CN109889475A - A kind of method and system for preventing TCP connection to be bypassed equipment sniff - Google Patents

A kind of method and system for preventing TCP connection to be bypassed equipment sniff Download PDF

Info

Publication number
CN109889475A
CN109889475A CN201811478080.6A CN201811478080A CN109889475A CN 109889475 A CN109889475 A CN 109889475A CN 201811478080 A CN201811478080 A CN 201811478080A CN 109889475 A CN109889475 A CN 109889475A
Authority
CN
China
Prior art keywords
sniff
data
data packet
keyword
packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811478080.6A
Other languages
Chinese (zh)
Other versions
CN109889475B (en
Inventor
朱博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Snail Digital Technology Co Ltd
Original Assignee
Suzhou Snail Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Snail Digital Technology Co Ltd filed Critical Suzhou Snail Digital Technology Co Ltd
Priority to CN201811478080.6A priority Critical patent/CN109889475B/en
Publication of CN109889475A publication Critical patent/CN109889475A/en
Application granted granted Critical
Publication of CN109889475B publication Critical patent/CN109889475B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

A method of prevent TCP connection to be bypassed equipment sniff, comprising the following steps: the data packet that capture user issues;The data for analyzing and determining data packet determine protected object according to protocol type, and parsing needs the data of anti-sniff;Modification needs the data or keyword of anti-sniff;Send the original true data packet of user.The present invention also provides a kind of system for preventing TCP connection to be bypassed equipment sniff, the bypass equipment in network can be prevented from correctly recombinating out the data in user's TCP connection, to avoid being injected malicious data.

Description

A kind of method and system for preventing TCP connection to be bypassed equipment sniff
Technical field
The present invention relates to Internet technical fields, more particularly to a kind of side for preventing TCP connection to be bypassed equipment sniff Method and anti-sniff system.
Background technique
Bypass equipment in network can be monitored or sniff is to all data packets Jing Guo the equipment, if to receiving The data of TCP (Transmission Control Protocol, transmission control protocol) connection are recombinated, then can be restored All data in whole connection, and advertisement or malicious code etc. are injected as needed, to threaten the network security of user.
If advertisement is often injected according to the webpage that user accesses wherein by some telecom operators, the method used is just Be judged whether by analyzing first established after connection packet be http protocol (HyperText Transfer Protocol, Hypertext transfer protocol), and URL (Uniform is gone out by the data recombination of the Host section of resource section and host name in request Resource Locator, uniform resource locator) and to user send one incorporate advertisement with it is embedding comprising a real URL Enter page packet spoof, so that user is allowed to be thought as the advertisement in former webpage, and the page that this advertisement is directed toward is third party Advertising provider can obtain or distort full page content if advertising provider is put into malicious script in the page.
In addition to advertisement outer network supplier itself also will record all internet records of user including access website In addition URL sniff and may also inject hostile content with the hacker in network, it is therefore desirable to a kind of method come allow bypass equipment without The method that method recombinates correct data automatically prevents it from analyzing the data in user's TCP connection and injects malicious data.
Summary of the invention
In order to solve the shortcomings of the prior art, TCP connection quilt is prevented the purpose of the present invention is to provide a kind of The method and system of bypass equipment sniff can prevent the bypass equipment in network from correctly recombinating out in user's TCP connection Data, to avoid being injected malicious data.
To achieve the above object, the method provided by the invention for preventing TCP connection to be bypassed equipment sniff, including following step It is rapid:
Capture the data packet that user issues;
The data for analyzing and determining data packet determine protected object according to protocol type, and parsing needs the data of anti-sniff;
Modification needs the data or keyword of anti-sniff;
Send the original true data packet of user.
Further, the data for analyzing and determining data packet determine protected object according to protocol type, and parsing needs anti- The step of data of sniff, further comprise:
If the agreement of data packet is HTTPS, it is determined that be protected to handshake packet, and resolve to and need anti-sniff Data are SNI;Or
If the agreement of data packet is HTTP, it is determined that be protected to each message, and resolve to and need anti-sniff Data be resource path and host domain name.
Further, the step of modification needs the data or keyword of anti-sniff further comprises:
The data for needing anti-sniff or keyword are replaced, and to the check code in TCP packet without modification.
Further, the step of modification needs the data or keyword of anti-sniff further comprises:
The data for needing anti-sniff or keyword are replaced;
Recalculate the correct check code of TCP packet of forgery, wherein repair confirmation number corresponding with the check code of forgery It is changed to identical as the confirmation number of data packet that the last time issues.
Further, the step of modification needs the data or keyword of anti-sniff further comprises:
The data for needing anti-sniff or keyword are replaced;
Recalculate the correct check code of TCP packet of forgery, wherein be modified as being less than by the TTL in the IP head of data packet TTL is actually needed in host.
Further, which is characterized in that the step of the transmission user original true data packet, further comprise:
The original true data packet of user is truncated from the keyword for needing anti-sniff;
The half of keyword is put into the end of a upper data packet, the other half is put into the beginning of next data packet.
Further, the step of transmission user original true data packet further comprises:
The original true data packet of user is truncated from the keyword for needing anti-sniff;
The half of keyword is put into the end of a upper data packet, the other half is put into the beginning of next data packet;
Pseudo- packet is sent between two data packets for being placed with the keyword being connected.
To achieve the above object, above-mentioned the present invention also provides a kind of system for preventing TCP connection to be bypassed equipment sniff Method prevents bypass equipment sniff TCP connection, the system, comprising:
Trapping module, the data packet that capture user issues;
Analysis module analyzes and determines the data of data packet, determines protected object according to protocol type, parsing needs anti-smell The data of spy;
Modified module, modification need the data or keyword of anti-sniff;
Sending module sends the original true data packet of user.
Further, the data for needing anti-sniff or keyword are continued to replace by the modified module, and in TCP packet Check code without modification or the data for needing anti-sniff or keyword are replaced, and recalculate the TCP of forgery Wrap correct check code, wherein be modified as confirmation number corresponding with the check code of forgery and the last data packet issued Confirmation number it is identical or the data or keyword that will need anti-sniff are replaced, and recalculate the TCP packet of forgery just True check code, wherein be modified as the TTL in the IP head of data packet to be less than host actual needs TTL.
Further, the original true data packet of user is truncated the sending module from the keyword for needing anti-sniff, And the half of keyword is put into the end of a upper data packet, the other half is put into the beginning of next data packet or incites somebody to action The original true data packet of user is truncated from the keyword for needing anti-sniff, and the half of keyword is put into a upper data packet End, the other half is put into the beginning of next data packet, and sends out between two data packets for being placed with the keyword being connected Send pseudo- packet.
The method and system for preventing TCP connection to be bypassed equipment sniff of the invention, by the data that will need anti-sniff Or keyword replaces with other content, Allah's machine ignores the data packet, and pseudo- packet is added to the TCP data of oneself by bypass equipment In queue, therefore bypass equipment then ignores the true data packet when transmission true data packet.Therefore, the bypass equipment in network can be made The data in user's TCP connection cannot be correctly recombinated out, to avoid being injected malicious data.
The method and system for preventing TCP connection to be bypassed equipment sniff of the invention, by the TCP packet for recalculating forgery Correct check code, since Allah's machine had received the confirmation number, and think the data packet be a wrong packet to It neglects bypass equipment when the data packet sends true data packet therefore and then ignores the true data packet.Therefore, can make in network Bypass equipment cannot correctly recombinate out the data in user's TCP connection, to avoid being injected malicious data.
The method and system for preventing TCP connection to be bypassed equipment sniff of the invention, by the IP head by data packet TTL is modified as being less than host actual needs TTL, and Allah's machine can not receive the data packet, and the data packet is added to oneself In TCP data queue.Therefore, the bypass equipment in network can be prevented from correctly recombinating out the data in user's TCP connection, from And it avoids being injected malicious data.
The method and system for preventing TCP connection to be bypassed equipment sniff of the invention, by the key that will need anti-sniff It is truncated at word and is put into multiple and different front and back packets, and the equipment that passes into others' hands is considered as packet loss re-transmission because having received data, thus Ignore the data packet.Therefore, the bypass equipment in network can be prevented from correctly recombinating out the data in user's TCP connection, from And it avoids being injected malicious data.
The advantages of of the invention method and system for preventing TCP connection to be bypassed equipment sniff be in Linux platform not It needs additional dependence can be used directly, and does not need to capture the packet largely sent, only passive receive may know that oneself is issued Packet in serial number and the filtration of unrelated packet all give operating system itself completion, application program convenient directly use and property It can be higher with stability.
Other features and advantages of the present invention will be illustrated in the following description, also, partly becomes from specification It obtains it is clear that understand through the implementation of the invention.
Detailed description of the invention
Attached drawing is used to provide further understanding of the present invention, and constitutes part of specification, and with it is of the invention Embodiment together, is used to explain the present invention, and is not construed as limiting the invention.In the accompanying drawings:
Fig. 1 is the method flow diagram according to the present invention for preventing TCP connection to be bypassed equipment sniff;
Fig. 2 is the system architecture diagram according to the present invention for preventing TCP connection to be bypassed equipment sniff.
Specific embodiment
Hereinafter, preferred embodiments of the present invention will be described with reference to the accompanying drawings, it should be understood that preferred reality described herein Apply example only for the purpose of illustrating and explaining the present invention and is not intended to limit the present invention.
Fig. 1 is the method flow diagram according to the present invention for preventing TCP connection to be bypassed equipment sniff, below with reference to Fig. 1, The method for preventing TCP connection to be bypassed equipment sniff of the invention is described in detail.
Embodiment 1
Firstly, in step 101, the data packet of capture user's sending.
In step 102, the agreement of data packet is analyzed and determined, protected object is determined according to protocol type, parsing needs anti-smell The data of spy.Specifically, if the agreement of data packet is HTTPS (Hyper Text Transfer Protocol over Secure Socket Layer), then it needs to protect handshake packet;If the agreement of data packet is HTTP, need to every A message is protected.Later, parsing needs the data of anti-sniff to need to prevent in the case where the agreement of data packet is HTTPS The data of sniff are SNI (Server Name Indication, server name instruction), are HTTP in the agreement of data packet In the case of, needing the data of anti-sniff is resource path and host domain name.
In step 103, the keyword of anti-sniff will be needed to replace with the random data of forgery, while to the school in TCP packet Code is tested without modification.At this point, due to check code mistake, Allah's machine ignores the data packet, and in order to high-performance without The bypass equipment of verification can be added in the TCP data queue of oneself.
In step 104, the original true data packet of user is sent.At this point, sending the original true data packet of user, then Allah's machine passes through It verifies and puts it into TCP data queue, and the equipment that passes into others' hands is because have added in the TCP data list of oneself, in turn Packet loss is regarded as to retransmit and ignore the data packet.
Later, return step 101.
Embodiment 2
The method and step of embodiment 2 is roughly the same with the method and step of embodiment 1, difference be step 103, for reality The identical step of example 1 is applied to omit the description.
In step 103a, the keyword of anti-sniff will be needed to replace with the random data of forgery, while recalculating forgery The correct check code of TCP packet, wherein confirmation number corresponding with the check code of forgery is modified as and the last number issued It is identical according to the confirmation number of packet.At this point, since Allah's machine had received the confirmation number, and thinking the data packet is a mistake Packet accidentally is to neglect the data packet.However, downlink of the bypass equipment of single channel detection because not recording server reply Data, thus can not judge whether the data packet is the duplicate acknowledgment sent because of a upper confirmation packet packet loss for server, "true" can only be considered as, and the data packet is added in the TCP data queue of oneself.
Embodiment 3
The method and step of embodiment 3 is roughly the same with the method and step of embodiment 1, difference be step 103, for reality The identical step of example 1 is applied to omit the description.
In step 103b, the keyword of anti-sniff will be needed to replace with the random data of forgery, while recalculating forgery The correct check code of TCP packet, wherein the TTL (Time To Live, time-to-live) in the IP head of data packet is modified as small TTL is actually needed in host.At this point, being dropped due to TTL deficiency when TTL is reduced after each target node to 0. Therefore, Allah's machine can not receive the data packet, and bypass equipment reach server without analysis in advance needed for TTL, thus without Method judges the true and false, and the data packet is added in the TCP data queue of oneself.
Embodiment 4
The method and step of embodiment 4 is roughly the same with the method and step of embodiment 1 to embodiment 3, and difference is step 104, the step identical as embodiment 1 to embodiment 4 is omitted the description.
In step 104a, the original true data packet of user is truncated from the keyword for needing anti-sniff, by the one of keyword It is partly put into the end of a data packet, the other half is put into the beginning of next data packet.After Allah's machine receives these data packets TCP data stream is reassembled into, and the equipment that passes into others' hands is considered as packet loss re-transmission because having received data, to ignore the data packet.This Change is the equipment not reorganizing packets that pass into others' hands in order to prevent, and is detected to single packet, such as the usual number of http protocol It can include all the elements of conventional requests head according to packet, therefore advertisement injection device only can need a packet that can obtain puppet Content needed for making data.Equipment to cope with this type needs to send data packet point in multiple packets, to make each packet In all do not include bypass equipment needed for data.
Embodiment 5
The method and step of embodiment 5 is roughly the same with the method and step of embodiment 1 to embodiment 3, and difference is step 104, for being omitted the description with embodiment 1 to the identical step of embodiment 3.
In step 104b, the original true data packet of user is truncated from the keyword for needing anti-sniff, by the one of keyword As be put into the end of a data packet, the other half is put into the beginning of next data packet, and is being placed with the keyword being connected Two packets between retransmit the pseudo- packet that either step once in step 103, step 103a and step 103b generates.Allah Machine reassembles into TCP data stream after receiving these data packets, and the equipment that passes into others' hands is considered as packet loss re-transmission because having received data, from And ignore the data packet, if not retransmitting for packet loss, then true packet is override again.This change is that bypass equipment is not only in order to prevent There is single packet detection, while data packet is not considered as packet loss repeating transmission and being directly combined and check.For setting for corresponding this type Primary pseudo- packet is retransmited between the standby data packet for needing talent separated, so that half is by the before when the rear half really wrapped The pseudo- cladding lid of secondary transmission, and then make in the data flow recombinated out without containing data needed for bypass equipment.
Now the above embodiments are illustrated with actual example.
Firstly, creating normal TCP socket, and with creating TCP raw socket and use connect bound targets Location.Later, using TCP socket linking objective, and receive the SYN that server returns with raw socket | ACK response bag.Its In, it is the acknowledgement number for the data packet that may know that oneself is issued by the ACK value in packet, for constructing the pseudo- packet needed, puppet packet It can be sent with raw socket herein.
It in following step, is carried out respectively according to the step of each embodiment, and obtains following result.
The data that user sends:
TTL:64 SEQ:1 ACK:1 Checksum GET/index.htm HTTP/1.1 r nHost:www.test.com r n r n
The data that embodiment 1 is actually sent:
TTL:64 SEQ:1 ACK:1 Wrong PUT/error.htm HTTP/1.1 r nHost:www.fake.com r n r n
TTL:64 SEQ:1 ACK:1 Checksum GET/index.htm HTTP/1.1 r nHost:www.test.com r n r n
The data that embodiment 2 is actually sent:
TTL:64 SEQ:1 ACK:0 Checksum PUT/error.htm HTTP/1.1 r nHost:www.fake.com r n r n
TTL:64 SEQ:1 ACK:1 Checksum GET/index.htm HTTP/1.1 r nHost:www.test.com r n r n
The data that embodiment 3 is actually sent:
TTL:8 SEQ:1 ACK:1 Checksum PUT/error.htm HTTP/1.1 r nHost:www.fake.com r n r n
TTL:64 SEQ:1 ACK:1 Checksum GET/index.htm HTTP/1.1 r nHost:www.test.com r n r n
The data that embodiment 4 is actually sent:
TTL:8 SEQ:1 ACK:1 Checksum PUT/error.htm HTTP/1.1 r nHost:www.fake.com r n r n
TTL:64 SEQ:1 ACK:1 Checksum GET/ind
TTL:64 SEQ:9 ACK:1 Checksum Ex.htm HTTP/1.1 r nHost:www.te
TTL:64 SEQ:38 ACK:1 Checksum st.com\r\n\r\n
In embodiment 1 to embodiment 4, data that bypass equipment recombinates out:
PUT/error.htm HTTP/1.1 r nHost:www.fake.com r n r n
In embodiment 1 to embodiment 4, the data received are serviced:
GET/index.htm HTTP/1.1 r nHost:www.test.com r n r n
The data that embodiment 5 is actually sent:
TTL:64 SEQ:1 ACK:0 Checksum PUT/error.htm HTTP/1.1 r nHost:www.fake.com r n r n
TTL:64 SEQ:1 ACK:1 Checksum GET/ind
TTL:64 SEQ:1 ACK:1 Wrong PUT/error.htm HTTP/1.1 r nHost:www.fake.com r n r n
TTL:64 SEQ:9 ACK:1 Checksum Ex.htm HTTP/1.1 r nHost:www.te
TTL:8 SEQ:1 ACK:1 Checksum PUT/error.htm HTTP/1.1 r nHost:www.fake.com r n r n
TTL:64 SEQ:38 ACK:1 Checksum st.com\r\n\r\n
In embodiment 5, data that bypass equipment recombinates out (receive every time data that new package-restructuring goes out can be different):
1, PUT/error.htm HTTP/1.1 r nHost:www.fake.com r n r n
2, GET/indor.htm HTTP/1.1 r nHost:www.fake.com r n r n
3, PUT/error.htm HTTP/1.1 r nHost:www.fake.com r n r n
4, PUT/errex.htm HTTP/1.1 r nHost:www.teke.com r n r n
5, PUT/error.htm HTTP/1.1 r nHost:www.fake.com r n r n
6, PUT/error.htm HTTP/1.1 r nHost:www.fast.com r n r n
In embodiment 5, the data received are serviced:
GET/index.htm HTTP/1.1 r nHost:www.test.com r n r n.
Fig. 2 is the system architecture diagram according to the present invention for preventing TCP connection to be bypassed equipment sniff, as shown in Fig. 2, this hair The bright system 200 for preventing TCP connection to be bypassed equipment sniff, including, trapping module 201, analysis module 202, modified module 203, sending module 204.
Trapping module 201 captures the data packet that user issues.
Analysis module 202 analyzes and determines the agreement of data packet, and determines protected object according to protocol type, and parsing need to Will anti-sniff data.Specifically, analysis module 202 is judged as that the agreement of data packet is HTTPS (Hyper Text Transfer Protocol over Secure Socket Layer), then it needs to protect handshake packet;Analysis module 202 are judged as that the agreement of data packet is HTTP, then need to protect each message.Later, the parsing of analysis module 202 needs The data of anti-sniff resolve in the case where the agreement of data packet is HTTPS and need the data of anti-sniff for SNI (Server Name Indication, server name instruction), in the case where the agreement of data packet is HTTP, resolves to and need anti-sniff Data be resource path and host domain name.
Modified module 203 modifies the keyword for needing anti-sniff.Specifically, modified module 203 is by all data or key Word replaces with other contents, while replacing with to the check code in TCP packet without modification or by all data or keyword Other contents, while recalculating the correct check code of TCP packet of forgery, wherein by confirmation corresponding with the check code of forgery Number is modified as identical as the confirmation number of data packet of last time sending or replaces with all data or keyword other Content, while recalculating the correct check code of TCP packet of forgery, wherein by TTL (the Time To in the IP head of data packet Live, time-to-live) it is modified as being less than host actual needs TTL.
Sending module 204 sends the original true data packet of user.Specifically, by the original true data packet of user from needing anti-sniff Keyword at be truncated, the half of keyword is put into the end of a upper data packet, the other half is put into next data packet Start or the original true data packet of user is truncated from the keyword for needing anti-sniff, keyword is generally put into upper one The end of a data packet, the other half is put into the beginning of next data packet, and wraps it in two for being placed with the keyword being connected Between retransmit primary pseudo- packet.
According to the present embodiment, since all data or keyword are replaced with other contents, Allah's machine ignores the data packet, And puppet packet is added in the TCP data queue of oneself by bypass equipment, therefore bypass equipment then ignores this when transmission true data packet True data packet.Therefore, the bypass equipment in network can be prevented from correctly recombinating out the data in user's TCP connection, to keep away Exempt to be injected malicious data.
According to the present embodiment, due to recalculating the correct check code of TCP packet of forgery, since Allah's machine had received The confirmation number, and thinking the data packet is a wrong packet thus by when neglecting the data packet therefore sending true data packet Pipeline equipment then ignores the true data packet.Therefore, the bypass equipment in network can be prevented from correctly recombinating out in user's TCP connection Data, to avoid being injected malicious data.
According to the present embodiment, the TTL in the IP head of data packet is modified as being less than host and is actually needed TTL, Allah's machine without Method receives the data packet, and the data packet is added in the TCP data queue of oneself.Therefore, the bypass in network can be made Equipment cannot correctly recombinate out the data in user's TCP connection, to avoid being injected malicious data.
According to the present embodiment, it will be truncated at the keyword for needing anti-sniff and be put into multiple and different front and backs and wrapped, and passed into others' hands Equipment is considered as packet loss re-transmission because having received data, to ignore the data packet.Therefore, the bypass in network can be made to set The standby data that cannot correctly recombinate out in user's TCP connection, to avoid being injected malicious data.
Those of ordinary skill in the art will appreciate that: the foregoing is only a preferred embodiment of the present invention, and does not have to In the limitation present invention, although the present invention is described in detail referring to the foregoing embodiments, for those skilled in the art For, still can to foregoing embodiments record technical solution modify, or to part of technical characteristic into Row equivalent replacement.All within the spirits and principles of the present invention, any modification, equivalent replacement, improvement and so on should all include Within protection scope of the present invention.

Claims (10)

1. a kind of method for preventing TCP connection to be bypassed equipment sniff, comprising the following steps:
Capture the data packet that user issues;
The data for analyzing and determining data packet determine protected object according to protocol type, and parsing needs the data of anti-sniff;
Modification needs the data or keyword of anti-sniff;
Send the original true data packet of user.
2. the method for preventing TCP connection to be bypassed equipment sniff according to claim 1, which is characterized in that the analysis is sentenced The step of data of disconnected data packet determine protected object according to protocol type, and parsing needs the data of anti-sniff, further wraps It includes:
If the agreement of data packet is HTTPS, it is determined that protect to handshake packet, and resolve to the data for needing anti-sniff It is SNI;Or
If the agreement of data packet is HTTP, it is determined that protect to each message, and resolve to the number for needing anti-sniff According to being resource path and host domain name.
3. the method for preventing TCP connection to be bypassed equipment sniff according to claim 1, which is characterized in that the modification needs Will anti-sniff data or keyword the step of, further comprise:
The data for needing anti-sniff or keyword are replaced, and to the check code in TCP packet without modification.
4. the method for preventing TCP connection to be bypassed equipment sniff according to claim 1, which is characterized in that the modification needs Will anti-sniff data or keyword the step of, further comprise:
The data for needing anti-sniff or keyword are replaced;
Recalculate the correct check code of TCP packet of forgery, wherein be modified as confirmation number corresponding with the check code of forgery It is identical as the confirmation number of data packet that the last time issues.
5. the method for preventing TCP connection to be bypassed equipment sniff according to claim 1, which is characterized in that the modification needs Will anti-sniff data or keyword the step of, further comprise:
The data for needing anti-sniff or keyword are replaced;
Recalculate the correct check code of TCP packet of forgery, wherein be modified as the TTL in the IP head of data packet to be less than host TTL is actually needed.
6. according to claim 1 to the method for preventing TCP connection to be bypassed equipment sniff described in any one of 5, which is characterized in that The step of transmission user original true data packet, further comprise:
The original true data packet of user is truncated from the keyword for needing anti-sniff;
The half of keyword is put into the end of a upper data packet, the other half is put into the beginning of next data packet.
7. according to claim 1 to the method for preventing TCP connection to be bypassed equipment sniff described in any one of 5, which is characterized in that The step of transmission user original true data packet, further comprise:
The original true data packet of user is truncated from the keyword for needing anti-sniff;
The half of keyword is put into the end of a upper data packet, the other half is put into the beginning of next data packet;
Pseudo- packet is sent between two data packets for being placed with the keyword being connected.
8. a kind of system for preventing TCP connection to be bypassed equipment sniff uses the described in any item methods of claim 1-7 anti- Only bypass equipment sniff TCP connection, which is characterized in that the system, comprising:
Trapping module, the data packet that capture user issues;
Analysis module analyzes and determines the data of data packet, determines protected object according to protocol type, parsing needs anti-sniff Data;
Modified module, modification need the data or keyword of anti-sniff;
Sending module sends the original true data packet of user.
9. the system according to claim 8 for preventing TCP connection to be bypassed equipment sniff, which is characterized in that
The data for needing anti-sniff or keyword are replaced by the modified module, and to the check code in TCP packet without Modification or the correct verification of TCP packet that the data for needing anti-sniff or keyword are replaced evidence, and recalculate forgery Code, wherein confirmation number corresponding with the check code of forgery is modified as to the confirmation number phase with the last data packet issued Together or the data for needing anti-sniff or keyword are replaced, and recalculate the correct check code of TCP packet of forgery, Wherein, the TTL in the IP head of data packet is modified as being less than host actual needs TTL.
10. the system for preventing TCP connection to be bypassed equipment sniff according to claim 8 or claim 9, which is characterized in that
The original true data packet of user is truncated the sending module from the keyword for needing anti-sniff, and by keyword Half is put into the end of a data packet, the other half is put into the beginning of next data packet or by the original true data of user Packet is truncated from the keyword for needing anti-sniff, and the half of keyword is put into the end of a upper data packet, the other half It is put into the beginning of next data packet, and sends pseudo- packet between two data packets for being placed with the keyword being connected.
CN201811478080.6A 2018-12-05 2018-12-05 Method and system for preventing TCP connection from being sniffed by bypass equipment Active CN109889475B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811478080.6A CN109889475B (en) 2018-12-05 2018-12-05 Method and system for preventing TCP connection from being sniffed by bypass equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811478080.6A CN109889475B (en) 2018-12-05 2018-12-05 Method and system for preventing TCP connection from being sniffed by bypass equipment

Publications (2)

Publication Number Publication Date
CN109889475A true CN109889475A (en) 2019-06-14
CN109889475B CN109889475B (en) 2021-08-06

Family

ID=66924959

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811478080.6A Active CN109889475B (en) 2018-12-05 2018-12-05 Method and system for preventing TCP connection from being sniffed by bypass equipment

Country Status (1)

Country Link
CN (1) CN109889475B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220224622A1 (en) * 2021-01-14 2022-07-14 Zscaler, Inc. TCP traceroute using RST and SYN-ACK to determine destination reachability

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101478387A (en) * 2008-12-31 2009-07-08 成都市华为赛门铁克科技有限公司 Defense method, apparatus and system for hyper text transmission protocol attack
US20140006430A1 (en) * 2006-08-08 2014-01-02 CastTV Inc. Indexing multimedia web content
CN105046150A (en) * 2015-08-06 2015-11-11 福建天晴数码有限公司 Method and system for preventing structured query language (SQL) implantation
CN106131060A (en) * 2016-08-23 2016-11-16 公安部第三研究所 Utilize the tcp/ip communication control method of SYN bag manipulative communications deception track
CN107896145A (en) * 2017-11-10 2018-04-10 郑州云海信息技术有限公司 A kind of anti-method for implanting of interface interchange and system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140006430A1 (en) * 2006-08-08 2014-01-02 CastTV Inc. Indexing multimedia web content
CN101478387A (en) * 2008-12-31 2009-07-08 成都市华为赛门铁克科技有限公司 Defense method, apparatus and system for hyper text transmission protocol attack
CN105046150A (en) * 2015-08-06 2015-11-11 福建天晴数码有限公司 Method and system for preventing structured query language (SQL) implantation
CN106131060A (en) * 2016-08-23 2016-11-16 公安部第三研究所 Utilize the tcp/ip communication control method of SYN bag manipulative communications deception track
CN107896145A (en) * 2017-11-10 2018-04-10 郑州云海信息技术有限公司 A kind of anti-method for implanting of interface interchange and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220224622A1 (en) * 2021-01-14 2022-07-14 Zscaler, Inc. TCP traceroute using RST and SYN-ACK to determine destination reachability
US11770319B2 (en) * 2021-01-14 2023-09-26 Zscaler, Inc. TCP traceroute using RST and SYN-ACK to determine destination reachability

Also Published As

Publication number Publication date
CN109889475B (en) 2021-08-06

Similar Documents

Publication Publication Date Title
CN104519018B (en) A kind of methods, devices and systems preventing the malicious requests for server
CN107634967B (en) CSRFtoken defense system and method for CSRF attack
CN102480490B (en) Method for preventing CSRF attack and equipment thereof
US7703127B2 (en) System for verifying a client request
CN101789947B (en) Method and firewall for preventing HTTP POST flooding attacks
Kaksonen et al. Software security assessment through specification mutations and fault injection
CN103327025A (en) Method and device for network access control
US20110202987A1 (en) Service access control
EP1931114B1 (en) Method and apparatus for detecting the IP address of a computer and location information associated therewith
CN101478387A (en) Defense method, apparatus and system for hyper text transmission protocol attack
CN103401836A (en) Method and device used for judging whether webpage is hijacked by ISP (internet service provider) or not
CN107426711A (en) Bind or unbind the method, apparatus and system of cell-phone number
CN109413060A (en) Message processing method, device, equipment and storage medium
US10798080B2 (en) User authentication in communication systems
CN102571846A (en) Method and device for forwarding hyper text transport protocol (HTTP) request
CN105025041A (en) File upload method, file upload apparatus and system
Bocovich et al. Secure asymmetry and deployability for decoy routing systems
CN103634111B (en) Single-point logging method and system and single sign-on client-side
CN108476199A (en) A kind of system and method for detection and defence CC attacks based on token mechanism
CN103051598B (en) Method, user equipment and packet access gateway for secure access to Internet services
CN109889475A (en) A kind of method and system for preventing TCP connection to be bypassed equipment sniff
CN107786489A (en) Access request verification method and device
CN103812859B (en) Network admission method, terminal admission method, network admission device and terminal
CN108259416B (en) Method for detecting malicious webpage and related equipment
CN101267456B (en) Method and system for preventing CP subscription simulation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant