CN116389416A - Massive IPv6 address identification method, system, electronic equipment and storage medium - Google Patents
Massive IPv6 address identification method, system, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN116389416A CN116389416A CN202111494912.5A CN202111494912A CN116389416A CN 116389416 A CN116389416 A CN 116389416A CN 202111494912 A CN202111494912 A CN 202111494912A CN 116389416 A CN116389416 A CN 116389416A
- Authority
- CN
- China
- Prior art keywords
- ipv6
- address
- values
- surviving
- identifying
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/50—Reducing energy consumption in communication networks in wire-line communication networks, e.g. low power modes or reduced link rate
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present disclosure provides a method for identifying massive IPv6 addresses, including: s1, acquiring an IPv6 data stream, and acquiring a first address set with non-zero flow from the IPv6 data stream; s2, sequencing the number of the values of the fixed fields in the first address set to obtain N values with the largest number; s3, respectively replacing the values with the maximum N numbers into fixed fields in the first address set to obtain N groups of second address sets; and S4, carrying out address survival identification on the N groups of second address sets to obtain the survival IPv6 address. According to the mass IPv6 address identification method, system, electronic equipment and storage medium, according to the IPv6 characteristics, the number of the values of the fixed fields in the first address set is ordered, the values with the largest number N are respectively replaced into the fixed fields in the first address set, a new IPv6 address set is formed, so that the number of IPv6 active users in any area can be counted more rapidly, and the accuracy and the effectiveness of IP resource management are improved.
Description
Technical Field
The disclosure relates to the field of communication, in particular to a method, a system, electronic equipment and a storage medium for identifying massive IPv6 addresses.
Background
The industrial and informative sector issues 2021 work arrangement (hereinafter referred to as notification) for deep-advanced IPv6 scale deployment and application, month 6 of 2021. The notification clearly shows that by the end of 2021, the network bearing capacity is obviously enhanced, and the key index of the IPv6 network is not inferior to IPv4 by the end of 2021. The IPv6 transformation is basically completed by application infrastructures such as a data center, a content distribution network, a cloud platform, a domain name resolution system and the like. The newly marketed home wireless router supports and defaults to turn on IPv6 functionality. More than 30 IPv6 technical innovations and fusion application test point items are deployed. The number of IPv6 active users reaches 5.5 hundred million, and the number of IPv6 connections of the Internet of things reaches 5000 ten thousand. The IPv6 traffic ratio of the mobile network reaches 20%, and the IPv6 traffic ratio of the metropolitan area network reaches 5%. The IPv6 supporting rate of government portal sites above county level reaches 70%, and the IPv6 supporting rate of domestic main commercial websites and mobile Internet application reaches 60%. It is imperative to identify available assets for IPv 6.
Disclosure of Invention
Aiming at the defects existing in the prior art, the invention provides a method, a system, electronic equipment and a storage medium for identifying massive IPv6 addresses, which can rapidly count the number of IPv6 active users in any area.
The invention provides a method for identifying massive IPv6 addresses, which comprises the following steps: s1, acquiring an IPv6 data stream, and acquiring a first address set with non-zero flow from the IPv6 data stream; s2, sequencing the number of the values of the fixed fields in the first address set to obtain N values with the largest number; s3, respectively replacing the values with the maximum N numbers into fixed fields in the first address set to obtain N groups of second address sets; and S4, carrying out address survival identification on the N groups of second address sets to obtain the survival IPv6 address.
Optionally, the IPv6 data flow collected in step S1 originates from a router or a switch; the method for collecting IPv6 data flow comprises the following steps: configuring a flow analysis tool Netflow on a router or a switch, starting the flow analysis tool Netflow, and collecting the IPv6 data flow; the acquired IPv6 data flow includes: source IP, destination IP, ingress traffic and egress traffic.
Optionally, the fixed field is the last 16 bits of the IPv6 address.
Optionally, N is 10.
Optionally, asset detection is performed on the surviving IPv6 address, which includes: s101, acquiring an asset detection task; s102, extracting a scanning type and a detection strategy corresponding to the scanning type which are included in an asset detection task; s103, identifying the surviving assets based on the scanning type and the detection strategy.
Optionally, the method further comprises identifying the surviving IPv6 address so as to facilitate subsequent reading of the IPv6 address information and classifying according to the address information.
Optionally, the identifying the surviving IPv6 address includes identifying a country, province and city, organization, AS number and purpose to which the IPv6 address belongs, so AS to facilitate subsequent reading of the address information of the IPv6 address, and classifying according to the address information.
The invention also provides a massive IPv6 address identification system, which comprises: the acquisition module is used for acquiring the identification information of the IPv6 data stream and the address thereof; a first extraction module, configured to obtain a first address set with a flow that is non-zero from the IPv6 data flow; the analysis module is used for sequencing the number of the values of the fixed fields in the first address set and obtaining N values with the largest number; the integration module is used for respectively replacing the N values with the largest quantity into fixed fields in the first address set to obtain N groups of second address sets; the second extraction module is used for carrying out address survival identification on the N groups of second address sets and extracting the surviving IPv6 addresses; the acquisition module, the first extraction module, the analysis module, the integration module and the second extraction module are sequentially connected.
The invention also provides a computer readable storage medium storing computer executable instructions which, when executed, are adapted to carry out the method of any one of claims 1 to 5.
The invention also provides an electronic device, comprising: one or more processors; a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-5.
According to the method, the system, the electronic equipment and the storage medium for identifying the massive IPv6 addresses, disclosed by the invention, according to the IPv6 characteristics, the number of the values of the fixed fields in the first address set is sequenced, and the values with the largest N numbers are respectively replaced into the fixed fields in the first address set to form a new IPv6 address set, so that the number of the IPv6 active users in any area can be counted more rapidly, and the accuracy and the effectiveness of IP resource management are improved.
Drawings
FIG. 1 schematically illustrates a flow chart of a method of massive IPv6 address identification according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a block diagram of a massive IPv6 address identification system according to an embodiment of the present disclosure;
fig. 3 schematically illustrates a structural schematic diagram of an electronic device according to an embodiment of the present disclosure;
in the figure, the acquisition module-410, the first extraction module-420, the analysis module-430, the integration module-440, the second extraction module-450, the processor-510, the memory-520 and the program-521 are provided.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
Fig. 1 schematically illustrates a flow chart of a method of massive IPv6 address identification according to an embodiment of the present disclosure.
The embodiment of the disclosure provides a method for identifying massive IPv6 addresses, as shown in fig. 1, comprising the following steps:
s1, acquiring an IPv6 data stream, and acquiring a first address set with non-zero flow from the IPv6 data stream;
in the above step S1, the collected IPv6 data flow originates from a router or a switch.
The method for collecting IPv6 data flow comprises the following steps: configuring a flow analysis tool Netflow on a router or a switch; and starting a flow analysis tool Netflow, and collecting the IPv6 data flow.
The acquired IPv6 data flow includes: source IP, destination IP, ingress traffic and egress traffic. The source IP is the source IP of the data stream, and the destination IP receives the IP of the data party. The output flow refers to the flow of the data packet sent by the equipment or the website and the like corresponding to the IPv6 address; the ingress flow is the flow of the data packet corresponding to the device or the website corresponding to the IPv6 address, which is sent when responding, and the ingress flow is only used for condition judgment and is not counted in the IPv6 address set.
And eliminating IPv6 addresses with zero outgoing traffic or incoming traffic, and finishing the rest IPv6 addresses into a first address set.
The remaining address numbers are counted after the address set with the flow of 0 is removed, and the ratio statistics of the remaining address numbers are as follows:
total number of IP | Total number of active addresses | Active duty cycle (%) | |
Measurement 1 | 1165618636 | 237088168 | 20.34% |
Measurement 2 | 1100157381 | 210645387 | 19.15% |
Measurement 3 | 958901876 | 194882062 | 20.32% |
As shown in the table above, the first address set in measurement 1 is the total number of active addresses 237088168, the first address set in measurement 2 is the total number of active addresses 210645387, and the first address set in measurement 3 is the total number of active addresses 194882062.
S2, sequencing the number of the values of the fixed fields in the first address set to obtain N values with the largest number;
wherein the fixed field is the last 16 bits of the IPv6 address, and ordering the number of values of the fixed field in the first address set includes: counting probability distribution conditions of 16 bits after IPv6 addresses in a first address set, and selecting the 16 bits after the IPv6 addresses with probability of N items before ranking; since the IPv6 address binary representation has 128 bits, the next 16 bits are: 0000 0000 0000 0000 to 1111 1111 1111 1111, expressed in 16: 0000-ffff.
The probability distribution of 16 bits after IPv6 is counted as follows:
s3, replacing the values of the fixed fields of the M IPv6 addresses in the first address set with the values of the fixed fields of the IPv6 addresses of the N items with probability duty ratios, forming M.times.N IPv6 addresses, and finishing the M.times.N IPv6 addresses into a second address set.
Wherein N is 10. That is, the probability duty cycle should be 16 bits after the IPv6 address of the top N terms: 0000;0002;0001;0006;0003;0004;0020;0009;0010;0008.
suppose that the first address set includes 2001: da8:6030:3: :2 and 2001: da8:6026: :1 two IPv6 addresses, then "0000" will be used; 0002;0001;0006;0003;0004;0020;0009;0010;0008 "substitution 2001: da8:6030:3: : the last 16 bits in 2, get the first set of addresses:
2001:da8:6030:3::
2001:da8:6030:3::2
2001:da8:6030:3::1
2001:da8:6030:3::6
2001:da8:6030:3::3
2001:da8:6030:3::4
2001:da8:6030:3::20
2001:da8:6030:3::5
2001:da8:6030:3::9
2001:da8:6030:3::10
"0000;0002;0001;0006;0003;0004;0020;0009;0010;0008 "substitution 2001: da8:6026: : the last 16 bits in 1, a second set of addresses:
2001:da8:6026::
2001:da8:6026::2
2001:da8:6026::1
2001:da8:6026::6
2001:da8:6026::3
2001:da8:6026::4
2001:da8:6026::20
2001:da8:6026::5
2001:da8:6026::9
2001:da8:6026::10
in summary, the second address set should include the following IPv6 addresses:
2001:da8:6030:3::
2001:da8:6030:3::2
2001:da8:6030:3::1
2001:da8:6030:3::6
2001:da8:6030:3::3
2001:da8:6030:3::4
2001:da8:6030:3::20
2001:da8:6030:3::5
2001:da8:6030:3::9
2001:da8:6030:3::10
2001:da8:6026::
2001:da8:6026::2
2001:da8:6026::1
2001:da8:6026::6
2001:da8:6026::3
2001:da8:6026::4
2001:da8:6026::20
2001:da8:6026::5
2001:da8:6026::9
2001:da8:6026::10
and S4, performing address survival identification on the second address set to obtain a survived IPv6 address.
Comprising the following steps: and judging whether the IPv6 addresses in the second address set survive or not through a detection tool nmap.
That is, filtering the IPv6 address by the detection tool, and filtering the non-surviving IPv6 address. The detection tool nmap is a Network Mapper. The basic functions are three, namely detecting whether a group of hosts are online; secondly, scanning a host port and sniffing the provided network service; the operation system used by the host can also be inferred, whether the IPv6 address survives or not can be detected by the operation system, the ping scanning can be performed, the host responding to the scanning is printed out, and the like, and the detection tool nmap is used in the prior art and is not described in detail herein. In addition, the embodiment of the application does not limit the tools for detecting whether the IPv6 address survives, and only needs to judge the survival of the IPv6 address.
Then, the first set of number test results are as follows:
IPv6 address | Whether or not to survive |
2001:da8:6030:3:: | Whether or not |
2001:da8:6030:3::2 | Is that |
2001:da8:6030:3::1 | Is that |
2001:da8:6030:3::6 | Whether or not |
2001:da8:6030:3::3 | Whether or not |
2001:da8:6030:3::4 | Is that |
2001:da8:6030:3::20 | Whether or not |
2001:da8:6030:3::5 | Whether or not |
2001:da8:6030:3::9 | Whether or not |
2001:da8:6030:3::10 | Whether or not |
The second set of number test results are as follows:
IPv6 address | Whether or not to survive |
2001:da8:6026:: | Whether or not |
2001:da8:6026::2 | Is that |
2001:da8:6026::1 | Is that |
2001:da8:6026::6 | Whether or not |
2001:da8:6026::3 | Is that |
2001:da8:6026::4 | Whether or not |
2001:da8:6026::20 | Whether or not |
2001:da8:6026::5 | Whether or not |
2001:da8:6026::9 | Whether or not |
2001:da8:6026::10 | Whether or not |
According to the test method, hit rate of 30% exists in each detection, IPv6 is quickly identified and survived according to probability distribution, and the problems that IPv6 addresses are huge and quick identification is difficult are solved.
S5, performing asset detection on the surviving IPv6, wherein the asset detection method comprises the following steps of:
s101, acquiring an asset detection task.
The asset detection task is created within a detection range, which may be the local area network range of the enterprise, the network range where each device set in the factory is located, etc. The assets include all devices of computers, routers, printers, etc. that access the network. The asset detection tasks may be pre-established, e.g., periodically performing asset detection, etc.; it may also be established in real time, for example, immediately upon a user's need to know current asset information, etc.
S102, extracting a scanning type and a detection strategy corresponding to the scanning type, which are included in the asset detection task.
The asset detection task at least includes a scanning type, a scanning time, a scanning packet sending speed, and an asset detection result storage path, and of course, other task information may also be included, which is not limited in detail in the embodiment of the present disclosure. It should be noted that each probe information in the asset detection task may be customized.
The scanning type can indicate a detection survival address, and the asset detection task further comprises a detection network segment; the scan type may also indicate that surviving hosts and surviving ports are detected, where the asset detection task further includes a detection network segment and a port range; the scan type may also indicate that surviving addresses, surviving ports, and service fingerprints are detected, where the asset detection task also includes detection network segments, port ranges, and service fingerprints.
Since the scan type indicates one or more of a probe surviving address, a surviving port, and a service fingerprint, its corresponding probe policy may be set based on different scan types and included in the asset probe task in association with the scan type, thereby enabling the surviving asset to be identified based on the scan type and the probe policy corresponding to the scan type after the asset probe task is acquired.
S103, identifying the surviving assets based on the scanning type and the detection strategy.
After extracting the scan type and the detection policy, surviving assets are identified based on the scan type and the detection policy. Where a surviving asset refers to a device in operation among all devices accessing the network.
The embodiment of the disclosure can customize the scanning type, further complete the identification of the surviving asset according to the detection strategy corresponding to the scanning type included in the asset detection task, solve the problem of limited detection range, and be suitable for asset detection under various business scenes; meanwhile, by detecting one or more of the surviving host, the surviving port and the service fingerprint, the accuracy of the detection result is improved.
In the case where the scan type indicates a probe surviving host, S103 includes: and sending a first detection message to an IP address in a detection network segment contained in the detection strategy, determining that the host corresponding to the IP address responding to the first detection message is a surviving host, and then determining that the asset to which the surviving host belongs is a surviving asset.
In the case where the scan type indicates to probe the surviving host and the surviving port, S103 includes: sending a first detection message to an IP address in a detection network segment contained in the detection strategy; determining that the host corresponding to the IP address responding to the first detection message is a surviving host; sending a second detection message to a port corresponding to the surviving host and in a port range, wherein the detection strategy comprises the port range; determining the port responding to the second detection message as a survival port; and determining the asset to which the survival port belongs as a survival asset.
S6, identifying the surviving IPv6, including identifying the country, province and city, organization, AS number and purpose (open port service) of the IPv6 address, and displaying part of data AS follows:
by doing so, the address information of IPv6 can be conveniently read later, and classification can be carried out according to the address information.
Fig. 2 schematically illustrates a structural diagram of a massive IPv6 address identification system according to an embodiment of the present disclosure.
A massive IPv6 address identification system, as shown in fig. 2, comprising:
the acquisition module 410 is configured to acquire identification information of an IPv6 data stream and an address thereof;
a first extracting module 420, configured to obtain a first address set with a non-zero flow from the IPv6 data flow;
an analysis module 430, configured to sort the number of values of the fixed field in the first address set, and obtain N values with the largest number;
the integration module 440 is configured to replace the N most numerous values into fixed fields in the first address set, to obtain N groups of second address sets;
a second extracting module 450, configured to perform address survival identification on the N groups of second address sets, and extract a surviving IPv6 address;
the collection module 410, the first extraction module 420, the analysis module 430, the integration module 440, and the second extraction module 450 are sequentially connected.
A computer readable storage medium storing computer executable instructions which when executed are adapted to implement a method of identifying a massive IPv6 address as described above.
The computer-readable storage medium may be included in the apparatus/device/system described in the above embodiments or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present invention.
Fig. 3 schematically illustrates a structural schematic diagram of an electronic device according to an embodiment of the present disclosure.
An electronic device, comprising: one or more processors 510; and a memory 520 for storing one or more programs 521, wherein the one or more programs 521, when executed by the one or more processors 510, cause the one or more processors 510 to implement a method for identifying a massive IPv6 address.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
While the foregoing is directed to embodiments of the present invention, other and further details of the invention may be had by the present invention, it should be understood that the foregoing description is merely illustrative of the present invention and that no limitations are intended to the scope of the invention, except insofar as modifications, equivalents, improvements or modifications are within the spirit and principles of the invention.
Claims (10)
1. The method for identifying the massive IPv6 addresses is characterized by comprising the following steps of:
s1, acquiring an IPv6 data stream, and acquiring a first address set with non-zero flow from the IPv6 data stream;
s2, sequencing the number of the values of the fixed fields in the first address set to obtain N values with the largest number;
s3, respectively replacing the values with the maximum N numbers into fixed fields in the first address set to obtain N groups of second address sets;
and S4, carrying out address survival identification on the N groups of second address sets to obtain the survival IPv6 address.
2. The method for identifying massive IPv6 addresses according to claim 1, wherein the IPv6 data flow collected in step S1 originates from a router or a switch; the method for collecting IPv6 data flow comprises the following steps: configuring a flow analysis tool Netflow on a router or a switch, starting the flow analysis tool Netflow, and collecting the IPv6 data flow; the acquired IPv6 data flow includes: source IP, destination IP, ingress traffic and egress traffic.
3. The method of claim 1, wherein the fixed field is the last 16 bits of the IPv6 address.
4. The method for identifying massive IPv6 addresses according to claim 1, wherein N is 10.
5. The method of mass IPv6 address identification of claim 1, further comprising asset exploration of the surviving IPv6 addresses, comprising:
s101, acquiring an asset detection task;
s102, extracting a scanning type and a detection strategy corresponding to the scanning type which are included in an asset detection task;
s103, identifying the surviving assets based on the scanning type and the detection strategy.
6. The method of claim 1, further comprising identifying the surviving IPv6 addresses to facilitate subsequent reading of IPv6 address information and classifying according to the address information.
7. The method of claim 6, wherein identifying surviving IPv6 addresses includes identifying the country, province, city, organization, AS number, and use to which the IPv6 addresses belong to facilitate subsequent reading of the IPv6 address information and classification according to the address information.
8. A massive IPv6 address identification system, comprising:
the acquisition module (410) is used for acquiring the identification information of the IPv6 data stream and the address thereof;
a first extraction module (420) configured to obtain a first address set with a non-zero traffic from the IPv6 data flow;
an analysis module (430) configured to sort the number of values of the fixed fields in the first address set, and obtain N values with the largest number;
an integration module (440) for replacing the N most numerous values into fixed fields in the first address set, respectively, to obtain N groups of second address sets;
a second extracting module (450) for performing address survival identification on the N groups of second address sets, and extracting surviving IPv6 addresses;
the acquisition module (410), the first extraction module (420), the analysis module (430), the integration module (440) and the second extraction module (450) are sequentially connected.
9. A computer readable storage medium, characterized in that computer executable instructions are stored, which instructions, when executed, are for implementing the method of any of claims 1 to 5.
10. An electronic device, comprising:
one or more processors (510);
a memory (520) for storing one or more programs (521),
wherein the one or more programs (521), when executed by the one or more processors (510), cause the one or more processors (510) to implement the method of any of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111494912.5A CN116389416A (en) | 2021-12-08 | 2021-12-08 | Massive IPv6 address identification method, system, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111494912.5A CN116389416A (en) | 2021-12-08 | 2021-12-08 | Massive IPv6 address identification method, system, electronic equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116389416A true CN116389416A (en) | 2023-07-04 |
Family
ID=86975500
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111494912.5A Pending CN116389416A (en) | 2021-12-08 | 2021-12-08 | Massive IPv6 address identification method, system, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116389416A (en) |
-
2021
- 2021-12-08 CN CN202111494912.5A patent/CN116389416A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106534392B (en) | Positioning information acquisition method, positioning method and device | |
Plonka et al. | Temporal and spatial classification of active IPv6 addresses | |
TWI639324B (en) | Method and device for determining IP address segment and its corresponding latitude and longitude | |
CN107342913B (en) | Detection method and device for CDN node | |
CN106789242B (en) | Intelligent identification application analysis method based on mobile phone client software dynamic feature library | |
CN110245273B (en) | Method for acquiring APP service feature library and corresponding device | |
Zander et al. | Capturing ghosts: Predicting the used IPv4 space by inferring unobserved addresses | |
Tajalizadehkhoob et al. | Apples, oranges and hosting providers: Heterogeneity and security in the hosting market | |
CN105704259B (en) | A kind of domain name authority services source IP recognition methods and system | |
CN106301980A (en) | A kind of brush amount tool detection method and apparatus | |
CN104468107A (en) | Method and device for verification data processing | |
JP2020503775A (en) | DDoS attack detection method and device | |
CN106067879B (en) | The detection method and device of information | |
CN107426132A (en) | The detection method and device of network attack | |
Gharaibeh et al. | Assessing co-locality of IP blocks | |
CN117424743A (en) | Data processing method and device, electronic equipment and storage medium | |
CN108650145A (en) | Phone number characteristic automatic extraction method under a kind of home broadband WiFi | |
CN116389416A (en) | Massive IPv6 address identification method, system, electronic equipment and storage medium | |
Li et al. | A complete evaluation of the Chinese IP geolocation databases | |
CN108063764B (en) | Network traffic processing method and device | |
CN111106980B (en) | Bandwidth binding detection method and device | |
CN110995887B (en) | ID association method and device | |
CN106789411B (en) | Method and device for acquiring active IP data in machine room | |
CN104965851A (en) | System and method for analyzing data | |
CN111163184B (en) | Method and device for extracting message features |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |