CN109462586A - Flow monitoring method, device and execute server - Google Patents

Flow monitoring method, device and execute server Download PDF

Info

Publication number
CN109462586A
CN109462586A CN201811327450.6A CN201811327450A CN109462586A CN 109462586 A CN109462586 A CN 109462586A CN 201811327450 A CN201811327450 A CN 201811327450A CN 109462586 A CN109462586 A CN 109462586A
Authority
CN
China
Prior art keywords
data packet
uplink traffic
traffic data
execute server
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811327450.6A
Other languages
Chinese (zh)
Inventor
郝立鹏
石涵
熊杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Knownsec Information Technology Co Ltd
Original Assignee
Beijing Knownsec Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Knownsec Information Technology Co Ltd filed Critical Beijing Knownsec Information Technology Co Ltd
Priority to CN201811327450.6A priority Critical patent/CN109462586A/en
Publication of CN109462586A publication Critical patent/CN109462586A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network

Abstract

The present invention provides a kind of flow monitoring method, device and execute server, is related to technical field of communication processing.This method receives the uplink traffic data packet that user terminal is sent by dispatch server, and uplink traffic data packet is sent to execute server;Execute server verifies uplink traffic data packet according to default verification rule, to determine whether uplink traffic data packet is abnormal;When to be no, execute server sends reply data packet corresponding with uplink traffic data packet to user terminal.Because execute server only carries out flow monitoring to the uplink traffic data packet that dispatch server is obtained from user terminal, namely execute server is only monitored the uplink traffic of user terminal, it is monitored without the downlink traffic data to user terminal, reduce the amount of data processing, so the memory space of service system can be saved, and then mitigate the pressure of service system flow monitoring processing, help to improve the efficiency of flow monitoring processing.

Description

Flow monitoring method, device and execute server
Technical field
The present invention relates to technical field of communication processing, in particular to a kind of flow monitoring method, device and hold Row server.
Background technique
In traffic security field, the flow of transmission generally includes abnormal flow, if not filtering to abnormal flow It removes, is easy so that server or user terminal are attacked and be unable to operate normally.Flow in transmission process, usually server this Side can be monitored flow, and traditional approach will be divided again after uplink and downlink flow all recombination magnanimity flow Analysis, since downlink traffic is usually more times (for example being 10 times) of uplink traffic, traditional approach can seriously consume clothes in recombination The memory source of business device and the computing resource of processor, reduce so as to cause the treatment effeciency of flow monitoring.
Summary of the invention
In order to overcome the deficiencies in the prior art described above, the invention reside in provide a kind of flow monitoring method, device and hold Row server can reduce the memory space of server and the consumption of computing resource, help to improve the efficiency to flow monitoring.
To achieve the goals above, technical solution provided by the embodiment of the present invention is as follows:
In a first aspect, the embodiment of the present invention provides a kind of flow monitoring method, applied to including dispatch server and at least The distribution service of one execute server, which comprises
The dispatch server receives the uplink traffic data packet that user terminal is sent, and by the uplink traffic data packet It is sent to execute server;
The execute server verifies the uplink traffic data packet according to default verification rule, described in determination Whether uplink traffic data packet is abnormal;
When to be no, the execute server is sent and the uplink traffic data packet corresponding time to the user terminal Complex data packet.
Optionally, above-mentioned execute server verifies the uplink traffic data packet according to default verification rule, wraps Include following at least one mode:
Based on the corresponding transmission control protocol of the uplink traffic data packet, the execute server is to the uplink traffic Data carry out field verification and/or checkmark and/or load data verification, wherein in field verification, mark school Test, any one of load data verification verification it is obstructed out-of-date, determine that the uplink traffic data packet is abnormal;Or
Based on the corresponding source IP of the uplink traffic data packet, the execute server is to the corresponding use of the same source IP The byte-sized or request number of times for the uplink traffic data packet that family terminal is sent are verified, wherein same in preset period of time The byte for the uplink traffic data packet that the corresponding user terminal of the source IP is sent is not in preset flow threshold range, Huo Zhe When the request number of times is more than preset times, determine that the uplink traffic data packet is abnormal.
Optionally, above-mentioned execute server verifies the uplink traffic data packet according to default verification rule, wraps It includes:
Judge the biography that the uplink traffic data are used for transmission between the distribution service and the user terminal Whether defeated channel establishes the three-way handshake of transmission control protocol connection;
When the transmission channel establishes the three-way handshake for having transmission control protocol to connect, the execute server judges institute It states transmission channel and transmits the throughput of the uplink traffic data packet whether in default throughput range, when the transmission channel When transmitting the throughput of the uplink traffic data packet not in default throughput range, determine that the uplink traffic data packet is different Often;Alternatively,
When the transmission channel does not establish the three-way handshake of transmission control protocol connection, the execute server passes through The transmission rate of the transmission channel, the byte-sized for the uplink traffic data packet transmitted in preset duration determine the uplink Whether data on flows packet is abnormal, wherein in the transmission rate not in Preset Transfer speed range, or when described default The byte-sized of the uplink traffic data packet of long transmission determines the uplink traffic data packet not in preset flow threshold range It is abnormal.
Optionally, the above method further include: described to execute service when it is abnormal for determining the uplink traffic data packet Device abandons the uplink traffic data packet.
Optionally, before the uplink traffic data packet is sent to execute server, the method also includes:
The dispatch server determines that target executes clothes from least one execute server according to default balance policy Business device, wherein the target execute server is used to receive the uplink traffic data packet that the dispatch server is sent.
Optionally, the uplink traffic data packet is carried out verifying it according to default verification rule in the execute server Before, the method also includes:
The execute server parses the uplink traffic data packet according to default resolution rules, and is parsed Field afterwards is to verify the uplink traffic data packet.
Second aspect, the embodiment of the present invention provide a kind of flow monitoring device, applied to including dispatch server and at least The distribution service of one execute server, described device include:
Receiving unit, for receiving the uplink traffic data packet of user terminal transmission, and by the uplink traffic data packet It is sent to execute server;
Verification unit, for being verified according to default verification rule to the uplink traffic data packet, described in determination Whether uplink traffic data packet is abnormal;
Transmission unit, for when the verification unit determines that the uplink traffic data packet is not abnormal, to the use Family terminal sends reply data packet corresponding with the uplink traffic data packet.
Optionally, above-mentioned verification unit is also used to:
Based on the corresponding transmission control protocol of the uplink traffic data packet, the execute server is to the uplink traffic Data carry out field verification and/or checkmark and/or load data verification, wherein in field verification, mark school Test, any one of load data verification verification it is obstructed out-of-date, determine that the uplink traffic data packet is abnormal;Or
Based on the corresponding source IP of the uplink traffic data packet, the execute server is to the corresponding use of the same source IP The byte-sized or request number of times for the uplink traffic data packet that family terminal is sent are verified, wherein same in preset period of time The byte for the uplink traffic data packet that the corresponding user terminal of the source IP is sent is not in preset flow threshold range, Huo Zhe When the request number of times is more than preset times, determine that the uplink traffic data packet is abnormal.
The third aspect, the embodiment of the present invention provide a kind of execute server, comprising:
Memory module;
Processing module;And
Flow monitoring device is stored in the memory module including one or more and is executed by the processing module Software function module, the flow monitoring device include:
Receiving unit, for receiving the uplink traffic data packet of user terminal transmission, and by the uplink traffic data packet It is sent to execute server;
Verification unit, for being verified according to default verification rule to the uplink traffic data packet, described in determination Whether uplink traffic data packet is abnormal;
Transmission unit, for when the verification unit determines that the uplink traffic data packet is not abnormal, to the use Family terminal sends reply data packet corresponding with the uplink traffic data packet.
Fourth aspect, the embodiment of the present invention provide a kind of computer readable storage medium, deposit in the readable storage medium storing program for executing Computer program is contained, when the computer program is run on computers, so that the computer executes above-mentioned flow Monitoring method.
In terms of existing technologies, flow monitoring method provided by the invention, device and execute server at least have Below the utility model has the advantages that this method receives the uplink traffic data packet that user terminal is sent by dispatch server, and by upstream Amount data packet is sent to execute server;Execute server verifies uplink traffic data packet according to default verification rule, To determine whether uplink traffic data packet is abnormal;When to be no, execute server is sent and uplink traffic data to user terminal Wrap corresponding reply data packet.Because of the uplink traffic data packet that execute server only obtains dispatch server from user terminal Flow monitoring is carried out, that is, execute server is only monitored the uplink traffic of user terminal, without to user terminal Downlink traffic data are monitored, and reduce the amount of data processing, it is possible to be saved the memory space of service system, and then be subtracted The pressure of light service system flow monitoring processing, helps to improve the efficiency of flow monitoring processing.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, the embodiment of the present invention is cited below particularly, and match Appended attached drawing is closed, is described in detail below.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be to needed in the embodiment attached Figure is briefly described.It should be appreciated that the following drawings illustrates only certain embodiments of the present invention, therefore it is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is the interaction schematic diagram of execute server provided in an embodiment of the present invention, dispatch server and user terminal.
Fig. 2 is the block diagram of execute server provided in an embodiment of the present invention.
Fig. 3 is the flow diagram of flow monitoring method provided in an embodiment of the present invention.
Fig. 4 is the block diagram of flow monitoring device provided in an embodiment of the present invention.
Icon: 10- execute server;11- processing module;12- communication module;13- memory module;20- dispatch server; 30- user terminal;100- flow monitoring device;110- receiving unit;120- verification unit;130- transmission unit.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description.Obviously, described embodiment is only a part of the embodiments of the present invention, instead of all the embodiments.It is logical The component for the embodiment of the present invention being often described and illustrated herein in the accompanying drawings can be arranged and be designed with a variety of different configurations.
Therefore, the detailed description of the embodiment of the present invention provided in the accompanying drawings is not intended to limit below claimed The scope of the present invention, but be merely representative of selected embodiment of the invention.Based on the embodiment of the present invention, those skilled in the art Member's every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.In addition, term " the One ", " second " etc. is only used for distinguishing description, is not understood to indicate or imply relative importance.
In traffic security field, existing server can carry out research and application to uplink traffic and downlink traffic, with true Whether fixed include abnormal flow.And uplink traffic and the data volume of downlink traffic are big, and downlink traffic is usually exponentially more than Uplink traffic, that is to say, that the data volume for the flow that server needs to monitor is big, this can occupy the memory space of server, and right Computing resource consumption is high, so as to cause the low efficiency of flow monitoring data processing.
With reference to the accompanying drawing, it elaborates to the embodiment of the present invention.In the absence of conflict, following embodiments and Feature in embodiment can be combined with each other.
Fig. 1 is please referred to, is execute server 10 provided in an embodiment of the present invention, dispatch server 20 and user terminal 30 Interaction schematic diagram.Distribution service provided in an embodiment of the present invention may include dispatch server 20 and at least one execution Server 10, dispatch server 20 is established by network and at least one execute server 10 and is communicated to connect, and carries out data friendship Mutually.Dispatch server 20 is established by network by network and at least one user terminal 30 and is communicated to connect, to carry out data friendship Mutually.Target execute server 10 at least one execute server 10 established by network and user terminal 30 communicate to connect with Carry out data interaction.Wherein, distribution service can be the service system of load balancing, under can be used for executing or realizing Each step for stating flow monitoring method can be reduced the occupancy of memory space, and can reduce meter during realizing flow monitoring The consumption (can be regarded as reducing occupancy/utilization rate of central processing unit) for calculating resource, improves the treatment effeciency to flow monitoring.
It referring to figure 2., is the block diagram of execute server 10 provided in an embodiment of the present invention.In the present embodiment, Execute server 10 may include processing module 11, communication module 12, memory module 13 and flow monitoring device 100, processing Directly or indirectly electrically connect between module 11, communication module 12, memory module 13 and each element of flow monitoring device 100 It connects, to realize the transmission or interaction of data.For example, these elements can pass through one or more communication bus or signal between each other Line, which is realized, to be electrically connected.
It referring to figure 3., is the flow diagram of flow monitoring method provided in an embodiment of the present invention.The embodiment of the present invention mentions The flow monitoring method of confession can be applied to above-mentioned distribution service, real by dispatch server 20 and execute server 10 Each step of existing flow monitoring method can reduce the occupancy to system memory space, have on the basis of realizing flow monitoring Help raising system to the treatment effeciency of flow monitoring.
In the present embodiment, flow monitoring method may comprise steps of:
Step S210, dispatch server 20 receive the uplink traffic data packet that user terminal 30 is sent, and by uplink traffic Data packet is sent to execute server 10;
Step S220, execute server 10 verifies uplink traffic data packet according to default verification rule, with determination Whether uplink traffic data packet is abnormal;
Step S230, when to be no, execute server 10 sends corresponding with uplink traffic data packet to user terminal 30 Reply data packet.
Each step of flow monitoring method shown in Fig. 3 will be described in detail below:
Step S210, dispatch server 20 receive the uplink traffic data packet that user terminal 30 is sent, and by uplink traffic Data packet is sent to execute server 10.
In the present embodiment, dispatch server 20 receives uplink traffic data packet from user terminal 30, it will be appreciated that for scheduling Server 20 receives the upstream data that user terminal 30 is sent.Data that dispatch server 20 is sent to user terminal 30 or other Server can be regarded as the downlink data of user terminal 30 to the data that user terminal 30 is sent.Normally, user terminal 30 The byte of downlink data is exponentially to be higher than the byte of downlink data.For in the traffic environment of magnanimity, the present embodiment by pair The upstream data of user terminal 30 carries out flow monitoring processing, can reduce the amount of data processing, reduces system and stores upstream The occupied memory space of data packet is measured, the computing capability for saving central processing unit is facilitated, so that execute server 10/ is dispatched The treatment effeciency of server 20 is improved, and avoids collapsing because the amount of data processing is excessive.
Wherein, uplink traffic data packet includes but is not limited to TCP (Transmission Control Protocol, transmission Control protocol) data packet, IP (Internet Protocol, network protocol) data packet, it can be data packet and pass through shape after recombination At data packet.Specifically, what uplink traffic data packet can send for user terminal 30 to dispatch server 20 is used to request The data packet of business.Requested service can be configured according to the actual situation, including but not limited to, video download request, news Acquisition request, text acquisition request, picture acquisition request etc. are here not especially limited uplink traffic data.
Optionally, before uplink traffic data packet is sent to execute server 10, method can also include: scheduling clothes Device 20 be engaged according to default balance policy, determines target execute server 10 from least one execute server 10, wherein mesh Mark execute server 10 is used to receive the uplink traffic data packet of the transmission of dispatch server 20.
In the present embodiment, default balance policy can be configured according to the actual situation.For example, can be from multiple execution It is the smallest one or more as target execute server 10 that utilization rate of central processing unit is chosen in server 10;If uplink Data on flows packet quantity is more, and dispatch server 20 can preset multiple uplink traffic data packets according to this according to preset order Sequence is successively sent to an execute server 10, and a uplink traffic data packet is sent to an execute server 10, wherein The execute server 10 of dispatch server 20 to the transmission uplink traffic data packet of execute server 10 is just target execute server 10.Then, uplink traffic data packet is sent to target execute server 10 by dispatch server 20, so that destination server is to upper Row data on flows packet carries out respective handling.For example, being monitored to the safety of uplink traffic data packet, if safety, responds The corresponding request of uplink traffic data packet, and the request content of response is directly fed back into user terminal 30, it no longer needs to pass through tune It spends server 20 and the respond request content of feedback is sent to the user terminal 30, so as to reduce the pressure of dispatch server 20 Power.Based on this, facilitates the load balancing of the execute server 10 in distributed deployment, avoid leading to portion because of load imbalance The pressure of point execute server 10 is excessive and is unable to operate normally.
Step S220, execute server 10 verifies uplink traffic data packet according to default verification rule, with determination Whether uplink traffic data packet is abnormal.
In the present embodiment, presetting verification rule can be configured according to the actual situation, as long as can be to uplink traffic number It is monitored according to the safety of packet.Based on this, execute server 10 can determine whether uplink traffic data packet is tool The data packet for thering is DDoS (Distributed Denial of Service, distributed denial of service) to attack.
For example, step S220 may include that following at least one mode is realized:
Based on the corresponding transmission control protocol of uplink traffic data packet, execute server 10 carries out word to uplink traffic data Section verification and/or checkmark and/or load data verification, wherein in field verification, checkmark, load data verification Any one of verification it is obstructed out-of-date, determine that uplink traffic data packet is abnormal.
Alternatively, being based on the corresponding source IP of uplink traffic data packet, execute server 10 is whole to the corresponding user of same source IP The byte-sized or request number of times for the uplink traffic data packet that end 30 is sent are verified, wherein in preset period of time, same source The byte for the uplink traffic data packet that the corresponding user terminal 30 of IP is sent is not in preset flow threshold range, or in request time When number is more than preset times, determine that uplink traffic data packet is abnormal.
Understandably, field verification, checkmark, load data verification can be used for uplink traffic data packet transport protocol Validity check.Wherein, the principle of field verification may include: to judge whether preset field conflicts in uplink traffic data, For example, mutually conflicting if the source IP address of uplink traffic data packet is identical as purpose IP address for IP address (preset field);Or Person, if source port number and destination slogan are the same port of same equipment, for port collision, then uplink traffic data packet Field verification it is just unqualified, that is to say, that the uplink traffic data packet is abnormal data packet.Wherein, preset field can root It is configured according to actual conditions, is not especially limited here.
The principle of checkmark may include: first extract from uplink traffic data packet extract uplink traffic data packet in it is pre- It is marked with will, then judges that these default marks indicate whether that uplink traffic data packet is abnormal.For example, if TCP data packet (on Row data on flows packet) it simultaneously include syn mark and fin mark, then it is determined that the TCP data packet is abnormal data packet.Its In, default mark is the mark that uplink traffic data packet identifies in advance, can be configured according to the actual situation, not make to have here Body limits.
The principle of load data verification may include: to generally include load data in uplink traffic data packet.And for Normal load data is to parse to obtain corresponding contents, and for improper load data, can not usually parse to obtain in Hold or can not be parsed.Http protocol and HTTPS agreement such as based on Transmission Control Protocol, the load data of TCP is regular And part field can be parsed, if load data parses to obtain all 0xff values, then the uplink traffic data packet becomes different Regular data.
For example, six flag bits are all 1, six flag bits are all 0, SYN and FIN flag position while being 1, SYN and RST mark Will position is simultaneously 1, FIN and RST flag bit is simultaneously 1, and PSH, FIN and URG flag bit are simultaneously 1, and only FIN flag position is 1, only PSH flag bit is 1, and only URG flag bit is 1, SYN the and SYN-ACK message with load, and SYN, RST and FIN flag position are 1 Fragment message.
Optionally, step S220 may include: to judge to be used for transmission between distribution service and user terminal 30 Whether the transmission channel of row data on flows establishes the three-way handshake of transmission control protocol connection.
When transmission channel establishes the three-way handshake for having transmission control protocol to connect, execute server 10 judges transmission channel Transmit uplink traffic data packet throughput (unit of throughput can be data packet it is per second (Packets per Second, PPS)) whether in default throughput range, when the throughput of transmission channel transmission uplink traffic data packet is not handled up default When in rate range, determine that uplink traffic data packet is abnormal.Wherein, presetting throughput range can be set according to the actual situation It sets, is not especially limited here.
Alternatively, execute server 10 passes through when transmission channel does not establish the three-way handshake of transmission control protocol connection The transmission rate of transmission channel, the byte-sized for the uplink traffic data packet transmitted in preset duration determine uplink traffic data Whether packet is abnormal, wherein in transmission rate not in Preset Transfer speed range, or in the uplink traffic of preset duration transmission The byte-sized of data packet determines that uplink traffic data packet is abnormal not in preset flow threshold range.Wherein, preset duration, If transmission rate range and preset flow threshold range can be configured according to the actual situation, it is not especially limited here.
In the present embodiment, three-way handshake can be the three-way handshake between user terminal 30 and dispatch server 20.It can Understand ground, on the basis of three-way handshake, total byte of uplink traffic data packet is more than pre- if detecting in preset duration If flow threshold range, generally means that and currently deposit ddos attack, the uplink traffic data in the period can be regarded as Abnormal data.
Wherein, it is how to track to hold consultation to make the transmission of data segment and connect that three-way handshake, which is to the data volume sent every time, Receive and synchronize, based on the received the data validation number and data of data volume and determination send, receive after when cancel connection System, and establish virtual connections.
Specifically, for example, shaking hands for the first time: when establishing connection, user terminal 30 sends syn packet (syn=j) to scheduling clothes Business device 20, and enter SYN_SENT state, wait dispatch server 20 to confirm;SYN: synchronizing sequence numbers (Synchronize Sequence Numbers)。
Second handshake: syn packet is received to dispatch server 20, it is necessary to confirm the SYN (ack=j+1) of user terminal 30, A SYN packet (syn=k), i.e. SYN+ACK packet oneself are also sent simultaneously, dispatch server 20 enters SYN_RECV state at this time.
Third time is shaken hands: user terminal 30 receives the SYN+ACK packet of dispatch server 20, sends really to dispatch server 20 Recognize packet ACK (ack=k+1), this packet is sent, and user terminal 30 and dispatch server 20 enter ESTABLISHED (TCP company It is connected into function) state, complete three-way handshake.After completing three-way handshake, user terminal 30 and dispatch server 20 start to transmit data, As user terminal 30 transmits uplink traffic data to dispatch server 20 by the transmission channel based on three-way handshake.
Optionally, before step S220, method further include:
Execute server 10 parses uplink traffic data packet according to default resolution rules, and the word after being parsed Section is to verify uplink traffic data packet.
Optionally, in the present embodiment, it is also based on the data packet of tcp uplink traffic recombination, flow is monitored.
Wherein, default resolution rules can be configured according to the actual situation, in order to which execute server 10 is from upstream The field of needs is parsed in amount data packet.For example, execute server 10 can be from uplink traffic data packet with parsing source Location, destination address, source port, destination port, protocol number this five fields (being referred to as five-tuple) pass through the data of five-tuple Hash function processing obtains a unique cryptographic Hash, unique identification of this cryptographic Hash as session, using tcpsyn packet as weight The beginning of group carries the data in this session, is then constantly added in corresponding conversational list.With tcp fin or rst packet work Timing timeout mechanism is then taken turns come triggering session recombination using the time if it is TCP long connection for the end of recombination.Wherein, session It can be regarded as the process that uplink traffic data are carried out with flow monitoring.Conversational list can be used for counting the inspection of each uplink traffic data Survey result and progress.
In addition, timeout mechanism using based on the data packet (uplink traffic data packet) in TCP connection it is to be understood that drive The dynamic data structure of building in advance is operated, when this company in specified duration (specified duration can be configured according to the actual situation) The arrival of no data packet is connected, corresponding TCP connection is removed from conversational list.Based on this, it is periodically real to can solve high-volume When task schedule slow problem of progress due to time-consuming for waiting.
The dispatching algorithm time complexity of the abstract structure optimized is O (1), solves the high-volume period under production environment The scheduling difficult point of property real-time task.Wherein, O (1) can indicate the complexity of Hash table, it will be appreciated that it is the complexity of single order, It is exactly that complexity is lower.
Data packet after analysis recombination realizes that the principle of flow monitoring can be such that
Calculate downlink data packet: the packet (in addition to the data packet of three-way handshake) that payload length is 0 in upstream data packet is pair The confirmation ack packet of downlink data, data package size are the difference between first packet and the last one packet ack.
Calculate upstream data packet: in upstream data packet payload length greater than 0 packet be by user client transmission it is pure on Row data, the data package size of each segmentation are added up at the case where also having segment transmissions once in a while, total uplink that you can get it The size of flow.
After the byte-sized of upstream data packet or downlink data packet has been determined, it can be compared with corresponding preset threshold Compared with for example, if uplink traffic is excessive, such as more than preset flow, then then thinking Traffic Anomaly.
Furthermore it is also possible to judge whether the data in the same session meet condition, for example tcp connection is established, still It is but transmitted before the deadline without data, such as in the case where not establishing connection, begins to send the feelings such as clear data Condition is just abnormal flow.
Step S230, when to be no, execute server 10 sends corresponding with uplink traffic data packet to user terminal 30 Reply data packet.
Understandably, if uplink traffic data packet is normal data packet (not being abnormal data packet), then server Respective handling will be executed according to the content of uplink traffic data packet.For example, if uplink traffic data packet is substantially user terminal 30 requests for foradownloaded video sent, then execute server 10 will respond the request, and from the corresponding clothes of video source Business device gets video, and video content is then sent directly to user terminal 30, without as also needing to regard in the prior art Frequency content carries out traffic security monitoring and is sent to the user terminal 30 by dispatch server 20 again, to reduce execute server 10, the amount of the data processing of dispatch server 20 helps to improve the efficiency of flow monitoring.
Optionally, method further include: when it is abnormal for determining uplink traffic data packet, execute server 10 abandons uplink Data on flows packet.
Understandably, if uplink traffic data packet is abnormal data packet, execute server 10 directly abandons the data packet, keeps away Exempt from abnormal data packet to attack execute server 10, and execute server 10 is unable to operate normally.Such as, however, it is determined that Uplink traffic data packet has ddos attack out, then by the uplink traffic data packet discarding, to improve the peace of execute server 10 Quan Xing.
It referring to figure 4., is the block diagram of flow monitoring device 100 provided in an embodiment of the present invention.The present invention is implemented The flow monitoring device 100 that example provides can be applied to above-mentioned distribution service, for executing flow monitoring method Each step can reduce the occupancy to system memory space during flow monitoring, reduce the consumption to computing resource, Promote the treatment effeciency of flow monitoring.Wherein, flow monitoring device 100 may include that receiving unit 110, verification unit 120 are seen And transmission unit 130.
Receiving unit 110, for receiving the uplink traffic data packet of the transmission of user terminal 30, and by uplink traffic data packet It is sent to execute server 10.
Verification unit 120, for being verified according to default verification rule to uplink traffic data packet, to determine upstream Whether abnormal measure data packet.
Optionally, verification unit 120 is also used to: being based on the corresponding transmission control protocol of uplink traffic data packet, is executed clothes Device 10 be engaged in the progress field verification of uplink traffic data and/or checkmark and/or load data verification, wherein in field Any one of verification, checkmark, load data verification verification are obstructed out-of-date, determine that uplink traffic data packet is abnormal.Or base In the upstream that the corresponding source IP of uplink traffic data packet, execute server 10 send the corresponding user terminal of same source IP 30 The byte-sized or request number of times for measuring data packet are verified, wherein in preset period of time, the corresponding user terminal of same source IP 30 send uplink traffic data packets byte not in preset flow threshold range, or request number of times be more than preset times When, determine that uplink traffic data packet is abnormal.
Optionally, verification unit is also used to: judging to be used for transmission uplink between distribution service and user terminal 30 Whether the transmission channel of data on flows establishes the three-way handshake of transmission control protocol connection.When transmission channel foundation has transmission to control When the three-way handshake of agreement processed connection, execute server 10 judge transmission channel transmit uplink traffic data packet throughput whether In default throughput range, when the throughput of transmission channel transmission uplink traffic data packet is not in default throughput range When, determine that uplink traffic data packet is abnormal.Alternatively, when transmission channel does not establish the three-way handshake of transmission control protocol connection When, execute server 10 passes through the transmission rate of transmission channel, the byte for the uplink traffic data packet transmitted in preset duration Size determines whether uplink traffic data packet is abnormal, wherein in transmission rate not in Preset Transfer speed range, or pre- If the byte-sized of the uplink traffic data packet of duration transmission determines uplink traffic data packet not in preset flow threshold range It is abnormal.
Transmission unit 130, for verification unit 120 determine uplink traffic data packet be not abnormal when, to user terminal 30 send reply data packet corresponding with uplink traffic data packet.
Optionally, flow monitoring device 100 further includes discarding unit, for determining that uplink traffic data packet is abnormal When, execute server 10 abandons uplink traffic data packet.
Optionally, flow monitoring device 100 further includes scheduling determination unit.In receiving unit 110 by uplink traffic data Packet is sent to before execute server 10, and scheduling determination unit is used to execute service from least one according to balance policy is preset Target execute server 10 is determined in device 10, wherein target execute server 10 is used to receive the transmission of dispatch server 20 Uplink traffic data packet.
Optionally, flow monitoring device 100 further includes resolution unit.It is right according to default verification rule in verification unit 120 Before uplink traffic data packet is verified, resolution unit is for solving uplink traffic data packet according to default resolution rules Analysis, and the field after being parsed is to verify uplink traffic data packet.
It should be noted that it is apparent to those skilled in the art that, for convenience and simplicity of description, on The specific work process of the flow monitoring device 100 of description is stated, it can be with reference to each step corresponding process in preceding method, herein No longer excessively repeat.
In the present embodiment, user terminal 30 may be, but not limited to, smart phone, PC (personal Computer, PC), tablet computer, personal digital assistant (personal digital assistant, PDA), mobile Internet access set Standby (mobile Internet device, MID) etc..Network may be, but not limited to, cable network or wireless network.
Referring once again to Fig. 2, in the present embodiment, processing module 11 can be a kind of IC chip, have signal Processing capacity.Above-mentioned processing module 11 can be general processor.For example, the processor can be central processing unit At (Central Processing Unit, CPU), graphics processor (Graphics Processing Unit, GPU), network Manage device (Network Processor, NP) etc.;Can also be digital signal processor (DSP), specific integrated circuit (ASIC), Field programmable gate array (FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hard Part component.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.
Communication module 12 is used to establish leading to for execute server 10 and dispatch server 20 and user terminal 30 by network Letter connection, and pass through network sending and receiving data.
Memory module 13 may be, but not limited to, random access memory, read-only memory, programmable read only memory, Erasable Programmable Read Only Memory EPROM, electrically erasable programmable read-only memory etc..In the present embodiment, memory module 13 can be with For storing uplink traffic data packet, default verification rule etc..Certainly, memory module 13 can be also used for storage program, processing Module 11 executes the program after receiving and executing instruction.
Further, flow monitoring device 100 includes that at least one can be deposited in the form of software or firmware (firmware) The software function for being stored in memory module 13 or being solidificated in 10 operating system of execute server (operating system, OS) Module.Processing module 11 is used to execute the executable module stored in memory module 13, such as included by flow monitoring device 100 Software function module and computer program etc..
It is understood that structure shown in Fig. 2 is only a kind of structural schematic diagram of execute server 10, execute server 10 can also include than more or fewer components shown in Fig. 2.Each component shown in Fig. 2 can using hardware, software or its Combination is realized.
The embodiment of the present invention also provides a kind of computer readable storage medium.Computer journey is stored in readable storage medium storing program for executing Sequence, when computer program is run on computers, so that computer is executed such as the flow monitoring method in above-described embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that the present invention can lead to Hardware realization is crossed, the mode of necessary general hardware platform can also be added to realize by software, based on this understanding, this hair Bright technical solution can be embodied in the form of software products, which can store in a non-volatile memories In medium (can be CD-ROM, USB flash disk, mobile hard disk etc.), including some instructions are used so that a computer equipment (can be Personal computer, server or network equipment etc.) execute method described in each implement scene of the present invention.
In conclusion the present invention provides a kind of flow monitoring method, device and execute server.This method passes through scheduling clothes Business device receives the uplink traffic data packet that user terminal is sent, and uplink traffic data packet is sent to execute server;It executes Server verifies uplink traffic data packet according to default verification rule, to determine whether uplink traffic data packet is abnormal; When to be no, execute server sends reply data packet corresponding with uplink traffic data packet to user terminal.Because executing clothes Business device only carries out flow monitoring, that is, execute server to the uplink traffic data packet that dispatch server is obtained from user terminal Only the uplink traffic of user terminal is monitored, is monitored without the downlink traffic data to user terminal, reduces number According to the amount of processing, it is possible to the memory space of service system is saved, and then mitigates the pressure of service system flow monitoring processing, Help to improve the efficiency of flow monitoring processing.
In embodiment provided by the present invention, it should be understood that disclosed devices, systems, and methods can also lead to Other modes are crossed to realize.Devices, systems, and methods embodiment described above is only schematical, for example, in attached drawing Flow chart and block diagram show that the system of multiple embodiments according to the present invention, the possibility of method and computer program product are real Existing architecture, function and operation.In this regard, each box in flowchart or block diagram can represent module, a journey A part of sequence section or code, a part of the module, section or code include one or more for realizing defined The executable instruction of logic function.It should also be noted that in some implementations as replacement, function marked in the box It can also occur in a different order than that indicated in the drawings.For example, two continuous boxes can actually be substantially in parallel It executes, they can also be executed in the opposite order sometimes, and this depends on the function involved.It is also noted that block diagram and/ Or the combination of each box in flow chart and the box in block diagram and or flow chart, can with execute as defined in function or The dedicated hardware based system of movement is realized, or can be realized using a combination of dedicated hardware and computer instructions. In addition, each functional module in each embodiment of the present invention can integrate one independent part of formation together, it can also be with It is modules individualism, an independent part can also be integrated to form with two or more modules.
It can replace, can be realized wholly or partly by software, hardware, firmware or any combination thereof.When When using software realization, can entirely or partly it realize in the form of a computer program product.The computer program product Including one or more computer instructions.It is all or part of when loading on computers and executing the computer program instructions Ground is generated according to process or function described in the embodiment of the present invention.The computer can be general purpose computer, special purpose computer, Computer network or other programmable devices.The computer instruction may be stored in a computer readable storage medium, or Person is transmitted from a computer readable storage medium to another computer readable storage medium, for example, the computer instruction Wired (such as coaxial cable, optical fiber, digital subscriber can be passed through from a web-site, computer, server or data center Line (DSL)) or wireless (such as infrared, wireless, microwave etc.) mode to another web-site, computer, server or data It is transmitted at center.The computer readable storage medium can be any usable medium that computer can access and either wrap The data storage devices such as server, the data center integrated containing one or more usable mediums.The usable medium can be magnetic Property medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disk Solid State Disk (SSD)) etc..
The foregoing is only a preferred embodiment of the present invention, is not intended to restrict the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.All within the spirits and principles of the present invention, made any to repair Change, equivalent replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of flow monitoring method, which is characterized in that applied to including dispatch server and at least one execute server Distribution service, which comprises
The dispatch server receives the uplink traffic data packet that user terminal is sent, and the uplink traffic data packet is sent To execute server;
The execute server verifies the uplink traffic data packet according to default verification rule, with the determination uplink Whether data on flows packet is abnormal;
When to be no, the execute server sends reply number corresponding with the uplink traffic data packet to the user terminal According to packet.
2. the method according to claim 1, wherein the execute server is according to default verification rule to described Uplink traffic data packet is verified, including following at least one mode:
Based on the corresponding transmission control protocol of the uplink traffic data packet, the execute server is to the uplink traffic data Carry out field verification and/or checkmark and/or load data verification, wherein in the field verification, checkmark, bear It is obstructed out-of-date to carry the verification of any one of data check, determines that the uplink traffic data packet is abnormal;Or
Based on the corresponding source IP of the uplink traffic data packet, the execute server is whole to the corresponding user of the same source IP The byte-sized or request number of times for holding the uplink traffic data packet sent are verified, wherein same described in preset period of time The byte for the uplink traffic data packet that the corresponding user terminal of source IP is sent is not in preset flow threshold range, or described When request number of times is more than preset times, determine that the uplink traffic data packet is abnormal.
3. the method according to claim 1, wherein the execute server is according to default verification rule to described Uplink traffic data packet is verified, comprising:
Judge that the transmission that the uplink traffic data are used for transmission between the distribution service and the user terminal is logical Whether road establishes the three-way handshake of transmission control protocol connection;
When the transmission channel establishes the three-way handshake for having transmission control protocol to connect, the execute server judges the biography Whether the throughput of uplink traffic data packet described in defeated channel transfer is in default throughput range, when the transmission channel is transmitted When the throughput of the uplink traffic data packet is not in default throughput range, determine that the uplink traffic data packet is abnormal; Alternatively,
When the transmission channel does not establish the three-way handshake of transmission control protocol connection, the execute server passes through described The transmission rate of transmission channel, the byte-sized for the uplink traffic data packet transmitted in preset duration determine the uplink traffic Whether data packet is abnormal, wherein in the transmission rate not in Preset Transfer speed range, or in preset duration biography The byte-sized of defeated uplink traffic data packet determines that the uplink traffic data packet is different not in preset flow threshold range Often.
4. the method according to claim 1, wherein the method also includes: determining the uplink traffic When data packet is abnormal, the execute server abandons the uplink traffic data packet.
5. the method according to claim 1, wherein the uplink traffic data packet is sent to the service of execution Before device, the method also includes:
The dispatch server determines that target executes service from least one execute server according to default balance policy Device, wherein the target execute server is used to receive the uplink traffic data packet that the dispatch server is sent.
6. method described in any one of -5 according to claim 1, which is characterized in that in the execute server according to default Before verification rule verifies the uplink traffic data packet, the method also includes:
The execute server parses the uplink traffic data packet according to default resolution rules, and after being parsed Field is to verify the uplink traffic data packet.
7. a kind of flow monitoring device, which is characterized in that applied to including dispatch server and at least one execute server Distribution service, described device include:
Receiving unit is sent for receiving the uplink traffic data packet of user terminal transmission, and by the uplink traffic data packet To execute server;
Verification unit, for being verified according to default verification rule to the uplink traffic data packet, with the determination uplink Whether data on flows packet is abnormal;
Transmission unit, for when the verification unit determines that the uplink traffic data packet is not abnormal, Xiang Suoshu user to be whole End sends reply data packet corresponding with the uplink traffic data packet.
8. device according to claim 7, which is characterized in that the verification unit is also used to:
Based on the corresponding transmission control protocol of the uplink traffic data packet, the execute server is to the uplink traffic data Carry out field verification and/or checkmark and/or load data verification, wherein in the field verification, checkmark, bear It is obstructed out-of-date to carry the verification of any one of data check, determines that the uplink traffic data packet is abnormal;Or
Based on the corresponding source IP of the uplink traffic data packet, the execute server is whole to the corresponding user of the same source IP The byte-sized or request number of times for holding the uplink traffic data packet sent are verified, wherein same described in preset period of time The byte for the uplink traffic data packet that the corresponding user terminal of source IP is sent is not in preset flow threshold range, or described When request number of times is more than preset times, determine that the uplink traffic data packet is abnormal.
9. a kind of execute server characterized by comprising
Memory module;
Processing module;And
Flow monitoring device, the software for being stored in the memory module and being executed by the processing module including one or more Functional module, the flow monitoring device include:
Receiving unit is sent for receiving the uplink traffic data packet of user terminal transmission, and by the uplink traffic data packet To execute server;
Verification unit, for being verified according to default verification rule to the uplink traffic data packet, with the determination uplink Whether data on flows packet is abnormal;
Transmission unit, for when the verification unit determines that the uplink traffic data packet is not abnormal, Xiang Suoshu user to be whole End sends reply data packet corresponding with the uplink traffic data packet.
10. a kind of computer readable storage medium, which is characterized in that it is stored with computer program in the readable storage medium storing program for executing, When the computer program is run on computers, so that the computer is executed such as any one of claim 1-6 institute The flow monitoring method stated.
CN201811327450.6A 2018-11-08 2018-11-08 Flow monitoring method, device and execute server Pending CN109462586A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811327450.6A CN109462586A (en) 2018-11-08 2018-11-08 Flow monitoring method, device and execute server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811327450.6A CN109462586A (en) 2018-11-08 2018-11-08 Flow monitoring method, device and execute server

Publications (1)

Publication Number Publication Date
CN109462586A true CN109462586A (en) 2019-03-12

Family

ID=65609778

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811327450.6A Pending CN109462586A (en) 2018-11-08 2018-11-08 Flow monitoring method, device and execute server

Country Status (1)

Country Link
CN (1) CN109462586A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111010409A (en) * 2020-01-07 2020-04-14 南京林业大学 Encryption attack network flow detection method
CN112887319A (en) * 2021-02-01 2021-06-01 上海帆一尚行科技有限公司 Network state monitoring method and device based on downlink traffic and electronic equipment
CN113098875A (en) * 2021-04-02 2021-07-09 北京兰云科技有限公司 Network monitoring method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007071881A2 (en) * 2005-12-19 2007-06-28 France Telecom Terminal-accessible service use evaluation
CN101494598A (en) * 2008-01-25 2009-07-29 华为技术有限公司 Flow control method, device and system
CN101827033A (en) * 2010-04-30 2010-09-08 北京搜狗科技发展有限公司 Method and device for controlling network traffic and local area network system
CN106792618A (en) * 2016-11-30 2017-05-31 宇龙计算机通信科技(深圳)有限公司 Flux monitoring method and device and terminal
CN106850687A (en) * 2017-03-29 2017-06-13 北京百度网讯科技有限公司 Method and apparatus for detecting network attack
CN107395550A (en) * 2016-05-16 2017-11-24 腾讯科技(深圳)有限公司 The defence method and server of a kind of network attack
CN108322418A (en) * 2017-01-16 2018-07-24 深圳兆日科技股份有限公司 The detection method and device of unauthorized access
CN108600208A (en) * 2018-04-12 2018-09-28 南京中新赛克科技有限责任公司 A kind of fine granularity flow arbitration device and method for server cluster

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007071881A2 (en) * 2005-12-19 2007-06-28 France Telecom Terminal-accessible service use evaluation
CN101494598A (en) * 2008-01-25 2009-07-29 华为技术有限公司 Flow control method, device and system
CN101827033A (en) * 2010-04-30 2010-09-08 北京搜狗科技发展有限公司 Method and device for controlling network traffic and local area network system
CN107395550A (en) * 2016-05-16 2017-11-24 腾讯科技(深圳)有限公司 The defence method and server of a kind of network attack
CN106792618A (en) * 2016-11-30 2017-05-31 宇龙计算机通信科技(深圳)有限公司 Flux monitoring method and device and terminal
CN108322418A (en) * 2017-01-16 2018-07-24 深圳兆日科技股份有限公司 The detection method and device of unauthorized access
CN106850687A (en) * 2017-03-29 2017-06-13 北京百度网讯科技有限公司 Method and apparatus for detecting network attack
CN108600208A (en) * 2018-04-12 2018-09-28 南京中新赛克科技有限责任公司 A kind of fine granularity flow arbitration device and method for server cluster

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111010409A (en) * 2020-01-07 2020-04-14 南京林业大学 Encryption attack network flow detection method
CN111010409B (en) * 2020-01-07 2021-08-17 南京林业大学 Encryption attack network flow detection method
CN112887319A (en) * 2021-02-01 2021-06-01 上海帆一尚行科技有限公司 Network state monitoring method and device based on downlink traffic and electronic equipment
CN112887319B (en) * 2021-02-01 2022-07-01 上海帆一尚行科技有限公司 Network state monitoring method and device based on downlink traffic and electronic equipment
CN113098875A (en) * 2021-04-02 2021-07-09 北京兰云科技有限公司 Network monitoring method and device
CN113098875B (en) * 2021-04-02 2023-01-10 北京兰云科技有限公司 Network monitoring method and device

Similar Documents

Publication Publication Date Title
US11196653B2 (en) Systems and methods for dynamic bandwidth allocation and optimization
US20140164640A1 (en) Small packet priority congestion control for data center traffic
CN109462586A (en) Flow monitoring method, device and execute server
US20140164641A1 (en) Congestion control for data center traffic
US9712374B1 (en) Network services resource management
WO2018112877A1 (en) Path calculating and access request distributing methods, devices and systems
EP2755363A1 (en) Data-fast-distribution method and device
EP3119132B1 (en) Access port queuing & resource management
Hayajneh et al. A green approach for selfish misbehavior detection in 802.11-based wireless networks
Gomez et al. A survey on TCP enhancements using P4-programmable devices
Jeon et al. Experimental evaluation of improved IoT middleware for flexible performance and efficient connectivity
CN104380686B (en) Method and system, NG Fire-walled Clients and NG SOCKS servers for implementing NG fire walls
KR101448951B1 (en) Apparatus and method for processing packet
Huang et al. A buffer management algorithm for improving up/down transmission congestion protocol fairness in IEEE 802.11 wireless local area networks
JP2011171995A (en) Device, method, and program for discriminating data
CN112436982B (en) Network flow automatic mixed running test method, system, terminal and storage medium
Dashtbozorgi et al. A high-performance and scalable multi-core aware software solution for network monitoring
JP2018046404A (en) Relay device, relay system, relay program, and relay method
CN106549815B (en) Apparatus and method for real-time deep application recognition in a network
CN114124489B (en) Method, cleaning device, equipment and medium for preventing flow attack
EP3716549A1 (en) Bandwidth management
US11483241B2 (en) Network traffic metering credit distribution in network device having multiple processing units
CN116938598B (en) Information transmission method, apparatus, electronic device, and computer-readable medium
JP6060723B2 (en) COMMUNICATION SYSTEM, TRANSMITTER, AND COMMUNICATION CONTROL METHOD
US8593972B2 (en) Method to verify a drop probability curve

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Room 311501, Unit 1, Building 5, Courtyard 1, Futong East Street, Chaoyang District, Beijing

Applicant after: BEIJING KNOWNSEC INFORMATION TECHNOLOGY Co.,Ltd.

Address before: Room 311501, Unit 1, Building 5, Courtyard 1, Futong East Street, Chaoyang District, Beijing

Applicant before: BEIJING KNOWNSEC INFORMATION TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
RJ01 Rejection of invention patent application after publication

Application publication date: 20190312

RJ01 Rejection of invention patent application after publication