CN115333816B - Method for identifying internet traffic of ipv6 campus - Google Patents

Method for identifying internet traffic of ipv6 campus Download PDF

Info

Publication number
CN115333816B
CN115333816B CN202210927974.9A CN202210927974A CN115333816B CN 115333816 B CN115333816 B CN 115333816B CN 202210927974 A CN202210927974 A CN 202210927974A CN 115333816 B CN115333816 B CN 115333816B
Authority
CN
China
Prior art keywords
network
access terminal
safety
access
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210927974.9A
Other languages
Chinese (zh)
Other versions
CN115333816A (en
Inventor
周建伟
刘奕
舒佳根
房晓阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Vocational University
Original Assignee
Suzhou Vocational University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Vocational University filed Critical Suzhou Vocational University
Priority to CN202210927974.9A priority Critical patent/CN115333816B/en
Publication of CN115333816A publication Critical patent/CN115333816A/en
Application granted granted Critical
Publication of CN115333816B publication Critical patent/CN115333816B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a method for identifying internet traffic of an ipv6 campus, which belongs to the field of network traffic, relates to a traffic identification monitoring technology, and solves the technical problems that in the prior art, a campus network cannot be safely analyzed, and meanwhile, the safety of an access end and an accessed end in the campus network cannot be monitored, so that the data safety of a terminal in the campus network is ensured, and the validity of internet traffic identification is ensured; the method comprises the steps of carrying out safety monitoring on real-time communication of a mobile access terminal connected with a campus area coverage network in real time, identifying the internet traffic of the real-time access terminal, and ensuring the monitoring performance of the access terminal, so as to ensure the internet security of the access terminal; the safety monitoring is carried out on the accessed end browsed in real time by the access end, so that the safety of the accessed end is improved, the safety of the access end is ensured, the access risk of the access end is prevented from being increased, the cheating risk of the access end corresponding to the user is effectively reduced, and the Internet surfing safety of student users is improved.

Description

Method for identifying internet traffic of ipv6 campus
Technical Field
The invention belongs to the field of network traffic, relates to a traffic identification monitoring technology, and in particular relates to a method for identifying internet traffic on an ipv6 campus.
Background
The rapid development of network technology makes the network application wider and wider, and the students' study and entertainment are not away from the support of campus network, and the data traffic of campus network outlet is larger and larger. Students access various websites through a campus network, wherein many bad websites are not spent, many students are cheated on the network every year, the bad websites are identified in the campus network, personal interests of the students can be effectively protected, and network space is purified.
In the prior art, the network used in the campus cannot be subjected to security analysis, and meanwhile, the security of an access terminal and an accessed terminal in the campus network cannot be monitored, so that the cheating risk of student users in the campus is increased;
therefore, we propose a method for identifying internet traffic on an ipv6 campus.
Disclosure of Invention
Aiming at the defects existing in the prior art, the invention aims to provide a method for identifying internet traffic of an ipv6 campus, which is used for carrying out safety monitoring on a coverage network in a campus area, accurately judging the safety of the current campus network, ensuring the data safety of a connection terminal in the campus network and simultaneously ensuring the effectiveness of internet traffic identification; the method comprises the steps of carrying out safety monitoring on real-time communication of a mobile access terminal connected with a campus area coverage network in real time, identifying the internet traffic of the real-time access terminal, and ensuring the monitoring performance of the access terminal, so as to ensure the internet security of the access terminal; the safety monitoring is carried out on the accessed end browsed in real time by the access end, so that the safety of the accessed end is improved, the safety of the access end is ensured, the access risk of the access end is prevented from being increased, the cheating risk of the access end corresponding to the user is effectively reduced, and the Internet surfing safety of student users is improved.
The technical problems to be solved by the invention are as follows:
How to effectively improve the security of the campus network, and the security of the campus network access terminal and the accessed terminal.
The aim of the invention can be achieved by the following technical scheme:
The method for identifying the internet traffic of the ipv6 campus network comprises the following steps:
Firstly, monitoring a campus network, namely performing security monitoring on a coverage network in a campus area, accurately judging the security of the current campus network, and ensuring the data security of a connection terminal in the campus network;
Secondly, safety monitoring of the access terminal, namely safety monitoring of real-time communication of a mobile access terminal connected with a campus area coverage network in real time, identification of internet traffic of the real-time access terminal, and ensuring monitoring performance of the access terminal;
Thirdly, safety monitoring is carried out on the accessed end, and safety monitoring is carried out on the accessed end browsed in real time by the access end.
As a further technical scheme of the invention, the garden network monitoring process in the first step is as follows:
Acquiring access frequency of a first-time logged-in access terminal repetition network in a campus area coverage network and increasing speed of a corresponding first-time logged-in access terminal, and marking the access frequency of the first-time logged-in access terminal repetition network in the campus area coverage network and the increasing speed of the corresponding first-time logged-in access terminal as JRP and ZJS respectively; collecting average duration of a non-first login continuous access network in a campus area coverage network, and marking the average duration of the non-first login continuous access network in the campus area coverage network as WLS;
By the formula And acquiring a safety monitoring coefficient X in the campus area coverage network.
As a further technical scheme of the invention, a1, a2 and a3 are all preset proportionality coefficients, a1 is more than a2 and more than a3 is more than 0, beta is an error correction factor, and the value is 0.996; and comparing the safety monitoring coefficient X in the campus area coverage network with a safety monitoring coefficient threshold value.
As a further technical scheme of the invention, the comparison process of the safety monitoring coefficient X and the safety monitoring coefficient threshold value in the campus area coverage network is as follows:
If the safety monitoring coefficient X in the campus area coverage network exceeds the safety monitoring coefficient threshold value, judging that the safety monitoring of the current campus area coverage network is qualified, marking the corresponding campus area coverage network as a safety network, and carrying out open connection of an access terminal on the corresponding safety network, and then carrying out the second step;
if the safety monitoring coefficient X in the campus area coverage network does not exceed the safety monitoring coefficient threshold value, judging that the safety monitoring of the current campus area coverage network is unqualified, marking the corresponding campus area coverage network as a risk network, sending an IP address of the corresponding risk network to a mobile phone terminal of a manager, after receiving the IP address of the risk network, cleaning a connecting terminal and the existing data in the risk network, and closing the access terminal connection of the risk network after cleaning.
As a further technical scheme of the invention, the specific process of access terminal safety monitoring in the second step is as follows:
After the corresponding access terminal of the secure network is connected with the secure network, the distance between the position of the traffic use terminal in the secure network and the position of the real-time access terminal and the floating frequency of the position of the real-time access terminal in the corresponding secure network are acquired when the access terminal for establishing connection generates traffic consumption in the secure network, and the distance between the position of the traffic use terminal in the secure network and the position of the real-time access terminal when the access terminal for establishing connection generates traffic consumption in the secure network and the floating frequency of the position of the real-time access terminal in the corresponding secure network are compared with the distance threshold and the position floating frequency threshold respectively.
As a further technical scheme of the invention, if the distance between the position of the traffic use terminal in the secure network and the position of the real-time access terminal exceeds the distance threshold when the access terminal which establishes connection generates traffic consumption in the secure network, or the floating frequency of the position of the real-time access terminal in the corresponding secure network exceeds the position floating frequency threshold, judging that the security detection of the corresponding access terminal in the current secure network is abnormal, connecting the corresponding access terminal of the secure network to be interrupted, and when the secure network accurately controls the real-time traffic use of the access terminal, namely the position of the access terminal can be controlled in real time, and the access terminal is re-connected into the secure network;
If the distance between the position of the traffic using terminal in the safety network and the position of the real-time access terminal does not exceed the distance threshold when the access terminal which establishes the connection generates traffic consumption in the safety network, and the floating frequency of the position of the real-time access terminal in the corresponding safety network does not exceed the position floating frequency threshold, judging that the safety detection of the corresponding access terminal in the current safety network is normal, and entering the step three.
As a further technical scheme of the invention, the safety monitoring process of the accessed end in the third step is as follows:
The access terminal passing through the security monitoring in the security network is marked as a security access terminal, the number of the connection terminals with real names and the duration of the access period corresponding to the number of the connection terminals in the accessed terminal are collected, and the number of the connection terminals with real names and the duration of the access period corresponding to the number of the connection terminals in the accessed terminal are compared with a threshold value of the number of the real-time terminals and a threshold value of the duration respectively.
As a further technical scheme of the invention, if the number of the connection terminals with real names corresponding to the accessed terminals at the safety access end exceeds a threshold value of the number of the real-time terminals and the duration of the access period corresponding to the number of the connection terminals at the accessed terminals exceeds a threshold value of the duration, the safety monitoring of the accessed terminals is judged to be qualified, and the accessed terminals and the access terminals are subjected to browse data encryption protection;
if the number of the connection terminals with real names corresponding to the accessed terminals at the safe access end does not exceed the threshold value of the number of the real-time terminals or the duration of the access period corresponding to the number of the connection terminals at the accessed terminals does not exceed the threshold value of the duration, judging that the safety monitoring of the accessed end is unqualified, and setting the data transmission between the accessed end and the access end to be unidirectional, namely, the data of the access end is not provided with access permission in the accessed end.
Compared with the prior art, the invention has the beneficial effects that:
in the invention, the coverage network in the campus area is monitored safely, the security of the current campus network is accurately judged, the data security of the connection terminal in the campus network is ensured, and the validity of the internet traffic identification is ensured; the method comprises the steps of carrying out safety monitoring on real-time communication of a mobile access terminal connected with a campus area coverage network in real time, identifying the internet traffic of the real-time access terminal, and ensuring the monitoring performance of the access terminal, so as to ensure the internet security of the access terminal; the safety monitoring is carried out on the accessed end browsed in real time by the access end, so that the safety of the accessed end is improved, the safety of the access end is ensured, the access risk of the access end is prevented from being increased, the cheating risk of the access end corresponding to the user is effectively reduced, and the Internet surfing safety of student users is improved.
Drawings
The present invention is further described below with reference to the accompanying drawings for the convenience of understanding by those skilled in the art.
Fig. 1 is a flow chart of the operation of the present invention.
Detailed Description
The technical solutions of the present invention will be clearly and completely described in connection with the embodiments, and it is obvious that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
In one embodiment, referring to fig. 1, a method for identifying internet traffic on an ipv6 campus is now provided;
Wherein, IPv6 is the abbreviation of English "InternetProtocolVersion6" (Internet protocol version 6), which is the next generation IP protocol designed by the Internet Engineering Task Force (IETF) for replacing IPv4, and the number of addresses is named as one address for each sand in the world. The biggest problem of IPv4 is that network address resources are insufficient, which severely restricts the application and development of the internet. The use of IPv6 not only solves the problem of the number of network address resources, but also solves the obstacle of connecting various access devices to the Internet. IPv6 is designed to replace IPv4, but IPv4 has long been dominant in internet traffic, and use of IPv6 has grown slowly. Currently, the percentage of users using Google services through IPv6 exceeds 40% for the first time. Moreover, the internet digital distribution agency (IANA) has proposed an Internet Engineering Task Force (IETF) to require that newly formulated internet standards only support IPv6 and are no longer compatible with IPv4;
The specific explanation is that the process of the method for identifying the online flow of the school network in the embodiment is as follows:
Firstly, monitoring a campus network, performing security monitoring on a coverage network in a campus area, accurately judging the security of the current campus network, ensuring the data security of a connection terminal in the campus network, and simultaneously ensuring the effectiveness of internet traffic identification;
Secondly, safety monitoring of the access terminal is carried out, real-time communication of the mobile access terminal connected with the campus area coverage network in real time is carried out, internet traffic of the real-time access terminal is identified, monitoring performance of the access terminal is ensured, and therefore internet surfing safety of the access terminal is ensured;
Thirdly, safety monitoring of the accessed end is carried out, and the real-time browsed accessed end of the accessed end is carried out, so that the safety of the accessed end is effectively improved, the safety of the accessed end can be ensured, the access risk of the accessed end is effectively prevented from being increased, the cheating risk of the user corresponding to the accessed end is effectively reduced, and the Internet surfing safety of student users is improved;
In this embodiment, the process of monitoring the network in the first step is as follows:
Acquiring access frequency of a first-time logged-in access terminal repetition network in a campus area coverage network and increasing speed of a corresponding first-time logged-in access terminal, and marking the access frequency of the first-time logged-in access terminal repetition network in the campus area coverage network and the increasing speed of the corresponding first-time logged-in access terminal as JRP and ZJS respectively; collecting average duration of a non-first login continuous access network in a campus area coverage network, and marking the average duration of the non-first login continuous access network in the campus area coverage network as WLS;
By the formula The method comprises the steps of obtaining a safety monitoring coefficient X in a campus area coverage network, wherein a1, a2 and a3 are preset proportional coefficients, a1 is more than a2 and more than a3 is more than 0, beta is an error correction factor, and the value of beta is 0.996 as long as the values of a1, a2, a3 and beta do not influence the positive-negative ratio relation between parameters and result values;
comparing the safety monitoring coefficient X in the campus area coverage network with a safety monitoring coefficient threshold value:
If the safety monitoring coefficient X in the campus area coverage network exceeds the safety monitoring coefficient threshold value, judging that the safety monitoring of the current campus area coverage network is qualified, marking the corresponding campus area coverage network as a safety network, and carrying out open connection of an access terminal on the corresponding safety network, and then carrying out the second step;
If the safety monitoring coefficient X in the campus area coverage network does not exceed the safety monitoring coefficient threshold value, judging that the safety monitoring of the current campus area coverage network is unqualified, marking the corresponding campus area coverage network as a risk network, sending an IP address of the corresponding risk network to a mobile phone terminal of a manager, after receiving the IP address of the risk network, cleaning a connecting terminal and the existing data in the risk network by the manager, and closing the access terminal connection of the risk network after cleaning is finished;
In this embodiment, the specific process of access security monitoring in the second step is as follows:
After the corresponding access terminal of the secure network is connected with the access terminal, the distance between the position of the traffic use terminal in the secure network and the position of the real-time access terminal and the floating frequency of the position of the real-time access terminal in the corresponding secure network are acquired when the access terminal for establishing connection generates traffic consumption in the secure network, and the distance between the position of the traffic use terminal in the secure network and the position of the real-time access terminal when the access terminal for establishing connection generates traffic consumption in the secure network and the floating frequency of the position of the real-time access terminal in the corresponding secure network are compared with the distance threshold and the floating frequency threshold respectively:
If the distance between the position of the flow using terminal in the safety network and the position of the real-time access terminal exceeds the distance threshold when the access terminal which establishes connection generates flow consumption in the safety network, or the floating frequency of the position of the real-time access terminal in the corresponding safety network exceeds the position floating frequency threshold, judging that the safety detection of the corresponding access terminal in the current safety network is abnormal, interrupting the connection of the corresponding access terminal of the safety network, and when the safety network accurately controls the use of the real-time flow of the access terminal, namely the position of the access terminal can be controlled in real time, and the access terminal is re-connected into the safety network;
if the distance between the position of the flow using terminal in the safety network and the position of the real-time access terminal does not exceed the distance threshold when the access terminal which establishes the connection generates flow consumption in the safety network, and the floating frequency of the position of the real-time access terminal in the corresponding safety network does not exceed the position floating frequency threshold, judging that the safety detection of the corresponding access terminal in the current safety network is normal, and entering the step III;
It should be specifically noted that, in the present application, the access terminal may be a mobile phone terminal of a user, or may be a network connection device such as a computer, which is not limited herein;
In this embodiment, the safety monitoring process of the accessed end in the third step is as follows:
Marking the access terminal passing through the security monitoring in the security network as a security access terminal, collecting the number of connection terminals with real names of the security access terminal corresponding to the accessed terminal and the duration of the access period corresponding to the number of connection terminals in the accessed terminal, and comparing the number of connection terminals with real names of the security access terminal corresponding to the accessed terminal and the duration of the access period corresponding to the number of connection terminals in the accessed terminal with a real-time terminal number threshold and a duration threshold respectively;
If the number of the connection terminals with real names corresponding to the accessed terminals at the safety access end exceeds a threshold value of the number of the real-time terminals and the duration of the access period corresponding to the number of the connection terminals at the accessed terminals exceeds a threshold value of the duration, judging that the safety monitoring of the accessed terminals is qualified, and carrying out encryption protection on browsing data between the accessed terminals and the access terminals;
If the number of the real-name connection terminals of the safety access terminal corresponding to the accessed terminal does not exceed the threshold value of the number of the real-time terminals or the duration of the access period corresponding to the number of the connection terminals in the accessed terminal does not exceed the threshold value of the duration, judging that the safety monitoring of the accessed terminal is unqualified, and setting the data transmission of the accessed terminal and the access terminal to be unidirectional, namely, the data of the access terminal is not provided with access permission in the accessed terminal;
the method and the device have the advantages that the accessed terminal is expressed as a network access terminal such as a website and a network platform in the prior art; the access period is expressed as a fixed access period of the access terminal to the accessed terminal.
Compared with the prior art, the invention has the beneficial effects that: the invention monitors the safety of the coverage network in the campus area, accurately judges the safety of the current campus network, ensures the data safety of the connection terminal in the campus network, and simultaneously ensures the effectiveness of internet traffic identification; the method comprises the steps of carrying out safety monitoring on real-time communication of a mobile access terminal connected with a campus area coverage network in real time, identifying the internet traffic of the real-time access terminal, and ensuring the monitoring performance of the access terminal, so as to ensure the internet security of the access terminal; the safety monitoring is carried out on the accessed end browsed in real time by the access end, so that the safety of the accessed end is improved, the safety of the access end is ensured, the access risk of the access end is prevented from being increased, the cheating risk of the access end corresponding to the user is effectively reduced, and the Internet surfing safety of student users is improved.
The formulas are all formulas with dimensions removed and numerical calculation, the formulas are formulas with a large amount of data collected for software simulation to obtain the latest real situation, and preset parameters in the formulas are set by a person skilled in the art according to the actual situation;
The formula is as follows:
Collecting a plurality of groups of sample data by a person skilled in the art and setting a corresponding rating coefficient for each group of sample data; substituting the set rating coefficient and the collected sample data into a formula, forming a binary one-time equation set by any two formulas, screening the calculated coefficient and taking an average value to obtain values a1, a2 and a3 which are respectively 1.2, 1.05 and 1.02;
The size of the coefficient is a specific numerical value obtained by quantizing each parameter, so that the subsequent comparison is convenient, and the size of the coefficient depends on the number of sample data and the corresponding humidity coefficient is preliminarily set for each group of sample data by a person skilled in the art; as long as the proportional relation between the parameter and the quantized value is not affected.
The preferred embodiments of the invention disclosed above are intended only to assist in the explanation of the invention. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. The invention is limited only by the claims and the full scope and equivalents thereof.

Claims (3)

1. The method for identifying internet traffic of the ipv6 campus is characterized by comprising the following steps of:
Firstly, monitoring a campus network, namely performing security monitoring on a coverage network in the campus area, accurately judging the security of the current campus network, ensuring the data security of a connecting terminal in the campus network, acquiring the access frequency of a first-time logged-in access terminal repetition network in the campus area coverage network and the increase speed of the corresponding first-time logged-in access terminal repetition network in the campus area coverage network, and marking the access frequency of the first-time logged-in access terminal repetition network and the increase speed of the corresponding first-time logged-in access terminal in the campus area coverage network as JRP and ZJS respectively; collecting average duration of a non-first login continuous access network in a campus area coverage network, and marking the average duration of the non-first login continuous access network in the campus area coverage network as WLS;
By the formula The method comprises the steps that safety monitoring coefficients X, a1, a2 and a3 in a campus area coverage network are all preset proportion coefficients, a1 is more than a2 and more than a3 is more than 0, beta is an error correction factor, and the value is 0.996; comparing the safety monitoring coefficient X in the campus area coverage network with a safety monitoring coefficient threshold value, if the safety monitoring coefficient X in the campus area coverage network exceeds the safety monitoring coefficient threshold value, judging that the safety monitoring of the current campus area coverage network is qualified, marking the corresponding campus area coverage network as a safety network, and carrying out open connection of an access terminal on the corresponding safety network, and entering a step two;
Secondly, safety monitoring of the access terminal, namely safety monitoring of real-time communication of a mobile access terminal connected with a campus area coverage network in real time, identifying the internet traffic of the real-time access terminal, and ensuring the monitorability of the access terminal, wherein the safety monitoring of the access terminal in the second step comprises the following specific processes:
After the corresponding access terminal of the safety network is connected with the access terminal in an open mode, after the connection is established between the safety network and the access terminal, the distance between the position of the traffic use terminal in the safety network and the position of the real-time access terminal and the floating frequency of the position of the real-time access terminal in the corresponding safety network are acquired when the access terminal for establishing the connection generates traffic consumption in the safety network, the distance between the position of the traffic use terminal in the safety network and the position of the real-time access terminal in the corresponding safety network and the floating frequency of the position of the real-time access terminal in the corresponding safety network are compared with the distance threshold and the position floating frequency threshold respectively, if the distance between the position of the traffic use terminal in the safety network and the position of the real-time access terminal in the corresponding safety network does not exceed the distance threshold when the access terminal for establishing the connection generates traffic consumption in the safety network, and the floating frequency of the position of the real-time access terminal in the corresponding safety network does not exceed the position floating frequency threshold, the corresponding access terminal in the current safety network is judged to be detected normally, and the safety detection of the corresponding access terminal in the safety network is entered into step three;
thirdly, safety monitoring is carried out on the accessed end browsed in real time by the accessed end, and the safety monitoring process of the accessed end in the third step is as follows:
Marking the access terminal passing through the security monitoring in the security network as a security access terminal, collecting the number of connection terminals with real names and the duration of access periods corresponding to the number of connection terminals in the accessed terminal, which correspond to the accessed terminal, and comparing the number of connection terminals with real names and the duration of access periods corresponding to the number of connection terminals in the accessed terminal with a threshold value of the number of the real terminals and a threshold value of the duration respectively, if the number of connection terminals with real names, which correspond to the accessed terminal, of the security access terminal exceeds the threshold value of the number of the real terminals, and the duration of access periods corresponding to the number of connection terminals in the accessed terminal exceeds the threshold value of the duration, judging that the security monitoring of the accessed terminal is qualified, and carrying out browse data encryption protection on the accessed terminal and the access terminal;
if the number of the connection terminals with real names corresponding to the accessed terminals at the safe access end does not exceed the threshold value of the number of the real-time terminals or the duration of the access period corresponding to the number of the connection terminals at the accessed terminals does not exceed the threshold value of the duration, judging that the safety monitoring of the accessed end is unqualified, and setting the data transmission between the accessed end and the access end to be unidirectional, namely, the data of the access end is not provided with access permission in the accessed end.
2. The method for identifying internet traffic on an ipv6 campus according to claim 1, wherein the comparison process of the security monitoring coefficient X and the security monitoring coefficient threshold in the campus area coverage network is as follows:
if the safety monitoring coefficient X in the campus area coverage network does not exceed the safety monitoring coefficient threshold value, judging that the safety monitoring of the current campus area coverage network is unqualified, marking the corresponding campus area coverage network as a risk network, sending an IP address of the corresponding risk network to a mobile phone terminal of a manager, after receiving the IP address of the risk network, cleaning a connecting terminal and the existing data in the risk network, and closing the access terminal connection of the risk network after cleaning.
3. The method for identifying internet traffic on an ipv6 campus according to claim 1, wherein if a distance between a location of a traffic-using terminal in a secure network and a location of a real-time access terminal exceeds a distance threshold when an access terminal establishing a connection generates traffic consumption in the secure network, or if a floating frequency of the location of the real-time access terminal in the corresponding secure network exceeds a location floating frequency threshold, determining that security detection of the corresponding access terminal in the current secure network is abnormal, interrupting connection of the corresponding access terminal in the secure network, and when the secure network accurately manages real-time traffic usage of the access terminal, that is, the location of the access terminal can be controlled in real time, and the access terminal is re-connected into the secure network.
CN202210927974.9A 2022-08-03 2022-08-03 Method for identifying internet traffic of ipv6 campus Active CN115333816B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210927974.9A CN115333816B (en) 2022-08-03 2022-08-03 Method for identifying internet traffic of ipv6 campus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210927974.9A CN115333816B (en) 2022-08-03 2022-08-03 Method for identifying internet traffic of ipv6 campus

Publications (2)

Publication Number Publication Date
CN115333816A CN115333816A (en) 2022-11-11
CN115333816B true CN115333816B (en) 2024-05-31

Family

ID=83921236

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210927974.9A Active CN115333816B (en) 2022-08-03 2022-08-03 Method for identifying internet traffic of ipv6 campus

Country Status (1)

Country Link
CN (1) CN115333816B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1610439A (en) * 2003-10-17 2005-04-27 松下电器产业株式会社 Handover method and mobile communication system
CN102172063A (en) * 2008-09-30 2011-08-31 日本电气株式会社 Access control system, access control method, and communication terminal
GB201318796D0 (en) * 2012-10-24 2013-12-11 Seven Networks Inc Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion
WO2015103984A1 (en) * 2014-01-07 2015-07-16 Tencent Technology (Shenzhen) Company Limited Network access traffic control method and server
CN106416375A (en) * 2014-01-31 2017-02-15 富士通株式会社 Access method of wireless communication network
CN107950062A (en) * 2016-06-30 2018-04-20 华为技术有限公司 A kind of method for scanning wireless fidelity network and mobile equipment
CN111371784A (en) * 2020-03-04 2020-07-03 贵州弈趣云创科技有限公司 Method for automatically fusing attacked distributed point-to-point service
CN112702316A (en) * 2020-12-10 2021-04-23 济南大学 Campus network security protection system
CN112800098A (en) * 2021-01-28 2021-05-14 温州大学 Education management information maintenance system of education platform
CN113938317A (en) * 2021-11-29 2022-01-14 福建瑞网科技有限公司 Network security monitoring method and computer equipment
CN114022988A (en) * 2021-11-05 2022-02-08 西南交通大学 Visitor information management verification system and method based on artificial intelligence
CN114066171A (en) * 2021-10-26 2022-02-18 浪潮软件科技有限公司 Service platform activity degree analysis method and system

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1610439A (en) * 2003-10-17 2005-04-27 松下电器产业株式会社 Handover method and mobile communication system
CN102172063A (en) * 2008-09-30 2011-08-31 日本电气株式会社 Access control system, access control method, and communication terminal
GB201318796D0 (en) * 2012-10-24 2013-12-11 Seven Networks Inc Optimized and selective management of policy deployment to mobile clients in a congested network to prevent further aggravation of network congestion
WO2015103984A1 (en) * 2014-01-07 2015-07-16 Tencent Technology (Shenzhen) Company Limited Network access traffic control method and server
CN106416375A (en) * 2014-01-31 2017-02-15 富士通株式会社 Access method of wireless communication network
CN107950062A (en) * 2016-06-30 2018-04-20 华为技术有限公司 A kind of method for scanning wireless fidelity network and mobile equipment
CN111371784A (en) * 2020-03-04 2020-07-03 贵州弈趣云创科技有限公司 Method for automatically fusing attacked distributed point-to-point service
CN112702316A (en) * 2020-12-10 2021-04-23 济南大学 Campus network security protection system
CN112800098A (en) * 2021-01-28 2021-05-14 温州大学 Education management information maintenance system of education platform
CN114066171A (en) * 2021-10-26 2022-02-18 浪潮软件科技有限公司 Service platform activity degree analysis method and system
CN114022988A (en) * 2021-11-05 2022-02-08 西南交通大学 Visitor information management verification system and method based on artificial intelligence
CN113938317A (en) * 2021-11-29 2022-01-14 福建瑞网科技有限公司 Network security monitoring method and computer equipment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于PKI/HIP协议的下一代互联网实名访问研究;刘华春;王建华;段华琼;;计算机工程与设计;20100416(第07期);全文 *
基于校园网的网络安全监测与控制系统的设计;李业谦;;信息记录材料;20200601(第06期);全文 *

Also Published As

Publication number Publication date
CN115333816A (en) 2022-11-11

Similar Documents

Publication Publication Date Title
CN108449342B (en) Malicious request detection method and device
CN105024969A (en) Method and device for realizing malicious domain name identification
CN105516165A (en) Method, device and system for identifying illegal proxy for charging fraud
CN106656666B (en) Method and device for acquiring first screen time of webpage
CN115134099B (en) Network attack behavior analysis method and device based on full flow
CN110071932A (en) A kind of security access system and method
CN106789413B (en) Method and device for detecting proxy internet surfing
CN111654486A (en) Server equipment judgment and identification method
CN115333816B (en) Method for identifying internet traffic of ipv6 campus
CN112449371A (en) Performance evaluation method of wireless router and electronic equipment
CN111565196B (en) KNXnet/IP protocol intrusion detection method, device, equipment and medium
CN105528352A (en) Method for establishing corresponding relation of mobile communication user and network account information thereof
Wang et al. Smart devices information extraction in home wi‐fi networks
CN109309665A (en) A kind of access request processing method and processing device, a kind of calculating equipment and storage medium
CN105357335A (en) DNS authority log information mining processing method
CN115865427B (en) Data acquisition and monitoring method based on data routing gateway
CN111368858B (en) User satisfaction evaluation method and device
CN116963055A (en) Authentication method, authentication device, authentication apparatus, authentication storage medium, and authentication program product
CN109241458A (en) A kind of Ad blocking method and router based on router
CN115865707A (en) Internet data management system
CN109818782A (en) The method that a kind of pair of server is classified
CN109450866A (en) It is a kind of that library method for early warning is hit based on big data analysis
CN112134856B (en) Application program disabling method, system, server and storage medium
CN112104765A (en) Illegal website detection method and device
CN114417198A (en) Phishing early warning method, phishing early warning device, phishing early warning system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant