Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that, in the embodiments of the present invention, words such as "exemplary" or "for example" are used to indicate examples, illustrations or explanations. Any embodiment or design described as "exemplary" or "e.g.," an embodiment of the present invention is not necessarily to be construed as preferred or advantageous over other embodiments or designs. Rather, use of the word "exemplary" or "such as" is intended to present concepts related in a concrete fashion.
It should be noted that, in the embodiments of the present invention, "of", "corresponding" and "corresponding" may be sometimes used in combination, and it should be noted that, when the difference is not emphasized, the intended meaning is consistent.
For the convenience of clearly describing the technical solutions of the embodiments of the present invention, in the embodiments of the present invention, the words "first", "second", and the like are used for distinguishing the same items or similar items with basically the same functions and actions, and those skilled in the art can understand that the words "first", "second", and the like are not limited in number or execution order.
Network operators provide network services for signed customers through the IDC machine room, but when the IDC machine room provides the network services for the signed customers, some merchants without signing and authorization use vulnerabilities managed by the IDC machine room to privately access the network through some network technologies and provide the network services to the outside, and the normal benefits of the network operators are seriously damaged.
Referring to fig. 1, an embodiment of the present invention provides a schematic diagram of an IDC room private connection behavior, where an unauthorized merchant implements the private connection behavior with a router in the IDC room through a router outside the IDC room, and provides network services to the outside through the router outside the IDC room, so that others can perform network connection. For the private connection behavior of the IDC machine room, network operators mostly determine the private connection line by a manual screening method. However, the manual screening method is not only low in efficiency and high in labor cost, but also is easy to miss and miss.
At present, a legal client of an IDC room generally provides content services to the outside through a bandwidth of a leasing network operator, for example, media services such as characters, images, audio and video are provided to the outside, while an illegal client which is privately accessed to the IDC room provides various network services to the outside, so that traffic use conditions of the legal client and the illegal client are obviously different from conditions such as a source IP address accessed to the IDC room. If the legal client generally provides content service, the outflow flow of the IDC machine room port accessed by the legal client is far greater than the inflow flow, and whether the client accessed to the IDC machine room port is the legal client or not can be determined through the ratio of the inflow flow to the outflow flow of the IDC machine room port; if the legal client leased bandwidth provides content service to the outside, a fixed independent source IP address is generally used for providing service to the outside, and different ports are set according to different services, so that whether the client accessing the IDC machine room port is a legal client can be determined through whether the source IP address and the port of an access request received by the IDC machine room port are changed; and because the legal client terminal rarely uses the domain name resolution when providing the content service, whether the client terminal accessed to the IDC machine room port is the legal client terminal can be determined according to the flow of the domain name resolution of the IDC machine room port. The valid client is the client used by the signed client, and the invalid client is the client used by the merchant who has not signed the authorized access network.
Referring to fig. 2, an embodiment of the present invention provides a network private connection identification method, which includes:
101. first state information of a first port of a server is acquired.
The first port is used for communication between the server and the client, the first state information is used for indicating a source IP address and flow of the first port, and the source IP address is a source IP address of an access request from the client received by the first port.
Specifically, the server may be a network device shown in fig. 1, and may be configured to communicate with the client to provide the client with a network service, where the server provides the client with the network service through a port of the server. Of course, the server includes a plurality of ports, each of which may communicate with one of the clients, where the first port may be any one of the server ports.
For example, the first status information may be NetFlow information of the first port, and the NetFlow information may be acquired by an information acquisition tool, and the NetFlow information may be acquired by analyzing the NetFlow information, where the inflow flow, the outflow flow, a ratio of the inflow flow to the outflow flow, the number of source IP addresses, and the total domain name resolution flow of the first port in a certain time period may be acquired, that is, the first status information includes the inflow flow, the outflow flow, the ratio of the inflow flow to the outflow flow, the number of source IP addresses, and the total domain name resolution flow.
It should be noted that the information collecting tool may be a NetFlow tool commonly used in the art, such as a NetFlow analysis tool provided by cisco, or an information collecting tool designed by itself, and the embodiment of the present invention is not limited thereto. The source IP address refers to a source IP address in an access request sent by a client to a server, the number of the source IP addresses is the number of the source IP addresses of the access request from the client received by a first port, and the number of the source IP addresses refers to the number of different source IP addresses; certainly, because the port used when the client provides the network service is also fixed, when it is determined whether the client is an illegal client according to the source IP address, the determination may be further performed in combination with the number of ports providing the network service, that is, the determination may be performed according to the sum of the number of the source IP address and the number of the ports, where the port is a port providing the network service by the client, such as a software port, and is different from the first port of the server. The total domain name resolution flow can be obtained by analyzing the flow information of 53 ports in the NetFlow information, where the 53 ports are domain name resolution ports, and the total domain name resolution flow here is the total flow received by the server for domain name resolution.
102. And determining the client as an illegal client according to the first state information and the binary model.
The two classification models are used for identifying an illegal client and a legal client, and the illegal client is a client for illegally accessing the server.
Specifically, referring to fig. 3, the classification model includes a first reference point and a second reference point, where the first reference point is used to indicate that the client corresponding to the first state information is an illegal client, and the second reference point is used to indicate that the client corresponding to the first state information is a legal client. After the first state information is input into the two classification models, the two classification models can determine whether the client corresponding to the first state information is an illegal client according to the distance between the first state information and the first reference point and the distance between the first state information and the second reference point respectively.
It should be noted that the illegal client refers to a client which is not authorized by a network operator but is privately accessed to a server of the IDC room through a technical means to access the network; the legal client is the client authorized by the network operator to access the server of the IDC computer room.
Optionally, as shown in fig. 4, before step 102, the method further includes:
201. and processing the inflow flow according to a first preset algorithm to obtain a first characteristic value.
Specifically, the first preset algorithm specifically includes:
V′a=|Va-P|/Q;
wherein, VaP is any one of inflow flow, outflow flow, ratio of inflow flow to outflow flow, number of source IP addresses and total flow of domain name resolution, and is a plurality of VaQ is a plurality of VaStandard deviation of, V'aIs a VaThe corresponding characteristic value.
Illustratively, if the acquisition cycle of the first state information is set to a preset time period, the NetFlow information is acquired once every preset time period, so as to obtain the first state information. Taking 5 acquisition cycles as an example, if the inflow rates in the first status information are obtained to be 1.8GBytes, 1.9GBytes, 2GBytes, 2.1GBytes and 2.2GBytes in sequence, the average value P of the inflow rates is 2GBytes and the standard deviation is about 0.158, that is, Q is 0.158, through mathematical calculation. If the inflow rate is V in the embodiment of the present inventiona2.1GBytes as input to a first predetermined algorithm, i.e. using an inflow rate of VaJudging whether the client is an illegal client or not according to 2.1GBytes, and processing the inflow flow according to a first preset algorithm to obtain V'aThe first characteristic value is 0.633 when |2.1-2|/0.158 is 0.633.
The NetFlow information may be acquired in a plurality of continuous preset time periods, or may be acquired in a plurality of discontinuous preset time periods.
202. And processing the outflow flow according to a first preset algorithm to obtain a second characteristic value.
For example, taking 5 acquisition cycles as an example, if the outflow rates in the first status information are obtained as 2GBytes, 2.1GBytes, 2.2GBytes, 2.3GBytes and 2.4GBytes in sequence, the average value P of the outflow rates is 2.2GBytes and the standard deviation is about 0.158, that is, Q is 0.158, through mathematical calculation. If the inflow rate is V in the embodiment of the present inventiona2.3GBytes as input to a first predetermined algorithm, i.e. using an outflow of VaJudging whether the client is an illegal client or not according to 2.3GBytes, and processing the outflow flow according to a first preset algorithm to obtain V'aThe second characteristic value is 0.633 when |2.3-2.2|/0.158 is 0.633.
203. And processing the ratio of the inflow flow rate and the outflow flow rate according to a first preset algorithm to obtain a third characteristic value.
For example, taking 5 acquisition cycles as an example, if the ratios of the inflow flow rate and the outflow flow rate in the first state information are obtained as 9/10, 19/21, 10/11, 21/23 and 11/12 in this order, the average value P of the ratio of the inflow flow rate and the outflow flow rate is 0.917, and the standard deviation is about 0.007, that is, Q is 0.007, through mathematical calculation. If the ratio of the inflow rate to the outflow rate is V in the embodiment of the present inventiona21/23 as input to a first predetermined algorithm, i.e. using a ratio of the incoming flow to the outgoing flow of Va21/23, judging whether the client is an illegal client, processing the outflow flow according to a first preset algorithm to obtain V'aThe third characteristic value is 0.571, i.e., 0.571, |21/23-0.917 |/0.007.
204. And processing the number of the source IP addresses according to a first preset algorithm to obtain a fourth characteristic value.
For example, taking 5 acquisition cycles as an example, if the number of the source IP addresses in the first status information is obtained as 7, 10, 15, and 23 in sequence, it can be known through mathematical calculation that the average value P of the number of the source IP addresses is 13, and the standard deviation is about 6.28, that is, Q is 6.28. If the number of source IP addresses is V in the embodiment of the inventiona15 as input to a first predetermined algorithm, i.e. using a number of source IP addresses of VaJudging whether the client is an illegal client or not, processing the number of the source IP addresses according to a first preset algorithm to obtain V'aThe fourth characteristic value is 0.318 when |15-13|/6.28 is 0.318.
205. And processing the domain name resolution total flow according to a first preset algorithm to obtain a fifth characteristic value.
For example, taking 5 acquisition cycles as an example, if the total domain name resolution traffic obtained in the first status information is 0.5GBytes, 0.6GBytes, 0.7GBytes, 0.8GBytes and 0.9GBytes in sequence, the average value P of the total domain name resolution traffic is 0.7GBytes and the standard deviation is about 0.158, that is, Q is 0.158, through mathematical calculation. If the total flow rate of domain name resolution is V in the embodiment of the inventiona0.8GBytes as input to a first predetermined algorithm, i.e. using the domain name to resolve the total flow to VaJudging whether the client is an illegal guest or not according to 0.8GBytesAnd the client side processes the domain name resolution total flow according to a first preset algorithm to obtain V'aThe fifth characteristic value is 0.633 when |0.8-0.7|/0.158 is 0.633.
Optionally, referring to fig. 5, step 102 includes:
1021. and determining a first vector according to the first characteristic value, the second characteristic value, the third characteristic value, the fourth characteristic value and the fifth characteristic value.
Specifically, the first vector may be a five-dimensional vector composed of a first feature value, a second feature value, a third feature value, a fourth feature value, and a fifth feature value.
Illustratively, if the first eigenvalue, the second eigenvalue, the third eigenvalue, the fourth eigenvalue, and the fifth eigenvalue are 0.571, 0.318, and 0.633 respectively, as obtained in the above steps 201-204, the first vector composed of the first eigenvalue, the second eigenvalue, the third eigenvalue, the fourth eigenvalue, and the fifth eigenvalue is (0.633, 0.633, 0.571, 0.318, 0.633).
It should be noted that the two-dimensional classification model is a five-dimensional space, so a five-dimensional vector can be determined according to the first feature value, the second feature value, the third feature value, the fourth feature value and the fifth feature value, and the five-dimensional vector is input into the two-dimensional classification model for classification.
1022. The first vector is input into a classification model, and a first distance of the first vector from a first reference point and a second distance from a second reference point are determined.
Specifically, the first reference point and the second reference point may be pre-trained cluster centers in a binary model, and a first distance between the first vector and the first reference point and a second distance between the first vector and the second reference point may be calculated according to an euclidean distance formula.
For example, if the first vector is (a1, a2, a3, a4, a5), the first reference point is (b1, b2, b3, b4, b5), and the second reference point is (c1, c2, c3, c4, c5), the first distance is:
the second distance is:
wherein a1, a2, a3, a4 and a5 are respectively a first eigenvalue, a second eigenvalue, a third eigenvalue, a fourth eigenvalue and a fifth eigenvalue in the first vector; b1, b2, b3, b4 and b5 are respectively a first characteristic value, a second characteristic value, a third characteristic value, a fourth characteristic value and a fifth characteristic value in the first reference point; c1, c2, c3, c4 and c5 are the first, second, third, fourth and fifth eigenvalues, respectively, in the second reference point.
1023. And if the first distance is greater than the second distance, determining that the client corresponding to the first state information is a legal client.
Specifically, the first vector may be classified into a cluster where the first reference point is located or a cluster where the second reference point is located according to a distance between the first vector and the first reference point and the second reference point. Because the cluster where the second reference point is located is the set of valid clients in the embodiment of the present invention, when the first distance is greater than the second distance, the first vector may be classified into the cluster where the second reference point is located, that is, the client corresponding to the first vector is a valid client, that is, the client corresponding to the first state information obtained in step 101 is a valid client.
1024. And if the first distance is smaller than the second distance, determining the client corresponding to the first state information as an illegal client.
Specifically, in the embodiment of the present invention, the cluster where the first reference point is located is a set of illegal clients, so when the first distance is smaller than the second distance, the first vector may be classified into the cluster where the first reference point is located, that is, the client corresponding to the first vector is an illegal client, that is, the client corresponding to the first state information obtained in step 101 is an illegal client.
Optionally, referring to fig. 6, the method for identifying a network private access provided in the embodiment of the present invention further includes:
301. second state information of the plurality of ports of the server is obtained.
The second state information includes an incoming flow, an outgoing flow, a ratio of the incoming flow to the outgoing flow, the number of source IP addresses, and a total domain name resolution flow.
Specifically, the IDC room may have a plurality of ports, each of which may communicate with a client. The obtained plurality of second state information are used for training the classification model, and the second state information comprises the state information of the illegal client and also comprises the state information of the legal client.
Illustratively, the server may include a plurality of ports, such as a second port, a third port, a fourth port, etc., and each port of the server may communicate with a legitimate client or an illegitimate client. The second status information may include status information of the second port of the server, and may also include status information of ports such as the third port, the fourth port, and the fifth port.
302. And respectively processing the inflow flow, the outflow flow, the ratio of the inflow flow to the outflow flow, the number of source IP addresses and the total domain name resolution flow in the second state information according to a first preset algorithm.
Specifically, the processing of the second status information is the same as the processing method of the incoming flow, the outgoing flow, the ratio of the incoming flow to the outgoing flow, the number of source IP addresses and the total traffic of domain name resolution in the first status information in step 201 and 205, and is not described herein again. Similarly, five characteristic values are obtained after the second state information is processed according to the first preset algorithm.
It should be noted that the second state information obtained in step 301 may include tens of thousands, even hundreds of thousands, and the amount of data to be processed in step 302 is very large, so that the calculation engine SPARK is used to process the second state information in the embodiment of the present invention. And constructing a computing frame according to the SPARK technology and a first preset algorithm, wherein the computing frame comprises the first preset algorithm, inputting second state information acquired by each port in a preset number of periods into the computing frame, and processing the second state information by the first preset algorithm in the computing frame, so that the data processing efficiency is improved. Of course, since the first preset algorithm also involves calculation of the mean and the standard deviation, the calculation framework constructed according to the SPARK technique also includes an algorithm of the mean and an algorithm of the standard deviation.
303. And training according to the characteristic value obtained by processing the second state information and a second preset algorithm to obtain a two-classification model.
Wherein the second preset algorithm is a K-means clustering algorithm (K-means clustering, K-means).
Optionally, step 303 specifically includes:
(1) and inputting the characteristic value obtained by processing the second state information into a k-means clustering algorithm to be used as a first sample set.
Specifically, as in step 1021-. Since the second state information obtained in step 301 includes a plurality of vectors, and accordingly, the second vector input to the k-means clustering algorithm also includes a plurality of vectors, the result of inputting the plurality of second vectors to the k-means clustering algorithm can be referred to fig. 7, and a set of the plurality of second vectors is the first sample set.
(2) And randomly drawing K sample points in the first sample set as initial clustering centers.
Specifically, the embodiment of the present invention is configured to identify a valid client and an invalid client, so that the K-means clustering algorithm is configured to divide a first sample set into two types, where one type is a second vector obtained according to state information of the valid client, and the other type is a second vector obtained according to state information of the invalid client, so that K is 2, and randomly extract 2 sample points in the first sample set as an initial clustering center.
Illustratively, referring to fig. 8, the randomly drawn sample points may be a1 and a 2.
It should be noted that the initial clustering center is randomly set, and in practice, after the first sample set is divided into two types, the average value of all sample points in the two types may be set as the initial clustering center.
(3) And classifying each second vector in the first sample set into the first cluster where the initial cluster center closest to the first vector is located.
And the number of the first clusters is K.
Specifically, the first sample may be divided into a plurality of clusters according to the number of the initial clustering centers, and as the number of the initial clustering centers in the embodiment of the present invention is 2, the first sample may be divided into 2 first clusters. Referring to initial cluster centers a1 and a2 shown in fig. 8, the distance between each second vector in the first sample set and a1 and a2 is calculated according to the euclidean distance formula, and the second vectors are classified into the first cluster in which the closer initial cluster center is located, and the partition result of the first cluster can be shown in fig. 9.
(4) A first cluster center for a second set of samples in each first cluster is determined.
Wherein the second set of samples is a second vector included in the first cluster.
Specifically, referring to the first cluster division result shown in fig. 9, the average value of each second vector in the first cluster a and the first cluster B is calculated, and the average value of each second vector in the first cluster a and the first cluster B is used as a first cluster center, which may be a3 and a4 shown in fig. 10.
(5) And (4) iterating the steps (3) and (4) until the clustering center of the second sample set does not change any more, and obtaining a binary classification model.
Specifically, referring to fig. 11, the sample points in the first sample set may divide the first sample set into a first cluster C and a first cluster D according to the first cluster centers a3 and a4, after the first cluster C and the first cluster D are determined, determine the average value of each second vector in the first cluster C and the first cluster D according to the determined average value, and use the average value of each second vector in the first cluster C and the first cluster D as the first cluster centers a5 and a 6.
The sample points in the first sample set are divided again according to the above-mentioned (3), and are respectively divided into the first cluster where the closer first cluster center a5 or a6 is located. And (4) sequentially iterating the steps (4) and (3) until the finally determined clustering center of the first cluster is not changed any more, so as to obtain a first cluster N and a first cluster M.
Because the number of valid clients accessed to the IDC room is far less than that of invalid clients in practice, the first cluster with a smaller number of sample points in the two first clusters obtained finally can indicate a valid client, and the first cluster with a larger number of sample points can indicate an invalid client. If the first cluster N indicates an illegal client, the first cluster M indicates a legal client, wherein the cluster center of the first cluster N may be a first reference point, and the cluster center of the first cluster M may be a second reference point.
It should be noted that the classification space constructed according to the k-means clustering algorithm is a five-dimensional space, and the plane views shown in fig. 7 to 11 are only exemplary and only show a cross-sectional view of the five-dimensional space. In practice, the process of determining the two-class model according to the second state information and the k-means clustering algorithm in step 303 may be implemented by a code, and step (2) may be implemented by the following code:
val kmeans=new KMeans().setK(2).setSeed(1L);
wherein setK (2) is used to indicate that the first sample set is divided into two classes, and setSeed (1L) is used to indicate that the initial clustering center is randomly set.
And the process of the above steps (3), (4) and (5) to finally obtain the two-classification model through iteration can be realized by the following codes:
val model=kmeans.fit(dataset);
here, the dataset may be a feature value obtained by processing the second state information as described above.
After obtaining the binary model, the process of implementing step 102 can be implemented by the following code:
val predictions=model.transform(dataset);
here, the dataset may be a feature value obtained by processing the first state information as described above.
The embodiment of the invention provides a network private access identification method, which comprises the following steps: acquiring first state information of a first port of a server; the first port is used for the server to communicate with the client, the first state information is used for indicating a source IP address and the flow of the first port, and the source IP address is the source IP address of an access request from the client received by the first port; determining the client as an illegal client according to the first state information and the two classification models; the two classification models are used for identifying an illegal client and a legal client, and the illegal client is a client of an illegal access server. According to the embodiment of the invention, the first state information of the server port is obtained, and whether the client is illegal or not is determined by utilizing the classification model according to the difference of the first state information of the illegal client and the first state information of the legal client during network communication, so that the workload of manual investigation is reduced, and the investigation efficiency is improved.
Referring to fig. 12, an embodiment of the present invention further provides a network private connection identifying apparatus 40, including:
an obtaining module 401, configured to obtain first state information of a first port of a server; the first port is used for the server to communicate with the client, the first state information is used for indicating a source IP address and the flow of the first port, and the source IP address is the source IP address of an access request from the client received by the first port.
A classification module 402, configured to determine, according to the first state information and the two classification models obtained by the obtaining module 401, that the client is an illegal client; the two classification models are used for identifying an illegal client and a legal client, and the illegal client is a client of an illegal access server.
Optionally, the first state information includes an incoming flow, an outgoing flow, a ratio of the incoming flow to the outgoing flow, a number of source IP addresses, and a total domain name resolution flow; the number of the source IP addresses is the number of the source IP addresses of the access request from the client received by the first port, and the total domain name resolution flow is the total flow received by the server and used for resolving the domain name.
Optionally, referring to fig. 13, the network private connection identifying apparatus 40 further includes a processing module 403.
The processing module 403 is configured to: processing the inflow flow according to a first preset algorithm to obtain a first characteristic value; processing the outflow flow according to a first preset algorithm to obtain a second characteristic value; processing the ratio of the inflow flow rate and the outflow flow rate according to a first preset algorithm to obtain a third characteristic value; processing the number of the source IP addresses according to a first preset algorithm to obtain a fourth characteristic value; and processing the domain name resolution total flow according to a first preset algorithm to obtain a fifth characteristic value.
The first preset algorithm specifically comprises:
V′a=|Va-P|/Q;
wherein, VaP is any one of inflow flow, outflow flow, ratio of inflow flow to outflow flow, number of source IP addresses and total flow of domain name resolution, and is a plurality of VaQ is a plurality of VaStandard deviation of, V'aIs the characteristic value corresponding to V _ a.
Optionally, the classification model includes a first reference point and a second reference point, where the first reference point is used to indicate that the client corresponding to the first state information is an illegal client, and the second reference point is used to indicate that the client corresponding to the first state information is a legal client.
The classification module 402 is specifically configured to: determining a first vector according to the first characteristic value, the second characteristic value, the third characteristic value, the fourth characteristic value and the fifth characteristic value obtained by the processing module 403; inputting the first vector into a classification model, and determining a first distance between the first vector and a first reference point and a second distance between the first vector and a second reference point; if the first distance is greater than the second distance, determining that the client corresponding to the first state information is a legal client; and if the first distance is smaller than the second distance, determining the client corresponding to the first state information as an illegal client.
The embodiment of the invention provides a network private connection identification device, which comprises: the acquisition module is used for acquiring first state information of a first port of the server; the first port is used for the server to communicate with the client, the first state information is used for indicating a source IP address and the flow of the first port, and the source IP address is the source IP address of an access request from the client received by the first port; the classification module is used for determining the client as an illegal client according to the first state information and the two classification models acquired by the acquisition module; the two classification models are used for identifying an illegal client and a legal client, and the illegal client is a client of an illegal access server. According to the embodiment of the invention, the first state information of the server port is obtained, and whether the client is illegal or not is determined by utilizing the classification model according to the difference of the first state information of the illegal client and the first state information of the legal client during network communication, so that the workload of manual investigation is reduced, and the investigation efficiency is improved.
Referring to fig. 14, an embodiment of the present invention further provides another network private connection identification apparatus, including a memory 51, a processor 52, a bus 53, and a communication interface 54; the memory 51 is used for storing computer execution instructions, and the processor 52 is connected with the memory 51 through a bus 53; when the network private connection identifying device operates, the processor 52 executes computer-executable instructions stored in the memory 51 to cause the network private connection identifying device to perform the network private connection identifying method provided in the above-described embodiment.
In particular implementations, processor 52(52-1 and 52-2) may include one or more CPUs, such as CPU0 and CPU1 shown in FIG. 14, for example, as one embodiment. And as an example, the network private connection identifying means may include a plurality of processors 52, such as the processor 52-1 and the processor 52-2 shown in fig. 14. Each of the processors 52 may be a single-Core Processor (CPU) or a multi-Core Processor (CPU). Processor 52 may refer herein to one or more devices, circuits, and/or processing cores that process data (e.g., computer program instructions).
The memory 51 may be, but is not limited to, a read-only memory 51 (ROM) or other type of static storage device that may store static information and instructions, a Random Access Memory (RAM) or other type of dynamic storage device that may store information and instructions, an electrically erasable programmable read-only memory (EEPROM), a compact disc read-only memory (CD-ROM) or other optical disc storage, optical disc storage (including compact disc, laser disc, optical disc, digital versatile disc, blu-ray disc, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. The memory 51 may be self-contained and coupled to the processor 52 via a bus 53. The memory 51 may also be integrated with the processor 52.
In a specific implementation, the memory 51 is used for storing data in the present application and computer-executable instructions corresponding to software programs for executing the present application. The processor 52 may recognize various functions of the device by running or executing software programs stored in the memory 51 and calling data stored in the memory 51.
The communication interface 54 is any device, such as a transceiver, for communicating with other devices or communication networks, such as a control system, a Radio Access Network (RAN), a Wireless Local Area Network (WLAN), and the like. The communication interface 54 may include a receiving unit implementing a receiving function and a transmitting unit implementing a transmitting function.
The bus 53 may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. The bus 53 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 14, but this is not intended to represent only one bus or type of bus.
The embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium includes computer-executable instructions, and when the computer-executable instructions are run on a computer, the computer is enabled to execute the network private connection identification method provided in the foregoing embodiment.
The embodiment of the invention also provides a computer program which can be directly loaded into the memory and contains software codes, and the computer program can realize the network private access identification method provided by the embodiment after being loaded and executed by the computer.
Those skilled in the art will recognize that, in one or more of the examples described above, the functions described in this invention may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, the functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
Through the above description of the embodiments, it is clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device may be divided into different functional modules to complete all or part of the above described functions.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules or units is only one logical function division, and there may be other division ways in actual implementation. For example, various elements or components may be combined or may be integrated into another device, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form. Units described as separate parts may or may not be physically separate, and parts displayed as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed to a plurality of different places. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributed to by the prior art, or all or part of the technical solutions may be embodied in the form of a software product, where the software product is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a U disk, a removable hard disk, a ROM, a RAM, a magnetic disk, or an optical disk.
The above description is only for the specific embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.