当前位置:网站首页>Terminal identification technology and management technology

Terminal identification technology and management technology

2022-07-01 13:13:00 Bad bad -5

Anti sharing requirement background

  • Sharing Internet access means that multiple terminals share the source address to access the Internet
  • Demand background
    • Private connection WiFi It is easy to expose the intranet , Avoid shared access users bypassing corporate access control and online behavior monitoring
    • The operator undertakes to build the campus network of colleges and universities , The wireless sharing network in the dormitory will affect the broadband account opening rate and income of operators

Anti sharing identification and control technology

  • Share the Internet scene
    • Configure the router NAT agent , Realize multiple PC Share the Internet through the router
    • PC Agent to others through agent software PC Share the Internet
    • PC adopt 360WiFi And other software sharing hot spots to share the Internet

Traditional anti sharing technology

  • ID Trajectory detection
    • Only aim at Windows host , adopt Windows When the network protocol stack is implemented ,ID The value of the field will be sent with IP The number of messages increases
    • PC After power on , Will randomly generate a ID value , after PC Will increase this regularly ID value , Generally different hosts ID The initial value of will be different
    • By monitoring ID Value of field , You can find out whether there is sharing Internet
    • advantage
      • It can accurately judge whether it is a shared Internet user
      • You can determine the number of network hosts on the online share
      • Completely passive monitoring , There is no need to send detection information
    • shortcoming
      • It takes a period of observation , Usually more than two days . Because it takes a long time to observe , And users' online time will not last for two days
      • For time-sharing Internet and Proxy The detection effect of is not obvious . Because of staggering online time , You can't detect different ID value
      • DHCP In this case, the effect is poor . Because after the lease expires ,IP The address may change
  • Always offset detection
    • Different hosts always have different physical offsets , There is a corresponding relationship between the network protocol stack clock and the physical clock
    • There is a statistical correspondence between the message frequency sent by different hosts and the clock
    • You can use a specific spectrum analysis algorithm , Find different network clock offsets to determine different hosts
    • advantage
      • It can accurately determine whether it is a shared Internet user
      • It can accurately determine the number of shared Internet hosts
    • shortcoming
      • Complex calculation methods are needed for processing and analysis , Consumption of resources
      • It takes a period of observation , Usually more than two days
      • DHCP In this case, the effect is poor
  • Other traditional anti sharing technologies

image.png

Convinced DPI Detection technology

PC And PC Detection technology between

  • QQ Detect anti sharing technology
    • QQ At the time of landing , The sent packet will contain its own reality IP Address , Through the gateway device NAT After the transformation , Will not change the inner data information ,AC After receiving the packet , To test , Discover the source in the packet IP Different , Then it can be determined that there is sharing Internet behavior
  • Deeply convinced by font detection technology
    • In the shared PC visit HTTP Website , When playing video ( Need to install Flash plug-in unit ),AC Request tampering PC request , send PC Report the system font information to AC, If shared PC Use different Fonts , Then you can identify the sharing online behavior
  • Deeply convinced of auxiliary detection technology
    • URL testing
      • By analyzing the data package of common application software , You can find some HTTP In request ,URL There will be some feature strings , These feature strings will have some information related to PC Strongly related . That is, the same one PC The characteristic information string sent is the same , Different PC It's different .AC Then we can get the shared Internet based on the number of different feature strings PC The number of
    • Wechat features ID testing
      • By analyzing the wechat client when sending messages , At the fixed offset position of the packet , The offset position of the same wechat client is the same , Different clients have different offset positions .AC You can extract the number of offset positions , Get the number of shared Internet devices

Detection technology between mobile terminals

  • URL Detection technology
    • And PC Between the URL The detection technology is the same
  • Apply rule detection technology
    • Through the built-in rule library of the device , Different mobile terminals can be analyzed from the application
  • UA Detection technology
    • User-Agent It contains the identification information of the browser ( operating system 、 Encryption level 、 Browser language and other information ), Different terminals can be identified from this information

PC And mobile terminal detection technology

  • URL Detection technology
  • Apply rule detection technology

Background of mobile terminal management requirements

  • Private connection WiFi It will bring hidden dangers to the intranet
  • cheap WiFi Tools will reduce private access WiFi Difficulty and cost
  • The popularity of rubbing network cards makes it difficult to find and trace the source of violations

Mobile terminal identification and control technology

  • Exclude trust IP And the user
    • For legal AP Access , Default release , For illegal access AP Or the user , Then it needs to be controlled
  • Manage illegally accessed mobile terminals
    • For illegally accessed mobile terminals , You can configure to reject this mobile terminal device , No internet access , And after this IP All access to will be denied
  • Identify mobile terminals
    • URL Detection technology
    • Apply rule detection technology
    • UA Detection technology
  • Recognition is not supported for the following three scenarios
    • Cell phone through USB Data line to access the Internet , share PC Network of
    • PC Virtual machine installed in ,AC Different operating systems will be detected
    • The mobile terminal simulator is installed on the computer ,AC Will be detected PC And two kinds of traffic packets of mobile terminals
  • Mobile terminals find trends
    • For recent 7、30 God ,AC Make trend statistics on the number of mobile terminals found every day , It is convenient for administrators to find the effectiveness of management

【AC Terminal identification and control experiment 】


 All of the above are original , If unknown or wrong , Please point out .
原网站

版权声明
本文为[Bad bad -5]所创,转载请带上原文链接,感谢
https://yzsam.com/2022/182/202207011257321958.html