CN117118816A - Method, device, equipment and medium for realizing network tool - Google Patents

Method, device, equipment and medium for realizing network tool Download PDF

Info

Publication number
CN117118816A
CN117118816A CN202210596667.7A CN202210596667A CN117118816A CN 117118816 A CN117118816 A CN 117118816A CN 202210596667 A CN202210596667 A CN 202210596667A CN 117118816 A CN117118816 A CN 117118816A
Authority
CN
China
Prior art keywords
message
server
client
application
test
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210596667.7A
Other languages
Chinese (zh)
Inventor
刘帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Cyber Tianjin Co Ltd
Original Assignee
Tencent Cyber Tianjin Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Cyber Tianjin Co Ltd filed Critical Tencent Cyber Tianjin Co Ltd
Priority to CN202210596667.7A priority Critical patent/CN117118816A/en
Publication of CN117118816A publication Critical patent/CN117118816A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0677Localisation of faults
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors
    • H04L43/0829Packet loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • H04L43/087Jitter
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/12Network monitoring probes

Abstract

The application discloses a method, a device, equipment and a medium for realizing a network tool, relates to the technical field of computers, and particularly relates to the technical field of computer networks. The method comprises the following steps: intercepting a first message between a client of an application to be tested and a server, wherein the first message is sent to the server by the client or sent to the client by the server; determining a test parameter corresponding to the first message according to the protocol type of the first message and policy record information, wherein the policy record information comprises a plurality of protocol types and the test parameter corresponding to each protocol type in the plurality of protocol types; determining a processing strategy according to the test parameters; and processing the first message according to the processing strategy, and determining the running state of the application after the first message is processed. When the application is tested, the message is processed in a targeted mode by adopting the test parameters matched according to the protocol type of the message, so that the comprehensiveness and reliability of the test are improved, the test requirement of the application is better met, and the problem positioning can be simply and conveniently realized.

Description

Method, device, equipment and medium for realizing network tool
Technical Field
The present disclosure relates generally to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a medium for implementing a network tool.
Background
Software products, such as applications, often need to be tested after development is completed, in order to find out whether there are problems such as program errors, running defects, etc., and weak network testing is a basic test item, for example: whether the application has a problem in a network environment with too high network delay is tested.
In the related art, the weak network test is usually implemented by setting a delay time and a packet loss rate, and then implementing an application test according to the delay time and the packet loss rate, for example: and carrying out random packet loss on the data packets during interaction between the client of the application and the server of the application, and determining whether the application has problems of program errors, running defects and the like according to the running condition of the application after the packet loss.
The following technical problems exist: because the test mode of random packet loss is adopted, the test of the application can not be realized for each data packet, so that the test is incomplete, and although some program errors, operation defects and the like can be found, the program errors and the operation defects caused by the fact that the same data packet is discarded are difficult to reproduce, and the problem positioning is difficult. In addition, the whole test process adopts a random packet loss test mode, namely: the test mode is single, and the test requirement can not be well met.
Disclosure of Invention
In view of the above-mentioned drawbacks or shortcomings in the prior art, it is desirable to provide a method, an apparatus, a device and a medium for implementing a network tool, in which, during application testing, test parameters matched according to protocol types of any message are adopted to process the message in a targeted and different manner, so as to improve the comprehensiveness and reliability of the test, better meet the test requirements of the application, and simply and conveniently implement problem positioning.
In a first aspect, the present application provides a method for implementing a network tool, where the method includes: intercepting a first message between a client and a server of an application to be tested, wherein the first message is sent to the server by the client or sent to the client by the server; determining a test parameter corresponding to the first message according to the protocol type of the first message and policy record information, wherein the policy record information comprises a plurality of protocol types and the test parameter corresponding to each protocol type in the plurality of protocol types; determining a processing strategy according to the test parameters, wherein different test parameters correspond to different processing strategies; and processing the first message according to the processing strategy, and determining the running state of the application after the first message is processed.
In a second aspect, the present application provides an implementation apparatus of a network tool, where the apparatus includes: the system comprises an interception unit, a first message generation unit and a second message generation unit, wherein the interception unit is used for intercepting a first message between a client side and a server side of an application to be tested, and the first message is sent to the server side by the client side or is sent to the client side by the server side; a selection unit, configured to determine a test parameter corresponding to the first message according to a protocol type of the first message and policy record information, where the policy record information includes a plurality of protocol types and a test parameter corresponding to each protocol type in the plurality of protocol types; the strategy determining unit is used for determining a processing strategy according to the test parameters, wherein different test parameters correspond to different processing strategies; and the testing unit is used for processing the first message according to the processing strategy and determining the running state of the application after the first message is processed.
In a possible implementation manner of the second aspect, the test unit is specifically configured to: when the processing strategy is packet loss operation, carrying out packet loss processing on the first message; or when the processing strategy is a delay operation, forwarding the first message after the delay time; or when the processing strategy is a network disconnection operation, discarding the first message, and disconnecting the communication between the client and the server.
In a possible implementation manner of the second aspect, when the test unit determines that the operation is a delay operation according to the test parameter, the first message is forwarded after a delay time, specifically: starting timing by intercepting the first message; and when the timing time reaches the delay time, forwarding the first message according to a destination IP address and a port number, wherein the destination IP address and the port number are obtained by analyzing a message header of the first message.
In a possible implementation manner of the second aspect, the test unit is specifically configured to: obtaining the delay time according to a default time parameter; alternatively, the delay time is generated from a random number.
In a possible implementation manner of the second aspect, the test unit disconnects communication between the client and the server, specifically: executing a closing operation of a connection object to close the connection object, wherein the connection object is an object used for communicating with the server side in the client side; or executing the deleting operation of the connection object to delete the connection object.
In a possible implementation manner of the second aspect, the intercepting unit is further configured to, after the testing unit disconnects the communication between the client and the server: intercepting a second message, and when the discarding frequency of the second message reaches a preset frequency, releasing the second message intercepted again, wherein the test unit is further used for discarding the second message when the intercepting unit intercepts the second message, and the second message comprises a reconnection request after communication between the client and the server is disconnected.
In a possible implementation manner of the second aspect, the method further includes: a configuration unit, configured to receive a first input of an interception condition configuration item before the interception unit intercepts a first message; and determining the message to be intercepted according to the first input.
In a possible implementation manner of the second aspect, the configuration unit is further configured to receive a second input of the interception condition configuration item; obtaining target interception times of the message according to the second input; the interception unit is used for releasing the message when the interception times of the message reach the target interception times.
In a possible implementation manner of the second aspect, the method further includes: the log unit is used for obtaining log information according to the first message intercepted by the interception unit, wherein the log information comprises the protocol type of the first message, the interception time of the first message and the running state of the application after the first message is processed; and writing the log information into a log file.
In a third aspect, embodiments of the present application provide a computer device including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing a method for implementing a network tool as described in embodiments of the present application when the program is executed by the processor.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements a method for implementing a network tool as described in embodiments of the present application.
According to the method, the device, the equipment and the medium for realizing the network tool, after any message interacted between the client side of the application and the server side of the application is intercepted, the matched test parameters are selected from the strategy record information according to the protocol type of the message, and then the message is processed according to the matched test parameters to obtain the targeted processing strategy. In addition, the application test can be carried out through each message, the comprehensiveness and the reliability of the test are ensured, and after the application test is carried out through a certain message, the application test passing through the message can be reproduced, so that the problem can be conveniently and simply positioned.
Therefore, the application can test the application in a targeted manner through any message, and compared with the prior art, such as a mode of realizing the application test according to the delay time and the packet loss rate, the application improves the comprehensiveness and the reliability of the test, better meets the test requirement of the application, and can simply and conveniently realize the positioning of the problem.
Additional aspects and advantages of the application will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the application.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments, made with reference to the accompanying drawings in which:
fig. 1 is a flow chart of an implementation method of a network tool according to an embodiment of the present application;
FIG. 2 is a schematic diagram of interaction between a client and a server for character login in a game application according to an embodiment of the present application;
FIG. 3 is a schematic diagram of testing a client and a server of a game application according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an implementation device of a network tool according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The application is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be noted that, for convenience of description, only the portions related to the application are shown in the drawings.
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
The application provides a method, a device, equipment and a storage medium for realizing a network tool, which are used for describing an application, wherein the application refers to an application program adopting a C/S (Client-Server) architecture, and the C/S architecture is totally called a Client/Server (service end) architecture, and is a network architecture, wherein a Client is a personal computer device, a mobile terminal or a workstation and the like for running the application program by a user, and the Client is required to acquire resources by means of the Server. The C/S architecture reduces network traffic by providing query responses rather than total file transfers. Allowing multiple users to update to the shared database through GUI (graphical user interface ) front-ends, communication between clients and servers typically employs remote invocation (RPC) or Standard Query Language (SQL) statements.
At present, when an application is subjected to weak network test, application performance of the application in a weak network state is usually tested in a mode of random packet loss, and the application test can not be realized for each data packet, so that the test is incomplete, program errors and operation defects caused by discarding the same data packet are difficult to reproduce, and the problem positioning is difficult. In addition, the test mode is single, and the test requirement can not be well met.
Wherein weak network testing generally refers to: whether a problem occurs in the running process of the test application in a network environment with too high network delay and the like, and a weak network generally refers to network conditions such as poor network state, too high delay, network jitter, too high packet loss rate, limited bandwidth and the like.
Based on the above, the application provides a method, a device, equipment and a storage medium for realizing a network tool, which adopt test parameters matched according to the protocol type of any message to process the message in a targeted and different mode when the application is tested, thereby improving the comprehensiveness and reliability of the test, better meeting the test requirement of the application, and simply and conveniently realizing the positioning of the problem.
According to the implementation environment of the embodiment of the application, first messages between the client and the server of the application to be tested can be intercepted by personal computer equipment, a mobile terminal, a workstation and the like; determining a test parameter corresponding to the first message according to the protocol type of the first message and policy record information, wherein the policy record information comprises a plurality of protocol types and the test parameter corresponding to each protocol type in the plurality of protocol types; and processing the first message according to the test parameters, and determining the running state of the application after the first message is processed.
Alternatively, the method can be implemented by a server (i.e. a server side), for example: the personal computer equipment, the mobile terminal or the workstation sends a request to a server, and the server intercepts a first message between a client side and a server side of an application to be tested; determining a test parameter corresponding to the first message according to the protocol type of the first message and policy record information, wherein the policy record information comprises a plurality of protocol types and the test parameter corresponding to each protocol type in the plurality of protocol types; and processing the first message according to the test parameters, and determining the running state of the application after the first message is processed.
The server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, a content distribution network (content delivery network, CDN), basic cloud computing services such as big data and an artificial intelligent platform.
The embodiment of the application provides a method for realizing a network tool, which can be applied to personal computer equipment, a mobile terminal or a workstation, and the like, namely: the network tool can be applied to personal computer equipment, mobile terminals or workstations and the like for network testing of applications. As shown in fig. 1, the method comprises the steps of:
101. And intercepting a first message between the client side and the server side of the application to be tested, wherein the first message is sent to the server side by the client side or sent to the client side by the server side.
In the running process of the application, the client side and the server side communicate with each other, namely: the first message is any one of the protocol messages, for example, a connection protocol message for establishing communication connection between the client and the server, or a data protocol message interacted when the client and the server realize various application functions.
Each message is interacted with by a protocol, and different messages may be transmitted between the client and the server using different protocols, for example: some messages are sent by clients to clients or clients by using the Request protocol and Response protocol, and some messages are sent by clients to clients or clients by using the Report protocol or the Notice protocol. Of course, the Request protocol and Response, report protocol or note described above are only examples, and other possible protocols may be used to send messages from the client to the server, or from the server to the client.
In a specific application, the function of intercepting the first message between the client and the server of the application to be tested can be integrated on the client, so that the client intercepts the message before the message arrives at the server each time when the client performs network interaction with the server, or intercepts the message transmitted by the server each time when the client does not arrive at the client.
In the above description, the application may be a variety of application programs employing a C/S architecture, for example: some online games, the client is a game client, the server is a game server, for example, a game jockey glows, the client is a jockey glows game client, the server is a jockey glows game server, the jockey glows game client can be installed on a personal smart phone, after the game client on the smart phone is started, a game playing function is realized on the smart phone through communication between the game client and the jockey glows game server.
102. And determining the test parameters corresponding to the first message according to the protocol type of the first message and the strategy record information, wherein the strategy record information comprises a plurality of protocol types and the test parameters corresponding to each protocol type in the plurality of protocol types.
As can be seen from 101, the message during communication between the client and the server may be implemented by a plurality of different protocols, so that the protocol types of the plurality of protocols used during the message transmission between the client and the server may be counted in advance. For example: the broadcast type message usually adopts Report protocol or Notice protocol, and the message needing to get Response can adopt Request protocol and Response protocol. Assuming that the various protocols used in the transfer of messages between the client and the server are counted to include 3 types, these 3 protocol types may be represented by specific symbols, for example: the 3 protocol types are denoted as 001, 002 and 003, and 001, 002 and 003 represent one of the 3 protocol types, respectively.
Setting a test parameter meeting test requirements for each protocol type, and then recording the test parameter set for each protocol type into strategy record information, namely: the policy record information includes a plurality of protocol types and test parameters corresponding to each of the plurality of protocol types. The policy record information may be any file capable of storing the test parameters, so that after the first message is intercepted, the protocol type of the first message is determined, and then the corresponding test parameters are matched from the file.
It should be noted that the test parameter may be a representation of the processing logic (i.e., the processing policy), for example: the 3 test parameters set for the 3 protocol types are A, B and C, respectively, the a corresponds to the protocol type 001, the B corresponds to the protocol type 002, and the C corresponds to the protocol type 003, and the a is a representation of a first processing logic, the B is a representation of a second processing logic, and the C is a representation of a third processing logic, where the first processing logic may be a processing logic of a packet loss operation, the second processing logic may be a processing logic of a delay operation, and the third processing logic may be a processing logic of a network disconnection operation. Assuming that the protocol type of the intercepted first message is 001, the test parameter which is queried to be matched with the first message in the policy record information is A, and the processing mode of the first message, namely processing logic, can be obtained through the A. Wherein the processing logic indicates what processing is performed on the first message, for example: packet loss processing, delay processing or discarding and simultaneously performing network disconnection processing.
Of course, the test parameter may be any preset identifier, where each identifier corresponds to a processing logic, for example: the policy record information is recorded with DB, YC and CN, the DB corresponds to the first processing logic, the YC corresponds to the second processing logic and the CN corresponds to the third processing logic.
103. And determining a processing strategy according to the test parameters, wherein different test parameters correspond to different processing strategies.
The correspondence between the test parameters and the processing policies may be recorded in a mapping table, for example: the mapping table includes two columns, each of the first column is a test parameter, and each of the second column is a processing policy, so that the first column and the second column of each row may be a correspondence, for example: the first row to the third row of the first column are the three test parameters A, B and C, respectively, and the first row to the third row of the second column are the processing policy one, the processing policy two and the processing policy three, respectively, then the mapping in this mapping table is concerned with: a and the first processing strategy are in a mapping relation, B and the second processing strategy are in a mapping relation, C and the third processing strategy are in a mapping relation, so that the first processing strategy can be determined by the A, the second processing strategy can be determined by the B, and the third processing strategy can be determined by the C. In a specific example, the first processing policy is, for example, a packet loss operation, the second processing policy is, for example, a delay operation, and the third processing policy is, for example, a network disconnection operation.
104. And processing the first message according to the processing strategy, and determining the running state of the application after the first message is processed.
In an embodiment of the present application, a processing policy for processing the first message includes, but is not limited to, a packet loss operation, a delay operation, and a network disconnection operation, and thus, processing the first message according to the processing policy includes: when the processing strategy is packet loss operation, carrying out packet loss processing on the first message; or when the processing strategy is to delay operation, forwarding the first message after the delay time; or when the processing strategy is the network disconnection operation, discarding the first message, and disconnecting the communication between the client and the server.
Taking the protocol type of the first message in 102 as 001 and the corresponding test parameter a as an example, firstly, obtaining a processing logic one (i.e. a processing policy one) from the test parameter a, wherein the processing logic one is a packet loss operation, assuming that the first message is sent by a client to a server, the first message is intercepted before the first message reaches the server, and then the first message is subjected to packet loss processing, namely: discarding the first message, that is, shielding the client from sending the first message to the server, where the server cannot receive the first message, and after the first message is processed in this way, since the application is running, the running state of the client of the application can be determined, that is: determining whether some abnormal conditions which are not allowed exist on the client side of the application, if so, indicating that the test of the application is not passed, and if so, indicating that the program code of the application has program errors or the application has running defects, otherwise, if some expected and well-set conditions exist on the client side, indicating that the test of the corresponding function of the application is passed, and not indicating that the corresponding program errors or running defects exist.
For example: for the game which the principals glory, the game client requests to open the knapsack and display the articles in the knapsack, at the moment, the game client sends corresponding information to the game server so that the game server feeds back the article information in the knapsack to the game client, under the scene, the information is intercepted and the network disconnection operation is carried out, after the network is waited for recovery, whether the knapsack is correctly opened and the articles in the knapsack are displayed in the game client is determined, if the knapsack is correctly opened and the articles in the knapsack are displayed in the network recovery, the knapsack is correctly opened and the articles in the knapsack are displayed in the correct operation state when the network is recovered, and if the articles in the knapsack are not correctly displayed after the network is disconnected and the network is waited for, the program code is indicated to have a program error or an application to have an operation defect, otherwise, the program code is indicated to have no program error or the operation defect.
Taking the protocol type of the first message in 102 as 002 and the corresponding test parameter B as an example, firstly, obtaining processing logic two (i.e. processing policy two) from the test parameter B, where the processing logic two is a delay operation, assuming that the first message is sent by the client to the server, before the first message reaches the server, the first message is intercepted, and then the first message is delayed and sent to the server, and the sequence of different messages received by the server may be out of order, after the first message is processed in this way, determining the running state of the client of the application, that is: determining whether some abnormal conditions which are not allowed exist on the client side of the application, if so, indicating that the test of the application is not passed, and if so, indicating that the program code of the application has program errors or the application has running defects, otherwise, if some expected and well-set conditions exist on the client side, indicating that the test of the corresponding function of the application is passed, and not indicating that the corresponding program errors or running defects exist.
For example: for the game which the principals glory, the game client requests to open the knapsack and display the articles in the knapsack, at the moment, the game client sends corresponding information to the game server so that the game server feeds back the article information in the knapsack to the game client, under the scene, the information is intercepted and delayed, if the information is forwarded after 10 seconds, whether the knapsack is correctly opened and the articles in the knapsack are displayed in the game client is determined, if the information is failed to be forwarded after 10 seconds, at the moment, the knapsack cannot be correctly opened and the articles in the knapsack are displayed, and the expected design is that the information can be forwarded and the knapsack can be smoothly opened and the articles in the knapsack are displayed after 10 seconds, so that the program code is determined to have a program error or an application operation defect, otherwise, the program code is determined to have no program error or operation defect.
In the above example, the delay operation is performed according to a delay time, for example: forwarding the first message after the delay time comprises: starting timing when the first message is intercepted; and when the timing time reaches the delay time, forwarding the first message according to the destination IP address and the port number, wherein the destination IP address and the port number are obtained by analyzing a message header of the first message.
Specifically, the test parameter B represents the second processing logic of the delay operation, and a default time parameter, i.e., delay time, may be configured in advance for the test parameter B, for example: and if the delay time is set to be 5 seconds, starting to count from the time of intercepting the first message sent from the client to the server, and forwarding the first message to the server after 5 seconds.
It should be noted that, the forwarding operation needs to know the destination, so before intercepting the first message and performing delayed sending, a header of the first message is obtained, where the header includes the destination IP address and the port number, so that the destination IP address (internet protocol address ) and the port number can be resolved from the header, and thus, the first message can be forwarded to the corresponding service end, that is, the destination according to the destination IP address and the port number.
Of course, the embodiment of the present application is not limited to obtaining the delay time according to the default time parameter, and may also generate the delay time according to a random number, for example: and configuring a random number for the test parameter B in advance, and then, after intercepting the first message sent by the client to the server, obtaining a random delay time according to the random number, so that the first message can be forwarded to the server after the random delay time. By delaying the random delay time to forward the first message, the running state of the application in the weak network state can be tested more truly, that is, in the real situation, when the network has problems, namely: weak net state, such as: in the case of poor network state, network jitter, etc., the delay time varies, so that the implementation of the network tool can be better realized through the random delay time.
It should be noted that, by generating the random delay time by the random number, in order to avoid the delay time being too long, the range of generating the random delay time may be determined to conform to the truly desired time range, for example, a time range of 2 seconds to 8 seconds.
Taking the protocol type of the first message in 102 as 003, the corresponding test parameter C as an example, firstly, obtaining processing logic three from the test parameter C, wherein the processing logic three is in a network disconnection operation, if the first message is sent to the server by the client, the first message is intercepted before reaching the server, then the first message is discarded, and in order to avoid interaction between the client and the server by other messages, the network disconnection operation is performed, in this case, whether the running state of the application meets expectations is determined, if the expectations are not met, the implementation of the network tool is not passed, and if the expectations are not met, the program code of the application has a program error or the application has a running defect, otherwise, if some expected and set conditions occur on the client, the test of the corresponding function of the application is passed, and the corresponding program error or running defect does not exist.
In a possible implementation manner, the communication between the client and the server is disconnected, including: executing a closing operation of the connection object to close the connection object, wherein the connection object is an object used for communicating with the server side in the client side; or performing a deletion operation of the connection object to delete the connection object. Assuming that the client and the server communicate through the Socket connection object, the Socket connection object is closed or deleted, namely: the Socket connection between the client and the server is actively cut off, so that the condition of network disconnection is simulated, the receiving and transmitting of other messages are shielded, and when the condition of real network interruption is simulated, whether the application exceeds the expected condition or not, namely: whether there is a program error or an operation defect.
When the network is disconnected, in general, the network reconnection will be performed between the client and the server of the application, and at this time, the client may send a second message to the server, that is: the second message is intercepted at the time of the reconnection request after the disconnection of the communication between the client and the server. In a possible implementation manner, after the communication between the client and the server is disconnected, the method further includes: discarding the second message when the second message is intercepted, wherein the second message comprises a reconnection request after communication between the client and the server is disconnected; and when the discarding times of the second message reach the preset times, releasing the intercepted second message again. That is, it can be tested whether an application can restore a network connection in case of a network outage. Assuming that network connection recovery is expected and it is tested that network connection recovery is not possible, a program error or an operation defect is indicated.
Specifically, because the situation of re-disconnection or repeated disconnection in the reconnection process of disconnection may occur in the real network, multiple interception and packet loss can be performed on the second message in the reconnection process to simulate the process of re-connection or repeated recovery of the network, and whether the application of the process correctly performs corresponding operation or not is tested.
In this example, in order to improve the test efficiency, the predetermined number of times need not be set to be too large, for example, set to 1 time, 2 times, 3 times or 4 times, so as to improve the implementation efficiency of the network tool and avoid the test in the reconnection process for a long time.
According to the implementation method of the network tool, after any message interacted between the client side of the application and the server side of the application is intercepted, the matched test parameters are selected from the strategy record information according to the protocol type of the message, and then the message is processed according to the matched test parameters, so that the messages of different protocol types are processed in a targeted and different manner, the processing behaviors of the message in real and different weak network states (such as network delay, over-high packet loss rate, network jitter and the like) can be simulated by the different processing manners, the implementation manner of the network tool has pertinence and diversification, and further, the application performance of the application in different weak network states can be better tested, and the implementation requirement of the network tool is well met. In addition, the implementation of the network tool can be carried out through each message, the comprehensiveness and the reliability of the test are ensured, and after the problem is found through the application test carried out by a certain message, the application test passing through the message can be reproduced, so that the problem can be conveniently and simply positioned. Namely: by intercepting the messages between the server and the client, different interception strategies are performed on messages of different protocol types, for example: the weak network conditions such as packet loss, delay, network disconnection and the like are simulated, and whether the functions applied during the weak network are normal can be well tested.
In one possible implementation, messages of a certain class or protocol type may be selectively intercepted and the running condition of the application tested. Thus, before intercepting the first message, further comprising: receiving a first input of an interception condition configuration item; and determining the message to be intercepted according to the first input. That is, providing a conditional configuration item in the client, by the selection above, i.e. the first input, it is possible to determine the message that needs to be intercepted. The functional implementation of the conditional profiles is integrated in the client, which is enabled by opening a command switch, on which there are a number of selectable items. The following is shown:
cmd instruction list:
disabling protocol transmissions
Disabling protocol reception
Adding all mask protocols
Restoring normal network state
Initiating hoisting link
Setting reconnection debugging times
ReqGetZonelist upstream packet loss
ReqGetZonelist downstream packet loss
NtyClientStatus loss
Selecting a forbidden protocol to send, wherein the forbidden protocol is used for carrying out packet loss on a message sent to a server by a client; selecting forbidden protocol reception, which means that the message sent to the client side by the server side is subjected to packet loss; adding all shielding protocols to represent interception of all messages; restoring the normal network state, wherein the state indicates that all messages are not intercepted; initiating reconnection, which means that the server and the client are reconnected through the network; setting reconnection debugging times to represent the times of starting reconnection; the ReqGetZonelist uplink packet is lost, which means that a specific message sent to a server side by a client side is lost; the ReqGetZonelist downlink packet is lost, which means that a specific message sent to a client by a server side is lost; the ntyclienstatus is lost, which means that a specific message sent by the server to the client and a specific message sent by the client to the server are lost.
From the selection in the Cmd instruction list described above, it may be determined that a message needs to be intercepted, for example: if the protocol transmission is forbidden, only the message sent by the client to the server is intercepted, and the message sent by the server to the client is not intercepted. Therefore, the required information can be intercepted, and the application can be subjected to targeted test, so that the test efficiency can be effectively improved.
In the case of a selected originating reconnection in the Cmd instruction list, in one possible implementation, a second input of an intercept condition configuration item may also be received; obtaining target interception times of the message according to the second input; and when the interception times of the message reach the target interception times, the message is released. The second input is to select the set reconnection debugging times, namely: by initiating reconnection and setting the selection of reconnection debugging times, the process of recovering network reconnection for the second time or multiple times can be simulated, and whether the process application correctly executes corresponding operation or not is tested. Therefore, the implementation of the network tool is realized more comprehensively, and the comprehensiveness and reliability of the test are improved.
In a possible implementation manner, the method for testing an application further includes: obtaining log information according to the intercepted first message, wherein the log information comprises a protocol type of the first message, interception time of the first message and an operation state of the application after the first message is processed; and writing the log information into a log file. For example: recording the intercepted information into a log file, so that the protocol coverage rate of the test can be obtained through the log file, and the error occurred in the operation of the application when the information is intercepted can be positioned. Therefore, the same test can be quickly reproduced, and the problem can be conveniently searched and positioned.
Taking a game application as an example, assuming that the game application is glowing to a king person, as shown in fig. 2, a process of logging in a main city in a game screen by a Client (i.e., a game Client) of the game application is shown, firstly, the game Client obtains a platform ticket from a third party platform GCloud, for example, obtains a platform ticket of an open platform (i.e., a game server) from a social platform (e.g., weChat), the open platform refers to a game server, obtains the platform ticket, then obtains a server list DirServer, and after obtaining the server list DirServer, for example, the server is glowing to a king person, the server list DirServer includes a Huadong server, a Huanan server, a Huabei server and a Huaxi server, and selects a connected server GameServer from the server list DirServer, for example, connects the Huadong server.
In this example, the message between the game server and the game client in the above process is not intercepted, and the reconnection test is not performed, namely: the reconnection mechanism is not walked, and detection of a network failure is typically manually retried by the player. In the process of acquiring the server list DirServer, the application itself is set with a timeout, namely: if the server list DirServer is not acquired after the timeout time, the application itself automatically retransmits the packet, namely: and re-acquiring the operation of the server list DirServer. In this example, the above process is not tested, and after the connection to the server game server is successful, the user logs in through the account, and after the account is successfully logged in, a character is selected, for example, a game character is selected, and after the game character is selected, a character login process is performed, that is: after the character is successfully selected, the character logs in the main city flow. In this example, in the account login process, corresponding messages are intercepted by the implementation method of the network tool, as shown in fig. 2, the message csreqplayerlegin is intercepted, the message type of the message csreqplayerlegin is determined to be 001, the query indicates that 001 corresponds to the test parameter a, and then the processing logic one is mapped out by the test parameter a, namely: the network disconnection operation is performed at this time, and after the network is disconnected for a certain period of time and the network is restored, whether a program error or an operation defect occurs can be judged according to the operation state of the application, for example: the method comprises the steps of determining whether an account successfully logs in, assuming that normal logic is that a game server clears a protocol buffer, successfully receiving a message CSReqPlayerLogin after network recovery, and rewriting the message CSReqPlayerLogin into the protocol buffer of the game server, so that the account can successfully log in, and therefore, whether an application has a program error or a running defect can be tested according to the action of whether the network recovery game server clears the protocol buffer. In addition, it is assumed that in the role registration flow, a message reqroleigin is intercepted and a disconnection operation is performed, so as to determine whether an operation such as automatic reconnection and packet sending is performed and whether disconnection detection is started according to an operation condition of an application, and if not, for example: if the character can not successfully log in, the test application has program errors or running defects, so that the error or running defects of the program code corresponding to the character logging in of the prince can be positioned, and the program code can be conveniently modified and debugged.
As shown in fig. 3, after intercepting the message csreqplayerlegin of the uplink packet sent to the server by the client and performing the network disconnection operation, whether the application has a problem can be tested according to whether the situation of deleting the confirmed packet in the buffer is executed after the latest packet sequence number received by the server, and similarly, after intercepting the message csreqplayerlegin of the downlink packet sent to the client by the server and performing the network disconnection operation, whether the application has a problem can be tested according to whether the situation of deleting the confirmed packet in the buffer is executed after the latest packet sequence number received by the client.
According to the implementation method of the network tool, after any message interacted between the client side of the application and the server side of the application is intercepted, the matched test parameters are selected from the strategy record information according to the protocol type of the message, and then the message is processed according to the matched test parameters, so that the messages of different protocol types are processed in a targeted and different manner, the processing behaviors of the messages in real and different weak network states (such as network delay, over-high packet loss rate, network jitter and the like) can be simulated by the different processing manners, the application test manner has pertinence and diversification, and further, the application performance of the application in different weak network states can be better tested, and the application test requirements are well met. In addition, the application test can be carried out through each message, the comprehensiveness and the reliability of the test are ensured, and after the application test is carried out through a certain message, the application test passing through the message can be reproduced, so that the problem can be conveniently and simply positioned.
Therefore, the application can test the application in a targeted manner through any message, and compared with the prior art, such as a mode of realizing the network tool according to the delay time and the packet loss rate, the application improves the comprehensiveness and the reliability of the test, better meets the realization requirement of the network tool, and can simply and conveniently realize the positioning of the problem.
Fig. 4 is a block diagram of an implementation apparatus of a network tool according to an embodiment of the present application.
As shown in fig. 4, the implementation apparatus of the network tool includes: an interception unit 401, a selection unit 402, a policy determination unit 403, and a test unit 403, wherein:
an interception unit 401, configured to intercept a first message between a client and a server of an application to be tested, where the first message is sent by the client to the server or sent by the server to the client; a selection unit 402, configured to determine a test parameter corresponding to the first message according to a protocol type of the first message and policy record information, where the policy record information includes a plurality of protocol types and a test parameter corresponding to each of the plurality of protocol types; a policy determining unit 403, configured to determine a processing policy according to the test parameters, where different test parameters correspond to different processing policies; and the test unit 403 is configured to process the first message according to the processing policy, and determine an operation state of the application after the first message is processed.
In a possible implementation, the test unit 403 is specifically configured to: when the processing strategy is packet loss operation, carrying out packet loss processing on the first message; or when the processing strategy is to delay operation, forwarding the first message after the delay time; or when the processing strategy is the network disconnection operation, discarding the first message, and disconnecting the communication between the client and the server.
In one possible implementation, when the test unit 403 determines that the operation is a delay operation according to the test parameter, the first message is forwarded after a delay time, specifically: starting timing when the first message is intercepted; and when the timing time reaches the delay time, forwarding the first message according to the destination IP address and the port number, wherein the destination IP address and the port number are obtained by analyzing a message header of the first message.
In a possible implementation, the test unit 403 is specifically configured to: obtaining delay time according to a default time parameter; alternatively, the delay time is generated from a random number.
In one possible implementation, the test unit 403 disconnects the communication between the client and the server, specifically: executing a closing operation of the connection object to close the connection object, wherein the connection object is an object used for communicating with the server side in the client side; or performing a deletion operation of the connection object to delete the connection object.
In a possible implementation manner, after the testing unit 403 disconnects the communication between the client and the server, the interception unit 401 is further configured to: the second message is intercepted, and when the number of times of discarding the second message reaches a predetermined number of times, the second message intercepted again is released, and the test unit 403 is further configured to discard the second message when the interception unit 401 intercepts the second message, where the second message includes a reconnection request after the communication between the client and the server is disconnected.
In one possible implementation, the method further includes: a configuration unit (not shown in fig. 4) for receiving a first input of an interception condition configuration item before the interception unit 401 intercepts the first message; and determining the message to be intercepted according to the first input.
In a possible implementation, the configuration unit is further configured to receive a second input of an interception condition configuration item; obtaining target interception times of the message according to the second input; the interception unit 401 is configured to release the message when the number of interception times of the message reaches the target number of interception times.
In one possible implementation, the method further includes: a log unit (not shown in fig. 4) configured to obtain log information according to the first message intercepted by the interception unit 401, where the log information includes a protocol type of the first message, an interception time of the first message, and an operation state of the application after the first message is processed; and writing the log information into a log file.
According to the implementation device of the network tool, after any message interacted between the client side of the application and the server side of the application is intercepted, the matched test parameters are selected from the strategy record information according to the protocol type of the message, and then the message is processed according to the matched test parameters, so that the messages of different protocol types are processed in a targeted and different manner, the processing behaviors of the messages in real and different weak network states (such as network delay, over-high packet loss rate, network jitter and the like) can be simulated by the different processing manners, the application test manner has pertinence and diversification, and further, the application performance of the application in different weak network states can be better tested, and the application test requirements are well met. In addition, the application test can be carried out through each message, the comprehensiveness and the reliability of the test are ensured, and after the application test is carried out through a certain message, the application test passing through the message can be reproduced, so that the problem can be conveniently and simply positioned.
It should be understood that the elements recited in the implementation means of the network tool correspond to the individual steps in the implementation method of the network tool described with reference to fig. 1. Thus, the operations and features described above for the method are equally applicable to the implementation device of the network tool and the units contained therein, and are not described here again. The implementation device of the network tool can be implemented in a browser of the computer equipment or other security applications in advance, or can be loaded into the browser of the computer equipment or the security applications thereof by means of downloading and the like. Corresponding elements in the implementation means of the network tool may cooperate with elements in the computer device to implement the solutions of the embodiments of the present application.
The division of the modules or units mentioned in the above detailed description is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit in accordance with embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
It should be noted that, for details not disclosed in the implementation device of the network tool in the embodiment of the present application, please refer to details disclosed in the above embodiment of the present application, and details are not repeated here.
Referring now to fig. 5, fig. 5 shows a schematic diagram of a computer device suitable for implementing an embodiment of the present application, and as shown in fig. 5, a computer system 500 includes a Central Processing Unit (CPU) 501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM503, various programs and data required for operation instructions of the system are also stored. The CPU501, ROM502, and RAM503 are connected to each other through a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505; an input section 506 including a keyboard, a mouse, and the like; an output portion 507 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker, and the like; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication processing via a network such as the internet. The drive 510 is also connected to the I/O interface 505 as needed. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as needed so that a computer program read therefrom is mounted into the storage section 508 as needed.
In particular, the process described above with reference to flowchart fig. 1 may be implemented as a computer software program according to an embodiment of the application. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program contains program code for performing the method shown in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 509, and/or installed from the removable media 511. The above-described functions defined in the system of the present application are performed when the computer program is executed by a Central Processing Unit (CPU) 501.
The computer readable medium shown in the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation instructions of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, blocks shown in two separate connections may in fact be performed substantially in parallel, or they may sometimes be performed in the reverse order, depending on the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules involved in the embodiments of the present application may be implemented in software or in hardware. The described units or modules may also be provided in a processor, for example, as: a processor includes a first collection module, a second collection module, and a transmission module. Wherein the names of the units or modules do not in some cases constitute a limitation of the units or modules themselves.
As another aspect, the present application also provides a computer-readable storage medium that may be included in the electronic device described in the above embodiment or may exist alone without being incorporated in the electronic device. The computer-readable storage medium stores one or more programs that when executed by one or more processors perform the methods described herein for implementing the network tool.
The above description is only illustrative of the preferred embodiments of the present application and of the principles of the technology employed. It will be appreciated by persons skilled in the art that the scope of the disclosure referred to in the present application is not limited to the specific combinations of technical features described above, but also covers other technical features which may be formed by any combination of the technical features described above or their equivalents without departing from the spirit of the disclosure. Such as the above-mentioned features and the technical features disclosed in the present application (but not limited to) having similar functions are replaced with each other.

Claims (12)

1. A method for implementing a network tool, comprising:
intercepting a first message between a client and a server of an application to be tested, wherein the first message is sent to the server by the client or sent to the client by the server;
Determining a test parameter corresponding to the first message according to the protocol type of the first message and policy record information, wherein the policy record information comprises a plurality of protocol types and the test parameter corresponding to each protocol type in the plurality of protocol types;
determining a processing strategy according to the test parameters, wherein different test parameters correspond to different processing strategies;
and processing the first message according to the processing strategy, and determining the running state of the application after the first message is processed.
2. The method of claim 1, wherein the processing the first message according to the processing policy comprises:
when the processing strategy is packet loss operation, carrying out packet loss processing on the first message; or,
the processing strategy is that when the processing strategy is delay operation, the first message is forwarded after delay time; or,
the processing strategy is to discard the first message and disconnect the communication between the client and the server when the processing strategy is a network disconnection operation.
3. The method according to claim 2, wherein forwarding the first message after the delay time has elapsed comprises:
Starting timing by intercepting the first message;
and when the timing time reaches the delay time, forwarding the first message according to a destination IP address and a port number, wherein the destination IP address and the port number are obtained by analyzing a message header of the first message.
4. A method of implementing a network tool according to claim 2 or 3, further comprising:
obtaining the delay time according to a default time parameter; or,
the delay time is generated from a random number.
5. The method according to claim 2, wherein the disconnecting the communication between the client and the server comprises:
executing a closing operation of a connection object to close the connection object, wherein the connection object is an object used for communicating with the server side in the client side; or alternatively
And executing the deleting operation of the connection object to delete the connection object.
6. The implementation method of a network tool according to claim 2 or 5, further comprising, after disconnecting the communication between the client and the server:
discarding a second message when the second message is intercepted, wherein the second message comprises a reconnection request after communication between the client and the server is disconnected;
And when the discarding times of the second message reach the preset times, releasing the intercepted second message again.
7. The method of implementing a network tool of claim 1, further comprising, prior to intercepting the first message:
receiving a first input of an interception condition configuration item;
and determining the message to be intercepted according to the first input.
8. The method of implementing a network tool of claim 7, further comprising:
receiving a second input of the intercept condition configuration item;
obtaining target interception times of the message according to the second input;
and when the interception times of the message reach the target interception times, releasing the message.
9. The method of implementing a network tool according to any one of claims 1-8, further comprising:
obtaining log information according to the intercepted first message, wherein the log information comprises a protocol type of the first message, interception time of the first message and an operation state of the application after the first message is processed;
and writing the log information into a log file.
10. An implementation apparatus of a network tool, comprising:
The system comprises an interception unit, a first message generation unit and a second message generation unit, wherein the interception unit is used for intercepting a first message between a client side and a server side of an application to be tested, and the first message is sent to the server side by the client side or is sent to the client side by the server side;
a selection unit, configured to determine a test parameter corresponding to the first message according to a protocol type of the first message and policy record information, where the policy record information includes a plurality of protocol types and a test parameter corresponding to each protocol type in the plurality of protocol types;
the strategy determining unit is used for determining a processing strategy according to the test parameters, wherein different test parameters correspond to different processing strategies;
and the testing unit is used for processing the first message according to the processing strategy and determining the running state of the application after the first message is processed.
11. A computing device, comprising: a processor and a memory;
the memory is used for storing a computer program;
the processor for executing the computer program to implement the method of implementing a network tool according to any one of claims 1 to 9.
12. A computer readable storage medium, characterized in that the storage medium comprises computer instructions which, when executed by a computer, cause the computer to implement a method of implementing a network tool according to any one of claims 1-9.
CN202210596667.7A 2022-05-17 2022-05-17 Method, device, equipment and medium for realizing network tool Pending CN117118816A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210596667.7A CN117118816A (en) 2022-05-17 2022-05-17 Method, device, equipment and medium for realizing network tool

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210596667.7A CN117118816A (en) 2022-05-17 2022-05-17 Method, device, equipment and medium for realizing network tool

Publications (1)

Publication Number Publication Date
CN117118816A true CN117118816A (en) 2023-11-24

Family

ID=88811587

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210596667.7A Pending CN117118816A (en) 2022-05-17 2022-05-17 Method, device, equipment and medium for realizing network tool

Country Status (1)

Country Link
CN (1) CN117118816A (en)

Similar Documents

Publication Publication Date Title
US8688822B2 (en) Push e-mail inferred network presence
US9432389B1 (en) System, apparatus and method for detecting a malicious attack based on static analysis of a multi-flow object
US8693348B1 (en) Systems and methods for content type classification
CN105991412B (en) Information push method and device
US20160191349A1 (en) Stress testing and monitoring
US10764228B1 (en) Automated message recall from a sender's device
US9654445B2 (en) Network traffic filtering and routing for threat analysis
US11770457B2 (en) Methods and systems for implementing a regionally contiguous proxy service
CN106612284B (en) Streaming data transmission method and device
KR20020079426A (en) System and method to verify trusted status of peer in a peer-to-peer network environment
CN113067882A (en) Message processing method and device, electronic equipment and medium
CN115004673B (en) Message pushing method, device, electronic equipment and computer readable medium
CN110581812A (en) Data message processing method and device
US20180302438A1 (en) Identifying and deceiving adversary nodes and maneuvers for attack deception and mitigation
US7313635B1 (en) Method and apparatus for simulating a load on an application server in a network
US20190312904A1 (en) Network traffic filtering and routing for threat analysis
CN102014145A (en) File transfer security control system and method
Natarajan et al. SCTP: What, why, and how
CN113364804A (en) Method and device for processing flow data
CN110597706A (en) Method and device for testing application program interface data abnormity
CN112822208A (en) Internet of things equipment identification method and system based on block chain
CN117118816A (en) Method, device, equipment and medium for realizing network tool
CN106937350B (en) Routing method and system based on mobile terminal
CN105230074B (en) Video cache switching handling method, device and system
CN112671822B (en) Service request processing method, device, storage medium, server and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination