CN109587643A - A kind of method and apparatus of detection application traffic leakage - Google Patents

A kind of method and apparatus of detection application traffic leakage Download PDF

Info

Publication number
CN109587643A
CN109587643A CN201811555328.4A CN201811555328A CN109587643A CN 109587643 A CN109587643 A CN 109587643A CN 201811555328 A CN201811555328 A CN 201811555328A CN 109587643 A CN109587643 A CN 109587643A
Authority
CN
China
Prior art keywords
target application
application
test
target
network access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811555328.4A
Other languages
Chinese (zh)
Other versions
CN109587643B (en
Inventor
陈子为
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wangsu Science and Technology Co Ltd
Original Assignee
Wangsu Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wangsu Science and Technology Co Ltd filed Critical Wangsu Science and Technology Co Ltd
Priority to CN201811555328.4A priority Critical patent/CN109587643B/en
Publication of CN109587643A publication Critical patent/CN109587643A/en
Application granted granted Critical
Publication of CN109587643B publication Critical patent/CN109587643B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • H04L43/0888Throughput
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic

Abstract

The invention discloses a kind of method and apparatus of detection application traffic leakage, belong to field of computer technology.The described method includes: test process receives the flow rate test instruction for target application, start the target application;When carrying out scenario simulation to the target application, the test process records file by the corresponding transport layer data of each process of target application described in system administration catalogue, obtains the network access state information of each process of the target application;The test process judges whether each process of the target application flow leakage occurs according to the orientation IP address of the network access state information and the preset target application.Using the present invention, the time human cost of detection application traffic leakage can be reduced, improves the efficiency of detection application traffic leakage.

Description

A kind of method and apparatus of detection application traffic leakage
Technical field
The present invention relates to field of computer technology, in particular to a kind of method and apparatus of detection application traffic leakage.
Background technique
Orienting charge on traffic is a kind of based on CDN cluster and mobile network, for the meter of the data traffic of specified application Take mode.For having the A that applies of orientation charge on traffic function, this can be applied the destination IP of all requests of A by CDN service side Application resource on address is aggregated into same CDN node.In this way, user is when using using A, network operator can pass through The data traffic (can be described as orientation flow) using A in the CDN node is counted, it is fixed to realize to the application A data traffic generated To charge on traffic.
At runtime using A, it is possible that part is sent to the request of other IP address, and these IP address (can be described as Non-directional IP address) it is not aggregate to above-mentioned CDN node, therefore, network operator will be according to general charge on traffic mode Carry out charging to the data traffic (can be described as non-directional flow) of the request influences to answer to increase the campus network of user With the user experience with mobile network.For this purpose, needing during for application and development orientation charge on traffic function to application In non-directional flow carry out test verification, with determine application whether can generate non-directional flow in the process of running, i.e., whether There are problems that flow leakage.
For the A that applies under Android system, when progress non-directional flow carries out test verification, technical staff will can first be transported Row has this to be connected to test equipment using the terminal device of A, then in user's usage scenario of simulation application A, sets in test It is filtered on standby by the network packet that network packet catcher generates terminal device.Later, technical staff can extract The information of the network packet filtered out, judges whether the network packet is issued by application A, and whether is sent to the IP summarized Address (can be described as orientation IP address), and then the problem of revealing using A with the presence or absence of flow is determined by judging result.
In the implementation of the present invention, the inventor finds that the existing technology has at least the following problems:
First, being limited to the performance of software/hardware, it is typically only capable to survey a terminal device with a test equipment Examination, inefficiency;Second, the network communication due to Android system background application can not completely close, checked result will be by very Big interference;Third, testing verification non-directional flow by manually, time human cost is higher, while the accuracy of checked result It is difficult to ensure.
Summary of the invention
In order to solve problems in the prior art, the embodiment of the invention provides it is a kind of detection application traffic leakage method and Device.The technical solution is as follows:
In a first aspect, providing a kind of method of detection application traffic leakage, which comprises
Test process receives the flow rate test instruction for target application, starts the target application;
When carrying out scenario simulation to the target application, the test process passes through target described in system administration catalogue The corresponding transport layer data of each process of application records file, obtains the network access shape of each process of the target application State information;
The test process according to the orientation IP address of the network access state information and the preset target application, Judge whether each process of the target application flow leakage occurs.
Optionally, after the test process starting target application, further includes:
The test process executes shell-command, obtains the target application according to the application identities of the target application The process identity information of each process.
Optionally, the corresponding transmission of each process that the test process passes through target application described in system administration catalogue Layer data records file, obtains the network access state information of each process of the target application, comprising:
For the target process of the target application, the test process is searched in system administration catalogue based on the mesh The file destination catalogue of the process identity information name of mark process, and remembered by the transport layer data in the file destination catalogue Record the network access state information of target process described in file acquisition.
Optionally, the corresponding transmission of each process that the test process passes through target application described in system administration catalogue Layer data records file, obtains the network access state information of each process of the target application, comprising:
The corresponding transmission of each process of target application described in the test process periodicity Ergodic Theory administrative directory Layer data records file, generates the corresponding status information table of comparisons of each process, wherein the status information table of comparisons is extremely The connection status of network access connection including process and opposite end address less;
The test process traverses the corresponding status information table of comparisons of each process, obtains the every of the target application The network access state information of a process.
Optionally, the test process is according to the orientation of the network access state information and the preset target application IP address, before judging whether each process of the target application flow leakage occurs, further includes:
The test process is to the opposite end of network access connection in the corresponding status information table of comparisons of each process Location carries out system conversion.
Optionally, after the test process starting target application, further includes:
The test process is based on the corresponding application simulation operation of the preset target application, Xiang Suoshu target application Application process sends different application operating instructions.
Optionally, the method also includes:
When flow leakage occurs in the target process for detecting the target application, the test process determines most proximad institute State the target application operational order of application process transmission;
The test process sends the target application operational order to the application process again, and monitors the system The corresponding transport layer data of target process described in administrative directory records file.
Second aspect provides a kind of device of detection application traffic leakage, and described device operation has test process, described Test process is used for:
The flow rate test received for target application instructs, and starts the target application;
To the target application carry out scenario simulation when, by each of target application described in system administration catalogue into The corresponding transport layer data of journey records file, obtains the network access state information of each process of the target application;
According to the orientation IP address of the network access state information and the preset target application, the target is judged Whether each process of application there is flow leakage.
Optionally, the test process, is also used to:
After starting the target application, shell-command is executed, obtains institute according to the application identities of the target application State the process identity information of each process of target application.
Optionally, the test process, is specifically used for:
For the target process of the target application, the process based on the target process is searched in system administration catalogue The file destination catalogue of identification information name, and file acquisition institute is recorded by the transport layer data in the file destination catalogue State the network access state information of target process.
Optionally, the test process, is specifically used for:
The corresponding transport layer data record text of each process of target application described in periodical Ergodic Theory administrative directory Part generates the corresponding status information table of comparisons of each process, wherein the status information table of comparisons includes at least process The connection status of network access connection and opposite end address;
The corresponding status information table of comparisons of each process is traversed, the network of each process of the target application is obtained Access state information.
Optionally, the test process, is also used to:
In the orientation IP address according to the network access state information and the preset target application, the mesh is judged Before whether each process of mark application flow leakage occurs, to network in the corresponding status information table of comparisons of each process The opposite end address of access connection carries out system conversion.
Optionally, the test process, is also used to:
After starting the target application, it is based on the corresponding application simulation operation of the preset target application, to institute The application process for stating target application sends different application operating instructions.
Optionally, the test process, is also used to:
When flow leakage occurs in the target process for detecting the target application, determine that most proximad the application process is sent out The target application operational order sent;
The target application operational order is sent again to the application process, and monitors institute in the system administration catalogue State the corresponding transport layer data record file of target process.
The third aspect, provides a kind of test terminal, and the test terminal includes processor and memory, the memory In be stored at least one instruction, at least a Duan Chengxu, code set or instruction set, at least one instruction, described at least one Duan Chengxu, the code set or instruction set are loaded by the processor and are executed to realize detection application as described in relation to the first aspect The method of flow leakage.
Fourth aspect provides a kind of computer readable storage medium, at least one finger is stored in the storage medium Enable, at least a Duan Chengxu, code set or instruction set, at least one instruction, an at least Duan Chengxu, the code set or The method that instruction set is loaded by processor and executed to realize detection application traffic leakage as described in relation to the first aspect.
Technical solution provided in an embodiment of the present invention has the benefit that
In the embodiment of the present invention, test process receives the flow rate test instruction for target application, starts target application;? When carrying out scenario simulation to target application, test process passes through the corresponding biography of each process of target application in system administration catalogue Defeated layer data records file, obtains the network access state information of each process of target application;Test process is visited according to network The orientation IP address for asking status information and preset target application, judges whether each process of target application flow occurs and let out Leakage.In this way, recording file by the corresponding transport layer data of application process in test process access system administration catalogue, applied The network access state information of process can support more test equipments while carry out flow leak detection, and can be accurately straight It sees ground and determines the process that flow leakage occurs, and participated in without artificial, reduce the time human cost of detection, improve detection Efficiency.
Detailed description of the invention
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, for For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 is a kind of method flow diagram of detection application traffic leakage provided in an embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram for testing terminal provided in an embodiment of the present invention.
Specific embodiment
To make the object, technical solutions and advantages of the present invention clearer, below in conjunction with attached drawing to embodiment party of the present invention Formula is described in further detail.
The embodiment of the invention provides a kind of method of detection application traffic leakage, this method can be used in the survey of application It tries in terminal, and is specifically realized by the test process operated in test terminal.Wherein, test terminal can be to apply and be in It is that CDN service side is used to detect the flow leak case of application, configured with android operating system in test phase Arbitrary network equipment, in every test terminal, CDN service side can install the testing tool for specifically being tested. When needing to detect application with the presence or absence of flow leakage problem, CDN service side can start above-mentioned test work in test terminal Tool operation test process, and relevant detection processing is carried out by test process.If be appreciated that in more test terminals On dispose testing tool, then can by more test terminals simultaneously to one or more application carry out flow leak-testing. Above-mentioned test terminal may include processor, memory, transceiver, processor can be used for carrying out the test in following processes into Processing performed by journey, memory can be used for storing the data of the data and generation that need in following treatment processes, transmitting-receiving Device can be used for sending and receiving the related data in following treatment processes.It is appreciated that test process is realized in the application All processing, it is understood that be implemented by the test terminal of operation test process by test process.
Below in conjunction with specific embodiment, process flow shown in FIG. 1 is described in detail, content can be as Under:
Step 101, test process receives the flow rate test instruction for target application, starts target application.
Wherein, using to may operate at the application program in terminal, target application then can be for one or a kind of using journey Sequence.
In an implementation, survey can be passed through in the exploitation of the orientation charge on traffic function of application and test phase, CDN service side It tries terminal and flow leak-testing is carried out to application.By taking target application as an example, the technical staff of CDN service side is in detection target application When with the presence or absence of flow leakage problem, the target application first can be installed in test terminal, it is then pre- in starting test terminal The testing tool first disposed runs test process.Later, technical staff input can be directed to target application in test terminal Flow rate test instruction determines target application to be tested, and call and be so that triggering test process receives flow rate test instruction Intent API unite to start target application.
Optionally, after starting target application, test process can obtain relevant process identification (PID) by shell-command Information, correspondingly, may exist following processing after step 101: test process executes shell-command, according to answering for target application The process identity information of each process of target application is obtained with mark.
Wherein, process identity information can be the information for uniquely tagged process, specifically can be pid information, can also It is unified in the present embodiment to be illustrated by taking pid information as an example to be the information of other forms, the information of other forms with etc Seemingly, it no longer introduces one by one.
In an implementation, after target application starting, test process can execute shell-command, then according to target application Application identities obtain the pid information of each process of target application.Specific shell-command can be " ps | grep " order, For obtaining the pid information of all processes in current test terminal, then by the application identities of target application " packagename " As the parameter of " ps | grep " order, that is, constitute " ps | grep packagename ", with filter out each of target application into The pid information of journey.
Step 102, when carrying out scenario simulation to target application, test process passes through target application in system administration catalogue The corresponding transport layer data of each process record file, obtain the network access state information of each process of target application.
Wherein, transport layer data record file can be the transport layer data of the network access connection for record the process File, specifically can be the net/tcp file of tcp connection under corresponding ipv4 or is the net/ of tcp connection under corresponding ipv6 Tcp6 file or be udp connection under corresponding ipv4 net/udp file, or under corresponding ipv6 udp connection net/ Udp6 file.Network access state information can be the network including process access connection connection status (such as connection status or Off-state) and network access connection five-tuple information etc..
In an implementation, after target application starting, the system process for testing terminal can create mesh in system administration catalogue The corresponding transport layer data of each process for marking application records file, and each by record in transport layer data record file The network access state information of process.In this way, to target application carry out flow leak-testing when, can first to target application into Row scenario simulation, with all scenes being likely to occur when reappearing user using target application.And field is being carried out to target application It, can real-time record the process in the corresponding transport layer data record file of each process of above-mentioned target application while scape is simulated Network access state information.In turn, test process can be corresponding by each process of target application in system administration catalogue Transport layer data record file, obtain the network access state information of each process of target application.
Optionally, the processing of process identity information is obtained based on above-mentioned test process, test process can pass through process mark The corresponding network access state information of acquisition of information process is known, correspondingly, obtaining the place of network access state information in step 102 Reason can be such that the target process for target application, and for the target process of target application, test process is in system administration mesh The file destination catalogue of the process identity information name based on target process is searched in record, and passes through the biography in file destination catalogue The network access state information of defeated layer data record file acquisition target process.
In an implementation, target application starting after, test terminal system process can be created in system administration catalogue with Multiple file directorys of the pid information name of each process of target application, and create under each file directory for remembering Picture recording answers the transport layer data record file of the network access state information of process.In this way, the target process with target application is Example, test process after getting the pid information of target process, can first in system administration catalogue search based on target into The file destination catalogue of the pid information name of journey can then be remembered later by the transport layer data in access target file directory File is recorded, to obtain the network access state information of target process.
It optionally, can be by the form of the unified table of comparisons come the network access state information of record the process, correspondingly, obtaining The processing of all process network access state information is taken specifically to can be such that in test process periodicity Ergodic Theory administrative directory The corresponding transport layer data of each process of target application records file, generates the corresponding status information table of comparisons of each process. Test process traverses the corresponding status information table of comparisons of each process, obtains the network access state of each process of target application Information.
Wherein, the status information table of comparisons includes at least connection status and the opposite end address of the network access connection of process.
In an implementation, when carrying out scenario simulation to target application, test process can periodically Ergodic Theory management The corresponding transport layer data of each process of target application records file in catalogue, so as to generate each of target application into The corresponding status information table of comparisons of journey.Each status information table of comparisons can be named with the pid information of each process, wherein can be with Connection status and opposite end address including at least the network access connection of a process of target application, specifically refer to table 1 and show The state of a process information contrast table that pid information out is 5533.
Table 1
In this way, test process can traverse the corresponding status information table of comparisons of each process, each of target application is obtained The network access state information of process.Intuitively reflect mesh as can be seen that can understand by way of the status information table of comparisons The network access state information of the process of application is marked, convenient for subsequent artefacts to the network access state information inspection of process and really Recognize.
Step 103, orientation IP address of the test process according to network access state information and preset target application, judgement Whether each process of target application there is flow leakage.
It in an implementation, can be with after test process gets the network access state information of each process of target application The orientation IP address of preset target application is obtained, which can be orientation of the CDN service side based on target application Charge on traffic business is predefined and is configured in each test terminal, can specifically be existed in the form of IP address table, should IP address table can be using the application identities of target application as table name, and record has the corresponding all orientation IP of known target application Address.In this way, the orientation IP of network access state information and above-mentioned preset target application that test process can will acquire Address compares, to judge whether each process of target application flow leakage occurs.Specifically, working as certain of target application The IP address in the address of opposite end that the network access state information of a process includes is not belonging to the orientation IP of preset target application When address, it is possible to determine that flow leakage occurs in the process, on the contrary, if IP address in above-mentioned opposite end address and above-mentioned orientation IP An address in address is identical, it may be considered that the process does not occur flow leakage.For example, the process A of target application is corresponding Opposite end address IP address IPaFor 125.77.130.208, the IP address IP of the corresponding opposite end address process BbFor 125.77.120.208, the orientation IP address of preset target application is 125.77.130.0-125.77.130.255, then IPaBelong to orientation IP address, IPbIt is not belonging to orientation IP address, so, process A does not occur flow leakage, and process B flow occurs and lets out Leakage.Further, if flow leakage occurs in some process, the network access state information of the process can be added to In the test log of target application.
Optionally, after generating the status information table of comparisons, the opposite end address of access connection therein can be converted, In order to be compared with orientation IP address, correspondingly, there may be following processing before step 103: test process is to each The opposite end address of network access connection carries out system conversion in the corresponding status information table of comparisons of process.
In an implementation, test process generates the corresponding status information table of comparisons of process for each process of target application Later, the opposite end address of the network access connection in the status information table of comparisons can be extracted.The opposite end of network access connection Location can be the form of the network bytes sequence of 16 systems, and for the ease of comparing with orientation IP address, test process can be right The opposite end address of network access connection carries out system conversion, generates the opposite end address of dotted decimal notation.In turn, test process can With the opposite end address based on dotted decimal notation, the subsequent processing compared with orienting IP address is carried out.
It optionally, can be configured with the function of carrying out scenario simulation to application, correspondingly, test process exists in testing tool After starting target application, there may be following processing: test process is based on the corresponding scenario simulation behaviour of preset target application Make, different application operating instructions is sent to the application process of target application.
In an implementation, the technical staff of CDN service side can add correspondence when developing testing tool in testing tool With the function of carrying out scenario simulation, further, it is contemplated that the usage scenario of same type of application is essentially identical, so can be with For same type of application, the function code of identical scenario simulation is configured, it, can be with for example, for video playback class application The analog functuion for providing the scenes such as video playing, video download, video sharing can provide text for instant messaging class application The analog functuion of the scenes such as word session, voice conversation, video session.In this way, after test process starts target application, it can be true It sets the goal using affiliated classification, is then based on the corresponding scenario simulation operation of preset target application, i.e. field under the category Scape simulated operation sends different application operating instructions to the application process of target application, to realize the field to target application Scape simulation.It is noted that the transmission interval that different application operatings instructs can be according to the needs of application scenarios by artificial Voluntarily adjust.Certainly, for the scenario simulation of target application, realization, Huo Zheyou can also be manually triggered by technical staff Test process is realized with the mode manually combined.
Optionally, it is based on above-mentioned test process sending application operational order, the processing of application scenarios simulation is realized, works as detection To when flow leakage, test process can carry out current scene repeating simulation, to confirm whether flow leakage is accidentally, accordingly , the processing of test process can be such that test process is true when flow leakage occurs in the target process for detecting target application The fixed target application operational order that most proximad application process is sent;Test process sends target application operation to application process again Instruction, and monitor the corresponding transport layer data record file of target process described in the system administration catalogue.
In an implementation, test process is when the network access state information of all processes to target application is analyzed, If it find that flow leakage occurs in some process (such as target process) of target application, then it can determine flow leakage occur Reappear again using scene, and to this using scene.It is most proximad applied specifically, test process can be determined first Then the target application operational order that process is sent sends target application operation to the application process of target application again and refers to It enables.Later, test process can only the corresponding transport layer data of target process records file in monitoring system administrative directory, to obtain The network access state information for taking target process, then further determines that whether target process is deposited according to network access state information In flow leakage problem.Detect that some process there are when flow leakage problem, need to pass through for the first time it can be appreciated that may be set in N times scene reproduction, and judge each scene reproduction when, whether which all has flow leakage problem, in this way, inspection can be reduced Survey result is influenced by incident, ensure that the accuracy of testing result to a certain extent.
In the embodiment of the present invention, test process receives the flow rate test instruction for target application, starts target application;? When carrying out scenario simulation to target application, test process passes through the corresponding biography of each process of target application in system administration catalogue Defeated layer data records file, obtains the network access state information of each process of target application;Test process is visited according to network The orientation IP address for asking status information and preset target application, judges whether each process of target application flow occurs and let out Leakage.In this way, recording file by the corresponding transport layer data of application process in test process access system administration catalogue, applied The network access state information of process can support more test equipments while carry out flow leak detection, and can be accurately straight It sees ground and determines the process that flow leakage occurs, and participated in without artificial, reduce the time human cost of detection, improve detection Efficiency.
Based on the same technical idea, the embodiment of the invention also provides a kind of device of detection application traffic leakage, institutes Stating device operation has test process, and the test process is used for:
The flow rate test received for target application instructs, and starts the target application;
To the target application carry out scenario simulation when, by each of target application described in system administration catalogue into The corresponding transport layer data of journey records file, obtains the network access state information of each process of the target application;
According to the orientation IP address of the network access state information and the preset target application, the target is judged Whether each process of application there is flow leakage.
Optionally, the test process, is also used to:
After starting the target application, shell-command is executed, obtains institute according to the application identities of the target application State the process identity information of each process of target application.
Optionally, the test process, is specifically used for:
For the target process of the target application, the process based on the target process is searched in system administration catalogue The file destination catalogue of identification information name, and file acquisition institute is recorded by the transport layer data in the file destination catalogue State the network access state information of target process.
Optionally, the test process, is specifically used for:
The corresponding transport layer data record text of each process of target application described in periodical Ergodic Theory administrative directory Part generates the corresponding status information table of comparisons of each process, wherein the status information table of comparisons includes at least process The connection status of network access connection and opposite end address;
The corresponding status information table of comparisons of each process is traversed, the network of each process of the target application is obtained Access state information.
Optionally, the test process, is also used to:
In the orientation IP address according to the network access state information and the preset target application, the mesh is judged Before whether each process of mark application flow leakage occurs, to network in the corresponding status information table of comparisons of each process The opposite end address of access connection carries out system conversion.
Optionally, the test process, is also used to:
After starting the target application, it is based on the corresponding application simulation operation of the preset target application, to institute The application process for stating target application sends different application operating instructions.
Optionally, the test process, is also used to:
When flow leakage occurs in the target process for detecting the target application, determine that most proximad the application process is sent out The target application operational order sent;
The target application operational order is sent again to the application process, and monitors institute in the system administration catalogue State the corresponding transport layer data record file of target process.
In the embodiment of the present invention, test process receives the flow rate test instruction for target application, starts target application;? When carrying out scenario simulation to target application, test process passes through the corresponding biography of each process of target application in system administration catalogue Defeated layer data records file, obtains the network access state information of each process of target application;Test process is visited according to network The orientation IP address for asking status information and preset target application, judges whether each process of target application flow occurs and let out Leakage.In this way, recording file by the corresponding transport layer data of application process in test process access system administration catalogue, applied The network access state information of process can support more test equipments while carry out flow leak detection, and can be accurately straight It sees ground and determines the process that flow leakage occurs, and participated in without artificial, reduce the time human cost of detection, improve detection Efficiency.
It should be understood that the device of detection application traffic leakage provided by the above embodiment is in detection application traffic leakage When, only the example of the division of the above functional modules, in practical application, it can according to need and divide above-mentioned function With being completed by different functional modules, i.e., the internal structure of device is divided into different functional modules, to complete above description All or part of function.In addition, device and the detection application traffic of detection application traffic leakage provided by the above embodiment The embodiment of the method for leakage belongs to same design, and specific implementation process is detailed in embodiment of the method, and which is not described herein again.
Fig. 2 is the structural schematic diagram of test terminal provided in an embodiment of the present invention.The test terminal 200 can be because of configuration or property Energy is different and generates bigger difference, may include one or more central processing units 222 (for example, one or one The above processor) and memory 232, the 230 (example of storage medium of one or more storage application programs 242 or data 244 Such as one or more mass memory units).Wherein, memory 232 and storage medium 230 can be of short duration storage or lasting Storage.The program for being stored in storage medium 230 may include one or more modules (diagram does not mark), and each module can To include to the series of instructions operation in test terminal 200.Further, central processing unit 222 can be set to and deposit Storage media 230 communicates, and the series of instructions operation in storage medium 230 is executed in test terminal 200.
Testing terminal 200 can also include one or more power supplys 229, one or more wired or wireless nets Network interface 250, one or more input/output interfaces 258, one or more keyboards 256, and/or, one or one A above operating system 241, such as Windows Server, Mac OS X, Unix, Linux, FreeBSD etc..
Test terminal 200 may include have memory and one perhaps more than one program one of them or one A procedure above is stored in memory, and is configured to execute one or one by one or more than one processor A procedure above includes the instruction for carrying out above-mentioned detection application traffic leakage.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (16)

1. a kind of method of detection application traffic leakage, which is characterized in that the described method includes:
Test process receives the flow rate test instruction for target application, starts the target application;
When carrying out scenario simulation to the target application, the test process passes through target application described in system administration catalogue The corresponding transport layer data of each process record file, obtain the network access state letter of each process of the target application Breath;
Orientation IP address of the test process according to the network access state information and the preset target application, judgement Whether each process of the target application there is flow leakage.
2. the method according to claim 1, wherein being gone back after the test process starts the target application Include:
The test process executes shell-command, and it is each to obtain the target application according to the application identities of the target application The process identity information of process.
3. according to the method described in claim 2, it is characterized in that, the test process passes through mesh described in system administration catalogue The corresponding transport layer data of each process for marking application records file, obtains the network access of each process of the target application Status information, comprising:
For the target process of the target application, the test process searched in system administration catalogue based on the target into The file destination catalogue of the process identity information name of journey, and text is recorded by the transport layer data in the file destination catalogue Part obtains the network access state information of the target process.
4. the method according to claim 1, wherein the test process passes through mesh described in system administration catalogue The corresponding transport layer data of each process for marking application records file, obtains the network access of each process of the target application Status information, comprising:
The corresponding transmission number of plies of each process of target application described in the test process periodicity Ergodic Theory administrative directory According to record file, the corresponding status information table of comparisons of each process is generated, wherein the status information table of comparisons at least wraps Include connection status and the opposite end address of the network access connection of process;
The corresponding status information table of comparisons of test process traversal each process, obtain each of described target application into The network access state information of journey.
5. according to the method described in claim 4, it is characterized in that, the test process is according to the network access state information With the orientation IP address of the preset target application, judge whether each process of the target application flow occurs and leak it Before, further includes:
The test process to the opposite end address of network access connection in the corresponding status information table of comparisons of each process into System of advancing conversion.
6. the method according to claim 1, wherein being gone back after the test process starts the target application Include:
The test process is based on the corresponding application simulation operation of the preset target application, the application of Xiang Suoshu target application Process sends different application operating instructions.
7. according to the method described in claim 6, it is characterized in that, the method also includes:
When flow leakage occurs in the target process for detecting the target application, the test process determines most proximad described answer The target application operational order sent with process;
The test process sends the target application operational order to the application process again, and monitors the system administration The corresponding transport layer data of target process described in catalogue records file.
8. a kind of device of detection application traffic leakage, which is characterized in that described device operation has a test process, it is described test into Journey is used for:
The flow rate test received for target application instructs, and starts the target application;
When carrying out scenario simulation to the target application, pass through each process pair of target application described in system administration catalogue The transport layer data record file answered, obtains the network access state information of each process of the target application;
According to the orientation IP address of the network access state information and the preset target application, the target application is judged Each process whether there is flow leakage.
9. device according to claim 8, which is characterized in that the test process is also used to:
After starting the target application, shell-command is executed, obtains the mesh according to the application identities of the target application The process identity information of each process of mark application.
10. device according to claim 9, which is characterized in that the test process is specifically used for:
For the target process of the target application, the process identification (PID) based on the target process is searched in system administration catalogue The file destination catalogue of information name, and mesh described in file acquisition is recorded by the transport layer data in the file destination catalogue The network access state information of mark process.
11. device according to claim 8, which is characterized in that the test process is specifically used for:
The corresponding transport layer data of each process of target application described in periodical Ergodic Theory administrative directory records file, raw At the corresponding status information table of comparisons of each process, wherein the status information table of comparisons includes at least the network of process Access connection status and the opposite end address of connection;
The corresponding status information table of comparisons of each process is traversed, the network access of each process of the target application is obtained Status information.
12. device according to claim 11, which is characterized in that the test process is also used to:
In the orientation IP address according to the network access state information and the preset target application, judge that the target is answered Before whether each process flow leakage occurs, network in the corresponding status information table of comparisons of each process is accessed The opposite end address of connection carries out system conversion.
13. device according to claim 8, which is characterized in that the test process is also used to:
After starting the target application, it is based on the corresponding application simulation operation of the preset target application, Xiang Suoshu mesh The application process of mark application sends different application operating instructions.
14. device according to claim 13, which is characterized in that the test process is also used to:
When flow leakage occurs in the target process for detecting the target application, determine that most proximad the application process is sent Target application operational order;
The target application operational order is sent again to the application process, and monitors mesh described in the system administration catalogue The corresponding transport layer data of mark process records file.
15. a kind of test terminal, which is characterized in that the test terminal includes processor and memory, is deposited in the memory Contain at least one instruction, at least a Duan Chengxu, code set or instruction set, at least one instruction, an at least Duan Cheng Sequence, the code set or instruction set are loaded by the processor and are executed to realize the detection as described in claim 1 to 7 is any The method of application traffic leakage.
16. a kind of computer readable storage medium, which is characterized in that be stored at least one instruction, extremely in the storage medium A few Duan Chengxu, code set or instruction set, at least one instruction, an at least Duan Chengxu, the code set or instruction The method that collection is loaded by processor and executed to realize the detection application traffic leakage as described in claim 1 to 7 is any.
CN201811555328.4A 2018-12-18 2018-12-18 Method and device for detecting flow leakage of application Expired - Fee Related CN109587643B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811555328.4A CN109587643B (en) 2018-12-18 2018-12-18 Method and device for detecting flow leakage of application

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811555328.4A CN109587643B (en) 2018-12-18 2018-12-18 Method and device for detecting flow leakage of application

Publications (2)

Publication Number Publication Date
CN109587643A true CN109587643A (en) 2019-04-05
CN109587643B CN109587643B (en) 2020-11-06

Family

ID=65930048

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811555328.4A Expired - Fee Related CN109587643B (en) 2018-12-18 2018-12-18 Method and device for detecting flow leakage of application

Country Status (1)

Country Link
CN (1) CN109587643B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277502A (en) * 2022-06-17 2022-11-01 广州根链国际网络研究院有限公司 Method for automatically measuring IPv6 flow aiming at APP application

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070130324A1 (en) * 2005-12-05 2007-06-07 Jieming Wang Method for detecting non-responsive applications in a TCP-based network
US20080244086A1 (en) * 2007-03-28 2008-10-02 Cisco Technology, Inc. Identifying network path including network proxies
CN103001814A (en) * 2011-09-09 2013-03-27 湖南神州祥网科技有限公司 Method for describing network flow characteristic statistics
CN103166807A (en) * 2011-12-15 2013-06-19 中国电信股份有限公司 Analyzing and processing method and analyzing and processing system of traffic flow direction based on application
CN103929373A (en) * 2014-03-20 2014-07-16 江苏省未来网络创新研究院 Method for accurately recognizing network application traffic
CN104023092A (en) * 2014-04-29 2014-09-03 中国联合网络通信集团有限公司 Method and system for realizing directed flow packet
CN104348682A (en) * 2014-10-11 2015-02-11 北京中创腾锐技术有限公司 Method and system for mobile application flow feature automatic analysis
CN105988928A (en) * 2015-03-02 2016-10-05 腾讯科技(深圳)有限公司 Terminal application testing method and mobile terminal
CN106302350A (en) * 2015-06-01 2017-01-04 阿里巴巴集团控股有限公司 URL monitoring method, device and equipment
CN108494616A (en) * 2018-02-26 2018-09-04 上海康斐信息技术有限公司 A kind of cell phone application flow rate test method and system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070130324A1 (en) * 2005-12-05 2007-06-07 Jieming Wang Method for detecting non-responsive applications in a TCP-based network
US20080244086A1 (en) * 2007-03-28 2008-10-02 Cisco Technology, Inc. Identifying network path including network proxies
CN103001814A (en) * 2011-09-09 2013-03-27 湖南神州祥网科技有限公司 Method for describing network flow characteristic statistics
CN103166807A (en) * 2011-12-15 2013-06-19 中国电信股份有限公司 Analyzing and processing method and analyzing and processing system of traffic flow direction based on application
CN103929373A (en) * 2014-03-20 2014-07-16 江苏省未来网络创新研究院 Method for accurately recognizing network application traffic
CN104023092A (en) * 2014-04-29 2014-09-03 中国联合网络通信集团有限公司 Method and system for realizing directed flow packet
CN104348682A (en) * 2014-10-11 2015-02-11 北京中创腾锐技术有限公司 Method and system for mobile application flow feature automatic analysis
CN105988928A (en) * 2015-03-02 2016-10-05 腾讯科技(深圳)有限公司 Terminal application testing method and mobile terminal
CN106302350A (en) * 2015-06-01 2017-01-04 阿里巴巴集团控股有限公司 URL monitoring method, device and equipment
CN108494616A (en) * 2018-02-26 2018-09-04 上海康斐信息技术有限公司 A kind of cell phone application flow rate test method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277502A (en) * 2022-06-17 2022-11-01 广州根链国际网络研究院有限公司 Method for automatically measuring IPv6 flow aiming at APP application
CN115277502B (en) * 2022-06-17 2023-10-10 广州根链国际网络研究院有限公司 Method for automatically measuring IPv6 flow aiming at APP

Also Published As

Publication number Publication date
CN109587643B (en) 2020-11-06

Similar Documents

Publication Publication Date Title
CN110636131B (en) Internet of things testing system based on cloud technology
US8874736B2 (en) Event extractor
CN109308266A (en) Construction method, test method, device, equipment and the medium of test case
CN109639782B (en) Message sending platform and method
CN105376335B (en) Collected data uploading method and device
CN109067938B (en) Method and device for testing DNS (Domain name Server)
Qiao et al. Characterizing flow, application, and user behavior in mobile networks: A framework for mobile big data
CN106412975B (en) A kind of test method and device of content charging loophole
CN111371639B (en) Network delay analysis method and device, storage medium and computer equipment
CN111028085A (en) Network shooting range asset information acquisition method and device based on active and passive combination
CN106161396B (en) A kind of method and device for realizing virtual machine network access control
Lin et al. Low-storage capture and loss recovery selective replay of real flows
CN106067879B (en) The detection method and device of information
CN112217777A (en) Attack backtracking method and equipment
CN103368783A (en) Method, system and equipment for network communication process monitoring
CN109587643A (en) A kind of method and apparatus of detection application traffic leakage
Trammell et al. Identifying Skype traffic in a large-scale flow data repository
CN114389792B (en) WEB log NAT (network Address translation) front-back association method and system
CN109582585A (en) A kind of method and apparatus of detection application traffic leakage
EP4042649A1 (en) A method of capturing packets from a container in a cluster background
CN108737387A (en) Recording method, server and the computer readable storage medium of network request
CN115114132A (en) Performance test method and system for auditing program
CN111881384B (en) Evidence obtaining method, system and storage medium for illegal external connection
CN108616415A (en) data correlation method and device
CN114071391A (en) Content charging test method, management device, terminal device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201106

CF01 Termination of patent right due to non-payment of annual fee