CN109495330B - Method and device for realizing UDP interception test - Google Patents

Method and device for realizing UDP interception test Download PDF

Info

Publication number
CN109495330B
CN109495330B CN201710811096.3A CN201710811096A CN109495330B CN 109495330 B CN109495330 B CN 109495330B CN 201710811096 A CN201710811096 A CN 201710811096A CN 109495330 B CN109495330 B CN 109495330B
Authority
CN
China
Prior art keywords
receiver
access data
interception
port
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710811096.3A
Other languages
Chinese (zh)
Other versions
CN109495330A (en
Inventor
张慧珍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201710811096.3A priority Critical patent/CN109495330B/en
Publication of CN109495330A publication Critical patent/CN109495330A/en
Application granted granted Critical
Publication of CN109495330B publication Critical patent/CN109495330B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL

Abstract

The application discloses a method and a device for realizing UDP interception test, comprising the following steps: a monitoring port which is configured in advance by a receiver and used for monitoring whether access data are received is taken as a target port, and the IP of the receiver is taken as a target IP, and a UDP interception instruction is issued to the interception execution equipment; and the initiator sends the IP access data to the receiver by taking the monitoring port of the receiver as a destination port, and if the returned result is that the monitoring port of the receiver cannot receive the access data, the initiator determines that the current UDP interception is successful. By the technical scheme provided by the application, the UDP interception test is verified, so that the initiator knows whether the UDP interception test is successful or not.

Description

Method and device for realizing UDP interception test
Technical Field
The present application relates to, but not limited to, communication network technologies, and in particular, to a method and an apparatus for implementing UDP interception test.
Background
Many games and video websites are transmitted by using a User Datagram Protocol (UDP), and when some video websites or games have illegal conditions, the transmission of the video websites or games should be stopped in time. The method for terminating the video website or game propagation with illegal violation is to acquire an Internet Protocol (IP) address and a port used for problem data exchange from data exchange traffic and intercept the IP address and the port. After the interception request is sent to the interception execution device, it needs to determine whether the flow of the UDP protocol is successfully intercepted.
Since the UDP protocol is a connectionless protocol, whether data is transmitted from the client to the server cannot be determined by a packet return from the initiator. That is, the related art cannot perform the verification of the UDP interception test.
Disclosure of Invention
In order to solve the technical problem, the invention provides a method and a device for realizing a UDP interception test, which can verify the UDP interception test.
In order to achieve the purpose of the invention, the invention provides a method for realizing UDP interception test, which comprises the following steps:
the initiator takes a monitoring port which is pre-configured by the receiver and is used for monitoring whether the access data is received as a target port and takes the IP of the receiver as a target IP, and issues a UDP interception instruction to the interception execution equipment;
the initiator sends IP access data to the receiver by taking the monitoring port of the receiver as a destination port;
and the initiator receives a return result from the receiver, and if the return result is that the monitoring port of the receiver cannot receive the access data, the initiator determines that the current UDP interception is successful.
Optionally, the method further comprises, before:
the initiator sends IP access data to a receiver by taking the monitoring port as a destination port, and if the receiver receives the IP access data, the step of issuing a UDP interception instruction to the interception execution equipment is continuously executed;
and if the receiver can not receive the IP access data, checking the network basic environment until the receiver receives the IP access data, and then executing the step of issuing a UDP interception instruction to the interception execution equipment.
Optionally, the sending, by the initiator, the IP access data to the receiver by using the listening port as a destination port includes:
the initiator sends IP access data twice or more to a receiver by taking the monitoring port as a destination port;
the method further comprises the following steps:
and calculating the interception rate of the flow according to the number of the access data received by the receiver and the access times of the IP access data.
Optionally, if the returned result is that the listening port of the receiver receives the access data, it is determined that the current UDP interception fails.
The application also provides a data processing method, which comprises the following steps:
taking a monitoring port of second computing equipment as a destination port and an IP of the second computing equipment as a destination IP, and sending an interception instruction to interception equipment by first computing equipment;
the first computing device sends a first amount of access data to the second computing device by taking a monitoring port of the second computing device as a destination port and taking an IP of the second computing device as a destination IP;
the first computing device receiving a returned result of the second computing device, the returned result comprising: a listening port of the second computing device receives a second amount of access data;
the first computing device determines that the first number exceeds the second number, indicating that the interception device setting is successful.
The application further provides a device for implementing UDP interception test, which includes: an interception unit and a monitoring unit; wherein the content of the first and second substances,
the interception unit is used for issuing a UDP interception instruction to the interception execution equipment by taking a monitoring port which is pre-configured by the receiver and is used for monitoring whether the access data is received as a target port and taking the IP of the receiver as a target IP when the network basic environment is normal;
and the monitoring unit is used for sending the IP access data to the receiver by taking the monitoring port of the receiver as a destination port, and determining that the current UDP interception is successful if the returned result is that the monitoring port of the receiver cannot receive the access data.
Optionally, the method further comprises:
and the deployment unit is used for sending IP access data to the receiver by taking the monitoring port as a destination port after the receiver sets and opens the monitoring port, and if the receiver receives the IP access data, the network basic environment is normal.
Optionally, when the initiator sends the IP access data to the receiver using the listening port as a destination port, the sending includes: the initiator sends two or more times of IP access data to the receiver by taking the monitoring port as a destination port,
the listening unit is further configured to: and calculating the interception rate of the flow according to the number of the access data received by the receiver and the access times of the IP access data.
Optionally, when the apparatus is used as a receiving party, the method further includes:
and the configuration unit is used for setting the monitoring port and opening the monitoring port.
The present application further provides a computer-readable storage medium storing computer-executable instructions for performing any one of the above methods for implementing UDP interception testing.
The application also provides a device for realizing the UDP interception test, which comprises a memory and a processor, wherein the memory stores the following executable instructions: a monitoring port which is configured in advance by a receiver and used for monitoring whether access data is received is taken as a target port, and an IP of the receiver is taken as a target IP, and a UDP interception instruction is issued to the interception execution equipment; and sending the IP access data to the receiver by taking the monitoring port of the receiver as a destination port, and determining that the current UDP interception is successful if the returned result is that the monitoring port of the receiver cannot receive the access data.
The present application at least includes: a monitoring port which is configured in advance by a receiver and used for monitoring whether access data are received is taken as a target port, and the IP of the receiver is taken as a target IP, and a UDP interception instruction is issued to the interception execution equipment; the initiator sends the IP access data to the receiver by taking the monitoring port of the receiver as a destination port, and if the returned result is that the monitoring port of the receiver cannot receive the access data, the initiator determines that the current UDP interception is successful. By the technical scheme provided by the application, the UDP interception test is verified, so that the initiator knows whether the UDP interception test is successful or not.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the claimed subject matter and are incorporated in and constitute a part of this specification, illustrate embodiments of the subject matter and together with the description serve to explain the principles of the subject matter and not to limit the subject matter.
FIG. 1 is a schematic diagram of two implementations of Internet traffic in the related art;
FIG. 2 is a schematic flowchart of a method for implementing UDP interception test according to the present application;
FIG. 3 is a flowchart illustrating a first embodiment of implementing UDP interception test according to the present application;
FIG. 4 is a flowchart illustrating a second embodiment of implementing UDP interception test according to the present application;
fig. 5 is a schematic structural diagram of a device for implementing UDP interception test according to the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more apparent, embodiments of the present application will be described in detail below with reference to the accompanying drawings. It should be noted that the embodiments and features of the embodiments in the present application may be arbitrarily combined with each other without conflict.
In one exemplary configuration of the present application, a computing device includes one or more processors (CPUs), input/output interfaces, a network interface, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include non-transitory computer readable media (transient media), such as modulated data signals and carrier waves.
The steps illustrated in the flow charts of the figures may be performed in a computer system such as a set of computer-executable instructions. Also, while a logical order is shown in the flow diagrams, in some cases, the steps shown or described may be performed in an order different than here.
The traffic direction of the internet traffic is divided into two cases of outgoing traffic and incoming traffic, fig. 1 is a schematic diagram of two implementation forms of the internet traffic in the related art, as shown in fig. 1, when an initiator intercepting a request instruction is a client, that is, access is initiated from the client, the internet traffic sent from the initiator client to a receiver server is called incoming traffic; when the interception request instruction initiator is a server, that is, access is initiated from the server, internet traffic sent from the initiator server to the receiver client is called outgoing traffic. The UDP intercepted network traffic may include: traffic of a UDP protocol of a certain IP, or traffic of a certain port of a UDP protocol of a certain IP.
Fig. 2 is a schematic flowchart of a method for implementing UDP interception testing according to the present application, as shown in fig. 2, the method at least includes:
step 200: the initiator takes a monitoring port which is configured in advance by the receiver and is used for monitoring whether the access data is received as a destination port, takes the IP of the receiver as a destination IP, and issues a UDP interception instruction to the interception execution equipment.
Here, the UDP interception instruction may include: the system comprises a source IP, a source port, a destination IP, a destination port and a flow direction, wherein the source IP is an IP address of an initiator, the source port is empty, the destination IP is an IP address of a receiver, and the destination port is a monitoring port which is configured in advance by the receiver and used for monitoring whether access data are received.
After the UDP interception instruction issuance is completed and the acknowledgement is validated, the access path from the initiator to the recipient is cut off.
Step 201: the initiator sends the IP access data to the receiver by taking the monitoring port of the receiver as a destination port.
Optionally, when the initiator sends the IP access data to the receiver by using the listening port of the receiver as the destination port, the sending step includes: the initiator sends the IP access data twice or more to the receiver by taking the monitoring port of the receiver as a destination port, and the method of the application can also comprise the following steps:
and calculating the interception rate of the flow according to the number of the access data received by the receiver and the access times of the IP access data.
Optionally, the calculating the interception rate of the internet traffic may specifically include: the interception rate is 1- (number of pieces of access data received by the receiving side/number of accesses).
Therefore, the UDP interception effect of the whole network internet flow can be reasonably inferred according to the calculated interception rate, and the higher the interception rate is, the better the UDP interception effect is. That is, the initiator achieves a reasonable evaluation of the effect of UDP interception.
Step 202: and the sender receives a return result from the receiving end, and if the return result is that the monitoring port of the receiver cannot receive the access data, the current UDP interception is determined to be successful.
The method also comprises the following steps: and if the returned result is that the monitoring port of the receiver receives the access data, determining that the current UDP interception fails.
By the technical scheme provided by the application, the UDP interception test is verified, so that the initiator knows whether the UDP interception test is successful.
Optionally, before step 200 of the present application, the method may further include:
and setting a monitoring port for monitoring whether the access data is received at the receiver and opening the monitoring port.
Optionally, after the receiving side sets and opens the listening port, before step 200, the method may further include:
the initiator sends IP access data to the receiver by taking the monitoring port of the receiver as a destination port, and if the receiver receives the IP access data, the network basic environment is normal, and the step 200 is continuously executed; if the receiver cannot receive the IP access data, the network infrastructure needs to be checked and repaired until the receiver receives the IP access data, and step 200 is performed.
According to the technical scheme, whether the network basic environment is normal or not is further tested, the UDP interception test is correctly carried out, and the reliability of the UDP interception test result is further improved.
The application also provides a device for realizing the UDP interception test, which comprises a memory and a processor, wherein the memory stores the following executable instructions: a monitoring port which is configured in advance by a receiver and used for monitoring whether access data is received is taken as a target port, and an IP of the receiver is taken as a target IP, and a UDP interception instruction is issued to the interception execution equipment; and sending IP access data to the receiver by taking the monitoring port of the receiver as a destination port, and determining that the current UDP interception is successful if the returned result is that the monitoring port of the receiver cannot receive the access data.
Optionally, the present application further provides a data processing method, including:
taking a monitoring port preset on the second computing device as a destination port and an IP of the second computing device as a destination IP, and sending an interception instruction to the interception device by the first computing device;
the first computing device sends a first amount of access data, such as a first amount of N1 access data, to the second computing device, with the listening port of the second computing device as a destination port and the IP of the second computing device as a destination IP;
the first computing device receives a return result of the second computing device, wherein the return result comprises: the listening port of the second computing device receives a second amount of access data, such as a second number N2 of access data;
the first computing device determines that the first number N1 exceeds the second number N2, indicating that the intercepting device setup was successful.
The present application further provides a computer-readable storage medium storing computer-executable instructions for performing the above-mentioned data processing method.
The application further provides a device for realizing the UDP interception test, which comprises a memory and a processor, wherein the memory stores the following executable instructions: taking a monitoring port preset on the second computing device as a destination port and an IP of the second computing device as a destination IP, and sending an interception instruction to the interception device by the first computing device; the first computing device sends a first amount of access data, such as a first amount of N1 access data, to the second computing device, with the listening port of the second computing device as a destination port and the IP of the second computing device as a destination IP; the first computing device receives a return result of the second computing device, wherein the return result comprises: the listening port of the second computing device receives a second amount of access data, such as a second number N2 of access data; the first computing device determines that the first number N1 exceeds the second number N2, indicating that the intercepting device setup was successful.
Fig. 3 is a schematic flowchart of a first embodiment of implementing UDP interception test according to the present application, where the first embodiment takes UDP interception test of incoming traffic as an example, and as shown in fig. 3, the method includes:
step 300 to step 303: the UDP interception test of the incoming flow needs to set a monitoring port at a server and open the monitoring port, the client accesses the monitoring port of the server, if the server can receive IP access data, the network basic environment is indicated to be normal, and if the server can not receive the IP access data, the network basic environment needs to be checked and repaired until the server can receive the IP access data.
Step 304 to step 308: after confirming that the basic network environment is normal, issuing a UDP interception instruction to the interception execution equipment, wherein the source IP address of the UDP interception instruction is the IP address of the client, the source port is empty, the target IP address is the IP address of the server, and the target port is a monitoring port opened on the IP of the server; after the interception instruction is issued and the confirmation is valid, the client sends IP access data to a monitoring port of the server, if the monitoring content cannot be received at the server, the UDP interception is judged to be successful, and if the monitoring content is received at the server, the UDP interception is judged to be failed.
If the client sends the IP access data to the monitoring port of the server for multiple times, the interception rate of the incoming flow can be further calculated by checking the number of the IP access data packets received by the server: the interception rate is 1- (number of pieces of access data received by the receiving side/number of accesses).
Fig. 4 is a schematic flowchart of a second embodiment for implementing UDP interception test according to the present application, where in the second embodiment, a UDP interception test of an outgoing flow is taken as an example, and a main difference between the UDP interception test of the outgoing flow in the embodiment and the UDP interception test of an incoming flow in the first embodiment is that a monitoring port is configured at a client, and IP access data is initiated by a server. As shown in fig. 4, includes:
step 400 to step 403: the method comprises the steps that a monitoring port is arranged at a client side and is opened, the monitoring port of the client side is accessed from a server side, if the client side can receive IP access data, the network basic environment is normal, and if the client side cannot receive the IP access data, the network basic environment needs to be checked and repaired until the client side can receive the IP access data.
Step 404 to step 408: after confirming that the network basic test environment is normal, issuing a UDP interception instruction to the interception execution equipment, wherein the source IP address of the UDP interception instruction is the IP address of the server side, the source port is empty, the destination IP address is the IP address of the client side, and the destination port is a monitoring port opened on the IP of the client side; after the interception instruction is issued and the confirmation is valid, the server side sends IP access data to the monitoring port of the client side, if the client side cannot receive the monitored content, the UDP interception is judged to be successful, and if the client side receives the monitored content, the UDP interception is judged to be failed.
If the server side sends IP access data to the monitoring port of the client side for multiple times, the interception rate of the flow can be further calculated by checking the number of IP access data packets received by the client side: the interception rate is 1- (number of pieces of access data received by the receiving side/number of accesses).
The present application further provides a computer-readable storage medium storing computer-executable instructions for performing any one of the above methods for implementing UDP interception testing.
Fig. 5 is a schematic structural diagram of a device for implementing UDP interception testing according to the present application, and as shown in fig. 5, the device at least includes: an interception unit and a monitoring unit; wherein, the first and the second end of the pipe are connected with each other,
the interception unit is used for issuing a UDP interception instruction to the interception execution equipment by taking a monitoring port which is pre-configured by the receiver and is used for monitoring whether the access data is received as a target port when the network basic environment is normal;
and the monitoring unit is used for sending the IP access data to the receiver by taking the monitoring port of the receiver as a destination port, and determining that the current UDP interception is successful if the returned result is that the monitoring port of the receiver cannot receive the access data.
Here, the interception unit may know whether the UDP interception instruction is issued by checking the interception execution device.
By the technical scheme provided by the application, the UDP interception test is verified, so that the initiator knows whether the UDP interception test is successful.
Optionally, when the initiator sends the IP access data to the receiver by using the listening port of the receiver as the destination port, the sending step includes: the initiator sends the IP access data twice or more to the receiver by using the monitoring port of the receiver as a destination port, and the monitoring unit is further configured to:
and calculating the interception rate of the flow according to the number of the access data received by the receiver and the access times of the IP access data. Optionally, calculating the interception rate of the internet traffic may include: the interception rate is 1- (number of pieces of access data received by the receiving side/number of accesses).
Therefore, the UDP interception effect of the whole network internet flow can be reasonably inferred according to the calculated interception rate, and the higher the interception rate is, the better the UDP interception effect is. That is, the initiator achieves a reasonable evaluation of the effect of UDP interception.
Optionally, when the apparatus for implementing UDP interception test is used as a receiving party, the method further includes:
and the configuration unit is used for setting a monitoring port for monitoring whether the access data is received and opening the monitoring port.
Optionally, the apparatus for implementing UDP interception test of the present application further includes: a deployment unit for sending IP access data to the receiver by using the monitoring port of the receiver as the destination port after the receiver sets and opens the monitoring port, and if the receiver receives the IP access data, indicating that the network basic environment is normal
Although the embodiments disclosed in the present application are described above, the descriptions are only for the convenience of understanding the present application, and are not intended to limit the present application. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the disclosure as defined by the appended claims.

Claims (10)

1. A method for implementing UDP interception test is characterized by comprising the following steps:
the initiator takes a monitoring port which is pre-configured by the receiver and is used for monitoring whether the access data is received as a target port and takes the IP of the receiver as a target IP, and issues a UDP interception instruction to the interception execution equipment;
the initiator sends IP access data to the receiver by taking the monitoring port of the receiver as a destination port;
the initiator receives a return result from the receiver, and if the return result is that the monitoring port of the receiver cannot receive the access data, the initiator determines that the current UDP interception is successful; and if the returned result is that the monitoring port of the receiver receives the access data, determining that the current UDP interception fails.
2. The method of claim 1, further comprising, prior to the method:
the initiator sends IP access data to a receiver by taking the monitoring port as a destination port, and if the receiver receives the IP access data, the step of issuing a UDP interception instruction to the interception execution equipment is continuously executed;
and if the receiver can not receive the IP access data, checking the network basic environment until the receiver receives the IP access data, and then executing the step of issuing a UDP interception instruction to the interception execution equipment.
3. The method of claim 1 or 2, wherein the sending, by the initiator, the IP access data to the receiver using the listening port as a destination port comprises:
the initiator sends IP access data twice or more to a receiver by taking the monitoring port as a destination port;
the method further comprises the following steps:
and calculating the interception rate of the flow according to the number of the access data received by the receiver and the access times of the IP access data.
4. A method of data processing, comprising:
taking a monitoring port of second computing equipment as a destination port and taking an IP of the second computing equipment as a destination IP, and sending an interception instruction to interception equipment by first computing equipment;
the first computing device sends a first amount of access data to the second computing device by taking a monitoring port of the second computing device as a destination port and taking an IP of the second computing device as a destination IP;
the first computing device receiving a returned result of the second computing device, the returned result comprising: a listening port of the second computing device receives a second amount of access data;
the first computing device determines that the first number exceeds the second number, indicating that the interception device setting is successful.
5. An apparatus for implementing UDP interception testing, comprising: an interception unit and a monitoring unit; wherein the content of the first and second substances,
the interception unit is used for issuing a UDP interception instruction to the interception execution equipment by taking a monitoring port which is pre-configured by the receiver and is used for monitoring whether the access data is received as a target port and taking the IP of the receiver as a target IP when the network basic environment is normal;
the monitoring unit is used for sending IP access data to the receiver by taking the monitoring port of the receiver as a destination port, and determining that the current UDP interception is successful if the returned result is that the monitoring port of the receiver cannot receive the access data; and if the returned result is that the monitoring port of the receiver receives the access data, determining that the current UDP interception fails.
6. The apparatus of claim 5, further comprising:
and the deployment unit is used for sending IP access data to the receiver by taking the monitoring port as a destination port after the receiver sets and opens the monitoring port, and if the receiver receives the IP access data, the network basic environment is normal.
7. The apparatus of claim 5 or 6, wherein sending the IP access data to the receiver using the listening port as a destination port comprises: the monitoring port is used as a destination port to send IP access data to a receiver twice or more,
the listening unit is further configured to: and calculating the interception rate of the flow according to the number of the access data received by the receiver and the access times of the IP access data.
8. The apparatus according to claim 5 or 6, when the apparatus is used as a receiving side, further comprising:
and the configuration unit is used for setting the monitoring port and opening the monitoring port.
9. A computer-readable storage medium storing computer-executable instructions for performing the method for implementing UDP interception testing as claimed in any one of the preceding claims 1 to 3.
10. An apparatus for implementing UDP intercept testing, comprising a memory and a processor, wherein the memory has stored therein executable instructions that, when executed by the processor, implement the method of: a monitoring port which is configured in advance by a receiver and used for monitoring whether access data is received is taken as a target port, and an IP of the receiver is taken as a target IP, and a UDP interception instruction is issued to the interception execution equipment; sending IP access data to the receiver by taking the monitoring port of the receiver as a destination port, and determining that the current UDP interception is successful if the returned result is that the monitoring port of the receiver cannot receive the access data; and if the returned result is that the monitoring port of the receiver receives the access data, determining that the current UDP interception fails.
CN201710811096.3A 2017-09-11 2017-09-11 Method and device for realizing UDP interception test Active CN109495330B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710811096.3A CN109495330B (en) 2017-09-11 2017-09-11 Method and device for realizing UDP interception test

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710811096.3A CN109495330B (en) 2017-09-11 2017-09-11 Method and device for realizing UDP interception test

Publications (2)

Publication Number Publication Date
CN109495330A CN109495330A (en) 2019-03-19
CN109495330B true CN109495330B (en) 2022-07-05

Family

ID=65687482

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710811096.3A Active CN109495330B (en) 2017-09-11 2017-09-11 Method and device for realizing UDP interception test

Country Status (1)

Country Link
CN (1) CN109495330B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112717380B (en) * 2019-03-19 2023-04-07 Oppo广东移动通信有限公司 Network detection method and related device
CN113873057B (en) * 2021-09-28 2024-03-15 奇安信科技集团股份有限公司 Data processing method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103746885A (en) * 2014-01-28 2014-04-23 中国人民解放军信息安全测评认证中心 Test system and test method oriented to next-generation firewall
CN104539483A (en) * 2014-12-31 2015-04-22 中国电子科技集团公司第五十研究所 Network testing system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8200809B2 (en) * 2008-04-03 2012-06-12 At&T Intellectual Property I, L.P. Traffic analysis for a lawful interception system
US9628358B2 (en) * 2012-10-05 2017-04-18 Telefonaktiebolaget Lm Ericsson (Publ) Method and system for piggybacking radio data in IP measurements

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103746885A (en) * 2014-01-28 2014-04-23 中国人民解放军信息安全测评认证中心 Test system and test method oriented to next-generation firewall
CN104539483A (en) * 2014-12-31 2015-04-22 中国电子科技集团公司第五十研究所 Network testing system

Also Published As

Publication number Publication date
CN109495330A (en) 2019-03-19

Similar Documents

Publication Publication Date Title
KR102047585B1 (en) Method and apparatus of identifying proxy ip address
KR102167613B1 (en) Message push method and device
JP2018528679A (en) Device and method for establishing a connection in a load balancing system
CN107995233B (en) Method for establishing connection and corresponding equipment
CN104639555B (en) request processing method, system and device
CN109495330B (en) Method and device for realizing UDP interception test
CN110875897B (en) Data transmission method, device, server and storage medium
CN112565001A (en) NAT equipment performance test system, method, equipment and medium
JP2018533803A (en) IP address acquisition method and apparatus
CN108541000B (en) Method, medium and device for detecting network connection
CN108769086B (en) Method and equipment for detecting man-in-the-middle attack through user equipment
CN112615929B (en) Method and equipment for pushing messages
CN111953770B (en) Route forwarding method and device, route equipment and readable storage medium
CN111490961B (en) Communication connection blocking system, method, device and equipment
CN106302364B (en) Agent method, auxiliary agent method and equipment
CN113411228B (en) Network condition determining method and server
CN111600943B (en) Method and equipment for acquiring target data
US10742802B2 (en) Methods and devices for verifying a communication number
CN115914164A (en) Tunnel connection method and device, electronic equipment and storage medium
WO2016184079A1 (en) Method and device for processing system log message
CN105516297A (en) Information reporting method and device
CN110769010A (en) Data management authority processing method and device and computer equipment
CN114697380B (en) Redirection method, system, device and storage medium for access request
CN114614999B (en) Network access method, device, equipment and storage medium
WO2012119416A1 (en) Method for testing electronic device, and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant