CN113014509B - Application program acceleration method and device - Google Patents

Application program acceleration method and device Download PDF

Info

Publication number
CN113014509B
CN113014509B CN202110579603.1A CN202110579603A CN113014509B CN 113014509 B CN113014509 B CN 113014509B CN 202110579603 A CN202110579603 A CN 202110579603A CN 113014509 B CN113014509 B CN 113014509B
Authority
CN
China
Prior art keywords
network
acceleration
rule
traffic data
network traffic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110579603.1A
Other languages
Chinese (zh)
Other versions
CN113014509A (en
Inventor
黄嘉锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202110579603.1A priority Critical patent/CN113014509B/en
Publication of CN113014509A publication Critical patent/CN113014509A/en
Application granted granted Critical
Publication of CN113014509B publication Critical patent/CN113014509B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/24Traffic characterised by specific attributes, e.g. priority or QoS
    • H04L47/2441Traffic characterised by specific attributes, e.g. priority or QoS relying on flow classification, e.g. using integrated services [IntServ]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • H04L41/083Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability for increasing network speed

Abstract

The application relates to an application program acceleration method and device. The method comprises the following steps: acquiring network flow data generated when an application program runs; performing category matching on the network traffic data based on the acceleration rule base to obtain a category matching result; when the class matching result represents that the application program generating the network traffic data belongs to the target application class, carrying out shunt matching on the network traffic data and the shunt rule in the acceleration rule base to obtain the characteristic type of the network traffic data; and shunting the network traffic data to a target acceleration line corresponding to the characteristic type so as to perform network acceleration processing on the application program belonging to the target application class. By adopting the method, the network acceleration effect can be improved.

Description

Application program acceleration method and device
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for accelerating an application program.
Background
With the continuous development of scientific technology, application programs are also widely applied, wherein network performance is an important factor for the application programs to obtain good user experience. When a user participates in an application program with strong timeliness, for example, when the user participates in activities such as group answering, red packet robbing or wheat robbing, or the user participates in some competitive activities, the user puts higher expectations and requirements on the network speed and the running speed of the application program.
Some application acceleration schemes are also developed to meet the expectations and requirements of users on the running speed of applications. At present, the network performance of an application program is mainly accelerated based on an accelerator, and network traffic data generated during the operation of the application program is forwarded to a default acceleration line through the accelerator, so that the effect of network acceleration is achieved. However, the acceleration effect of network acceleration through the default acceleration line is limited, and the acceleration effect of the application program is limited, so that an application program acceleration method capable of further improving the acceleration effect is urgently needed.
Disclosure of Invention
In view of the above, it is necessary to provide an application acceleration method, an application acceleration apparatus, a computer device, and a storage medium capable of improving acceleration effect.
A method of application acceleration, the method comprising:
acquiring network flow data generated when an application program runs;
performing category matching on the network traffic data based on an acceleration rule base to obtain a category matching result;
when the class matching result represents that the application program generating the network traffic data belongs to a target application class, carrying out shunt matching on the network traffic data and a shunt rule in the acceleration rule base to obtain the characteristic type of the network traffic data;
and shunting the network traffic data to a target acceleration line corresponding to the characteristic type so as to perform network acceleration processing on the application program belonging to the target application type.
In one embodiment, the obtaining network traffic data generated by the application program during the operation comprises:
acquiring an acceleration rule base through the acceleration service, and creating a virtual network card corresponding to the accelerator;
and when the network flow data flows through the virtual network card, the accelerator acquires the network flow data.
An application acceleration apparatus, the apparatus comprising:
the flow acquisition module is used for acquiring network flow data generated when the application program runs;
the category matching module is used for carrying out category matching on the network flow data based on the acceleration rule base to obtain a category matching result;
the distribution module is used for distributing and matching the network traffic data and the distribution rules in the acceleration rule base to obtain the characteristic types of the network traffic data when the class matching result represents that the application program generating the network traffic data belongs to the target application class; and shunting the network traffic data to a target acceleration line corresponding to the characteristic type so as to perform network acceleration processing on the application program belonging to the target application type.
In one embodiment, the category matching module is further configured to determine a target traffic type of the network traffic data; screening out a corresponding target acceleration rule from the acceleration rule base according to the target flow type; the target acceleration rule comprises at least one of a target shielding rule and a target direct connection rule; and performing category matching on the network traffic data based on at least one of the target shielding rule and the target direct connection rule to obtain a corresponding category matching result.
In one embodiment, the category matching module is further configured to perform category matching processing on the network traffic data and a target shielding rule; when the network traffic data is successfully matched with the target shielding rule, determining that a class matching result obtained based on class matching processing is a result representing that the network traffic data belongs to a shielding class; and carrying out shielding processing on the network traffic data belonging to the shielding category.
In one embodiment, the category matching module is further configured to perform category matching processing on the network traffic data and the target direct connection rule when matching of the network traffic data and the target shielding rule fails; when the network traffic data is successfully matched with the target direct connection rule, determining that a category matching result obtained based on category matching processing is a result representing that an application program generating the network traffic data belongs to a direct connection application category; and performing direct connection processing on the network traffic data generated by the application program belonging to the direct connection application category.
In one embodiment, the target acceleration rule includes a target distribution rule, and the distribution module further includes a feature type determination module, configured to determine that an application program that generates the network traffic data belongs to a target application category when the network traffic data fails to match both the target shielding rule and the target direct connection rule; and carrying out shunting matching on the network traffic data and the target shunting rule to obtain the characteristic type of the network traffic data.
In an embodiment, the application program acceleration device is further configured to, when the network traffic data fails to match the target shielding rule, the target direct connection rule, and the target offloading rule, offload the network traffic data to a default acceleration line, so as to perform network acceleration processing on the application program generating the network traffic data through the default acceleration line.
In one embodiment, the application program acceleration apparatus further includes a rule construction module, configured to perform traffic feature analysis on the historical network traffic data, obtain at least one of a network domain name and a network address, and obtain at least one of an application package name of a historical application program that generates the historical network traffic data; and when the historical application program is determined not to belong to the illegal application category and not to belong to the target application category based on the application package name, constructing a corresponding target direct connection rule according to at least one of the network domain name and the network address.
In one embodiment, the application program acceleration device is further configured to perform network acceleration processing on the application programs of a target application class, wherein the target application class is a game application class; the distribution rule at least comprises one of a login acceleration rule, a region verification acceleration rule, a download acceleration rule, an opposite office acceleration rule and a dynamic access rule; the characteristic type of the network flow data at least comprises one of a login check type, a region check type, a download type, a local alignment type and a dynamic access type.
In one embodiment, the offloading module further includes an acceleration module, configured to forward the network traffic data to a multi-website acceleration line when the network traffic data belongs to a login verification type, so as to perform network acceleration processing on a login verification process of an application program that generates the network traffic data; wherein, the multi-website accelerating line is bound with at least one public network address; when the network flow data belong to a region verification type, forwarding the network flow data to a primary website accelerating line so as to perform network accelerating processing on a region verification process of an application program generating the network flow data; the native website accelerating line is bound with a native network address; when the network flow data belongs to a downloading type, forwarding the network flow data to a downloading acceleration line so as to perform network acceleration processing on a downloading process of an application program generating the network flow data; when the network traffic data belong to a local-alignment type, forwarding the network traffic data to a local-alignment acceleration line so as to perform network acceleration processing on a local-alignment process of an application program generating the network traffic data; and when the network flow data belongs to a dynamic access type, forwarding the network flow data to a dynamic acceleration line so as to perform network acceleration processing on an application program generating the network flow data.
In one embodiment, the rule construction module is further configured to perform traffic feature analysis on historical network traffic data, obtain at least one of a network domain name and a network address of the historical network traffic data, and obtain a traffic size of the historical network traffic data; and when the flow is larger than or equal to a preset flow threshold, constructing a corresponding downloading acceleration rule based on at least one of the network domain name and the network address.
In one embodiment, the rule building module is further configured to perform traffic feature analysis on historical network traffic data to obtain at least one of a network domain name and a network address of the historical network traffic data, and obtain an application package name of a historical application program generating the historical traffic data; when the historical application program is determined to belong to the target application category according to the application package name, shielding the historical network flow data, and determining whether the login function of the historical application program is abnormal; and when the historical network flow data is shielded and the login function of the historical application program is abnormal, constructing a corresponding login acceleration rule based on at least one of the network domain name and the network website.
In one embodiment, the rule construction module is further configured to perform traffic feature analysis on historical network traffic data to obtain at least one of a network domain name and a network address, and obtain access times; and when the communication times between the historical application program generating the historical network flow data and the corresponding communication object are determined to be greater than or equal to a preset communication threshold value according to the access times, constructing a corresponding opposite acceleration rule based on at least one of the network domain name and the network address.
In one embodiment, the application acceleration device is further configured to perform traffic feature analysis on the network traffic data to obtain a network traffic feature when the network traffic data does not match a rule in the acceleration rule base; constructing a corresponding acceleration rule according to the network flow characteristics; and updating the acceleration rule base based on the constructed acceleration rule.
In one embodiment, the application acceleration device is further configured to present an application list of applications; responding to the selection operation of the application list, and determining an application program to be accelerated selected by the selection operation; starting an accelerator, and carrying out initial network acceleration processing on the application program to be accelerated through the accelerator enabling a default acceleration line.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
acquiring network flow data generated when an application program runs;
performing category matching on the network traffic data based on an acceleration rule base to obtain a category matching result;
when the class matching result represents that the application program generating the network traffic data belongs to a target application class, carrying out shunt matching on the network traffic data and a shunt rule in the acceleration rule base to obtain the characteristic type of the network traffic data;
and shunting the network traffic data to a target acceleration line corresponding to the characteristic type so as to perform network acceleration processing on the application program belonging to the target application type.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
acquiring network flow data generated when an application program runs;
performing category matching on the network traffic data based on an acceleration rule base to obtain a category matching result;
when the class matching result represents that the application program generating the network traffic data belongs to a target application class, carrying out shunt matching on the network traffic data and a shunt rule in the acceleration rule base to obtain the characteristic type of the network traffic data;
and shunting the network traffic data to a target acceleration line corresponding to the characteristic type so as to perform network acceleration processing on the application program belonging to the target application type.
A computer program product or computer program, the computer program product or computer program comprising computer instructions stored in a computer readable storage medium, the computer instructions being read by a processor of a computer device from the computer readable storage medium, the processor executing the computer instructions to cause the computer device to perform the steps of: acquiring network flow data generated when an application program runs; performing category matching on the network traffic data based on an acceleration rule base to obtain a category matching result; when the class matching result represents that the application program generating the network traffic data belongs to a target application class, carrying out shunt matching on the network traffic data and a shunt rule in the acceleration rule base to obtain the characteristic type of the network traffic data; and shunting the network traffic data to a target acceleration line corresponding to the characteristic type so as to perform network acceleration processing on the application program belonging to the target application type.
According to the application program acceleration method, the application program acceleration device, the computer equipment, the storage medium and the computer program, the network traffic data generated when the application program runs are obtained, and the network traffic data and the acceleration rule base can be subjected to class matching processing to determine the class of the network traffic data. When the application program generating the network traffic data is determined to belong to the target application category based on the category matching result, the feature type of the network traffic data can be determined by performing distribution matching processing on the network traffic data and the distribution rule, so that the network traffic data can be distributed to a target acceleration line corresponding to the feature type, and network acceleration processing on the corresponding application program based on the target acceleration line is realized. Because the network traffic data can be directionally distributed to the corresponding target acceleration line by combining application category classification and the feature types of the network traffic data, compared with the traditional method of carrying out network acceleration processing through a default acceleration line, different acceleration strategies can be adopted for the network traffic data with different feature types, so that fine controllable acceleration aiming at the network traffic data is realized, and the acceleration effect of an application program is further improved.
Drawings
FIG. 1 is a diagram of an application environment for a method for application acceleration in one embodiment;
FIG. 2 is a flowchart of an application acceleration method, according to one embodiment;
FIG. 3 is a diagram illustrating class matching based on traffic type in one embodiment;
FIG. 4 is a schematic diagram of accelerated route selection in one embodiment;
FIG. 5 is a schematic illustration of traffic characteristic analysis in one embodiment;
FIG. 6 is a diagram illustrating the construction of download acceleration rules, in one embodiment;
FIG. 7 is a diagram illustrating the construction of rules for office acceleration in one embodiment;
FIG. 8 is a diagram of an application list in one embodiment;
FIG. 9 is a schematic diagram of an accelerator load interface in one embodiment;
FIG. 10 is a diagram of an acceleration detail page in one embodiment;
FIG. 11 is a flowchart of a method for application acceleration, according to one embodiment;
FIG. 12 is a flowchart illustrating a method for application acceleration in accordance with an exemplary embodiment;
FIG. 13 is a block diagram showing the structure of an application acceleration unit according to one embodiment;
FIG. 14 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
FIG. 1 is a diagram of an application environment in which a method for application acceleration is described, in one embodiment. Referring to fig. 1, the application acceleration method is applied to an application acceleration system 100. The application acceleration system 100 includes a terminal 102 and a server 104. Wherein the terminal 102 communicates with the server 104 via a network. An accelerator runs in the terminal 102, when it is determined that the application program to be accelerated is started, the terminal 102 automatically wakes up the accelerator, and triggers the accelerator to perform intelligent acceleration processing on the application program to be accelerated based on the acceleration rule base and network traffic data generated when the application program runs. The terminal 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices. The server 104 may be implemented as a stand-alone server or as a server cluster comprised of multiple servers.
The application also relates to a block chain technology, and acceleration rules, acceleration circuit information and the like can be stored through the block chain. The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The numbers of "plurality" or "plurality" and the like mentioned in the embodiments of the present application each refer to a number of "at least two", for example, "plurality" means "at least two", and "plurality" means "at least two".
In one embodiment, as shown in fig. 2, an application acceleration method is provided, which is described by taking the application of the method to the terminal in fig. 1 as an example, and includes the following steps:
step S202, network flow data generated when the application program runs is obtained.
The network traffic data is a data stream sent to the outside of the electronic device, or a data stream received by the electronic device, and may specifically be a data packet corresponding to an access request sent by an application program running on the terminal, or a data packet received by the application program and used for responding to the access request.
Specifically, when the terminal allows establishing a network channel, such as a mobile network, for example, a 4G (the 4th generation mobile communication technology) network channel, or a WIFI network channel, the application running in the terminal performs network communication based on the established network channel, thereby generating network traffic data. When the application program performs network communication and generates network data traffic, the accelerator operating in the terminal may capture the network data traffic, so as to perform network acceleration processing on the corresponding application program based on the captured network data traffic in the following.
In one embodiment, obtaining network traffic data generated during application program runtime comprises: acquiring an acceleration rule base through an acceleration service, and creating a virtual network card corresponding to an accelerator; and when the network flow data flows through the virtual network card, the network flow data is obtained through the accelerator.
When the accelerator is started, the terminal can establish a virtual network card corresponding to the accelerator, capture network traffic data generated during the operation of an application program through the established virtual network card, and forward the captured network traffic data to the accelerator.
And step S204, carrying out category matching on the network flow data based on the acceleration rule base to obtain a category matching result.
The acceleration rule base is a base in which at least one acceleration rule is stored, and the acceleration rule comprises a direct connection rule, a shielding rule and a shunting rule. The direct connection rule refers to a rule set based on a preset direct connection condition, and when the network traffic data is successfully matched with the direct connection rule, the network traffic data can be directly connected. The shielding rule refers to a rule set based on a preset shielding condition, and when the network traffic data is successfully matched with the shielding rule, the network traffic data can be shielded. The distribution rule refers to a rule set based on a preset distribution rule, and when the network traffic data is matched with the distribution rule, network acceleration processing can be performed on an application program generating the network traffic data.
Specifically, the accelerator performs category matching on the network traffic data and the acceleration rules in the acceleration rule base to obtain a category matching result. The categories corresponding to the network traffic data include a shielding category, a target application category and a direct connection application category. When it is determined that the network traffic data corresponds to the mask category based on the category matching result, the network traffic data may be considered as the illegal network traffic data, for example, network traffic data generated for accessing the illegal website. When it is determined that the network traffic data corresponds to the target application category based on the category matching result, the application program that generated the network traffic data may be considered to belong to the target application category, for example, when the target application category is a game category, the application program that generated the network traffic data may be determined to be a game application program when the network traffic data corresponds to the target application category. When it is determined that the network traffic data corresponds to the direct connection application category based on the category matching result, the application program that generates the network traffic data may be considered to belong to the direct connection application category, for example, when the direct connection application category is a non-game category, it may be determined that the application program that generates the network traffic data is not a game application program when the network traffic data corresponds to the direct connection application category.
In one embodiment, the acceleration rule base includes a masking rule and a direct connection rule. When the network traffic data is obtained by capturing, the captured network traffic data can be preferentially matched with the shielding rule to obtain a shielding matching result. When it is determined that the network traffic data is successfully matched with the masking rule based on the mask matching result, it is determined that the network traffic data corresponds to the masking category. When it is determined that the network traffic data fails to be matched with the shielding rule based on the shielding matching result, the accelerator can continue to perform matching processing on the network traffic data and the direct connection rule to obtain a direct connection matching result. When it is determined that the network traffic data is successfully matched with the direct connection rule based on the direct connection matching result, it is determined that the network traffic data corresponds to the direct connection application category. When it is determined that the network traffic data fails to match both the shielding rule and the direct connection rule based on the shielding matching result and the direct connection matching result, it may be determined that the network traffic data corresponds to the target application category.
In one embodiment, the network traffic data and the acceleration rules in the acceleration rule base may be subjected to regular matching processing to obtain corresponding regular matching results, and the corresponding category matching results are determined according to the regular matching results. For example, the masking rule may be set to ". about.go.com." so that the network traffic data may be subjected to a regular matching process with ". about.go.com.".
And step S206, when the class matching result represents that the application program generating the network traffic data belongs to the target application class, performing shunt matching on the network traffic data and the shunt rule in the acceleration rule base to obtain the characteristic type of the network traffic data.
The feature type of the network traffic data refers to information used for representing the feature type to which the network traffic data belongs. The characteristic type of the network traffic data at least comprises one of a login check type, a region check type, a download type, a local type and a dynamic access type. When the network flow data belongs to the login verification type, the network flow data is shown to be the flow data generated when the application program performs login verification; when the network flow data belongs to the region verification type, the network flow data is indicated to be flow data generated when the application program logs in the region verification; when the network flow data belongs to the downloading type, the network flow data is indicated to be the flow data generated when the application program carries out resource downloading; when the network flow data belongs to the game match type, the network flow data is the flow data generated when the application program carries out game match; when the network traffic data belongs to the dynamic access type, the server corresponding to the application program generating the network traffic data is indicated to be distributed in a plurality of different areas.
Specifically, when the class matching result represents that the application program of the network traffic data belongs to the target application class, the accelerator may perform a flow distribution matching process on the network traffic data and a flow distribution rule, for example, perform a regular matching process on the network traffic data and the flow distribution rule, so as to obtain a feature type of the network traffic data.
In one embodiment, when the network traffic data fails to match both the shielding rule and the direct connection rule, the application program generating the network traffic data may be considered to belong to the target application category as the category matching result characterization, that is, when it is determined that the network traffic data is neither the direct connection application category nor the shielding category based on the category matching result, it may be determined that the application program generating the network traffic data is belonging to the target application category as the category matching result characterization. For example, when it is determined that the network traffic data is not traffic data generated when an illegal website is accessed and it is determined that the application program generating the network traffic data is not of the direct connection application type, it may be determined that the application program generating the network traffic data belongs to the target application type.
In one embodiment, the offloading rule comprises at least one of a login acceleration rule, a region check acceleration rule, a download acceleration rule, a local acceleration rule, and a dynamic access rule. According to the sequence, matching the network traffic data with the login acceleration rule, the area verification acceleration rule, the download acceleration rule, the local acceleration rule and the dynamic access rule in sequence to obtain the characteristic type of the network traffic data. For example, when the network traffic data is successfully matched with the login acceleration rule, it can be determined that the network traffic data belongs to the login verification type, and at this time, the accelerator suspends continuing to match the network traffic data with the region verification acceleration rule.
Step S208, the network traffic data is shunted to the target acceleration line corresponding to the feature type, so as to perform network acceleration processing on the application program belonging to the target application category.
The acceleration line refers to a line used for forwarding specific network traffic data, and includes an access node and an egress node, through which a unique acceleration line can be determined. The accelerating lines comprise a multi-website accelerating line, a native website accelerating line, a downloading accelerating line, a local accelerating line and a dynamic accelerating line.
The multi-address acceleration line refers to an acceleration line to which at least one public network address is bound by an egress node, for example, an acceleration line to which a plurality of public network IP addresses are bound. The native web address acceleration line refers to an acceleration line to which the native network address is bound by the egress node, for example, an acceleration line to which the native IP address is bound. The download acceleration line refers to an acceleration line dedicated to transmitting network traffic data related to resource download, and may be a low-cost high-bandwidth acceleration line. The opposite acceleration line refers to an acceleration line dedicated to transmitting network traffic data generated when a game is opposite, and may be an acceleration line having high reliability and suitable for message communication. The dynamic acceleration line refers to an acceleration line constructed based on a region where a server is distributed when the server corresponding to an application is distributed over a plurality of different regions.
Specifically, multiple acceleration lines may be pre-established, such that different acceleration lines correspond to different feature types of network traffic data. When the feature type of the network traffic data is determined, the accelerator may determine a corresponding target acceleration line according to the feature type of the network traffic data, and distribute the network traffic data to the target acceleration line, so as to forward the network traffic data to a background server of an application program generating the network traffic data through the target acceleration line, thereby implementing network acceleration processing on the application program generating the network traffic data, that is, implementing network acceleration processing on the application program belonging to the target application category.
In the application program acceleration method, by acquiring the network traffic data generated when the application program runs, the network traffic data and the acceleration rule base can be subjected to class matching processing to determine the class of the network traffic data. When the application program generating the network traffic data is determined to belong to the target application category based on the category matching result, the feature type of the network traffic data can be determined by performing distribution matching processing on the network traffic data and the distribution rule, so that the network traffic data can be distributed to a target acceleration line corresponding to the feature type, and network acceleration processing on the corresponding application program based on the target acceleration line is realized. Because the network traffic data can be directionally distributed to the corresponding target acceleration line by combining application category classification and the feature types of the network traffic data, compared with the traditional method of carrying out network acceleration processing through a default acceleration line, different acceleration strategies can be adopted for the network traffic data with different feature types, so that fine controllable acceleration aiming at the network traffic data is realized, and the acceleration effect of an application program is further improved.
In one embodiment, performing category matching on the network traffic data based on the acceleration rule base to obtain a category matching result, includes: determining a target traffic type of the network traffic data; screening out a corresponding target acceleration rule from the acceleration rule base according to the target flow type; the target acceleration rule comprises at least one of a target shielding rule and a target direct connection rule; and performing category matching on the network traffic data and the target acceleration rule based on at least one of the target shielding rule and the target direct connection rule to obtain a corresponding category matching result.
The flow type of the network flow data comprises a website flow type and a domain name flow type. When the application program directly accesses the background server through the IP address, the flow type of the generated network data flow is the website flow type; when the application program accesses the background server through the domain name, the flow type of the generated network data flow is the domain name flow type.
Specifically, the acceleration rule base further includes a domain name rule and a website rule, where the domain name rule is a regular expression constructed according to a composition structure of the network domain name, for example, the domain name rule may be "http/" or "https/", and the website rule is a regular expression constructed according to a composition structure of the network website, that is, according to a composition structure of the website segment, for example, the website rule may be "d { n, } $". When the network traffic data generated during the operation of the application program is captured, the accelerator can perform matching processing on the captured network traffic data and the domain name rule and the website rule in the acceleration rule base to determine the target traffic type to which the captured network traffic data belongs. The network domain name refers to a network domain, and is the name of a certain computer or a certain computer group on the internet, which is composed of a string of names separated by points. The network address refers to an ip (internet Protocol address) address, which is a name of a computer composed of a string of numbers separated by dots. The web site segment includes an IP address and a mask.
For example, when an application accesses a backend server through a domain name, the generated network traffic data may include "http", so that the network traffic data may be matched with the domain name rule, and the target traffic type of the network traffic data is the domain name traffic type. When the application accesses the background server through the IP address, the generated network traffic data may include the IP address such as "1.2.3.0", so that the network data may be matched with the website rule, and the target traffic type of the network traffic data is the website traffic type.
Further, the acceleration rule base may include acceleration rules constructed based on the network address and the network domain name, respectively, for example, when both the illegal IP address a1 and the illegal domain name a2 are available for accessing the illegal a website, the acceleration rule base may include a masking rule b1 constructed based on the illegal IP address a1, and may include a masking rule b2 constructed based on the illegal domain name a 2. When the acceleration rule is constructed based on the network website, the constructed acceleration rule is associated with the website traffic type, and when the acceleration rule is constructed based on the network domain name, the constructed acceleration rule is associated with the domain name traffic type. For example, in the above example, masking rule b1 is associated with a website traffic type and masking rule b2 is associated with a domain name traffic type.
When the target traffic type of the network traffic data is determined, the accelerator may screen out a target acceleration rule associated with the target traffic type from the acceleration rule base, and perform type matching on the network traffic data and the target acceleration rule, for example, perform regular matching on a target shielding rule in the target acceleration rule, or perform regular matching on a target direct connection rule in the target acceleration rule, to obtain a corresponding category matching result.
In one embodiment, referring to fig. 3, when the network traffic data belongs to the website traffic type, performing category matching on the network traffic data and an acceleration rule composed based on website segments in an acceleration rule base to obtain a category matching result; and when the network flow data belongs to the domain name flow type, performing class matching on the network flow data and an acceleration rule formed based on the domain name in an acceleration rule base to obtain a class matching result. FIG. 3 illustrates a schematic diagram that shows the class matching process based on traffic type in one embodiment.
In the above embodiment, by screening out the target acceleration rule associated with the target traffic class from the acceleration rule base, only the network traffic data and the target acceleration rule may be subjected to class matching, and the network traffic data and the remaining acceleration rules do not need to be subjected to class matching, so that the matching efficiency of class matching is improved.
In one embodiment, performing category matching on network traffic data based on at least one of a target shielding rule and a target direct connection rule to obtain a corresponding category matching result, includes: carrying out category matching processing on the network flow data and the target shielding rule; when the network traffic data is successfully matched with the target shielding rule, determining that a class matching result obtained based on the class matching processing is a result representing that the network traffic data belongs to the shielding class; the method further comprises the following steps: and carrying out shielding processing on the network traffic data belonging to the shielding category.
Specifically, the category matching result includes a shielding matching result, and when the target shielding rule is obtained, the accelerator may perform matching processing on the network traffic data and the target shielding rule to obtain a corresponding shielding matching result. When the shielding matching result represents that the network traffic data is successfully matched with the target shielding rule, the network traffic data is determined to belong to the shielding category, at the moment, the accelerator performs shielding processing on the network traffic data belonging to the shielding category, and stops forwarding the network traffic data belonging to the shielding category to the corresponding server. When the shielding matching result represents that the network traffic data fails to be matched with the target shielding rule, the accelerator determines that the network traffic data does not belong to the shielding category, and at the moment, the accelerator can perform further category matching processing on the network traffic data and the target direct connection rule in the target acceleration rule.
In this embodiment, by performing the network traffic data and the target shielding rule, when the network traffic data belongs to the shielding category, the network traffic data can be shielded, so that the security of network accelerated processing is improved.
In an embodiment, after performing the class matching processing on the network traffic data and the target shielding rule, the method further includes: when the matching of the network traffic data and the target shielding rule fails, performing category matching processing on the network traffic data and the target direct connection rule; when the network traffic data is successfully matched with the target direct connection rule, determining that a class matching result obtained based on class matching processing is a result representing that an application program generating the network traffic data belongs to a direct connection application class; the method further comprises the following steps: and performing direct connection processing on the network traffic data generated by the application program belonging to the direct connection application category.
In particular, the category matching results may also include direct connection matching results. When the shielding matching result represents that the network traffic data fails to be matched with the target shielding rule, the accelerator may perform category matching processing on the network traffic data and the target direct connection rule, for example, may perform regular matching processing on the network traffic data and the target direct connection rule, so as to obtain a corresponding direct connection matching result. Further, when the direct connection matching result represents that the network traffic data is successfully matched with the target direct connection rule, the accelerator may consider the application program generating the network traffic data as a direct connection application program, and at this time, the accelerator performs direct connection processing on the network traffic data, that is, the accelerator directly sends the network traffic data to a corresponding server, instead of shunting the network traffic data to a corresponding acceleration line. When the direct connection matching result represents that the network traffic data fails to be matched with the target direct connection rule, the accelerator can consider that the application program generating the network traffic data is not the direct connection application program, and at the moment, the accelerator performs shunting matching processing on the network traffic data and the target shunting rule in the target acceleration rule so as to determine the characteristic type of the network traffic data.
In this embodiment, the network traffic data and the target direct connection rule are subjected to category matching processing, so that the accelerator can only accelerate the network traffic data of a specific category, thereby reducing the probability of accelerating the unnecessary network traffic data, and further saving network resources consumed when accelerating the unnecessary network data.
In one embodiment, the target acceleration rule further includes a target distribution rule, and when the class matching result indicates that the application program generating the network traffic data belongs to the target application class, the distribution matching is performed on the network traffic data and the distribution rule in the acceleration rule base to obtain the feature type of the network traffic data, where the method includes: when the network traffic data fails to be matched with the target shielding rule and the target direct connection rule, determining that an application program generating the network traffic data belongs to a target application category; and carrying out shunting matching on the network traffic data and the target shunting rule to obtain the characteristic type of the network traffic data.
Specifically, when the network traffic data fails to match both the target shielding rule and the target direct connection rule, the accelerator determines that the application program generating the network traffic data belongs to a target application category, for example, a game application category, and at this time, the accelerator performs distribution matching processing on the network traffic data and a target distribution rule in the target acceleration rule to obtain a feature type of the network traffic data.
In one embodiment, the target distribution rule at least includes one of a login acceleration rule, a region verification acceleration rule, a download acceleration rule, an opposite acceleration rule and a dynamic access rule, and the accelerator may sequentially perform distribution matching processing on the network traffic data and the login acceleration rule, the region verification acceleration rule, the download acceleration rule, the opposite acceleration rule and the dynamic access rule, or perform parallel distribution matching processing on the network traffic data and the login acceleration rule, the region verification acceleration rule, the download acceleration rule, the opposite acceleration rule and the dynamic access rule. The present embodiment is not limited thereto.
In the above embodiment, the feature type of the network traffic data may be determined by performing the traffic distribution matching on the network traffic data and the target traffic distribution rule, so that the network traffic data may be subsequently distributed to the corresponding acceleration line according to the feature type, thereby implementing different acceleration strategies for different types of network traffic data.
In one embodiment, the method further includes a step of performing network acceleration through a default acceleration line, and the step of performing network acceleration through the default acceleration line includes: and when the network traffic data fails to be matched with the target shielding rule, the target direct connection rule and the target distribution rule, distributing the network traffic data to a default acceleration line so as to perform network acceleration processing on the application program generating the network traffic data through the default acceleration line.
Specifically, when the network traffic data fails to match the target shielding rule, the target direct connection rule and the target distribution rule, the accelerator may determine a preset default acceleration access node and a default acceleration exit node, determine a default acceleration line through the default acceleration access node and the default acceleration exit node, forward the network traffic data to the default acceleration line, and send the network traffic data to the corresponding server through the default acceleration line.
In one embodiment, referring to fig. 4, when the network traffic data is obtained, the accelerator may determine a target traffic type to which the network traffic data belongs, and screen out a target acceleration rule from the acceleration rule base according to the target traffic type. When the network flow data is successfully matched with the target shielding rule, the accelerator shields the network flow data, when the network flow data is successfully matched with the target direct connection rule, the accelerator directly connects the network flow data, when the network flow data is successfully matched with the target distribution rule, the accelerator distributes the network flow data to a corresponding accelerating line according to the characteristic type of the network flow data so as to accelerate the network through the corresponding accelerating line, and when the network flow data is not matched with the target accelerating rule in the accelerating rule base, the accelerator sends the network flow data to a default accelerating line and accelerates the network through the default accelerating line. FIG. 4 illustrates a schematic diagram that speeds up route selection in one embodiment.
In this embodiment, when the network traffic data fails to match the target shielding rule, the target direct connection rule, and the target distribution rule, the network traffic data may be considered as not belonging to traffic data of a specific category, so that the network traffic data may be forwarded through a default acceleration line.
In one embodiment, the step of constructing the target direct connection rule comprises: performing flow characteristic analysis on historical network flow data to obtain at least one of a network domain name and a network address and an application package name of a historical application program generating the historical network flow data; and when the historical application program is determined not to belong to the illegal application category and not to belong to the target application category based on the application package name, constructing a corresponding target direct connection rule according to at least one of the network domain name and the network address.
Specifically, before performing category matching on the network traffic data, a corresponding target direct connection rule may be constructed. The accelerator can capture historical network flow data, perform flow characteristic analysis on the historical network flow data, obtain at least one of a network domain name and a network website, and obtain an application package name of a historical application program generating the historical network flow data. As will be readily appreciated, historical network traffic data refers to network traffic data generated at historical times. Further, the accelerator determines whether the historical application belongs to the illegal application category and the target application category according to the application package name, and constructs a target direct connection rule according to at least one of a network domain name and a network website of the historical network traffic data when the historical application is determined not to belong to the illegal application category and the target application category. For example, when the history application is an a multimedia playing application, the accelerator may extract a network address (1.2.3.4), a network domain name (www.v.q.com), and an application package name (a multimedia) from the history network traffic data generated by the a multimedia playing application, where the network address (1.2.3.4), the network domain name (www.v.q.com) are information of a background server used to access the a multimedia playing application. When the A multimedia playing application is not an illegal application and does not belong to the target application category, the accelerator constructs a target direct connection rule according to at least one of a network address (1.2.3.4) and a network domain name (www.v.q.com).
In one embodiment, the terminal obtains first preset application package names respectively corresponding to applications belonging to a target application category in advance, obtains second preset application package names respectively corresponding to applications belonging to an illegal application category, and judges whether the application package names of the historical application programs belong to the first preset application package names and whether the application package names belong to the second preset application package names. When the application packet name of the historical application program does not belong to the first preset application packet name or the second preset application packet name, the historical application program generating the historical network traffic data is indicated to belong to the direct connection application category, and at the moment, the accelerator constructs a target direct connection rule according to the historical network traffic data.
In one embodiment, referring to fig. 5, the terminal provides a Virtual Private Network (VPN) configuration based on a NEFilterControlProvider type, and based on the VPN configuration, a Network domain name and a Network address of historical Network traffic data and an application packet name of a historical application program that generates the historical Network traffic data may be obtained. FIG. 5 is a diagram that illustrates traffic characteristic parsing in one embodiment.
In one embodiment, when historical network traffic data is obtained through capture, the terminal obtains a log additionally generated when the historical network traffic data is generated, extracts an application identifier of an application program generating the historical network traffic data from the log, and uses the extracted application identifier as an application packet name of the historical network traffic data. It is easy to understand that there may be multiple logs obtained by the terminal, and for each obtained log, the terminal extracts the source port information in the log and performs port matching between the source port information and the local port information in the historical network traffic data. And when the source port information in the log is consistent with the local port information, the terminal takes the log as a target log corresponding to the historical network flow data, and takes the application identifier in the target log as the application packet name.
In one embodiment, the accelerator may further obtain a network domain name and a network address of the application program belonging to the direct connection application category, which are input by the administrator, and construct a corresponding target direct connection rule according to the network domain name and the network address input by the administrator.
In the embodiment, by performing traffic feature analysis on the historical network traffic data, when it is determined that the historical application program does not belong to the illegal application category and does not belong to the target application category according to the application package name, the target direct connection rule is directly constructed based on the network domain name and the network address obtained by analysis, so that the construction efficiency of the target direct connection rule is improved.
In one embodiment, the target application category is a gaming application category; the distribution rule at least comprises one of a login acceleration rule, a region verification acceleration rule, a download acceleration rule, an opposite office acceleration rule and a dynamic access rule; the characteristic type of the network traffic data at least comprises one of a login check type, a region check type, a download type, a local type and a dynamic access type.
In particular, the target application category may be a gaming application category and the corresponding direct connection application category may be a non-gaming application category. The distribution rule in the acceleration rule base at least comprises one of a login acceleration rule, a region verification acceleration rule, a download acceleration rule, an opposite office acceleration rule and a dynamic access rule, and when the network traffic data is matched with the login acceleration rule, the characteristic type of the network traffic data can be determined to be a login verification type; when the network traffic data is successfully matched with the region verification acceleration rule, determining that the characteristic type of the network traffic data is a region verification type; when the network flow data is successfully matched with the download acceleration rule, determining that the characteristic type of the network flow data is a download type; when the network traffic data is successfully matched with the opposite-office acceleration rule, determining that the characteristic type of the network traffic data is an opposite-office type; and when the network traffic data is successfully matched with the dynamic access rule, determining that the characteristic type of the network traffic data is a dynamic access type.
When the network flow data belongs to the login verification type, the network flow data is represented as the flow generated when the game application performs login verification, and through the flow, a background server of the game application can perform verification on the number of login people. When the network flow data belongs to the region verification type, the fact that the network flow belongs to the flow generated when the game application is subjected to login region verification is represented, and through the flow, a background server of the game application can perform verification of the login region. For example, when the game application performs account login, network traffic data carrying a specific region identifier may be generated, so that when the background server receives the network traffic data, verification of the login region may be performed according to the carried specific region identifier. When the network traffic data belongs to the downloading type, the network traffic data is represented as traffic generated when the application program carries out resource downloading. When the network traffic data belongs to the game-play type, the network traffic data is represented as traffic generated when the game application performs game-play. When the network flow data belongs to a dynamic access type, background servers representing game applications are deployed in different regions.
In this embodiment, by determining the feature type of the network traffic data, the network traffic data may be subsequently shunted to the corresponding acceleration line based on the feature type.
In one embodiment, the method for shunting network traffic data to a target acceleration line corresponding to a feature type to perform network acceleration processing on an application program belonging to a target application class includes: when the network flow data belongs to a login verification type, forwarding the network flow data to a multi-website acceleration line so as to perform network acceleration processing on a login verification process of an application program generating the network flow data; wherein, the multi-address accelerating circuit is bound with at least one public network address; when the network flow data belongs to a region checking type, forwarding the network flow data to a primary website accelerating line so as to carry out network accelerating processing on a region checking process of an application program generating the network flow data; wherein, the native website accelerating line is bound with a native network address; when the network flow data belongs to the downloading type, forwarding the network flow data to a downloading acceleration line so as to perform network acceleration processing on the downloading process of the application program generating the network flow data; when the network traffic data belongs to the opposite office type, forwarding the network traffic data to an opposite office acceleration line so as to carry out network acceleration processing on the opposite office process of an application program generating the network traffic data; and when the network flow data belongs to the dynamic access type, forwarding the network flow data to a dynamic acceleration line so as to perform network acceleration processing on the application program generating the network flow data.
Specifically, the accelerator may offload network traffic data to a pre-built target acceleration line corresponding to the characteristic type. The accelerating circuit comprises at least one of a multi-website accelerating circuit, a native website accelerating circuit, a downloading accelerating circuit, a local accelerating circuit and a dynamic accelerating circuit. The multi-network-address acceleration circuit is an acceleration circuit with at least one public network website bound at an exit node, can improve the smoothness of game login, and can forward network traffic data to a background server of the game application through one unsealed network website in the plurality of public network websites when the background server of the game application blocks one network website, so that the problem that a game party blocks IP is quickly solved. The public network address can also be called as a public network IP, and refers to an unreserved address on the Internet connected with a public network. Correspondingly, the native website acceleration line refers to an acceleration line bound with a native network website at an exit node. The native network address may also be referred to as a native IP, which refers to an IP whose registration address is consistent with a location of a VPS (Virtual Private Server) machine room, and the native network address is bound in an egress node, which may facilitate a backend Server of a game application to verify a login area of a game login.
The download acceleration line is a line dedicated to transmitting network traffic data related to resource download, has the characteristics of low cost and high bandwidth, and can effectively increase the download rate by shunting the network traffic data to the download acceleration line. The play acceleration line refers to a line for transmitting network traffic data related to game play, and has a characteristic of high reliability, and delay and jitter in game play can be reduced by shunting the network traffic data to the play acceleration line. When the background servers of the game application are distributed in different areas, the network traffic data can be accelerated through the dynamic acceleration line.
In this embodiment, different acceleration strategies are adopted for different types of network traffic data, which not only can improve game experience, but also can reduce game delay and jitter.
In one embodiment, the step of constructing the download acceleration rules comprises: analyzing the flow characteristics of the historical network flow data to obtain at least one of a network domain name and a network address of the historical network flow data and obtain the flow size of the historical network flow data; and when the flow is larger than or equal to the preset flow threshold, constructing a corresponding downloading acceleration rule based on at least one of the network domain name and the network address.
Specifically, when the accelerator captures the historical network traffic data, the accelerator may perform feature resolution on the historical traffic data to determine at least one of a network domain name and a network address of the historical network traffic data, and determine a traffic size of the historical network traffic data. The accelerator compares the flow with a preset flow threshold, when the flow is larger than or equal to the preset flow threshold, the network flow data is indicated to be the flow generated when the resource downloading is carried out on the application program, at the moment, the accelerator constructs a downloading acceleration rule according to at least one of a network address and a network domain name of historical network flow data, and adds the constructed downloading acceleration rule into an acceleration rule base.
In one embodiment, referring to fig. 6, the accelerator client monitors historical network traffic data (which may also be referred to as TCP connection traffic) flowing through the virtual network card through the acceleration service S602. The accelerator determines whether the historical network traffic data is greater than or equal to a preset traffic threshold S604. S606, if a historical network traffic data is greater than or equal to a preset traffic threshold, for example, greater than 10M, the historical network traffic data may be considered to be related to resource downloading, and at this time, the accelerator client reports the historical network traffic data to the accelerator background. S608, the background of the accelerator receives the historical network traffic data, S610, flow characteristic analysis is conducted on the historical network traffic data, and whether the historical network traffic data belongs to the domain name traffic type or not is judged. S612, when the historical network flow data belongs to the domain name flow type, a download acceleration rule is constructed according to the network domain name. S614, when the historical network flow data does not belong to the domain name flow type, the background of the accelerator judges whether the historical network flow type is the website flow type, and S616 downloads the acceleration rule based on the website when the historical network flow data belongs to the website flow type. And S618, when the historical network traffic data does not belong to the website traffic type or the domain name traffic type, the background of the accelerator suspends the processing of the historical network traffic data. And S620, the accelerator background updates the acceleration rule base according to the constructed download acceleration rule. FIG. 6 illustrates a diagram that illustrates building download acceleration rules, in one embodiment.
In one embodiment, the accelerator may build the download acceleration rule according to a common download domain name, for example, the download acceleration rule may be built according to a network domain name carrying "cdn" or "download".
In the above embodiment, by constructing the download acceleration rule, the network traffic data may be subjected to split matching processing subsequently based on the download acceleration rule.
In one embodiment, the step of building the login acceleration rule comprises: performing flow characteristic analysis on the historical network flow data to obtain at least one of a network domain name and a network website of the historical network flow data and an application package name of a historical application program generating the historical flow data; when determining that the historical application program belongs to the target application category according to the application package name, shielding historical network flow data and determining whether the login function of the historical application program is abnormal; when historical network flow data are shielded and the login function of a historical application program is abnormal, a corresponding login acceleration rule is constructed based on at least one of a network domain name and a network website.
Specifically, the accelerator performs traffic feature analysis on the historical network traffic data to obtain at least one of a network domain name and a network address of the historical network traffic data, and obtains an application package name of a historical application program generating the historical traffic data. When determining that the historical application program generating the historical network flow data belongs to the target application category according to the application package name, the accelerator shields the historical network flow data and determines whether the historical application program can normally log in at the moment. When the historical application program cannot normally log in the corresponding application account, the accelerator performs release processing on the historical network traffic data, sends the historical network traffic data to a background server of the historical application program, and determines whether the historical application program can normally log in the application account at the moment. When the historical application program cannot normally log in due to shielding of historical network traffic data and the historical network traffic data is released so that the historical application program is converted into a normally logged application account, the historical network traffic data can be considered to be related to login verification, and at the moment, the accelerator constructs a login acceleration rule according to at least one of a network domain name and a network address of the historical network traffic data.
In one embodiment, the accelerator may build the login acceleration rules based on common login domains, e.g., build the login acceleration rules based on a network domain carrying "auth". auth ", and build the login acceleration rules based on a network domain carrying" login ".
In the embodiment, the historical network traffic data is subjected to the shielding test and the releasing test, so that whether the historical network traffic data is related to login or not can be quickly determined, and the generation efficiency of the login acceleration rule is improved.
In one embodiment, a masking test and a clear test may be performed on historical network traffic data to determine whether the historical network traffic data is relevant to regional checks. When the historical application cannot log in the application account due to regional reasons because the historical flow data are shielded, the accelerator performs release processing on the historical flow data, and when the historical application is converted into a successful log-in application account, a regional verification acceleration rule is constructed according to at least one of a network domain name and a network address of the historical flow data.
In one embodiment, a screening test and a clear test may be performed on historical network traffic data to determine whether the historical network traffic data may access multiple regions. When the historical application cannot establish communication connection with the background servers of all the regions due to shielding of the historical traffic data, the accelerator releases the historical traffic data, and when the historical application is converted into the condition that the communication connection with the background servers of all the regions can be established, a corresponding dynamic access rule is constructed according to at least one of the network domain name and the network address of the historical traffic data.
In one embodiment, the administrator may input the illegal network address or the illegal network domain name in advance, so that the accelerator may construct the shielding acceleration rule according to the illegal network address and the illegal network domain name.
In one embodiment, the step of building the game acceleration rule comprises: analyzing the flow characteristics of historical network flow data to obtain at least one of a network domain name and a network address and access times; and when the communication times between the historical application program generating the historical network flow data and the corresponding communication object are determined to be greater than or equal to a preset communication threshold value according to the access times, constructing a corresponding opposite acceleration rule based on at least one of the network domain name and the network address.
Specifically, the accelerator performs traffic characteristic analysis on the historical network traffic data to obtain at least one of access times, a network domain name and a network address. The access times refer to the times of communication between the historical application program and the same target by using messages in a preset time period. The accelerator judges whether the access times are larger than a preset communication threshold value or not, and if the access times are larger than or equal to the preset communication threshold value, the historical network traffic data are considered to be traffic generated during the game, and at the moment, the accelerator constructs game acceleration rules according to at least one of a network domain name and a network address of the historical network traffic data.
In one embodiment, referring to fig. 7, the accelerator client S702 monitors the number of accesses to the same communication object using UDP packets through an acceleration service (also referred to as VPN). S704, the accelerator client judges whether the access times are larger than or equal to a preset communication threshold value. S706, when it is determined that the access time is greater than or equal to the preset communication threshold, for example, greater than 50 times, the accelerator client sends the historical network traffic data to the accelerator background. The accelerator background receives the historical network traffic data S708, and determines whether the historical network traffic data belongs to the domain name traffic type S710. S712, when the historical network traffic data belongs to the domain name traffic type, the accelerator background constructs a download acceleration rule according to the network domain name. S714, when the historical network flow data does not belong to the domain name flow type, the background of the accelerator judges whether the historical network flow type is the website flow type, S716, and when the historical network flow data belongs to the website flow type, the acceleration rule is downloaded based on the website. S718, when the historical network flow data does not belong to the website flow type or the domain name flow type, the background of the accelerator suspends the processing of the historical network flow data. S720, the background of the accelerator updates the acceleration rule base according to the constructed download acceleration rule. FIG. 7 is a diagram illustrating the construction of game acceleration rules in one embodiment.
In the above embodiment, by obtaining the access times, it may be determined whether the historical network traffic data is related to the game according to the access times, so that when determining that the historical network traffic data is related to the game, a corresponding game acceleration rule may be constructed according to the network domain name and the network address.
In one embodiment, the acceleration rule base may be further dynamically updated according to the network traffic data, and the step of dynamically updating the acceleration rule base includes: when the network traffic data is not matched with the rules in the acceleration rule base, carrying out traffic characteristic analysis on the network traffic data to obtain network traffic characteristics; constructing a corresponding acceleration rule according to the network flow characteristics; and updating the acceleration rule base based on the constructed acceleration rule.
Specifically, when the network traffic data does not match the acceleration rules in the acceleration rule base, that is, when the network traffic data does not match the shielding rules, the direct connection rules, or the distribution rules, the accelerator may perform feature analysis on the network traffic data to obtain the network traffic features. The network traffic characteristics include at least one of a network address, a network domain name, a traffic size, access times, access duration, and access timing, and a corresponding acceleration rule is constructed according to the network traffic characteristics, for example, when the traffic size is greater than a preset traffic threshold, a download acceleration rule is constructed according to the network address or the network domain name, and the like. Further, the accelerator updates the acceleration rule base according to the constructed acceleration rule.
In the embodiment, the acceleration rule base is updated dynamically, so that the acceleration rule base is more comprehensive and accurate.
In one embodiment, before obtaining the network traffic data generated during the running of the application program, the application program acceleration method further comprises: displaying an application list of the application program; responding to the selection operation of the application list, and determining an application program to be accelerated selected by the selection operation; starting the accelerator, and performing initial network acceleration processing on the application program to be accelerated through the accelerator enabling a default acceleration line.
Specifically, when the network acceleration processing of the application program is required, the terminal may present an application list of the application programs as shown in fig. 8, so that the user may select the application program to be accelerated therefrom. The terminal responds to the selection operation of the user on the application list, determines the application program to be accelerated selected by the selection operation, starts the accelerator, and displays an accelerator loading interface shown in fig. 9. When the accelerator enters a loading stage, the accelerator can obtain an acceleration rule base and an acceleration line, and when the loading is successful, a default acceleration line is started to perform initial network acceleration processing on an application program to be accelerated. FIG. 8 illustrates a diagram that shows a list of applications in one embodiment. FIG. 9 illustrates a schematic diagram of an accelerator load interface in one embodiment.
In one embodiment, when the accelerator load is successful, an acceleration detail page as shown in FIG. 10 may be shown. The acceleration detail page displays the acceleration details for network acceleration of the application program; the acceleration details include at least one of an acceleration pattern 1002, a current network fluency (e.g., signal fluency 1004 in fig. 10), an acceleration effect (e.g., post-acceleration delay 1006 in fig. 10), an acceleration flag (e.g., VPN1008 in fig. 10), and a packet loss rate 1000. The acceleration effect may be an effect achieved by the accelerator starting the default acceleration line to perform initial network acceleration processing on the application program to be accelerated, for example, the acceleration effect may be an effect achieved by the accelerator starting the default acceleration line to perform network acceleration processing on the loading process of the application program. FIG. 10 illustrates a schematic diagram that accelerates the detailed page in one embodiment.
In one embodiment, an application launch control, such as launch game 1012 in fig. 10, may also be displayed in the acceleration details page, and the user may launch the corresponding application by touching the application launch control.
In the above embodiment, by displaying the application list, the application program to be accelerated may be determined in response to a selection operation on the application list, so that network acceleration processing may be subsequently performed on the application program to be accelerated.
The application also provides an application scene, and the application scene applies the application program acceleration method. Specifically, the application of the application program acceleration method in the application scenario is as follows:
referring to fig. 11, when the terminal may start an accelerator when acceleration of the game application is required S1102, S1104 performs initial acceleration processing on the game application through a default acceleration line by acquiring an acceleration rule base through the accelerator S1106 and determining the default acceleration line. When it is determined that the initial acceleration is successful in S1108, the accelerator acquires the network traffic data flowing through the virtual network card in S1110, and in S1112, determines a corresponding target acceleration rule according to the target traffic type of the network traffic data. The S1114 accelerator performs a category matching process on the network traffic data and the target masking rule, and when the matching of the network traffic data and the target masking rule is successful, S1116, determining that the class matching result obtained based on the class matching process is a result representing that the network traffic data belongs to the mask class, and at this time, the accelerator performs a shielding process on the network traffic data belonging to the shielding category, and when the matching of the network traffic data and the target shielding rule fails in S1118, the accelerator performs category matching processing on the network traffic data and the target direct connection rule, and when the network traffic data and the target direct connection rule are successfully matched in S1120, it is determined that the result of the class matching obtained based on the class matching process is a result characterizing that the application program generating the network traffic data belongs to the direct connection application class, and at this time, and the accelerator performs direct connection processing on the network traffic data generated by the application program belonging to the direct connection application category.
S1122 determines that the application program generating the network traffic data belongs to the target application category when the network traffic data fails to be matched with both the target shielding rule and the target direct connection rule, at this time, the accelerator performs shunting matching processing on the network traffic data and the login acceleration rule, and S1124 distributes the network traffic data to the multi-website acceleration line when the network traffic data is determined to be successfully matched with the login acceleration rule. S1126, when the matching of the network traffic data and the login acceleration rule fails, the accelerator performs shunting matching processing on the network traffic data and the region verification acceleration rule, and S1128 distributes the network traffic data to the original website acceleration line when the matching of the network traffic data and the region verification acceleration rule is determined to be successful. S1130, when the matching of the network traffic data and the area verification acceleration rule fails, the accelerator performs shunting matching processing on the network traffic data and the download acceleration rule, and S1132, when the matching of the network traffic data and the download acceleration rule is determined to be successful, distributes the network traffic data to a download acceleration line.
S1134, when the matching of the network traffic data and the downloading acceleration rule fails, the accelerator performs shunting matching processing on the network traffic data and the local acceleration rule, and S1136, when the matching of the network traffic data and the local acceleration rule is determined to be successful, the network traffic data is distributed to a local acceleration line. S1138, when the matching between the network traffic data and the local acceleration rule fails, the accelerator performs a split matching process on the network traffic data and the dynamic access rule, and S1140, when it is determined that the matching between the network traffic data and the dynamic access rule is successful, distributes the network traffic data to the dynamic acceleration line.
S1142, when the accelerator determines that the network traffic data is not matched with the target acceleration rule, the accelerator sends the network traffic data to a default acceleration line, S1144, performs traffic characteristic analysis on the network traffic data to obtain network traffic characteristics, constructs an acceleration rule according to the network traffic characteristics, and dynamically updates an acceleration rule base based on the constructed acceleration rule. FIG. 11 is a flow diagram that illustrates a method for application acceleration, in one embodiment.
The application further provides an application scenario applying the application program acceleration method. Specifically, the application of the application program acceleration method in the application scenario is as follows:
when network acceleration processing needs to be performed on the group-based answer application, the accelerator can extract the application packet name in the network traffic data, and when the application program which generates the network traffic data is represented by the application packet name as the group-based answer application, the accelerator performs shunting matching processing on the network traffic data, and forwards the network traffic data to a corresponding acceleration line according to a shunting matching result so as to perform network acceleration processing on the group-based answer application. It will be readily appreciated that the group racing application is merely illustrative, and that the group racing application may also be a red envelope application or a wheat envelope application, etc.
As shown in fig. 12, in a specific embodiment, the application acceleration method includes the steps of:
s1202, when the network traffic data generated during the application program operation flows through the virtual network, the corresponding network traffic data may be obtained through the virtual network card, and a target traffic type of the network traffic data (for example, a domain name traffic type including a domain name, or a website traffic type including an IP address) is determined.
S1204, the accelerator screens out corresponding target acceleration rules from the acceleration rule base according to the target flow type; the target acceleration rules comprise target shielding rules, target direct connection rules and target distribution rules.
S1206, the accelerator performs category matching processing on the network flow data generated during the operation of the application program and the target shielding rule; when the network traffic data is successfully matched with the target shielding rule, determining that a class matching result obtained based on the class matching processing is a result representing that the network traffic data belongs to the shielding class; and carrying out shielding processing on the network traffic data belonging to the shielding category. For example, the network traffic data of the illegal website is shielded.
S1208, the accelerator performs category matching processing on the network traffic data and the target direct connection rule; when the network traffic data is successfully matched with the target direct connection rule, determining that a class matching result obtained based on class matching processing is a result representing that an application program generating the network traffic data belongs to a direct connection application class; and performing direct connection processing on the network traffic data generated by the application program belonging to the direct connection application category. For example, the accelerator performs direct connection processing on network traffic data generated by an application program of the direct connection application type.
S1210, when the application program generating the network traffic data belongs to game application, the accelerator performs shunting matching on the network traffic data and a target shunting rule to obtain the characteristic type of the network traffic data; the characteristic type of the network flow data at least comprises one of a login check type, a region check type, a download type, a local alignment type and a dynamic access type.
S1212, when the network traffic data belongs to the login check type, forwarding the network traffic data to a multi-website acceleration line so as to perform network acceleration processing on the login check process of the application program generating the network traffic data; wherein, the multi-address accelerating line is bound with at least one public network address. For example, the accelerator shunts network traffic data associated with game entry to the multi-web-site acceleration line.
S1214, when the network flow data belongs to the region checking type, forwarding the network flow data to the original website accelerating line so as to carry out network accelerating processing on the region checking process of the application program generating the network flow data; wherein, the native website accelerating line is bound with a native network address. For example, the accelerator shunts network traffic data associated with verification of the gaming entry area to the native web site acceleration line.
S1216, when the network traffic data belongs to the downloading type, forwarding the network traffic data to the downloading acceleration line, so as to perform network acceleration processing on the downloading process of the application program generating the network traffic data. For example, the accelerator shunts network traffic data associated with the resource download to the download acceleration line.
And S1218, when the network traffic data belongs to the opposite office type, forwarding the network traffic data to an opposite office acceleration line to perform network acceleration processing on an opposite office process of the application program generating the network traffic data. For example, the accelerator shunts network traffic data associated with game play to the play acceleration line.
And S1220, when the network traffic data belongs to the dynamic access type, forwarding the network traffic data to a dynamic acceleration line so as to perform network acceleration processing on the application program generating the network traffic data. For example, when the background server of the game application is distributed in different countries, the accelerator performs network acceleration processing on the game application through a dynamic acceleration line.
And S1222, when the network traffic data fails to match the target shielding rule, the target direct connection rule, and the target distribution rule, distributing the network traffic data to a default acceleration line, so as to perform network acceleration processing on the application program generating the network traffic data through the default acceleration line.
In the application program acceleration method, by acquiring the network traffic data generated when the application program runs, the network traffic data and the acceleration rule base can be subjected to class matching processing to determine the class of the network traffic data. When the application program generating the network traffic data is determined to belong to the target application category based on the category matching result, the feature type of the network traffic data can be determined by performing distribution matching processing on the network traffic data and the distribution rule, so that the network traffic data can be distributed to a target acceleration line corresponding to the feature type, and network acceleration processing on the corresponding application program based on the target acceleration line is realized. Because the network traffic data can be directionally distributed to the corresponding target acceleration line by combining application category classification and the feature types of the network traffic data, compared with the traditional method of carrying out network acceleration processing through a default acceleration line, different acceleration strategies can be adopted for the network traffic data with different feature types, so that fine controllable acceleration aiming at the network traffic data is realized, and the acceleration effect of an application program is further improved.
It should be understood that, although the steps in the flowcharts of fig. 2 and 12 are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2 and 12 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the steps or stages is not necessarily sequential, but may be performed alternately or alternately with other steps or at least some of the other steps or stages.
In one embodiment, as shown in fig. 13, there is provided an application acceleration apparatus 1300, which may be a part of a computer device using a software module or a hardware module, or a combination of the two, the apparatus specifically includes: a traffic obtaining module 1302, a category matching module 1304, and a splitting module 1306, wherein:
the traffic obtaining module 1302 is configured to obtain network traffic data generated when the application runs.
And the category matching module 1304 is configured to perform category matching on the network traffic data based on the acceleration rule base to obtain a category matching result.
The shunting module 1306 is configured to, when the class matching result represents that the application program that generates the network traffic data belongs to the target application class, perform shunting matching on the network traffic data and a shunting rule in the acceleration rule base to obtain a feature type of the network traffic data; and shunting the network traffic data to a target acceleration line corresponding to the characteristic type so as to perform network acceleration processing on the application program belonging to the target application class.
In one embodiment, the category matching module 1304 is further configured to determine a target traffic type of the network traffic data; screening out a corresponding target acceleration rule from the acceleration rule base according to the target flow type; the target acceleration rule comprises at least one of a target shielding rule and a target direct connection rule; and performing category matching on the network traffic data based on at least one of the target shielding rule and the target direct connection rule to obtain a corresponding category matching result.
In one embodiment, the category matching module 1304 is further configured to perform category matching on the network traffic data and the target shielding rule; when the network traffic data is successfully matched with the target shielding rule, determining that a class matching result obtained based on the class matching processing is a result representing that the network traffic data belongs to the shielding class; and carrying out shielding processing on the network traffic data belonging to the shielding category.
In one embodiment, the category matching module 1304 is further configured to perform category matching processing on the network traffic data and the target direct connection rule when matching between the network traffic data and the target shielding rule fails; when the network traffic data is successfully matched with the target direct connection rule, determining that a class matching result obtained based on class matching processing is a result representing that an application program generating the network traffic data belongs to a direct connection application class; and performing direct connection processing on the network traffic data generated by the application program belonging to the direct connection application category.
In one embodiment, the target acceleration rule further includes a target distribution rule, and the distribution module 1306 further includes a feature type determination module 1361, configured to determine that an application program generating the network traffic data belongs to the target application category when the network traffic data fails to match both the target shielding rule and the target direct connection rule; and carrying out shunting matching on the network traffic data and the target shunting rule to obtain the characteristic type of the network traffic data.
In one embodiment, the application acceleration apparatus 1300 is further configured to, when the network traffic data fails to match the target shielding rule, the target direct connection rule, and the target offloading rule, offload the network traffic data to a default acceleration line, so as to perform network acceleration processing on the application generating the network traffic data through the default acceleration line.
In one embodiment, the application accelerator 1300 further includes a rule construction module 1308, configured to perform traffic feature analysis on the historical network traffic data, obtain at least one of a network domain name and a network address, and obtain an application package name of a historical application that generates the historical network traffic data; and when the historical application program is determined not to belong to the illegal application category and not to belong to the target application category based on the application package name, constructing a corresponding target direct connection rule according to at least one of the network domain name and the network address.
In one embodiment, the application acceleration apparatus 1300 is further configured to perform network acceleration processing on the application program of the target application category, where the target application category is the game application category; the distribution rule at least comprises one of a login acceleration rule, a region verification acceleration rule, a download acceleration rule, an opposite office acceleration rule and a dynamic access rule; the characteristic type of the network traffic data at least comprises one of a login check type, a region check type, a download type, a local type and a dynamic access type.
In one embodiment, the offloading module 1306 further includes an acceleration module 1362 configured to forward the network traffic data to the multi-url acceleration line when the network traffic data belongs to the login verification type, so as to perform network acceleration processing on a login verification process of the application program generating the network traffic data; wherein, the multi-address accelerating circuit is bound with at least one public network address; when the network flow data belongs to a region checking type, forwarding the network flow data to a primary website accelerating line so as to carry out network accelerating processing on a region checking process of an application program generating the network flow data; wherein, the native website accelerating line is bound with a native network address; when the network flow data belongs to the downloading type, forwarding the network flow data to a downloading acceleration line so as to perform network acceleration processing on the downloading process of the application program generating the network flow data; when the network traffic data belongs to the opposite office type, forwarding the network traffic data to an opposite office acceleration line so as to carry out network acceleration processing on the opposite office process of an application program generating the network traffic data; and when the network flow data belongs to the dynamic access type, forwarding the network flow data to a dynamic acceleration line so as to perform network acceleration processing on the application program generating the network flow data.
In one embodiment, the rule building module 1308 is further configured to perform traffic feature analysis on the historical network traffic data, obtain at least one of a network domain name and a network address of the historical network traffic data, and obtain a traffic size of the historical network traffic data; and when the flow is larger than or equal to the preset flow threshold, constructing a corresponding downloading acceleration rule based on at least one of the network domain name and the network address.
In one embodiment, the rule building module 1308 is further configured to perform traffic feature analysis on the historical network traffic data, to obtain at least one of a network domain name and a network address of the historical network traffic data, and to obtain an application package name of a historical application program that generates the historical traffic data; when determining that the historical application program belongs to the target application category according to the application package name, shielding historical network flow data and determining whether the login function of the historical application program is abnormal; when historical network flow data are shielded and the login function of a historical application program is abnormal, a corresponding login acceleration rule is constructed based on at least one of a network domain name and a network website.
In one embodiment, the rule building module 1308 is further configured to perform traffic feature analysis on the historical network traffic data, obtain at least one of a network domain name and a network address, and obtain access times; and when the communication times between the historical application program generating the historical network flow data and the corresponding communication object are determined to be greater than or equal to a preset communication threshold value according to the access times, constructing a corresponding opposite acceleration rule based on at least one of the network domain name and the network address.
In one embodiment, the application acceleration device 1300 is further configured to perform traffic characteristic analysis on the network traffic data to obtain a network traffic characteristic when the network traffic data does not match with a rule in the acceleration rule base; constructing a corresponding acceleration rule according to the network flow characteristics; and updating the acceleration rule base based on the constructed acceleration rule.
In one embodiment, the application acceleration device 1300 is also used to expose an application list of applications; responding to the selection operation of the application list, and determining an application program to be accelerated selected by the selection operation; starting the accelerator, and performing initial network acceleration processing on the application program to be accelerated through the accelerator enabling a default acceleration line.
For the specific definition of the application program acceleration device, reference may be made to the above definition of the application program acceleration method, which is not described herein again. The modules in the application accelerating device can be wholly or partially realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 14. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement an application acceleration method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 14 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is further provided, which includes a memory and a processor, the memory stores a computer program, and the processor implements the steps of the above method embodiments when executing the computer program.
In an embodiment, a computer-readable storage medium is provided, in which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
In one embodiment, a computer program product or computer program is provided that includes computer instructions stored in a computer-readable storage medium. The computer instructions are read by a processor of a computer device from a computer-readable storage medium, and the computer instructions are executed by the processor to cause the computer device to perform the steps in the above-mentioned method embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (28)

1. A method for application acceleration, the method comprising:
acquiring network flow data generated when an application program runs; performing category matching on the network traffic data based on at least one of a shielding rule and a direct connection rule in an acceleration rule base to obtain a category matching result;
when the class matching result represents that the network traffic data fails to be matched with both the shielding rule and the direct connection rule, determining that an application program generating the network traffic data belongs to a target application class, and sequentially performing shunt matching on the network traffic data and each shunt rule in the acceleration rule base to obtain the characteristic type of the network traffic data; the distribution rule comprises a login acceleration rule, a region verification acceleration rule, a download acceleration rule, an opposite-office acceleration rule and a dynamic access rule; the characteristic types of the network flow data comprise a login verification type, a region verification type, a download type, a local alignment type and a dynamic access type;
the network traffic data are directionally distributed to a target acceleration line corresponding to the characteristic type, and the network traffic data under the corresponding characteristic type are forwarded through the target acceleration line corresponding to the characteristic type, so that network acceleration processing of the application program belonging to the target application type is realized; the target acceleration line corresponding to the login verification type is a multi-website acceleration line, the target acceleration line corresponding to the area verification type is a native website acceleration line, the target acceleration line corresponding to the download type is a download acceleration line, the target acceleration line corresponding to the opposite type is an opposite acceleration line, and the target acceleration line corresponding to the dynamic access type is a dynamic acceleration line.
2. The method of claim 1, wherein performing category matching on the network traffic data based on at least one of a masking rule and a direct connection rule in an acceleration rule base to obtain a category matching result comprises:
determining a target traffic type of the network traffic data;
screening out a corresponding target acceleration rule from the acceleration rule base according to the target flow type; the target acceleration rule comprises at least one of a target shielding rule and a target direct connection rule;
and performing category matching on the network traffic data based on at least one of the target shielding rule and the target direct connection rule to obtain a corresponding category matching result.
3. The method according to claim 2, wherein the performing category matching on the network traffic data based on at least one of the target shielding rule and the target direct connection rule to obtain a corresponding category matching result comprises:
carrying out category matching processing on the network traffic data and a target shielding rule;
when the network traffic data is successfully matched with the target shielding rule, determining that a class matching result obtained based on class matching processing is a result representing that the network traffic data belongs to a shielding class;
the method further comprises the following steps:
and carrying out shielding processing on the network traffic data belonging to the shielding category.
4. The method of claim 3, further comprising:
when the matching of the network traffic data and the target shielding rule fails, performing category matching processing on the network traffic data and the target direct connection rule;
when the network traffic data is successfully matched with the target direct connection rule, determining that a category matching result obtained based on category matching processing is a result representing that an application program generating the network traffic data belongs to a direct connection application category;
and performing direct connection processing on the network traffic data generated by the application program belonging to the direct connection application category.
5. The method according to claim 4, wherein the target acceleration rule further includes a target distribution rule, and when the class matching result indicates that the network traffic data fails to be matched with both the shielding rule and the direct connection rule, it is determined that an application program generating the network traffic data belongs to a target application class, and the network traffic data and the distribution rules in the acceleration rule base are sequentially subjected to distribution matching to obtain the feature type of the network traffic data, including:
when the network traffic data fails to be matched with both the target shielding rule and the target direct connection rule, determining that an application program generating the network traffic data belongs to a target application category;
and carrying out shunting matching on the network traffic data and the target shunting rule to obtain the characteristic type of the network traffic data.
6. The method of claim 5, further comprising:
when the network traffic data fails to be matched with the target shielding rule, the target direct connection rule and the target distribution rule, distributing the network traffic data to a default acceleration line, and carrying out network acceleration processing on an application program generating the network traffic data through the default acceleration line.
7. The method of claim 4, wherein the step of constructing the target direct connection rule comprises:
performing flow characteristic analysis on historical network flow data to obtain at least one of a network domain name and a network address and an application package name of a historical application program generating the historical network flow data;
and when the historical application program is determined not to belong to the illegal application category and not to belong to the target application category based on the application package name, constructing a corresponding target direct connection rule according to at least one of the network domain name and the network address.
8. The method according to claim 1, wherein the directionally shunting the network traffic data to a target acceleration line corresponding to the feature type, and forwarding the network traffic data in the corresponding feature type through the target acceleration line corresponding to the feature type to implement network acceleration processing on the application program belonging to the target application class includes:
when the network flow data belongs to a login verification type, forwarding the network flow data to a multi-website acceleration line so as to perform network acceleration processing on a login verification process of an application program generating the network flow data; wherein, the multi-website accelerating line is bound with at least one public network address;
when the network flow data belong to a region verification type, forwarding the network flow data to a primary website accelerating line so as to perform network accelerating processing on a region verification process of an application program generating the network flow data; the native website accelerating line is bound with a native network address;
when the network flow data belongs to a downloading type, forwarding the network flow data to a downloading acceleration line so as to perform network acceleration processing on a downloading process of an application program generating the network flow data;
when the network traffic data belong to a local-alignment type, forwarding the network traffic data to a local-alignment acceleration line so as to perform network acceleration processing on a local-alignment process of an application program generating the network traffic data;
and when the network flow data belongs to a dynamic access type, forwarding the network flow data to a dynamic acceleration line so as to perform network acceleration processing on an application program generating the network flow data.
9. The method of claim 1, wherein the step of constructing the download acceleration rule comprises:
analyzing the flow characteristics of historical network flow data to obtain at least one of a network domain name and a network address of the historical network flow data and obtain the flow size of the historical network flow data;
and when the flow is larger than or equal to a preset flow threshold, constructing a corresponding downloading acceleration rule based on at least one of the network domain name and the network address.
10. The method of claim 1, wherein the step of constructing the login acceleration rule comprises:
performing flow characteristic analysis on historical network flow data to obtain at least one of a network domain name and a network website of the historical network flow data and an application package name of a historical application program generating the historical network flow data;
when the historical application program is determined to belong to the target application category according to the application package name, shielding the historical network flow data, and determining whether the login function of the historical application program is abnormal;
and when the historical network flow data is shielded and the login function of the historical application program is abnormal, constructing a corresponding login acceleration rule based on at least one of the network domain name and the network website.
11. The method of claim 1, wherein the step of constructing the game acceleration rule comprises:
analyzing the flow characteristics of historical network flow data to obtain at least one of a network domain name and a network address and access times;
and when the communication times between the historical application program generating the historical network flow data and the corresponding communication object are determined to be greater than or equal to a preset communication threshold value according to the access times, constructing a corresponding opposite acceleration rule based on at least one of the network domain name and the network address.
12. The method of claim 1, further comprising:
when the network traffic data is not matched with the rules in the acceleration rule base, carrying out traffic characteristic analysis on the network traffic data to obtain network traffic characteristics;
constructing a corresponding acceleration rule according to the network flow characteristics;
and updating the acceleration rule base based on the constructed acceleration rule.
13. The method of any one of claims 1 to 12, wherein prior to obtaining network traffic data generated during application runtime, the method further comprises:
displaying an application list of the application program;
responding to the selection operation of the application list, and determining an application program to be accelerated selected by the selection operation;
starting an accelerator, and carrying out initial network acceleration processing on the application program to be accelerated through the accelerator enabling a default acceleration line.
14. An application acceleration apparatus, comprising:
the flow acquisition module is used for acquiring network flow data generated when the application program runs;
the category matching module is used for carrying out category matching on the network traffic data based on at least one of a shielding rule and a direct connection rule in an acceleration rule base to obtain a category matching result;
the distribution module is used for determining that an application program generating the network traffic data belongs to a target application category when the category matching result represents that the network traffic data fails to be matched with both the shielding rule and the direct connection rule, and sequentially distributing and matching the network traffic data and each distribution rule in the acceleration rule base to obtain the characteristic type of the network traffic data; the network traffic data are directionally distributed to a target acceleration line corresponding to the characteristic type, and the network traffic data under the corresponding characteristic type are forwarded through the target acceleration line corresponding to the characteristic type, so that network acceleration processing of the application program belonging to the target application type is realized; wherein the target application category is a game application category; the distribution rule comprises a login acceleration rule, a region verification acceleration rule, a download acceleration rule, an opposite office acceleration rule and a dynamic access rule; the characteristic types of the network flow data comprise a login verification type, a region verification type, a download type, a local alignment type and a dynamic access type; the target acceleration line corresponding to the login verification type is a multi-website acceleration line, the target acceleration line corresponding to the area verification type is a native website acceleration line, the target acceleration line corresponding to the download type is a download acceleration line, the target acceleration line corresponding to the opposite type is an opposite acceleration line, and the target acceleration line corresponding to the dynamic access type is a dynamic acceleration line.
15. The apparatus of claim 14, wherein the category matching module is further configured to determine a target traffic type of the network traffic data; screening out a corresponding target acceleration rule from the acceleration rule base according to the target flow type; the target acceleration rule comprises at least one of a target shielding rule and a target direct connection rule; and performing category matching on the network traffic data based on at least one of the target shielding rule and the target direct connection rule to obtain a corresponding category matching result.
16. The apparatus of claim 15, wherein the class matching module is further configured to perform class matching on the network traffic data and a target masking rule; when the network traffic data is successfully matched with the target shielding rule, determining that a class matching result obtained based on class matching processing is a result representing that the network traffic data belongs to a shielding class; and carrying out shielding processing on the network traffic data belonging to the shielding category.
17. The apparatus according to claim 16, wherein the category matching module is further configured to perform category matching processing on the network traffic data and the target direct connection rule when matching of the network traffic data and the target shielding rule fails; when the network traffic data is successfully matched with the target direct connection rule, determining that a category matching result obtained based on category matching processing is a result representing that an application program generating the network traffic data belongs to a direct connection application category; and performing direct connection processing on the network traffic data generated by the application program belonging to the direct connection application category.
18. The apparatus of claim 17, wherein the target acceleration rule comprises a target offloading rule, and wherein the offloading module further comprises a feature type determining module, configured to determine that an application program that generates the network traffic data belongs to a target application category when the network traffic data fails to match both the target shielding rule and the target direct connection rule; and carrying out shunting matching on the network traffic data and the target shunting rule to obtain the characteristic type of the network traffic data.
19. The apparatus according to claim 18, wherein the application acceleration device is further configured to shunt the network traffic data to a default acceleration line when the network traffic data fails to match the target shielding rule, the target direct connection rule, and the target shunt rule, so as to perform network acceleration processing on the application generating the network traffic data through the default acceleration line.
20. The apparatus according to claim 17, wherein the application acceleration apparatus further comprises a rule construction module, configured to perform traffic feature analysis on historical network traffic data, obtain at least one of a network domain name and a network address, and obtain at least one of an application package name of a historical application program that generates the historical network traffic data; and when the historical application program is determined not to belong to the illegal application category and not to belong to the target application category based on the application package name, constructing a corresponding target direct connection rule according to at least one of the network domain name and the network address.
21. The apparatus according to claim 14, wherein the offloading module further comprises an acceleration module, configured to forward the network traffic data to a multi-url acceleration line when the network traffic data belongs to a login checking type, so as to perform network acceleration processing on a login checking process of an application program that generates the network traffic data; wherein, the multi-website accelerating line is bound with at least one public network address; when the network flow data belong to a region verification type, forwarding the network flow data to a primary website accelerating line so as to perform network accelerating processing on a region verification process of an application program generating the network flow data; the native website accelerating line is bound with a native network address; when the network flow data belongs to a downloading type, forwarding the network flow data to a downloading acceleration line so as to perform network acceleration processing on a downloading process of an application program generating the network flow data; when the network traffic data belong to a local-alignment type, forwarding the network traffic data to a local-alignment acceleration line so as to perform network acceleration processing on a local-alignment process of an application program generating the network traffic data; and when the network flow data belongs to a dynamic access type, forwarding the network flow data to a dynamic acceleration line so as to perform network acceleration processing on an application program generating the network flow data.
22. The apparatus according to claim 21, wherein the application acceleration apparatus further comprises a rule construction module, and the rule construction module is configured to perform traffic feature analysis on historical network traffic data, obtain at least one of a network domain name and a network address of the historical network traffic data, and obtain a traffic size of the historical network traffic data; and when the flow is larger than or equal to a preset flow threshold, constructing a corresponding downloading acceleration rule based on at least one of the network domain name and the network address.
23. The apparatus according to claim 14, wherein the application acceleration apparatus further comprises a rule construction module, and the rule construction module is configured to perform traffic feature analysis on historical network traffic data, obtain at least one of a network domain name and a network address of the historical network traffic data, and obtain an application package name of a historical application that generates the historical network traffic data; when the historical application program is determined to belong to the target application category according to the application package name, shielding the historical network flow data, and determining whether the login function of the historical application program is abnormal; and when the historical network flow data is shielded and the login function of the historical application program is abnormal, constructing a corresponding login acceleration rule based on at least one of the network domain name and the network website.
24. The apparatus according to claim 14, wherein the application acceleration device further comprises a rule construction module, and the rule construction module is configured to perform traffic feature analysis on historical network traffic data, obtain at least one of a network domain name and a network address, and obtain access times; and when the communication times between the historical application program generating the historical network flow data and the corresponding communication object are determined to be greater than or equal to a preset communication threshold value according to the access times, constructing a corresponding opposite acceleration rule based on at least one of the network domain name and the network address.
25. The apparatus according to claim 14, wherein the application acceleration device is further configured to perform traffic characteristic analysis on the network traffic data to obtain a network traffic characteristic when the network traffic data does not match any rule in the acceleration rule base; constructing a corresponding acceleration rule according to the network flow characteristics; and updating the acceleration rule base based on the constructed acceleration rule.
26. The apparatus according to any one of claims 14 to 25, wherein the application acceleration means is further configured to expose an application list of applications; responding to the selection operation of the application list, and determining an application program to be accelerated selected by the selection operation; starting an accelerator, and carrying out initial network acceleration processing on the application program to be accelerated through the accelerator enabling a default acceleration line.
27. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor realizes the steps of the method of any one of claims 1 to 13 when executing the computer program.
28. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 13.
CN202110579603.1A 2021-05-26 2021-05-26 Application program acceleration method and device Active CN113014509B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110579603.1A CN113014509B (en) 2021-05-26 2021-05-26 Application program acceleration method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110579603.1A CN113014509B (en) 2021-05-26 2021-05-26 Application program acceleration method and device

Publications (2)

Publication Number Publication Date
CN113014509A CN113014509A (en) 2021-06-22
CN113014509B true CN113014509B (en) 2021-09-17

Family

ID=76380828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110579603.1A Active CN113014509B (en) 2021-05-26 2021-05-26 Application program acceleration method and device

Country Status (1)

Country Link
CN (1) CN113014509B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357258A (en) * 2015-09-28 2016-02-24 华为技术有限公司 Acceleration management node, acceleration node, client and method
CN108429701A (en) * 2018-02-08 2018-08-21 四川速宝网络科技有限公司 network acceleration system
CN111327665A (en) * 2018-12-14 2020-06-23 就肆电竞股份有限公司 Data transmission accelerating device, data transmission accelerating method and router
CN112217679A (en) * 2020-10-16 2021-01-12 腾讯科技(深圳)有限公司 Application program acceleration method and device, computer equipment and storage medium
CN112221121A (en) * 2020-10-20 2021-01-15 腾讯科技(深圳)有限公司 Application software networking acceleration method and device and storage medium
CN112822051A (en) * 2021-01-06 2021-05-18 贵阳迅游网络科技有限公司 Service acceleration method based on service perception

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105516122B (en) * 2015-12-03 2019-03-15 网宿科技股份有限公司 The network transmission acceleration method and system of acceleration strategy with graduation configuration
CN111131068B (en) * 2018-11-01 2023-04-11 中国移动通信集团广东有限公司 Internet private line data transmission method and device
CN109922504B (en) * 2019-03-27 2022-03-01 Oppo广东移动通信有限公司 Data distribution method and related product

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357258A (en) * 2015-09-28 2016-02-24 华为技术有限公司 Acceleration management node, acceleration node, client and method
CN108429701A (en) * 2018-02-08 2018-08-21 四川速宝网络科技有限公司 network acceleration system
CN111327665A (en) * 2018-12-14 2020-06-23 就肆电竞股份有限公司 Data transmission accelerating device, data transmission accelerating method and router
CN112217679A (en) * 2020-10-16 2021-01-12 腾讯科技(深圳)有限公司 Application program acceleration method and device, computer equipment and storage medium
CN112221121A (en) * 2020-10-20 2021-01-15 腾讯科技(深圳)有限公司 Application software networking acceleration method and device and storage medium
CN112822051A (en) * 2021-01-06 2021-05-18 贵阳迅游网络科技有限公司 Service acceleration method based on service perception

Also Published As

Publication number Publication date
CN113014509A (en) 2021-06-22

Similar Documents

Publication Publication Date Title
CN109640348B (en) Multi-service MEC network architecture, and method and device for processing multi-service data stream
CN107612895B (en) Internet anti-attack method and authentication server
CN111084983B (en) Cloud game service method, device, equipment and storage medium
CN110213522B (en) Video data processing method and device and related equipment
CN106254311A (en) Live broadcasting method and device, live data streams methods of exhibiting and device
CN106330816B (en) A kind of method and system logging in cloud desktop
US20220072436A1 (en) Method and apparatus for game live-streaming
CN104935558B (en) A kind of network user fast registers and login method and system
CN108616360A (en) User identity verification, register method and device
WO2022089028A1 (en) Data processing method and apparatus, device and storage medium
US20230291808A1 (en) Data processing method and apparatus, device and medium
US11784819B2 (en) Dynamic segmentation of network traffic by use of pre-shared keys
US20220029882A1 (en) Systems, methods, and media for monitoring cloud configuration settings
CN110620846B (en) Message merging method, device, equipment and storage medium
CN106060097B (en) A kind of management system and management method of information security contest
CN111641559B (en) Block chain-based multi-person session data transmission method and system and computer equipment
CN113573378A (en) Electronic contest data processing method, device, equipment and storage medium
US20170270561A1 (en) Method, terminal and server for monitoring advertisement exhibition
CN113014509B (en) Application program acceleration method and device
CN111866993B (en) Wireless local area network connection management method, device, software program and storage medium
US11558362B2 (en) Secure communication for remote devices
CN111741014B (en) Message sending method, device, server and storage medium
Shrivastava et al. Investment decision in cloud gaming-based businesses opportunities: An analysis of the cloud gaming industry
KR20220028950A (en) Content delivery system
CN107277640A (en) Interactive approach, device and storage medium based on live platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40046035

Country of ref document: HK