当前位置:网站首页>Terminal identification technology and management technology
Terminal identification technology and management technology
2022-07-01 13:13:00 【Bad bad -5】
Anti sharing requirement background
- Sharing Internet access means that multiple terminals share the source address to access the Internet
- Demand background
- Private connection WiFi It is easy to expose the intranet , Avoid shared access users bypassing corporate access control and online behavior monitoring
- The operator undertakes to build the campus network of colleges and universities , The wireless sharing network in the dormitory will affect the broadband account opening rate and income of operators
Anti sharing identification and control technology
- Share the Internet scene
- Configure the router NAT agent , Realize multiple PC Share the Internet through the router
- PC Agent to others through agent software PC Share the Internet
- PC adopt 360WiFi And other software sharing hot spots to share the Internet
Traditional anti sharing technology
- ID Trajectory detection
- Only aim at Windows host , adopt Windows When the network protocol stack is implemented ,ID The value of the field will be sent with IP The number of messages increases
- PC After power on , Will randomly generate a ID value , after PC Will increase this regularly ID value , Generally different hosts ID The initial value of will be different
- By monitoring ID Value of field , You can find out whether there is sharing Internet
- advantage
- It can accurately judge whether it is a shared Internet user
- You can determine the number of network hosts on the online share
- Completely passive monitoring , There is no need to send detection information
- shortcoming
- It takes a period of observation , Usually more than two days . Because it takes a long time to observe , And users' online time will not last for two days
- For time-sharing Internet and Proxy The detection effect of is not obvious . Because of staggering online time , You can't detect different ID value
- DHCP In this case, the effect is poor . Because after the lease expires ,IP The address may change
- Always offset detection
- Different hosts always have different physical offsets , There is a corresponding relationship between the network protocol stack clock and the physical clock
- There is a statistical correspondence between the message frequency sent by different hosts and the clock
- You can use a specific spectrum analysis algorithm , Find different network clock offsets to determine different hosts
- advantage
- It can accurately determine whether it is a shared Internet user
- It can accurately determine the number of shared Internet hosts
- shortcoming
- Complex calculation methods are needed for processing and analysis , Consumption of resources
- It takes a period of observation , Usually more than two days
- DHCP In this case, the effect is poor
- Other traditional anti sharing technologies

Convinced DPI Detection technology
PC And PC Detection technology between
- QQ Detect anti sharing technology
- QQ At the time of landing , The sent packet will contain its own reality IP Address , Through the gateway device NAT After the transformation , Will not change the inner data information ,AC After receiving the packet , To test , Discover the source in the packet IP Different , Then it can be determined that there is sharing Internet behavior
- Deeply convinced by font detection technology
- In the shared PC visit HTTP Website , When playing video ( Need to install Flash plug-in unit ),AC Request tampering PC request , send PC Report the system font information to AC, If shared PC Use different Fonts , Then you can identify the sharing online behavior
- Deeply convinced of auxiliary detection technology
- URL testing
- By analyzing the data package of common application software , You can find some HTTP In request ,URL There will be some feature strings , These feature strings will have some information related to PC Strongly related . That is, the same one PC The characteristic information string sent is the same , Different PC It's different .AC Then we can get the shared Internet based on the number of different feature strings PC The number of
- Wechat features ID testing
- By analyzing the wechat client when sending messages , At the fixed offset position of the packet , The offset position of the same wechat client is the same , Different clients have different offset positions .AC You can extract the number of offset positions , Get the number of shared Internet devices
- By analyzing the wechat client when sending messages , At the fixed offset position of the packet , The offset position of the same wechat client is the same , Different clients have different offset positions .AC You can extract the number of offset positions , Get the number of shared Internet devices
- URL testing
Detection technology between mobile terminals
- URL Detection technology
- And PC Between the URL The detection technology is the same
- Apply rule detection technology
- Through the built-in rule library of the device , Different mobile terminals can be analyzed from the application
- UA Detection technology
- User-Agent It contains the identification information of the browser ( operating system 、 Encryption level 、 Browser language and other information ), Different terminals can be identified from this information
- User-Agent It contains the identification information of the browser ( operating system 、 Encryption level 、 Browser language and other information ), Different terminals can be identified from this information
PC And mobile terminal detection technology
- URL Detection technology
- Apply rule detection technology
Background of mobile terminal management requirements
- Private connection WiFi It will bring hidden dangers to the intranet
- cheap WiFi Tools will reduce private access WiFi Difficulty and cost
- The popularity of rubbing network cards makes it difficult to find and trace the source of violations
Mobile terminal identification and control technology
- Exclude trust IP And the user
- For legal AP Access , Default release , For illegal access AP Or the user , Then it needs to be controlled
- Manage illegally accessed mobile terminals
- For illegally accessed mobile terminals , You can configure to reject this mobile terminal device , No internet access , And after this IP All access to will be denied
- Identify mobile terminals
- URL Detection technology
- Apply rule detection technology
- UA Detection technology
- Recognition is not supported for the following three scenarios
- Cell phone through USB Data line to access the Internet , share PC Network of
- PC Virtual machine installed in ,AC Different operating systems will be detected
- The mobile terminal simulator is installed on the computer ,AC Will be detected PC And two kinds of traffic packets of mobile terminals
- Mobile terminals find trends
- For recent 7、30 God ,AC Make trend statistics on the number of mobile terminals found every day , It is convenient for administrators to find the effectiveness of management
【AC Terminal identification and control experiment 】
All of the above are original , If unknown or wrong , Please point out .
边栏推荐
- Have you ever encountered the problem that flynk monitors the PostgreSQL database and checkpoints cannot be used
- Idea of [developing killer]
- ZABBIX 6.0 source code installation and ha configuration
- leetcode 322. Coin Change 零钱兑换(中等)
- Apache-atlas-2.2.0 independent compilation and deployment
- Redis exploration: cache breakdown, cache avalanche, cache penetration
- During Oracle CDC data transmission, the CLOB type field will lose its value during update. There is a value before update, but
- Vs code setting Click to open a new file window without overwriting the previous window
- MySQL gap lock
- Update a piece of data from the database. Will CDC get two pieces of data with OP fields D and C at the same time? I remember before, only OP was U
猜你喜欢

一款Flutter版的记事本

VM虚拟机配置动态ip和静态ip访问

Hardware development notes (9): basic process of hardware development, making a USB to RS232 module (8): create asm1117-3.3v package library and associate principle graphic devices

1553B环境搭建

我选的热门专业,四年后成了“天坑”

硬件开发笔记(九): 硬件开发基本流程,制作一个USB转RS232的模块(八):创建asm1117-3.3V封装库并关联原理图元器件

MHA high availability cluster deployment and failover of database

MySQL statistical bill information (Part 2): data import and query

I spent tens of thousands of dollars to learn and bring goods: I earned 3 yuan in three days, and the transaction depends on the bill

终端识别技术和管理技术
随机推荐
一款Flutter版的记事本
VM virtual machine configuration dynamic IP and static IP access
Redis explores cache consistency
How to count the status of network sockets?
Will it affect the original MySQL database to read the data of a MySQL table in full by flick MySQL CDC
华为HMS Core携手超图为三维GIS注入新动能
Cs5268 advantages replace ag9321mcq typec multi in one docking station scheme
leetcode:329. 矩阵中的最长递增路径【dfs + cache + 无需回溯 + 优雅】
不同的测试技术区分
Run PowerShell script prompt "because running script is prohibited on this system" solution
79. 单词搜索【dfs + 回溯visit + 遍历起点】
leetcode:226. 翻转二叉树【dfs翻转】
Zabbix 6.0 源码安装以及 HA 配置
Have you ever encountered the problem that flynk monitors the PostgreSQL database and checkpoints cannot be used
路由基础之OSPF LSA详细讲解
彩色五角星SVG动态网页背景js特效
Ikvm of toolbox Net project new progress
啟動solr報錯The stack size specified is too small,Specify at least 328k
Three questions about scientific entrepreneurship: timing, pain points and important decisions
Function test process in software testing