CN115333816B - Method for identifying internet traffic of ipv6 campus - Google Patents
Method for identifying internet traffic of ipv6 campus Download PDFInfo
- Publication number
- CN115333816B CN115333816B CN202210927974.9A CN202210927974A CN115333816B CN 115333816 B CN115333816 B CN 115333816B CN 202210927974 A CN202210927974 A CN 202210927974A CN 115333816 B CN115333816 B CN 115333816B
- Authority
- CN
- China
- Prior art keywords
- network
- access terminal
- safety
- access
- terminal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 26
- 238000012544 monitoring process Methods 0.000 claims abstract description 80
- 238000004891 communication Methods 0.000 claims abstract description 7
- 238000007667 floating Methods 0.000 claims description 21
- 238000004140 cleaning Methods 0.000 claims description 6
- 238000001514 detection method Methods 0.000 claims description 6
- 230000002159 abnormal effect Effects 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 claims description 3
- 238000012937 correction Methods 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 abstract description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000004364 calculation method Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000004576 sand Substances 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention discloses a method for identifying internet traffic of an ipv6 campus, which belongs to the field of network traffic, relates to a traffic identification monitoring technology, and solves the technical problems that in the prior art, a campus network cannot be safely analyzed, and meanwhile, the safety of an access end and an accessed end in the campus network cannot be monitored, so that the data safety of a terminal in the campus network is ensured, and the validity of internet traffic identification is ensured; the method comprises the steps of carrying out safety monitoring on real-time communication of a mobile access terminal connected with a campus area coverage network in real time, identifying the internet traffic of the real-time access terminal, and ensuring the monitoring performance of the access terminal, so as to ensure the internet security of the access terminal; the safety monitoring is carried out on the accessed end browsed in real time by the access end, so that the safety of the accessed end is improved, the safety of the access end is ensured, the access risk of the access end is prevented from being increased, the cheating risk of the access end corresponding to the user is effectively reduced, and the Internet surfing safety of student users is improved.
Description
Technical Field
The invention belongs to the field of network traffic, relates to a traffic identification monitoring technology, and in particular relates to a method for identifying internet traffic on an ipv6 campus.
Background
The rapid development of network technology makes the network application wider and wider, and the students' study and entertainment are not away from the support of campus network, and the data traffic of campus network outlet is larger and larger. Students access various websites through a campus network, wherein many bad websites are not spent, many students are cheated on the network every year, the bad websites are identified in the campus network, personal interests of the students can be effectively protected, and network space is purified.
In the prior art, the network used in the campus cannot be subjected to security analysis, and meanwhile, the security of an access terminal and an accessed terminal in the campus network cannot be monitored, so that the cheating risk of student users in the campus is increased;
therefore, we propose a method for identifying internet traffic on an ipv6 campus.
Disclosure of Invention
Aiming at the defects existing in the prior art, the invention aims to provide a method for identifying internet traffic of an ipv6 campus, which is used for carrying out safety monitoring on a coverage network in a campus area, accurately judging the safety of the current campus network, ensuring the data safety of a connection terminal in the campus network and simultaneously ensuring the effectiveness of internet traffic identification; the method comprises the steps of carrying out safety monitoring on real-time communication of a mobile access terminal connected with a campus area coverage network in real time, identifying the internet traffic of the real-time access terminal, and ensuring the monitoring performance of the access terminal, so as to ensure the internet security of the access terminal; the safety monitoring is carried out on the accessed end browsed in real time by the access end, so that the safety of the accessed end is improved, the safety of the access end is ensured, the access risk of the access end is prevented from being increased, the cheating risk of the access end corresponding to the user is effectively reduced, and the Internet surfing safety of student users is improved.
The technical problems to be solved by the invention are as follows:
How to effectively improve the security of the campus network, and the security of the campus network access terminal and the accessed terminal.
The aim of the invention can be achieved by the following technical scheme:
The method for identifying the internet traffic of the ipv6 campus network comprises the following steps:
Firstly, monitoring a campus network, namely performing security monitoring on a coverage network in a campus area, accurately judging the security of the current campus network, and ensuring the data security of a connection terminal in the campus network;
Secondly, safety monitoring of the access terminal, namely safety monitoring of real-time communication of a mobile access terminal connected with a campus area coverage network in real time, identification of internet traffic of the real-time access terminal, and ensuring monitoring performance of the access terminal;
Thirdly, safety monitoring is carried out on the accessed end, and safety monitoring is carried out on the accessed end browsed in real time by the access end.
As a further technical scheme of the invention, the garden network monitoring process in the first step is as follows:
Acquiring access frequency of a first-time logged-in access terminal repetition network in a campus area coverage network and increasing speed of a corresponding first-time logged-in access terminal, and marking the access frequency of the first-time logged-in access terminal repetition network in the campus area coverage network and the increasing speed of the corresponding first-time logged-in access terminal as JRP and ZJS respectively; collecting average duration of a non-first login continuous access network in a campus area coverage network, and marking the average duration of the non-first login continuous access network in the campus area coverage network as WLS;
By the formula And acquiring a safety monitoring coefficient X in the campus area coverage network.
As a further technical scheme of the invention, a1, a2 and a3 are all preset proportionality coefficients, a1 is more than a2 and more than a3 is more than 0, beta is an error correction factor, and the value is 0.996; and comparing the safety monitoring coefficient X in the campus area coverage network with a safety monitoring coefficient threshold value.
As a further technical scheme of the invention, the comparison process of the safety monitoring coefficient X and the safety monitoring coefficient threshold value in the campus area coverage network is as follows:
If the safety monitoring coefficient X in the campus area coverage network exceeds the safety monitoring coefficient threshold value, judging that the safety monitoring of the current campus area coverage network is qualified, marking the corresponding campus area coverage network as a safety network, and carrying out open connection of an access terminal on the corresponding safety network, and then carrying out the second step;
if the safety monitoring coefficient X in the campus area coverage network does not exceed the safety monitoring coefficient threshold value, judging that the safety monitoring of the current campus area coverage network is unqualified, marking the corresponding campus area coverage network as a risk network, sending an IP address of the corresponding risk network to a mobile phone terminal of a manager, after receiving the IP address of the risk network, cleaning a connecting terminal and the existing data in the risk network, and closing the access terminal connection of the risk network after cleaning.
As a further technical scheme of the invention, the specific process of access terminal safety monitoring in the second step is as follows:
After the corresponding access terminal of the secure network is connected with the secure network, the distance between the position of the traffic use terminal in the secure network and the position of the real-time access terminal and the floating frequency of the position of the real-time access terminal in the corresponding secure network are acquired when the access terminal for establishing connection generates traffic consumption in the secure network, and the distance between the position of the traffic use terminal in the secure network and the position of the real-time access terminal when the access terminal for establishing connection generates traffic consumption in the secure network and the floating frequency of the position of the real-time access terminal in the corresponding secure network are compared with the distance threshold and the position floating frequency threshold respectively.
As a further technical scheme of the invention, if the distance between the position of the traffic use terminal in the secure network and the position of the real-time access terminal exceeds the distance threshold when the access terminal which establishes connection generates traffic consumption in the secure network, or the floating frequency of the position of the real-time access terminal in the corresponding secure network exceeds the position floating frequency threshold, judging that the security detection of the corresponding access terminal in the current secure network is abnormal, connecting the corresponding access terminal of the secure network to be interrupted, and when the secure network accurately controls the real-time traffic use of the access terminal, namely the position of the access terminal can be controlled in real time, and the access terminal is re-connected into the secure network;
If the distance between the position of the traffic using terminal in the safety network and the position of the real-time access terminal does not exceed the distance threshold when the access terminal which establishes the connection generates traffic consumption in the safety network, and the floating frequency of the position of the real-time access terminal in the corresponding safety network does not exceed the position floating frequency threshold, judging that the safety detection of the corresponding access terminal in the current safety network is normal, and entering the step three.
As a further technical scheme of the invention, the safety monitoring process of the accessed end in the third step is as follows:
The access terminal passing through the security monitoring in the security network is marked as a security access terminal, the number of the connection terminals with real names and the duration of the access period corresponding to the number of the connection terminals in the accessed terminal are collected, and the number of the connection terminals with real names and the duration of the access period corresponding to the number of the connection terminals in the accessed terminal are compared with a threshold value of the number of the real-time terminals and a threshold value of the duration respectively.
As a further technical scheme of the invention, if the number of the connection terminals with real names corresponding to the accessed terminals at the safety access end exceeds a threshold value of the number of the real-time terminals and the duration of the access period corresponding to the number of the connection terminals at the accessed terminals exceeds a threshold value of the duration, the safety monitoring of the accessed terminals is judged to be qualified, and the accessed terminals and the access terminals are subjected to browse data encryption protection;
if the number of the connection terminals with real names corresponding to the accessed terminals at the safe access end does not exceed the threshold value of the number of the real-time terminals or the duration of the access period corresponding to the number of the connection terminals at the accessed terminals does not exceed the threshold value of the duration, judging that the safety monitoring of the accessed end is unqualified, and setting the data transmission between the accessed end and the access end to be unidirectional, namely, the data of the access end is not provided with access permission in the accessed end.
Compared with the prior art, the invention has the beneficial effects that:
in the invention, the coverage network in the campus area is monitored safely, the security of the current campus network is accurately judged, the data security of the connection terminal in the campus network is ensured, and the validity of the internet traffic identification is ensured; the method comprises the steps of carrying out safety monitoring on real-time communication of a mobile access terminal connected with a campus area coverage network in real time, identifying the internet traffic of the real-time access terminal, and ensuring the monitoring performance of the access terminal, so as to ensure the internet security of the access terminal; the safety monitoring is carried out on the accessed end browsed in real time by the access end, so that the safety of the accessed end is improved, the safety of the access end is ensured, the access risk of the access end is prevented from being increased, the cheating risk of the access end corresponding to the user is effectively reduced, and the Internet surfing safety of student users is improved.
Drawings
The present invention is further described below with reference to the accompanying drawings for the convenience of understanding by those skilled in the art.
Fig. 1 is a flow chart of the operation of the present invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In one embodiment, referring to fig. 1, a method for identifying internet traffic on an ipv6 campus is now provided;
Wherein, IPv6 is the abbreviation of English "InternetProtocolVersion6" (Internet protocol version 6), which is the next generation IP protocol designed by the Internet Engineering Task Force (IETF) for replacing IPv4, and the number of addresses is named as one address for each sand in the world. The biggest problem of IPv4 is that network address resources are insufficient, which severely restricts the application and development of the internet. The use of IPv6 not only solves the problem of the number of network address resources, but also solves the obstacle of connecting various access devices to the Internet. IPv6 is designed to replace IPv4, but IPv4 has long been dominant in internet traffic, and use of IPv6 has grown slowly. Currently, the percentage of users using Google services through IPv6 exceeds 40% for the first time. Moreover, the internet digital distribution agency (IANA) has proposed an Internet Engineering Task Force (IETF) to require that newly formulated internet standards only support IPv6 and are no longer compatible with IPv4;
The specific explanation is that the process of the method for identifying the online flow of the school network in the embodiment is as follows:
Firstly, monitoring a campus network, performing security monitoring on a coverage network in a campus area, accurately judging the security of the current campus network, ensuring the data security of a connection terminal in the campus network, and simultaneously ensuring the effectiveness of internet traffic identification;
Secondly, safety monitoring of the access terminal is carried out, real-time communication of the mobile access terminal connected with the campus area coverage network in real time is carried out, internet traffic of the real-time access terminal is identified, monitoring performance of the access terminal is ensured, and therefore internet surfing safety of the access terminal is ensured;
Thirdly, safety monitoring of the accessed end is carried out, and the real-time browsed accessed end of the accessed end is carried out, so that the safety of the accessed end is effectively improved, the safety of the accessed end can be ensured, the access risk of the accessed end is effectively prevented from being increased, the cheating risk of the user corresponding to the accessed end is effectively reduced, and the Internet surfing safety of student users is improved;
In this embodiment, the process of monitoring the network in the first step is as follows:
Acquiring access frequency of a first-time logged-in access terminal repetition network in a campus area coverage network and increasing speed of a corresponding first-time logged-in access terminal, and marking the access frequency of the first-time logged-in access terminal repetition network in the campus area coverage network and the increasing speed of the corresponding first-time logged-in access terminal as JRP and ZJS respectively; collecting average duration of a non-first login continuous access network in a campus area coverage network, and marking the average duration of the non-first login continuous access network in the campus area coverage network as WLS;
By the formula The method comprises the steps of obtaining a safety monitoring coefficient X in a campus area coverage network, wherein a1, a2 and a3 are preset proportional coefficients, a1 is more than a2 and more than a3 is more than 0, beta is an error correction factor, and the value of beta is 0.996 as long as the values of a1, a2, a3 and beta do not influence the positive-negative ratio relation between parameters and result values;
comparing the safety monitoring coefficient X in the campus area coverage network with a safety monitoring coefficient threshold value:
If the safety monitoring coefficient X in the campus area coverage network exceeds the safety monitoring coefficient threshold value, judging that the safety monitoring of the current campus area coverage network is qualified, marking the corresponding campus area coverage network as a safety network, and carrying out open connection of an access terminal on the corresponding safety network, and then carrying out the second step;
If the safety monitoring coefficient X in the campus area coverage network does not exceed the safety monitoring coefficient threshold value, judging that the safety monitoring of the current campus area coverage network is unqualified, marking the corresponding campus area coverage network as a risk network, sending an IP address of the corresponding risk network to a mobile phone terminal of a manager, after receiving the IP address of the risk network, cleaning a connecting terminal and the existing data in the risk network by the manager, and closing the access terminal connection of the risk network after cleaning is finished;
In this embodiment, the specific process of access security monitoring in the second step is as follows:
After the corresponding access terminal of the secure network is connected with the access terminal, the distance between the position of the traffic use terminal in the secure network and the position of the real-time access terminal and the floating frequency of the position of the real-time access terminal in the corresponding secure network are acquired when the access terminal for establishing connection generates traffic consumption in the secure network, and the distance between the position of the traffic use terminal in the secure network and the position of the real-time access terminal when the access terminal for establishing connection generates traffic consumption in the secure network and the floating frequency of the position of the real-time access terminal in the corresponding secure network are compared with the distance threshold and the floating frequency threshold respectively:
If the distance between the position of the flow using terminal in the safety network and the position of the real-time access terminal exceeds the distance threshold when the access terminal which establishes connection generates flow consumption in the safety network, or the floating frequency of the position of the real-time access terminal in the corresponding safety network exceeds the position floating frequency threshold, judging that the safety detection of the corresponding access terminal in the current safety network is abnormal, interrupting the connection of the corresponding access terminal of the safety network, and when the safety network accurately controls the use of the real-time flow of the access terminal, namely the position of the access terminal can be controlled in real time, and the access terminal is re-connected into the safety network;
if the distance between the position of the flow using terminal in the safety network and the position of the real-time access terminal does not exceed the distance threshold when the access terminal which establishes the connection generates flow consumption in the safety network, and the floating frequency of the position of the real-time access terminal in the corresponding safety network does not exceed the position floating frequency threshold, judging that the safety detection of the corresponding access terminal in the current safety network is normal, and entering the step III;
It should be specifically noted that, in the present application, the access terminal may be a mobile phone terminal of a user, or may be a network connection device such as a computer, which is not limited herein;
In this embodiment, the safety monitoring process of the accessed end in the third step is as follows:
Marking the access terminal passing through the security monitoring in the security network as a security access terminal, collecting the number of connection terminals with real names of the security access terminal corresponding to the accessed terminal and the duration of the access period corresponding to the number of connection terminals in the accessed terminal, and comparing the number of connection terminals with real names of the security access terminal corresponding to the accessed terminal and the duration of the access period corresponding to the number of connection terminals in the accessed terminal with a real-time terminal number threshold and a duration threshold respectively;
If the number of the connection terminals with real names corresponding to the accessed terminals at the safety access end exceeds a threshold value of the number of the real-time terminals and the duration of the access period corresponding to the number of the connection terminals at the accessed terminals exceeds a threshold value of the duration, judging that the safety monitoring of the accessed terminals is qualified, and carrying out encryption protection on browsing data between the accessed terminals and the access terminals;
If the number of the real-name connection terminals of the safety access terminal corresponding to the accessed terminal does not exceed the threshold value of the number of the real-time terminals or the duration of the access period corresponding to the number of the connection terminals in the accessed terminal does not exceed the threshold value of the duration, judging that the safety monitoring of the accessed terminal is unqualified, and setting the data transmission of the accessed terminal and the access terminal to be unidirectional, namely, the data of the access terminal is not provided with access permission in the accessed terminal;
the method and the device have the advantages that the accessed terminal is expressed as a network access terminal such as a website and a network platform in the prior art; the access period is expressed as a fixed access period of the access terminal to the accessed terminal.
Compared with the prior art, the invention has the beneficial effects that: the invention monitors the safety of the coverage network in the campus area, accurately judges the safety of the current campus network, ensures the data safety of the connection terminal in the campus network, and simultaneously ensures the effectiveness of internet traffic identification; the method comprises the steps of carrying out safety monitoring on real-time communication of a mobile access terminal connected with a campus area coverage network in real time, identifying the internet traffic of the real-time access terminal, and ensuring the monitoring performance of the access terminal, so as to ensure the internet security of the access terminal; the safety monitoring is carried out on the accessed end browsed in real time by the access end, so that the safety of the accessed end is improved, the safety of the access end is ensured, the access risk of the access end is prevented from being increased, the cheating risk of the access end corresponding to the user is effectively reduced, and the Internet surfing safety of student users is improved.
The formulas are all formulas with dimensions removed and numerical calculation, the formulas are formulas with a large amount of data collected for software simulation to obtain the latest real situation, and preset parameters in the formulas are set by a person skilled in the art according to the actual situation;
The formula is as follows:
Collecting a plurality of groups of sample data by a person skilled in the art and setting a corresponding rating coefficient for each group of sample data; substituting the set rating coefficient and the collected sample data into a formula, forming a binary one-time equation set by any two formulas, screening the calculated coefficient and taking an average value to obtain values a1, a2 and a3 which are respectively 1.2, 1.05 and 1.02;
The size of the coefficient is a specific numerical value obtained by quantizing each parameter, so that the subsequent comparison is convenient, and the size of the coefficient depends on the number of sample data and the corresponding humidity coefficient is preliminarily set for each group of sample data by a person skilled in the art; as long as the proportional relation between the parameter and the quantized value is not affected.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.
Claims (3)
1. The method for identifying internet traffic of the ipv6 campus is characterized by comprising the following steps of:
Firstly, monitoring a campus network, namely performing security monitoring on a coverage network in the campus area, accurately judging the security of the current campus network, ensuring the data security of a connecting terminal in the campus network, acquiring the access frequency of a first-time logged-in access terminal repetition network in the campus area coverage network and the increase speed of the corresponding first-time logged-in access terminal repetition network in the campus area coverage network, and marking the access frequency of the first-time logged-in access terminal repetition network and the increase speed of the corresponding first-time logged-in access terminal in the campus area coverage network as JRP and ZJS respectively; collecting average duration of a non-first login continuous access network in a campus area coverage network, and marking the average duration of the non-first login continuous access network in the campus area coverage network as WLS;
By the formula The method comprises the steps that safety monitoring coefficients X, a1, a2 and a3 in a campus area coverage network are all preset proportion coefficients, a1 is more than a2 and more than a3 is more than 0, beta is an error correction factor, and the value is 0.996; comparing the safety monitoring coefficient X in the campus area coverage network with a safety monitoring coefficient threshold value, if the safety monitoring coefficient X in the campus area coverage network exceeds the safety monitoring coefficient threshold value, judging that the safety monitoring of the current campus area coverage network is qualified, marking the corresponding campus area coverage network as a safety network, and carrying out open connection of an access terminal on the corresponding safety network, and entering a step two;
Secondly, safety monitoring of the access terminal, namely safety monitoring of real-time communication of a mobile access terminal connected with a campus area coverage network in real time, identifying the internet traffic of the real-time access terminal, and ensuring the monitorability of the access terminal, wherein the safety monitoring of the access terminal in the second step comprises the following specific processes:
After the corresponding access terminal of the safety network is connected with the access terminal in an open mode, after the connection is established between the safety network and the access terminal, the distance between the position of the traffic use terminal in the safety network and the position of the real-time access terminal and the floating frequency of the position of the real-time access terminal in the corresponding safety network are acquired when the access terminal for establishing the connection generates traffic consumption in the safety network, the distance between the position of the traffic use terminal in the safety network and the position of the real-time access terminal in the corresponding safety network and the floating frequency of the position of the real-time access terminal in the corresponding safety network are compared with the distance threshold and the position floating frequency threshold respectively, if the distance between the position of the traffic use terminal in the safety network and the position of the real-time access terminal in the corresponding safety network does not exceed the distance threshold when the access terminal for establishing the connection generates traffic consumption in the safety network, and the floating frequency of the position of the real-time access terminal in the corresponding safety network does not exceed the position floating frequency threshold, the corresponding access terminal in the current safety network is judged to be detected normally, and the safety detection of the corresponding access terminal in the safety network is entered into step three;
thirdly, safety monitoring is carried out on the accessed end browsed in real time by the accessed end, and the safety monitoring process of the accessed end in the third step is as follows:
Marking the access terminal passing through the security monitoring in the security network as a security access terminal, collecting the number of connection terminals with real names and the duration of access periods corresponding to the number of connection terminals in the accessed terminal, which correspond to the accessed terminal, and comparing the number of connection terminals with real names and the duration of access periods corresponding to the number of connection terminals in the accessed terminal with a threshold value of the number of the real terminals and a threshold value of the duration respectively, if the number of connection terminals with real names, which correspond to the accessed terminal, of the security access terminal exceeds the threshold value of the number of the real terminals, and the duration of access periods corresponding to the number of connection terminals in the accessed terminal exceeds the threshold value of the duration, judging that the security monitoring of the accessed terminal is qualified, and carrying out browse data encryption protection on the accessed terminal and the access terminal;
if the number of the connection terminals with real names corresponding to the accessed terminals at the safe access end does not exceed the threshold value of the number of the real-time terminals or the duration of the access period corresponding to the number of the connection terminals at the accessed terminals does not exceed the threshold value of the duration, judging that the safety monitoring of the accessed end is unqualified, and setting the data transmission between the accessed end and the access end to be unidirectional, namely, the data of the access end is not provided with access permission in the accessed end.
2. The method for identifying internet traffic on an ipv6 campus according to claim 1, wherein the comparison process of the security monitoring coefficient X and the security monitoring coefficient threshold in the campus area coverage network is as follows:
if the safety monitoring coefficient X in the campus area coverage network does not exceed the safety monitoring coefficient threshold value, judging that the safety monitoring of the current campus area coverage network is unqualified, marking the corresponding campus area coverage network as a risk network, sending an IP address of the corresponding risk network to a mobile phone terminal of a manager, after receiving the IP address of the risk network, cleaning a connecting terminal and the existing data in the risk network, and closing the access terminal connection of the risk network after cleaning.
3. The method for identifying internet traffic on an ipv6 campus according to claim 1, wherein if a distance between a location of a traffic-using terminal in a secure network and a location of a real-time access terminal exceeds a distance threshold when an access terminal establishing a connection generates traffic consumption in the secure network, or if a floating frequency of the location of the real-time access terminal in the corresponding secure network exceeds a location floating frequency threshold, determining that security detection of the corresponding access terminal in the current secure network is abnormal, interrupting connection of the corresponding access terminal in the secure network, and when the secure network accurately manages real-time traffic usage of the access terminal, that is, the location of the access terminal can be controlled in real time, and the access terminal is re-connected into the secure network.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210927974.9A CN115333816B (en) | 2022-08-03 | 2022-08-03 | Method for identifying internet traffic of ipv6 campus |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210927974.9A CN115333816B (en) | 2022-08-03 | 2022-08-03 | Method for identifying internet traffic of ipv6 campus |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115333816A CN115333816A (en) | 2022-11-11 |
CN115333816B true CN115333816B (en) | 2024-05-31 |
Family
ID=83921236
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210927974.9A Active CN115333816B (en) | 2022-08-03 | 2022-08-03 | Method for identifying internet traffic of ipv6 campus |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115333816B (en) |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1610439A (en) * | 2003-10-17 | 2005-04-27 | 松下电器产业株式会社 | Handover method and mobile communication system |
CN102172063A (en) * | 2008-09-30 | 2011-08-31 | 日本电气株式会社 | Access control system, access control method, and communication terminal |
GB201318796D0 (en) * | 2012-10-24 | 2013-12-11 | Seven Networks Inc | Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion |
WO2015103984A1 (en) * | 2014-01-07 | 2015-07-16 | Tencent Technology (Shenzhen) Company Limited | Network access traffic control method and server |
CN106416375A (en) * | 2014-01-31 | 2017-02-15 | 富士通株式会社 | Access method of wireless communication network |
CN107950062A (en) * | 2016-06-30 | 2018-04-20 | 华为技术有限公司 | A kind of method for scanning wireless fidelity network and mobile equipment |
CN111371784A (en) * | 2020-03-04 | 2020-07-03 | 贵州弈趣云创科技有限公司 | Method for automatically fusing attacked distributed point-to-point service |
CN112702316A (en) * | 2020-12-10 | 2021-04-23 | 济南大学 | Campus network security protection system |
CN112800098A (en) * | 2021-01-28 | 2021-05-14 | 温州大学 | Education management information maintenance system of education platform |
CN113938317A (en) * | 2021-11-29 | 2022-01-14 | 福建瑞网科技有限公司 | Network security monitoring method and computer equipment |
CN114022988A (en) * | 2021-11-05 | 2022-02-08 | 西南交通大学 | Visitor information management verification system and method based on artificial intelligence |
CN114066171A (en) * | 2021-10-26 | 2022-02-18 | 浪潮软件科技有限公司 | Service platform activity degree analysis method and system |
-
2022
- 2022-08-03 CN CN202210927974.9A patent/CN115333816B/en active Active
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1610439A (en) * | 2003-10-17 | 2005-04-27 | 松下电器产业株式会社 | Handover method and mobile communication system |
CN102172063A (en) * | 2008-09-30 | 2011-08-31 | 日本电气株式会社 | Access control system, access control method, and communication terminal |
GB201318796D0 (en) * | 2012-10-24 | 2013-12-11 | Seven Networks Inc | Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion |
WO2015103984A1 (en) * | 2014-01-07 | 2015-07-16 | Tencent Technology (Shenzhen) Company Limited | Network access traffic control method and server |
CN106416375A (en) * | 2014-01-31 | 2017-02-15 | 富士通株式会社 | Access method of wireless communication network |
CN107950062A (en) * | 2016-06-30 | 2018-04-20 | 华为技术有限公司 | A kind of method for scanning wireless fidelity network and mobile equipment |
CN111371784A (en) * | 2020-03-04 | 2020-07-03 | 贵州弈趣云创科技有限公司 | Method for automatically fusing attacked distributed point-to-point service |
CN112702316A (en) * | 2020-12-10 | 2021-04-23 | 济南大学 | Campus network security protection system |
CN112800098A (en) * | 2021-01-28 | 2021-05-14 | 温州大学 | Education management information maintenance system of education platform |
CN114066171A (en) * | 2021-10-26 | 2022-02-18 | 浪潮软件科技有限公司 | Service platform activity degree analysis method and system |
CN114022988A (en) * | 2021-11-05 | 2022-02-08 | 西南交通大学 | Visitor information management verification system and method based on artificial intelligence |
CN113938317A (en) * | 2021-11-29 | 2022-01-14 | 福建瑞网科技有限公司 | Network security monitoring method and computer equipment |
Non-Patent Citations (2)
Title |
---|
基于PKI/HIP协议的下一代互联网实名访问研究;刘华春;王建华;段华琼;;计算机工程与设计;20100416(第07期);全文 * |
基于校园网的网络安全监测与控制系统的设计;李业谦;;信息记录材料;20200601(第06期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN115333816A (en) | 2022-11-11 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108449342B (en) | Malicious request detection method and device | |
CN105024969A (en) | Method and device for realizing malicious domain name identification | |
CN105516165A (en) | Method, device and system for identifying illegal proxy for charging fraud | |
CN106656666B (en) | Method and device for acquiring first screen time of webpage | |
CN115134099B (en) | Network attack behavior analysis method and device based on full flow | |
CN110071932A (en) | A kind of security access system and method | |
CN106789413B (en) | Method and device for detecting proxy internet surfing | |
CN111654486A (en) | Server equipment judgment and identification method | |
CN115333816B (en) | Method for identifying internet traffic of ipv6 campus | |
CN112449371A (en) | Performance evaluation method of wireless router and electronic equipment | |
CN111565196B (en) | KNXnet/IP protocol intrusion detection method, device, equipment and medium | |
CN105528352A (en) | Method for establishing corresponding relation of mobile communication user and network account information thereof | |
Wang et al. | Smart devices information extraction in home wi‐fi networks | |
CN109309665A (en) | A kind of access request processing method and processing device, a kind of calculating equipment and storage medium | |
CN105357335A (en) | DNS authority log information mining processing method | |
CN115865427B (en) | Data acquisition and monitoring method based on data routing gateway | |
CN111368858B (en) | User satisfaction evaluation method and device | |
CN116963055A (en) | Authentication method, authentication device, authentication apparatus, authentication storage medium, and authentication program product | |
CN109241458A (en) | A kind of Ad blocking method and router based on router | |
CN115865707A (en) | Internet data management system | |
CN109818782A (en) | The method that a kind of pair of server is classified | |
CN109450866A (en) | It is a kind of that library method for early warning is hit based on big data analysis | |
CN112134856B (en) | Application program disabling method, system, server and storage medium | |
CN112104765A (en) | Illegal website detection method and device | |
CN114417198A (en) | Phishing early warning method, phishing early warning device, phishing early warning system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |