CN111294405A - Proxy detection method and device - Google Patents

Proxy detection method and device Download PDF

Info

Publication number
CN111294405A
CN111294405A CN202010096736.9A CN202010096736A CN111294405A CN 111294405 A CN111294405 A CN 111294405A CN 202010096736 A CN202010096736 A CN 202010096736A CN 111294405 A CN111294405 A CN 111294405A
Authority
CN
China
Prior art keywords
information
proxy
target
agent
connection request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010096736.9A
Other languages
Chinese (zh)
Inventor
陈曦
林皓
李胜家
杨泳
王海波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Linkdood Technologies SdnBhd
Beijing VRV Software Corp Ltd
Original Assignee
Linkdood Technologies SdnBhd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Linkdood Technologies SdnBhd filed Critical Linkdood Technologies SdnBhd
Priority to CN202010096736.9A priority Critical patent/CN111294405A/en
Publication of CN111294405A publication Critical patent/CN111294405A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/141Setup of application sessions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/22Parsing or analysis of headers

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer And Data Communications (AREA)

Abstract

The embodiment of the invention provides a proxy detection method and a device, wherein the proxy detection method comprises the following steps: acquiring a communication data packet between the target proxy server and the target proxy server; analyzing the communication data packet to obtain the proxy information of the target proxy server; and sending a proxy service connection request to the target proxy server based on the proxy information, and detecting whether the proxy information is effective information according to a connection request result. The embodiment of the invention improves the reliability of the proxy detection.

Description

Proxy detection method and device
Technical Field
The invention relates to the technical field of computers, in particular to a proxy detection method and a proxy detection device.
Background
The detection agent mode commonly used on the Windows computer at present comprises the acquisition from a registry or the acquisition by a packet capturing mode. The two methods correspond to different application software, for example, a browser for detecting a kernel of a web browser should be acquired from a registry, an agent of a dog search browser cannot be directly acquired from the registry, and for the software, agent information needs to be captured by a data packet analysis mode.
For the technology of acquiring the proxy information by packet capturing, it is currently common practice to acquire a data packet and match a rule in the data packet with a proxy rule, so that the proxy information can be actually captured, but forged or similar information in a certain communication section can be regarded as true proxy information, thereby causing misjudgment of the proxy information.
Disclosure of Invention
The embodiment of the invention provides a proxy detection method and a proxy detection device, which are used for improving the reliability of detected proxy server information.
The embodiment of the invention provides an agent detection method, which comprises the following steps:
acquiring a communication data packet between the target proxy server and the target proxy server;
analyzing the communication data packet to obtain the proxy information of the target proxy server;
and sending a proxy service connection request to the target proxy server based on the proxy information, and detecting whether the proxy information is effective information according to a connection request result.
Optionally, the proxy information further includes at least one of the following information: the website information, the port information and the agent type information of the target agent server.
Optionally, the proxy information includes network identification information and login information of the target proxy server; the sending a proxy service connection request to the target proxy server based on the proxy information includes: and sending a proxy service connection request to the target proxy server based on the network identification information and the login information of the target proxy server.
Optionally, the detecting whether the proxy information is valid information according to a connection request result includes: when the connection request result is that the connection is successful, judging that the proxy information is effective information; and when the connection request result is connection failure, judging that the proxy information is invalid information.
An embodiment of the present invention provides an agent detection apparatus, including:
the first acquisition module is used for acquiring a communication data packet between the first acquisition module and the target proxy server;
the second acquisition module is used for analyzing the communication data packet to obtain the proxy information of the target proxy server;
a sending module, configured to send a proxy service connection request to the target proxy server based on the proxy information;
and the proxy detection module is used for detecting whether the proxy information is effective information according to the connection request result.
Optionally, the proxy information further includes at least one of the following information: the website information, the port information and the agent type information of the target agent server.
Optionally, the proxy information includes network identification information and login information of the target proxy server; the sending module is used for sending a proxy service connection request to the target proxy server based on the network identification information and the login information of the target proxy server.
Optionally, the agent detection module is configured to determine that the agent information is valid information when the connection request result is that the connection is successful; and when the connection request result is connection failure, judging that the proxy information is invalid information.
The embodiment of the invention provides electronic equipment, which comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor realizes the steps of the agent detection method when executing the computer program.
An embodiment of the present invention provides a non-transitory computer readable storage medium, on which a computer program is stored, which, when executed by a processor, implements the steps of the proxy detection method described above.
According to the proxy detection method and device provided by the embodiment of the invention, the proxy information of the target proxy server is obtained by acquiring the communication data packet between the proxy server and the target proxy server and analyzing the communication data packet, then the proxy service connection request is sent to the target proxy server based on the proxy information, and whether the proxy information is effective information or not is detected according to the connection request result, so that proxy connection is established once again between the captured proxy information and the target proxy server, and at the moment, the captured proxy information is not fakeable in timeliness and regionality based on complete proxy connection, so that the problem of false identification of the proxy information caused by faking and the like can be avoided, and the reliability of proxy information detection is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and those skilled in the art can also obtain other drawings according to the drawings without creative efforts.
FIG. 1 is a flowchart illustrating the steps of a proxy detection method according to an embodiment of the present invention;
FIG. 2 is a block diagram of an agent detection apparatus according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device in an embodiment of the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, which is a flowchart illustrating steps of an agent detection method according to an embodiment of the present invention, the method includes the following steps:
step 101: and acquiring a communication data packet between the target proxy server and the target proxy server.
In this step, specifically, the terminal may obtain a communication data packet with the target proxy server in a packet capturing manner.
Specifically, the terminal may perform network card screening on the captured data packet, and screen to obtain data flowing through the specified network card, that is, screen to obtain a communication data packet with the target proxy server.
Step 102: and analyzing the communication data packet to obtain the proxy information of the target proxy server.
In this step, specifically, the proxy information of the target server may be obtained from the communication data packet through analysis. The proxy information may include network identification information and login information of the target proxy server, so that the terminal can connect with the target proxy server again based on the proxy information.
Step 103: and sending a proxy service connection request to the target proxy server based on the proxy information, and detecting whether the proxy information is effective information according to the connection request result.
In this step, specifically, after the agent information is obtained through analysis, an agent service connection request may be sent to the target agent server based on the agent information, and whether the target agent server is a valid agent server may be detected according to a connection request result.
Therefore, the communication data packet between the proxy server and the target proxy server is obtained and analyzed to obtain the proxy information of the target proxy server, then the proxy service connection request is sent to the target proxy server based on the proxy information, and whether the proxy information of the target proxy server is effective information is detected according to the connection request result, so that the proxy connection is established once again between the captured proxy information and the target proxy server, and the proxy information is ensured to be unforgeable in both time domain and region based on the integrity of the proxy connection process, thereby avoiding the problem of false judgment of the proxy information caused by counterfeiting or partial information similarity in communication data, and improving the detection reliability of the proxy information.
Specifically, the agent information further includes at least one of the following information: website information, port information, agent type information, etc. of the target agent server. At the moment, the information can dynamically follow the website information accessed by the local computer and carry out proxy detection again, so that the problem that the website cannot be accessed per se in different network environments when a fixed website detection proxy server is adopted is avoided.
Further, in the present embodiment, when sending the proxy service connection request to the target proxy server based on the proxy information, the proxy service connection request may be sent to the target proxy server based on the network identification information and the login information of the target proxy server.
Specifically, the login information may include an account name and a password required for connection.
Specifically, the network identification information is used for positioning the target proxy server, the login information is used for connecting with the target proxy server, and at this time, the combination can be performed according to the proxy rule, proxy service connection is established again with the target proxy server, that is, a proxy service connection request is sent to the target proxy server, so that a complete proxy connection process is realized.
Of course, it should be noted herein that the proxy service connection request may be the same as the proxy service connection service request corresponding to the communication data packet.
Further, in this embodiment, when detecting whether the proxy information is valid information according to the connection request result, it may be determined that the proxy information is valid information when the connection request result is a connection success; and when the connection request result is connection failure, judging that the proxy information is invalid information.
Specifically, when the connection is successful, the proxy information is judged to be valid, namely, the target proxy server is valid, and when the connection is failed, the proxy information is judged to be invalid, namely, the target proxy server is invalid, so that the proxy information is verified, misjudgment caused by counterfeiting or false recognition is reduced, and the reliability of proxy information detection is improved.
Specifically, when the agent information is determined to be valid information, the agent information may be output and stored.
In this way, the present embodiment sends the proxy service connection request to the target proxy server based on the proxy information analyzed from the communication data packet, and detects whether the proxy information is valid information according to the connection request result, thereby implementing a complete proxy connection process, thereby reducing misjudgment caused by forgery and erroneous identification, improving the reliability of proxy information detection, and making the detected proxy information more accurate.
In addition, as shown in fig. 2, a block diagram of a proxy detection apparatus in an embodiment of the present invention is shown, where the apparatus includes:
a first obtaining module 201, configured to obtain a communication data packet with a target proxy server;
a second obtaining module 202, configured to analyze the communication data packet to obtain proxy information of the target proxy server;
a sending module 203, configured to send a proxy service connection request to the target proxy server based on the proxy information;
and the proxy detection module 204 is configured to detect whether the proxy information is valid information according to a connection request result.
Optionally, the proxy information further includes at least one of the following information: the website information, the port information and the agent type information of the target agent server.
Optionally, the proxy information includes network identification information and login information of the target proxy server; the sending module is used for sending a proxy service connection request to the target proxy server based on the network identification information and the login information of the target proxy server.
Optionally, the agent detection module is configured to determine that the agent information is valid information when the connection request result is that the connection is successful; and when the connection request result is connection failure, judging that the proxy information is invalid information.
It should be noted that the apparatus can implement all the method steps of the embodiment of the method side and achieve the same beneficial effects, and the description of the same method steps and the beneficial effects is omitted here.
In addition, as shown in fig. 3, an entity structure schematic diagram of the electronic device provided in the embodiment of the present invention is shown, where the electronic device may include: a processor (processor)310, a communication interface (communication interface)320, a memory (memory)330 and a communication bus 340, wherein the processor 310, the communication interface 320 and the memory 330 communicate with each other via the communication bus 340. The processor 310 may invoke a computer program stored on the memory 330 and executable on the processor 310 to perform the following steps: acquiring a communication data packet between the target proxy server and the target proxy server; analyzing the communication data packet to obtain the proxy information of the target proxy server; and sending a proxy service connection request to the target proxy server based on the proxy information, and detecting whether the proxy information is effective information according to a connection request result.
It should be noted that, the electronic device can implement all the method steps of the embodiment of the method side and can achieve the same beneficial effects, and the description of the same method steps and the beneficial effects is omitted here.
In addition, the logic instructions in the memory 330 may be implemented in the form of software functional units and stored in a computer readable storage medium when the software functional units are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Embodiments of the present invention also provide a non-transitory computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the method provided by the above embodiments.
It should be noted that the storage medium can implement all the method steps of the above method side embodiment and can achieve the same beneficial effects, and the description of the same method steps and the beneficial effects is omitted here.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A method for agent detection, comprising:
acquiring a communication data packet between the target proxy server and the target proxy server;
analyzing the communication data packet to obtain the proxy information of the target proxy server;
and sending a proxy service connection request to the target proxy server based on the proxy information, and detecting whether the proxy information is effective information according to a connection request result.
2. The agent detection method according to claim 1, wherein the agent information further includes at least one of the following information: the website information, the port information and the agent type information of the target agent server.
3. The agent detection method according to claim 1, wherein the agent information includes network identification information and login information of the target agent server;
the sending a proxy service connection request to the target proxy server based on the proxy information includes:
and sending a proxy service connection request to the target proxy server based on the network identification information and the login information of the target proxy server.
4. The agent detection method according to claim 1, wherein the detecting whether the agent information is valid information according to the connection request result includes:
when the connection request result is that the connection is successful, judging that the proxy information is effective information;
and when the connection request result is connection failure, judging that the proxy information is invalid information.
5. An agent detection apparatus, comprising:
the first acquisition module is used for acquiring a communication data packet between the first acquisition module and the target proxy server;
the second acquisition module is used for analyzing the communication data packet to obtain the proxy information of the target proxy server;
a sending module, configured to send a proxy service connection request to the target proxy server based on the proxy information;
and the proxy detection module is used for detecting whether the proxy information is effective information according to the connection request result.
6. The agent detection apparatus according to claim 5, wherein the agent information further includes at least one of the following information: the website information, the port information and the agent type information of the target agent server.
7. The agent detection apparatus according to claim 5, wherein the agent information includes network identification information and login information of the target agent server;
the sending module is used for sending a proxy service connection request to the target proxy server based on the network identification information and the login information of the target proxy server.
8. The proxy detection device according to claim 5, wherein the proxy detection module is configured to determine that the proxy information is valid information when the connection request result is a successful connection; and when the connection request result is connection failure, judging that the proxy information is invalid information.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the agent detection method according to any of claims 1 to 4 when executing the computer program.
10. A non-transitory computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the agent detection method according to any one of claims 1 to 4.
CN202010096736.9A 2020-02-17 2020-02-17 Proxy detection method and device Pending CN111294405A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010096736.9A CN111294405A (en) 2020-02-17 2020-02-17 Proxy detection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010096736.9A CN111294405A (en) 2020-02-17 2020-02-17 Proxy detection method and device

Publications (1)

Publication Number Publication Date
CN111294405A true CN111294405A (en) 2020-06-16

Family

ID=71020264

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010096736.9A Pending CN111294405A (en) 2020-02-17 2020-02-17 Proxy detection method and device

Country Status (1)

Country Link
CN (1) CN111294405A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113259485A (en) * 2021-06-22 2021-08-13 统信软件技术有限公司 Network proxy method, computing device and readable storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030217173A1 (en) * 2002-05-15 2003-11-20 Butt Alan B. Automatic proxy detection
US20080151881A1 (en) * 2004-01-22 2008-06-26 Hain-Ching Liu Method and system for transporting data over network
CN101510874A (en) * 2009-03-20 2009-08-19 腾讯科技(深圳)有限公司 Setup system and method for network connection, network communication tool and method
CN103902386A (en) * 2014-04-11 2014-07-02 复旦大学 Multi-thread network crawler processing method based on connection proxy optimal management
CN103944906A (en) * 2014-04-25 2014-07-23 厦门享游网络科技有限公司 HTTP traffic guiding method on iOS for APP
CN109743411A (en) * 2018-12-10 2019-05-10 厦门市美亚柏科信息股份有限公司 A kind of method, apparatus and storage medium of the dynamic dispatching IP agent pool under distributed environment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030217173A1 (en) * 2002-05-15 2003-11-20 Butt Alan B. Automatic proxy detection
US20080151881A1 (en) * 2004-01-22 2008-06-26 Hain-Ching Liu Method and system for transporting data over network
CN101510874A (en) * 2009-03-20 2009-08-19 腾讯科技(深圳)有限公司 Setup system and method for network connection, network communication tool and method
CN103902386A (en) * 2014-04-11 2014-07-02 复旦大学 Multi-thread network crawler processing method based on connection proxy optimal management
CN103944906A (en) * 2014-04-25 2014-07-23 厦门享游网络科技有限公司 HTTP traffic guiding method on iOS for APP
CN109743411A (en) * 2018-12-10 2019-05-10 厦门市美亚柏科信息股份有限公司 A kind of method, apparatus and storage medium of the dynamic dispatching IP agent pool under distributed environment

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
站大爷: ""分享几种测试socks5代理IP的方式"", 《HTTPS://WWW.ZDAYE.COM/KNOW/S/3007.HTML》 *
站大爷: ""怎么检测socks5代理IP是否有效"", 《HTTPS://WWW.ZDAYE.COM/DAILI/IP/5544.HTML》 *
鲁港,于乐: ""企业网中代理服务器的检测程序开发"", 《万方数据库》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113259485A (en) * 2021-06-22 2021-08-13 统信软件技术有限公司 Network proxy method, computing device and readable storage medium
CN113259485B (en) * 2021-06-22 2021-09-17 统信软件技术有限公司 Network proxy method, computing device and readable storage medium

Similar Documents

Publication Publication Date Title
CN110445688B (en) Interface service function monitoring method and system based on data collection
CN111865925A (en) Network traffic based fraud group identification method, controller and medium
CN103209177B (en) The detection method of phishing attacks and device
CN104956372A (en) Determining coverage of dynamic security scans using runtime and static code analyses
CN109145585B (en) Method and device for detecting weak password of website
KR101675416B1 (en) System and method for realtime detection of abnormal financial transaction
EP3759636A1 (en) System, method, apparatus, and computer program product to detect page impersonation in phishing attacks
CN102891861A (en) Client-based phishing website detecting method and device
CN114422139A (en) API gateway request security verification method and device, electronic equipment and computer readable medium
WO2017054307A1 (en) Recognition method and apparatus for user information
CN108270754B (en) Detection method and device for phishing website
CN107819758A (en) A kind of IP Camera leak remote detecting method and device
CN110955890B (en) Method and device for detecting malicious batch access behaviors and computer storage medium
CN111294405A (en) Proxy detection method and device
CN114297735A (en) Data processing method and related device
CN107995167B (en) Equipment identification method and server
CN115913671A (en) Token injection access method and device based on zero-trust gateway, electronic equipment and storage medium
CN113411332B (en) CORS vulnerability detection method, device, equipment and medium
CN115643044A (en) Data processing method, device, server and storage medium
US20210176275A1 (en) System and method for page impersonation detection in phishing attacks
CN115065510A (en) Login method, device, system, electronic equipment and readable storage medium
CN113709136A (en) Access request verification method and device
CN111767493A (en) Method, device, equipment and storage medium for displaying content data of website
CN108632050B (en) Method and device for recording website access log
CN113836509B (en) Information acquisition method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200616