CN110465094A - A kind of plug-in detection method of game based on IP port diagnostic - Google Patents

A kind of plug-in detection method of game based on IP port diagnostic Download PDF

Info

Publication number
CN110465094A
CN110465094A CN201910765197.0A CN201910765197A CN110465094A CN 110465094 A CN110465094 A CN 110465094A CN 201910765197 A CN201910765197 A CN 201910765197A CN 110465094 A CN110465094 A CN 110465094A
Authority
CN
China
Prior art keywords
data packet
plug
far
port
blacklist
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910765197.0A
Other languages
Chinese (zh)
Inventor
刘德建
任佳伟
陈宏展
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fujian Tianqing Online Interactive Technology Co Ltd
Original Assignee
Fujian Tianqing Online Interactive Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Tianqing Online Interactive Technology Co Ltd filed Critical Fujian Tianqing Online Interactive Technology Co Ltd
Priority to CN201910765197.0A priority Critical patent/CN110465094A/en
Publication of CN110465094A publication Critical patent/CN110465094A/en
Pending legal-status Critical Current

Links

Classifications

    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/70Game security or game management aspects
    • A63F13/75Enforcing rules, e.g. detecting foul play or generating lists of cheating players
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • General Business, Economics & Management (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention provides a kind of plug-in detection methods of the game based on IP port diagnostic, this method comprises: the client of step S1, Windows system application layer creates networks filter driver in driving layer;Step S2, the port a far-end address IP- blacklist is established, the port far-end address IP- blacklist stores the IP and port numbers of the plug-in far-end address that can be accessed;Step S3, networks filter driver establishes the data packet that layer captures all request connection servers in data flow, and the IP and port parameter of data packet are analyzed, if the far-end IP of blacklist item is equal in the port the far-end address IP and far-end address IP- blacklist of data packet, the distal end slogan of data packet is equal with the distal end slogan of blacklist item simultaneously, then determines that this data packet is the data packet of plug-in transmission;And far-end address IP, distal end slogan, process ID, process path these information are written in plug-in detection journal file.The present invention can be for plug-in, the efficient detection of realization of known IP feature and port diagnostic.

Description

A kind of plug-in detection method of game based on IP port diagnostic
Technical field
The present invention relates to computer system field of communication technology, software security, the plug-in detection fields of game, especially a kind of The plug-in detection method of game based on IP port diagnostic.
Background technique
Existing plug-in detection module is usually using the detection method based on proceeding internal memory scanning, such as the memory of scan procedure Space judges whether comprising plug-in condition code etc., plug-in for game temporarily without disclosed based on data packet IP, port diagnostic Inner nuclear layer detection means.
The above-mentioned existing plug-in detection scheme of game may use the methods of hidden process, memory polymorphicization by plug-in Around detection.The scheme of this patent description can detecte such plug-in.In addition this patent is having IP and end applied to detection Precise and high efficiency is showed to obtain in the plug-in scene of mouth feature.
Technical term is explained:
The WFP filter frame that Microsoft provides delimit many layers in network packet transmission process, such as: FWPM_ LAYER_ALE_FLOW_ESTABLISHED_V4 layers (i.e. data flow foundation layer), FWPM_LAYER_STREAM_V4 layers of (i.e. data Fluid layer) and FWPM_LAYER_DATAGRAM_DATA_V4 layers (i.e. layer data packet);Since data packet needs basis in system bottom Different network protocols are packaged, therefore the data content that different layers capture is different.This patent scheme mentions FWPM_ LAYER_ALE_FLOW_ESTABLISHED_V4 layers (i.e. data flow foundation layer), FWPM_LAYER_ALE_FLOW_ ESTABLISHED_V4 layers can capture the authorization connection request that process is sent, and can obtain the transmitting-receiving of data packet in this layer Progress information, transmitting-receiving IP information, transmitting-receiving port information.
WFP (Windows Filter Platform), computerese are a kind of Windows filter stages, were used for Filter network packet.
Basic filtering engine BFE is the included user mode services of a Windows operating system, coordinates WFP component, base The main task that this filter engine BFE is executed is to add or remove filter, the configuration of stored filter device into system and strengthen WFP configures safety.The communication of application program and basic filtering engine BFE pass through the WFP management functions such as FwpmEngineOpen It carries out.
Summary of the invention
In order to overcome the problems referred above, the object of the present invention is to provide a kind of plug-in detection sides of the game based on IP port diagnostic Method is a kind of hidden plug-in behavior monitoring means, can be for plug-in, the efficient inspection of realization of known IP feature and port diagnostic It surveys.
The present invention is realized using following scheme: a kind of plug-in detection method of game based on IP port diagnostic, feature exist In: described method includes following steps: step S1, the client of Windows system application layer creates network filtering in driving layer Driving;
Step S2, the port a far-end address IP- blacklist is established, the storage of far-end address IP- port blacklist is plug-in The IP and port numbers for the far-end address that can be accessed;
Step S3, networks filter driver establishes the data packet that layer captures all request connection servers in data flow, and right The IP and port parameter of data packet are analyzed, if in the port the far-end address IP and far-end address IP- blacklist of data packet The far-end IP of blacklist item is equal, while the distal end slogan of data packet is equal with the distal end slogan of blacklist item, then determines This data packet is the data packet of plug-in transmission;And by far-end address IP, distal end slogan, process ID, process path these information It is written in plug-in detection journal file.
2, the plug-in detection method of a kind of game based on IP port diagnostic according to claim 1, it is characterised in that: The step S2 is further specifically: during creation networks filter driver, the IP address of plug-in access and port numbers are write Enter the file to networks filter driver, the load of Windows system application and opening network filtration drive;Networks filter driver After opening successfully, the port far-end address IP- blacklist is initialized, during initializing blacklist, networks filter driver will All there are IP address and port numbers to be inserted into the blacklist of the port far-end address IP- in write-in file.
3, the plug-in detection method of a kind of game based on IP port diagnostic according to claim 1, it is characterised in that: Between the step S2 and step S3 further include: step S21, networks filter driver obtains base using FwpmEngineOpen function This filter engine BFE handle, the parameter as subsequent operation;
Step S22, networks filter driver is established layer in data flow using FwpsCalloutRegister function registration and is monitored The call back function of data;
Step S23, networks filter driver uses FwpmCalloutAdd function to basic filtering engine BFE application addition The call back function of preceding registration;
Step S24, networks filter driver uses FwpmSubLayerAdd function, establishes layer creation sublayer in data flow, uses In capture data;
Step S25, networks filter driver uses FwpmFilterAdd function, by basic filtering engine BFE in data flow Layer creation filter is established, and call back function is associated with sublayer;After completing association, when sublayer captures network packet, System can call the corresponding call back function network data packet of sublayer;The data flow establishes the call back function of layer for handling Request the data packet of network linking.
4, the plug-in detection method of a kind of game based on IP port diagnostic according to claim 3, it is characterised in that: The step S3 is further specifically: step S31, networks filter driver establishes layer in data flow and captures all request connection services The data packet of device can extract the far-end IP and remote port of this data packet when the call back function that data flow establishes layer is called Number, all blacklist items of the port far-end address IP- blacklist are then traversed, each single item is remote with the data packet that currently captures End address information compares, if the far-end address IP of data packet is equal with the far-end IP of blacklist item, while the distal end of data packet Port numbers are equal with the distal end slogan of blacklist item, then determine that this data packet is the data packet of plug-in transmission, and then determine hair It is plug-in for giving the process of this data packet, and enters step S32;If the far-end IP and distal end slogan of data packet cannot match far Any blacklist item in address ip-port blacklist is held, then determining this data packet not is the data packet of plug-in transmission, and is terminated Process;
Step S32, call back function using ZwWirteFile function by the far-end address IP of data packet, distal end slogan, into These information of journey ID, process path are written in plug-in detection journal file.
5, the plug-in detection method of a kind of game based on IP port diagnostic according to claim 3, it is characterised in that: The data flow establishes the call back function of layer after completing data packet analysis, no matter data packet whether be plug-in transmission data Packet is let pass without exception, and data packet is allowed to continue to transmit.
The beneficial effects of the present invention are: 1. usage behavior blacklist mechanisms can accurately determine to trigger blacklist Process is plug-in process.For the plug-in of known IP feature and port diagnostic, may be implemented efficiently to detect.
2. plug-in to bypass this by traditional application layer API hook technology using the network filtering technology of inner nuclear layer Detection, greatly increases plug-in anti-detection difficulty.
Include login module, therefore this programme application surface is extremely wide 3. plug-in major part is all charge, can be applied to big Measure plug-in detection.
4. the plug-in behavior monitoring method of the game of this patent is a kind of hidden plug-in behavioral value means, detection is improved Ability.
Detailed description of the invention
Fig. 1 is method flow schematic diagram of the invention.
Fig. 2 is the port the far-end address IP- blacklist schematic diagram of one embodiment of the invention.
Specific embodiment
The present invention will be further described with reference to the accompanying drawing.
Refering to Figure 1, a kind of plug-in detection method of game based on IP port diagnostic of the invention, the present invention is based on The WFP networks filter driver frame of Microsoft captures plug-in network request row by installing network filter in system bottom For;Described method includes following steps: step S1, the client of Windows system application layer creates network filtering in driving layer Driving;
Step S2, the port a far-end address IP- blacklist is established, the storage of far-end address IP- port blacklist is plug-in The IP and port numbers for the far-end address that can be accessed;The step S2 is further specifically: during creation networks filter driver, The IP address of plug-in access and port numbers are written to the file of networks filter driver, Windows system application loads simultaneously Opening network filtration drive;After networks filter driver is opened successfully, the port far-end address IP- blacklist is initialized, is being initialized During blacklist, networks filter driver, which will be written in file, all has IP address and port numbers to be inserted into far-end address In the blacklist of the port IP-.In addition, the blacklist item stored in blacklist must be plug-in distinctive feature, i.e., in addition to this is plug-in Remaining program does not have the access behavior of this network or probability is extremely low, otherwise there is wrong report risk.
Step S3, networks filter driver establishes the data packet that layer captures all request connection servers in data flow, and right The IP and port parameter of data packet are analyzed, if in the port the far-end address IP and far-end address IP- blacklist of data packet The far-end IP of blacklist item is equal, while the distal end slogan of data packet is equal with the distal end slogan of blacklist item, then determines This data packet is the data packet of plug-in transmission;And by far-end address IP, distal end slogan, process ID, process path these information It is written in plug-in detection journal file.
Wherein, between the step S2 and step S3 further include: step S21, networks filter driver uses FwpmEngineOpen function obtains basic filtering engine BFE handle, the parameter as subsequent operation;
Step S22, networks filter driver establishes layer in data flow using FwpsCalloutRegister function registration The call back function of (FWPM_LAYER_ALE_FLOW_ESTABLISHED_V4 layers) monitoring data;
Step S23, networks filter driver uses FwpmCalloutAdd function to basic filtering engine BFE application addition The call back function of preceding registration;
Step S24, networks filter driver uses FwpmSubLayerAdd function, establishes layer creation sublayer in data flow, uses In capture data;
Step S25, networks filter driver uses FwpmFilterAdd function, by basic filtering engine BFE in data flow Layer creation filter is established, and call back function is associated with sublayer;After completing association, when sublayer captures network packet, System can call the corresponding call back function network data packet of sublayer;The data flow establishes the call back function of layer for handling Request the data packet of network linking.
In addition, the step S3 is further specifically: step S31, networks filter driver establishes layer capture institute in data flow There is the data packet of request connection server that can extract the remote of this data packet when the call back function that data flow establishes layer is called Hold IP and distal end slogan, then traverse all blacklist items of the port far-end address IP- blacklist, by each single item with currently catch The far-end address information of the data packet obtained compares, if the far-end address IP of data packet is equal with the far-end IP of blacklist item, together When data packet distal end slogan it is equal with the distal end slogan of blacklist item, then determine this data packet be plug-in transmission data Packet, and then determine that the process for sending this data packet is plug-in, and enter step S32;If the far-end IP and distal end of data packet Slogan cannot match any blacklist item in the blacklist of the port far-end address IP-, then determining this data packet not is plug-in transmission Data packet, and terminate process;
Step S32, call back function using ZwWirteFile function by the far-end address IP of data packet, distal end slogan, into These information of journey ID, process path are written in plug-in detection journal file.
Because the present invention only detects, interception function is not set, therefore the data flow establishes the call back function of layer complete After data packet analysis, no matter data packet whether be plug-in transmission data packet, without exception let pass, allow data packet continue to transmit.
As shown in fig.2, below with reference to a specific embodiment, to further describe the specific implementation side of this patent scheme Formula:
1. assuming that the plug-in A of game is the externally hung software for destroying the network game client C of game company B product.Outside The network address that IP is 222.187.224.66 can be accessed after process initiation by hanging A, and the remote port slogan of access is 7373.And it removes The plug-in A of game, other processes not will do it identical network request.
Whether run during the networks filter driver D detection player developed based on this programme 2. game company B is used Plug-in A, and scheme protects game client C whereby.
3. after player's running game client C, game client C can automatic load networks filtration drive D, network filtering drives Dynamic D initializes the port far-end address IP- blacklist after loading successfully, and is inserted into specially in the blacklist of the port far-end address IP- Door is for detecting the blacklist item of the plug-in A of game " 222.187.224.66-7373 ".
4. networks filter driver D is complete at FWPM_LAYER_ALE_FLOW_ESTABLISHED_V4 layers (data flow foundation layer) At starting to play network data packet filtering function after registered callbacks function, creation sublayer, the sequence of operations such as opening filter.
5. assuming in game client C operational process, player brings into operation the plug-in A of game.Game plug-in A starting at Access network is attempted after function, is then sent data packet request to No. 7373 ports of the server that IP is 222.187.224.66 and is connected It connects server, after the filters trap to this data packet of FWPM_LAYER_ALE_FLOW_ESTABLISHED_V4 sublayer, sentences Break this network request access object IP address and port numbers at the same hit " 222.187.224.66-7373 " this black name Individual event, it is determined that the process for sending this data packet is the process of the plug-in A creation of game.
6. networks filter driver D is by the far-end IP of this data packet, the process ID of distal end slogan and originating process, process road Diameter information is written in plug-in detection journal file by ZwWriteFile function.So far, entire plug-in detection module completes Primary plug-in behavior capture and record.(in addition to journal file is written, it can also will be believed by modes such as DeviceIoControl Breath is back to client, but this programme focuses on the capture of plug-in behavior, so having chosen simplest write-in file Method).
The foregoing is merely presently preferred embodiments of the present invention, all equivalent changes done according to scope of the present invention patent with Modification, is all covered by the present invention.

Claims (5)

1. a kind of plug-in detection method of game based on IP port diagnostic, it is characterised in that: described method includes following steps:
Step S1, the client of Windows system application layer creates networks filter driver in driving layer;
Step S2, the port a far-end address IP- blacklist is established, the storage of far-end address IP- port blacklist is plug-in to visit The IP and port numbers for the far-end address asked;
Step S3, networks filter driver establishes the data packet that layer captures all request connection servers in data flow, and to data The IP and port parameter of packet are analyzed, if black name in the port the far-end address IP and far-end address IP- blacklist of data packet The far-end IP of individual event is equal, while the distal end slogan of data packet is equal with the distal end slogan of blacklist item, then determines this number It is the data packet of plug-in transmission according to packet;And far-end address IP, distal end slogan, process ID, these information of process path are written Into plug-in detection journal file.
2. the plug-in detection method of a kind of game based on IP port diagnostic according to claim 1, it is characterised in that: described Step S2 is further specifically: during creation networks filter driver, the IP address of plug-in access and port numbers are written to The file of networks filter driver, the load of Windows system application and opening network filtration drive;Networks filter driver is opened After success, the port far-end address IP- blacklist is initialized, during initializing blacklist, networks filter driver will be written All in file have IP address and port numbers to be inserted into the blacklist of the port far-end address IP-.
3. the plug-in detection method of a kind of game based on IP port diagnostic according to claim 1, it is characterised in that: described Between step S2 and step S3 further include: step S21, networks filter driver obtains basic mistake using FwpmEngineOpen function Filter engine BFE handle, the parameter as subsequent operation;
Step S22, networks filter driver establishes layer monitoring data in data flow using FwpsCalloutRegister function registration Call back function;
Step S23, networks filter driver is infused using FwpmCalloutAdd function to basic filtering engine BFE application addition before The call back function of volume;
Step S24, networks filter driver uses FwpmSubLayerAdd function, layer creation sublayer is established in data flow, for catching Obtain data;
Step S25, networks filter driver uses FwpmFilterAdd function, is established by basic filtering engine BFE in data flow Layer creation filter, and call back function is associated with sublayer;After completing association, when sublayer captures network packet, system The corresponding call back function network data packet of sublayer can be called;The data flow establishes the call back function of layer for handling request The data packet of network linking.
4. the plug-in detection method of a kind of game based on IP port diagnostic according to claim 3, it is characterised in that: described Step S3 is further specifically: step S31, networks filter driver establishes layer in data flow and captures all request connection servers Data packet can extract the far-end IP and distal end slogan of this data packet, so when the call back function that data flow establishes layer is called All blacklist items for traversing the port far-end address IP- blacklist afterwards, distally with the data packet that currently captures by each single item Location information compares, if the far-end address IP of data packet is equal with the far-end IP of blacklist item, while the remote port of data packet It is number equal with the distal end slogan of blacklist item, then determine that this data packet is the data packet of plug-in transmission, and then determine to send this The process of data packet is plug-in, and enters step S32;If the far-end IP and distal end slogan of data packet cannot match distally Any blacklist item in the blacklist of the location port IP-, then determining this data packet not is the data packet of plug-in transmission, and terminates to flow Journey;
Step S32, call back function uses ZwWirteFile function by the far-end address IP of data packet, distal end slogan, process These information of ID, process path are written in plug-in detection journal file.
5. the plug-in detection method of a kind of game based on IP port diagnostic according to claim 3, it is characterised in that: described Data flow establishes the call back function of layer after completing data packet analysis, no matter data packet whether be plug-in transmission data packet, one Rule is let pass, and data packet is allowed to continue to transmit.
CN201910765197.0A 2019-08-19 2019-08-19 A kind of plug-in detection method of game based on IP port diagnostic Pending CN110465094A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910765197.0A CN110465094A (en) 2019-08-19 2019-08-19 A kind of plug-in detection method of game based on IP port diagnostic

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910765197.0A CN110465094A (en) 2019-08-19 2019-08-19 A kind of plug-in detection method of game based on IP port diagnostic

Publications (1)

Publication Number Publication Date
CN110465094A true CN110465094A (en) 2019-11-19

Family

ID=68511220

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910765197.0A Pending CN110465094A (en) 2019-08-19 2019-08-19 A kind of plug-in detection method of game based on IP port diagnostic

Country Status (1)

Country Link
CN (1) CN110465094A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113726761A (en) * 2021-08-27 2021-11-30 深圳供电局有限公司 Network security protection method based on white list

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101924769A (en) * 2010-08-24 2010-12-22 无锡开创信息技术有限公司 Payload characteristic identification based method for identifying Sohu dragon oath game service
WO2011150704A1 (en) * 2010-06-03 2011-12-08 中兴通讯股份有限公司 Method and apparatus for media gateway proxy
CN109347817A (en) * 2018-10-12 2019-02-15 厦门安胜网络科技有限公司 A kind of method and device that network security redirects
CN109889511A (en) * 2019-01-31 2019-06-14 中国人民解放军61660部队 Process DNS activity monitoring method, equipment and medium
CN109981604A (en) * 2019-03-07 2019-07-05 北京华安普特网络科技有限公司 A kind of method of the quick black chain of detection webpage

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011150704A1 (en) * 2010-06-03 2011-12-08 中兴通讯股份有限公司 Method and apparatus for media gateway proxy
CN101924769A (en) * 2010-08-24 2010-12-22 无锡开创信息技术有限公司 Payload characteristic identification based method for identifying Sohu dragon oath game service
CN109347817A (en) * 2018-10-12 2019-02-15 厦门安胜网络科技有限公司 A kind of method and device that network security redirects
CN109889511A (en) * 2019-01-31 2019-06-14 中国人民解放军61660部队 Process DNS activity monitoring method, equipment and medium
CN109981604A (en) * 2019-03-07 2019-07-05 北京华安普特网络科技有限公司 A kind of method of the quick black chain of detection webpage

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
雨中风华: "《Windows7以上使用WFP驱动框架实现IP数据包截取(一)》", 《CSDN》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113726761A (en) * 2021-08-27 2021-11-30 深圳供电局有限公司 Network security protection method based on white list

Similar Documents

Publication Publication Date Title
Gascon et al. Pulsar: Stateful black-box fuzzing of proprietary network protocols
CN109088901A (en) Deception defence method and system based on SDN building dynamic network
CN102761458B (en) Detection method and system of rebound type Trojan
CN106888209B (en) A kind of industry control bug excavation method based on protocol status figure extreme saturation
CN102035793B (en) Botnet detecting method, device and network security protective equipment
CN103297433B (en) The HTTP Botnet detection method of data flow Network Based and system
CN102045220A (en) Wooden horse monitoring and auditing method and system thereof
CN1889573A (en) Active decoy method and system
CN103873463A (en) Multistage filter firewall system and multistage filter method
CN109587156A (en) Abnormal network access connection identification and blocking-up method, system, medium and equipment
CN114422278B (en) Method, system and server for detecting program security
CN110035062A (en) A kind of network inspection method and apparatus
CN109995705A (en) Attack chain detection method and device based on high interaction honey pot system
CN109800577A (en) A kind of method and device of identification escape security monitoring behavior
CN110465094A (en) A kind of plug-in detection method of game based on IP port diagnostic
CN107864128A (en) Scanning detection method, device, readable storage medium storing program for executing based on network behavior
CN100493065C (en) Method for using immediate information software by data detection network address switching equipment
CN110460611A (en) Full flow attack detecting technology based on machine learning
CN107241304A (en) A kind of detection method and device of DDos attacks
CN112671759A (en) DNS tunnel detection method and device based on multi-dimensional analysis
CN109981603A (en) ARP Attack monitoring system and method
CN113542311B (en) Method for detecting and backtracking defect host in real time
CN110351237A (en) Honey jar method and device for numerically-controlled machine tool
CN109800571A (en) Event-handling method and device and storage medium and electronic device
CN110404267A (en) A kind of plug-in detection method of game based on HTTP flow HOST field feature

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191119

RJ01 Rejection of invention patent application after publication