CN110224897A - Vulnerable network test method, device, mobile device and the storage medium of application program - Google Patents
Vulnerable network test method, device, mobile device and the storage medium of application program Download PDFInfo
- Publication number
- CN110224897A CN110224897A CN201910561118.4A CN201910561118A CN110224897A CN 110224897 A CN110224897 A CN 110224897A CN 201910561118 A CN201910561118 A CN 201910561118A CN 110224897 A CN110224897 A CN 110224897A
- Authority
- CN
- China
- Prior art keywords
- network
- packet
- parameter
- vulnerable
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0823—Errors, e.g. transmission errors
- H04L43/0829—Packet loss
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0852—Delays
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0852—Delays
- H04L43/087—Jitter
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/50—Testing arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The present invention provides vulnerable network test method, device, mobile device and the storage mediums of application program, mobile device applied to the destination application for being equipped with vulnerable network test application program and the test of pending vulnerable network, vulnerable network test application program obtains the network packet transmitted between the destination application and the destination server, carries out vulnerable network control to the network packet according to preset vulnerable network parameter.Based on the above method and device, user directly can carry out vulnerable network configuration to application program on the mobile apparatus and simplify the vulnerable network test process to the application program installed in mobile device without relying on other equipment and other tools.
Description
Technical field
The present invention relates to technical field of network test, and more specifically, it relates to a kind of tests of the vulnerable network of application program
Method, apparatus, mobile device and storage medium.
Background technique
Android (Android) is the operating system of a kind of freedom based on Linux and open source code, is mainly used in shifting
Dynamic equipment by Google company and open mobile phone alliance leader and is developed such as smart phone and tablet computer.For carrying
For the mobile device (hereinafter referred to as Android mobile device) of Android operation system, Android application program is its main structure
At part, its diversity and multifunctionality are realized.Since the operation of most Android application programs needs to rely on network, because
This, by simulation vulnerable network environment with test Android application program under vulnerable network environment with the presence or absence of abnormal behavior or
Security risk seems particularly necessary.
Currently, commonly to the mode master of the vulnerable network test for the Android application program installed in Android mobile device
There is the following two kinds:
The first, installs vulnerable network testing tool, such as on PC (PersonalComputer, personal computer)
Fiddler, Charless, NET-Simulator etc. simulate vulnerable network ring by the vulnerable network testing tool installed on PC
Android mobile device is connected on PC by border, to realize the weak net to the Android application program installed in Android mobile device
Network test.
Second, vulnerable network environment is simulated by constructing vulnerable network Wi-Fi in private server, Android movement is set
It is standby to be connected to vulnerable network Wi-Fi, to realize that the vulnerable network to the Android application program installed in Android mobile device is tested.
But above two mode needs to dispose additional tool configuration vulnerable network environment in other equipment, causes pair
The vulnerable network test and comparison for the Android application program installed in Android mobile device is cumbersome.
Summary of the invention
In view of this, the present invention provides vulnerable network test method, device, mobile device and the storages of a kind of application program
Medium enables a user to that vulnerable network test can be carried out to the application program installed in mobile device using plain mode.
To achieve the above object, on the one hand, this application provides a kind of vulnerable network test method of application program, the sides
Method includes:
Determine the destination application and target corresponding with destination application clothes of pending vulnerable network test
Business device;
Obtain the network packet transmitted between the destination application and the destination server;
Vulnerable network control is carried out to the network packet according to preset vulnerable network parameter.
In one possible implementation, described weak to network packet progress according to preset vulnerable network parameter
Network-control, comprising:
According to preset delay parameter, delay jitter parameter, random packet loss parameter and continual data package dropout parameter to the net
Network data packet carries out weak network control system.
It is described to be joined according to preset according to preset delay parameter, delay jitter in another possible implementation
Number, random packet loss parameter and uplink continual data package dropout parameter carry out weak network control system to the network packet, comprising:
Judge whether the network packet meets the random packet loss parameter and the continual data package dropout parameter is corresponding
Packet loss condition;
If it is satisfied, then the network packet is abandoned;
If conditions are not met, then calculating the network packet according to the delay parameter and the delay jitter parameter
It is expected that sending instant;
In the expected sending instant, the network packet is sent.
It is described to be calculated according to the delay parameter and the delay jitter parameter in another possible implementation
The expection sending instant of the network packet, comprising:
Determine current network inherent delay;
The network is calculated according to the current network inherent delay, the delay parameter and the delay jitter parameter
The expection sending instant of data packet.
Another aspect, present invention also provides a kind of vulnerable network test device of application program, described device includes:
Determination unit, for determine the test of pending vulnerable network destination application and with the destination application
Corresponding destination server;
Network packet acquiring unit is transmitted between the destination application and the destination server for obtaining
Network packet;
Vulnerable network control unit, for carrying out vulnerable network control to the network packet according to preset vulnerable network parameter
System.
Another aspect, present invention also provides a kind of mobile devices characterized by comprising
Processor and memory;
Wherein, the processor is for executing the program stored in the memory;
For storing program, described program is at least used for the memory:
Determine the destination application and target corresponding with destination application clothes of pending vulnerable network test
Business device;
Obtain the network packet transmitted between the destination application and the destination server;
Vulnerable network control is carried out to the network packet according to preset vulnerable network parameter.
It is executable to be stored with computer present invention also provides a kind of storage medium for another aspect in the storage medium
Instruction, when the computer executable instructions are loaded and executed by processor, realizes the vulnerable network of application program as described above
Test method.
It can be seen via above technical scheme that compared with prior art, the present invention provides a kind of weak nets of application program
Network test method, device, mobile device and storage medium, applied to being equipped with vulnerable network test application program and pending weak net
The mobile device of the destination application of network test, vulnerable network test application program obtain the destination application and the mesh
The network packet transmitted between mark server carries out vulnerable network control to the network packet according to preset vulnerable network parameter
System.Based on the above method and device, user directly can carry out vulnerable network configuration to application program on the mobile apparatus, without according to
Rely other equipment and other tools, simplifies the vulnerable network test process to the application program installed in mobile device.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is the structure composed schematic diagram of the vulnerable network test macro of application program provided in an embodiment of the present invention;
Fig. 2 is the flow chart of the vulnerable network test method of application program provided in an embodiment of the present invention;
Fig. 3 is a variety of vulnerable network test template schematic diagrames of vulnerable network test application program provided in an embodiment of the present invention;
Fig. 4 is the corresponding parameter assignment schematic diagram of vulnerable network test template provided in an embodiment of the present invention;
Fig. 5 be it is provided in an embodiment of the present invention according to preset according to preset delay parameter, it is delay jitter parameter, random
Packet loss parameter and continual data package dropout parameter carry out the method flow diagram of weak network control to the network packet;
Fig. 6 is the time diagram of the application examples of the vulnerable network test method of application program provided in an embodiment of the present invention;
Fig. 7 is the structural block diagram of the vulnerable network test device of application program provided in an embodiment of the present invention;
Fig. 8 is a kind of composed structure schematic diagram of mobile device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
In order to make it easy to understand, the structure composed for the system being first applicable in the scheme of the application is introduced.Such as, referring to figure
1, it illustrates a kind of structure composed schematic diagrames of the vulnerable network test macro of application program of the application.
As shown in Figure 1, the vulnerable network test macro of the application program includes: server 101 and mobile device 102.
The server 101 is server corresponding with application program to be measured.The server can be an independent service
Device, or server cluster, or the distributed type assemblies being made of multiple servers.
The mobile device 102 is the client where application program to be measured and vulnerable network test application program.It specifically can be with
For smart phone, tablet computer etc..Referring to Fig.1, A, B, C, D, E, F, G, H, I, J, K, L, M are that user pacifies in the mobile device
The icon of the certain applications program of dress includes application program to be measured and vulnerable network test application program in these application programs.
Vulnerable network test macro based on application program shown in FIG. 1, below with the angle of mobile device, to of the invention real
The vulnerable network test method for applying the application program of example offer is introduced.
Fig. 2 is the flow chart of the vulnerable network test method of application program provided in an embodiment of the present invention, and this method can be applied
In the vulnerable network test application program installed in the mobile device, referring to Fig. 2, the method may include:
S201: the destination application and mesh corresponding with the destination application of pending vulnerable network test are determined
Mark server.
The destination application of pending vulnerable network test is any one in the application program installed in mobile device
Application program, destination server corresponding with destination application are in destination application operational process for target application
The server of program offer background service.
In the present embodiment, pending weak net can be determined by the selection instruction that mobile device is sent by receiving user
The destination application of network test.It, can be true according to the configuration information of destination application after determining destination application
Fixed corresponding destination server.
S202: the network packet transmitted between the destination application and the destination server is obtained.
In the present embodiment, the network packet transmitted between the destination application and the destination server includes
The destination application is sent to the network packet of the destination server, also includes that the destination server is sent to institute
State the network packet of destination application.
It should be noted that in embodiments of the present invention, the target element that can use in the mobile device obtains institute
State the network packet transmitted between destination application and the destination server.As an embodiment, when described
It, can be in favor of described in the acquisition of the VpnService component in the mobile device when mobile device carries Android operation system
The network packet transmitted between destination application and the destination server.
S203: vulnerable network control is carried out to the network packet according to preset vulnerable network parameter.
In the present embodiment, preset vulnerable network parameter include delay parameter, delay jitter parameter, random packet loss parameter,
Continual data package dropout parameter etc., these parameters can be vulnerable network test application program when being installed to mobile device, in configuration file
Default setting it is good.
A variety of vulnerable network test templates can be preset in the configuration file of vulnerable network test application program, specifically such as Fig. 3 institute
Line delay up and down 100, continual data package dropout, 100% packet loss shown, delay parameter, delay jitter ginseng in each vulnerable network test template
Number, random packet loss parameter, the assignment of continual data package dropout parameter are different, as " upper and lower line delay 100 " this vulnerable network tests mould in Fig. 3
After the corresponding parameter assignment of plate is as shown in figure 4, user selectes some vulnerable network test template, vulnerable network test application program is
Vulnerable network control can be carried out to the network packet according to the template corresponding vulnerable network parameter.
In addition, user can also be by editing delay parameter, delay jitter parameter, random packet loss parameter, continual data package dropout parameter
Customized vulnerable network test template is generated, vulnerable network test application program can test mould according to the customized vulnerable network of user
The corresponding vulnerable network parameter of plate carries out vulnerable network control to the network packet, is not limited in any way to this application.
The vulnerable network test method for present embodiments providing a kind of application program, applied to being equipped with vulnerable network test application
The mobile device of program and the destination application of pending vulnerable network test, vulnerable network test application program obtain the target
The network packet transmitted between application program and the destination server, according to preset vulnerable network parameter to the network number
Vulnerable network control is carried out according to packet.Based on the above method, user directly can carry out vulnerable network to application program on the mobile apparatus
Configuration simplifies the vulnerable network test to the application program installed in mobile device without relying on other equipment and other tools
Process.
Preferably, Fig. 5 show it is provided in an embodiment of the present invention according to it is preset according to preset delay parameter, delay tremble
Dynamic parameter, random packet loss parameter and continual data package dropout parameter carry out the method flow diagram of weak network control to the network packet,
Referring to Fig. 5, this method may include:
S301: judge whether the network packet meets the random packet loss parameter and the continual data package dropout parameter pair
The packet loss condition answered;If it is satisfied, then S302 is executed, if conditions are not met, then executing S303 and S304.
In the present embodiment, in preset vulnerable network test template and customized vulnerable network test template, delay ginseng
Number, delay jitter parameter, random packet loss parameter and continual data package dropout parameter will not possess valid value, such as random packet loss parameter simultaneously
And continual data package dropout parameter is under normal circumstances, one of them is only arranged.
As an example, the random packet loss parameter is 100%, then corresponding packet loss condition is to obtain a network number
A network packet is just abandoned according to packet.Continual data package dropout parameter is 0 at this time.
As another example, the continual data package dropout parameter be 8000 (clearance)/2000 (packet loss), then packet loss condition be with
10s is unit, and the network packet obtained in preceding 8s is all let pass, and the network packet obtained in rear 2s all abandons.
S302: the network packet is abandoned.
S303: the expected of the network packet is calculated according to the delay parameter and the delay jitter parameter and is sent
Moment.
In embodiments of the present invention, when calculating the expection sending instant of the network packet, it is contemplated that current network
Inherent delay, for being adapted to the delay of user setting, for example the delay of user setting is 200ms, if current network is intrinsic
Delay is 50ms, then the expection sending instant of the network packet is then the 150ms after current time.
Show that delay jitter parameter is 50ms, then the expected of the network packet sends for example, delay parameter is 100ms
Moment=current time+100ms+50ms- current network inherent delay.
Under normal circumstances, vulnerable network test application program can go acquisition current network solid with the ping utility of call instruction row
There is delay.Specifically, then destination server can return a reply data by sending detection data packet to destination server
Packet in this way the calculating time difference, can obtain current network inherent delay.But in this application, the operating system of mobile device
Network packet of the target element in addition to destination application can be intercepted and captured, can also intercept the network of vulnerable network test application program
Data packet.Moreover, the Socket object that the Java layer of operating system is packed only supports TCP and udp protocol, lead to ping tool
Although probe data packet is intercepted and captured by target element, have no idea to be forwarded to destination server at Java layers, is based on this, this
In application, in native layers of construction detection data packet of operating system that the mobile device of the destination application is carried;By institute
Detection data wrapping is stated to open the target element and be sent to the destination server so that the destination server receive it is described
Reply data packet is returned after probe data packet, and records sending instant;According to the transmission probe data packet to the target
At the time of server, and, current network inherent delay is determined at the time of receiving the reply data packet.
As an embodiment, when the mobile device carries Android operation system, in the target application
Native layers of construction Internet Control Message agreement ICMP data packet of Android operation system that the mobile device of program is carried;
The ICMP data packet is got around into the VpnService component and is sent to the destination server, so that the destination server
It receives the ICMP data packet and returns to reply data packet later, and record sending instant;According to the transmission ICMP data packet
At the time of to the destination server, and, current network inherent delay is determined at the time of receiving the reply data packet.
S304: in the expected sending instant, the network packet is sent.
It is that the network packet is sent to destination server in the expected sending instant for uplink, it is right
It is that the network packet is sent to destination application in the expected sending instant for downlink.
In this application, the target element that can use in the mobile device of the destination application obtains the target
The network packet transmitted between application program and the destination server tests knot to obtain the vulnerable network of application program
Fruit then needs to analyze these network packets.It is preferred, therefore, that the network packet that the present invention can also will acquire
It is packaged into the data file that network package analysis tool can identify;Data file after encapsulation is sent to the network package
Analysis tool is analyzed, to obtain the vulnerable network test result to the destination application.As an example, network seals
Packet analysis tool can be wireshark software, and the data file that the corresponding network package analysis tool can identify is
Pcap file.Other corresponding data files of network package tool set are also within the application protection scope.
The application examples of the vulnerable network test method of application program provided in an embodiment of the present invention can be such that
Fig. 6 is the time diagram of the application examples of the vulnerable network test method of application program provided in an embodiment of the present invention,
In the application example, realizing that vulnerable network is surveyed when testing the vulnerable network of destination application using vulnerable network test application program
Examination application program has been applied to the weak network control thread of downlink, VpnServer component, the weak network control thread of uplink, TCP/UDP
Server。
Specifically, the interface provided using VpnService component, obtains the uplink network number that destination application is sent
According at this point, the source IP address of the uplink network data is the local ip address of mobile device and purpose IP address is destination service
The address of device.VpnService component handles uplink network data, the source port number for uplink network data that treated
For the interface that the VpnService component provides, destination slogan is the interface that TCP/UDPserver component provides;
Treated that uplink network data are added to uplink weak network control queue (this treatment process figure by described for VpnService component
In be not shown);The weak network control thread of uplink obtains uplink network data from the weak network control queue of uplink, is implemented using the application
After the vulnerable network test method for the application program that example provides carries out vulnerable network control to uplink network data, it is sent to TCP/UDP
Uplink network data are sent to destination server by TCP/UDP Server by Server.
Destination server generates downlink network data according to uplink network data;And downlink network data are sent to TCP/
Downlink network data are sent to VpnService component by UDP Server component, TCP/UDP Server component;
Downlink network data are sent to the weak network control queue of downlink (being not shown in Fig. 6), the weak network control system of downlink by VpnService component
Thread obtains downlink network data from the weak network control queue of downlink, and using the weak of application program provided by the embodiments of the present application
Downlink network data are sent to target and answered by network test method later to the downlink network data progress weak network control system of downlink
Use program.
It should be noted that above-mentioned downlink network data and uplink network data may include multiple network packets, it is right
Each network packet is all made of weak network control method provided by the embodiments of the present application and is controlled.
It can be seen that based on the application examples and movement set only with the vulnerable network test application program installed in mobile device
The other applications of standby upper installation carry out vulnerable network test.
The vulnerable network test device of application program provided in an embodiment of the present invention is introduced below, it is described below to answer
With the vulnerable network test device of program reference can be corresponded to each other with the vulnerable network test method of application program.
Fig. 7 is the structural block diagram of the vulnerable network test device of application program provided in an embodiment of the present invention, the application program
Vulnerable network test device be specifically as follows the client of application program, referring to Fig. 7, which may include:
Determination unit 71, for determine the test of pending vulnerable network destination application and with the target application journey
The corresponding destination server of sequence;
Network packet acquiring unit 72 is transmitted between the destination application and the destination server for obtaining
Network packet;
Vulnerable network control unit 73, for carrying out vulnerable network control to the network packet according to preset vulnerable network parameter
System.
The function of above-mentioned each unit realizes and is described in detail in embodiment of the method part that this embodiment is not repeated.
On the other hand, present invention also provides a kind of mobile devices, and such as referring to Fig. 8, it illustrates the movements of the application to set
A kind of standby composed structure schematic diagram, the mobile device 1100 of the present embodiment may include: processor 1101 and memory 1102.
Optionally, which can also include communication interface 1103, input unit 1104 and display 1105 and lead to
Believe bus 1106.
Processor 1101, communication interface 1103, input unit 1104, display 1105, passes through communication at memory 1102
Bus 1106 completes mutual communication.
In the embodiment of the present application, the processor 1101 can be central processing unit (Central Processing
Unit, CPU), application-specific integrated circuit, digital signal processor, ready-made programmable gate array or other programmable logic
Device etc..
The processor can call the program stored in memory 1102.Specifically, processor can be with executing application
Vulnerable network test method embodiment in operation performed by mobile device.
For storing one or more than one program in memory 1102, program may include program code, the journey
Sequence code includes computer operation instruction, in the embodiment of the present application, is at least stored in the memory for realizing following function
The program of energy:
Determine the destination application and target corresponding with destination application clothes of pending vulnerable network test
Business device;
Obtain the network packet transmitted between the destination application and the destination server;
Vulnerable network control is carried out to the network packet according to preset vulnerable network parameter.
In one possible implementation, which may include storing program area and storage data area, wherein
Storing program area can application program needed for storage program area and at least one function (such as image player function etc.)
Deng;Storage data area can store the data created in the use process according to computer, for example, user data, user's access
Data and audio, video, image data etc..
In addition, memory 1102 may include high-speed random access memory, it can also include nonvolatile memory, example
Such as at least one disk memory or other volatile solid-state parts.
The communication interface 1103 can be the interface of communication module, such as the interface of gsm module.
The application can also include display 1104 and input unit 1105 etc..
Certainly, the structure of mobile device shown in Fig. 8 does not constitute the restriction to mobile device in the embodiment of the present application,
Mobile device may include than more or fewer components shown in Fig. 8, or the certain components of combination in practical application.
On the other hand, the embodiment of the present application also provides a kind of storage medium, computer is stored in the storage medium
Executable instruction when the computer executable instructions are loaded and executed by processor, is realized in as above any one embodiment
The vulnerable network test method for the application program that mobile device executes.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight
Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other.
For device class embodiment, since it is basically similar to the method embodiment, so being described relatively simple, related place ginseng
See the part explanation of embodiment of the method.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that
A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or
The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except there is also other identical elements in the process, method, article or equipment for including element.
The foregoing description of the disclosed embodiments can be realized those skilled in the art or using the present invention.To this
A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and the general principles defined herein can
Without departing from the spirit or scope of the present invention, to realize in other embodiments.Therefore, the present invention will not be limited
It is formed on the embodiments shown herein, and is to fit to consistent with the principles and novel features disclosed in this article widest
Range.
The above is only the preferred embodiment of the present invention, it is noted that those skilled in the art are come
It says, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should be regarded as
Protection scope of the present invention.
Claims (10)
1. a kind of vulnerable network test method of application program, which is characterized in that the described method includes:
Determine the destination application and destination server corresponding with the destination application of pending vulnerable network test;
Obtain the network packet transmitted between the destination application and the destination server;
Vulnerable network control is carried out to the network packet according to preset vulnerable network parameter.
2. the method according to claim 1, wherein described obtain the destination application and target clothes
The network packet transmitted between business device, comprising:
The destination application and the target are obtained using the target element in the mobile device of the destination application
The network packet transmitted between server.
3. according to the method described in claim 2, it is characterized in that, it is described according to preset vulnerable network parameter to the network number
Vulnerable network control is carried out according to packet, comprising:
According to preset delay parameter, delay jitter parameter, random packet loss parameter and continual data package dropout parameter to the network number
Weak network control system is carried out according to packet.
4. according to the method described in claim 3, it is characterized in that, it is described according to preset according to preset delay parameter, prolong
When jitter parameter, random packet loss parameter and uplink continual data package dropout parameter weak network control system is carried out to the network packet, comprising:
Judge whether the network packet meets the random packet loss parameter and the corresponding packet loss of the continual data package dropout parameter
Condition;
If it is satisfied, then the network packet is abandoned;
If conditions are not met, then calculating the expection of the network packet according to the delay parameter and the delay jitter parameter
Sending instant;
In the expected sending instant, the network packet is sent.
5. according to the method described in claim 4, it is characterized in that, described according to the delay parameter and the delay jitter
Parameter calculates the expection sending instant of the network packet, comprising:
Determine current network inherent delay;
The network data is calculated according to the current network inherent delay, the delay parameter and the delay jitter parameter
The expection sending instant of packet.
6. according to the method described in claim 5, it is characterized in that, the determining current network inherent delay, comprising:
In native layers of construction detection data packet of operating system that the mobile device of the destination application is carried;
The target element is opened into detection data wrapping and is sent to the destination server, so that the destination server connects
It receives the probe data packet and returns to reply data packet later, and record sending instant;
At the time of according to the probe data packet to the destination server is sent, and, receive the reply data packet
Moment determines current network inherent delay.
7. the method according to claim 1, wherein the method also includes:
The network packet that will acquire is packaged into the data file that network package analysis tool can identify;
Data file after encapsulation is sent to the network package analysis tool to analyze, to obtain to the target application
The vulnerable network test result of program.
8. a kind of vulnerable network test device of application program, which is characterized in that described device includes:
Determination unit, for determining the destination application of pending vulnerable network test and corresponding with the destination application
Destination server;
Network packet acquiring unit, for obtaining the network transmitted between the destination application and the destination server
Data packet;
Vulnerable network control unit, for carrying out vulnerable network control to the network packet according to preset vulnerable network parameter.
9. a kind of mobile device characterized by comprising
Processor and memory;
Wherein, the processor is for executing the program stored in the memory;
For storing program, described program is at least used for the memory:
Determine the destination application and destination server corresponding with the destination application of pending vulnerable network test;
Obtain the network packet transmitted between the destination application and the destination server;
Vulnerable network control is carried out to the network packet according to preset vulnerable network parameter.
10. a kind of storage medium, which is characterized in that be stored with computer executable instructions, the calculating in the storage medium
When machine executable instruction is loaded and executed by processor, the weak of the described in any item application programs of claim 1 to 7 as above is realized
Network test method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910561118.4A CN110224897B (en) | 2019-06-26 | 2019-06-26 | Weak network testing method and device of application program, mobile device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910561118.4A CN110224897B (en) | 2019-06-26 | 2019-06-26 | Weak network testing method and device of application program, mobile device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110224897A true CN110224897A (en) | 2019-09-10 |
CN110224897B CN110224897B (en) | 2022-10-04 |
Family
ID=67814818
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910561118.4A Active CN110224897B (en) | 2019-06-26 | 2019-06-26 | Weak network testing method and device of application program, mobile device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110224897B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113472607A (en) * | 2021-06-29 | 2021-10-01 | 未鲲(上海)科技服务有限公司 | Application program network environment detection method, device, equipment and storage medium |
CN114143213A (en) * | 2021-11-30 | 2022-03-04 | 中国工商银行股份有限公司 | Mapping test system, method, device, computer equipment and storage medium |
CN114710429A (en) * | 2022-03-28 | 2022-07-05 | 重庆长安汽车股份有限公司 | Weak network simulation system and method and weak network vehicle unloading machine test method |
CN115021831A (en) * | 2022-06-22 | 2022-09-06 | 北京有竹居网络技术有限公司 | Weak network testing method, device, system, equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105227569A (en) * | 2015-10-16 | 2016-01-06 | 百度在线网络技术(北京)有限公司 | The data pack transmission method of application and device |
CN106375142A (en) * | 2016-08-26 | 2017-02-01 | 腾讯科技(深圳)有限公司 | Application program test method and apparatus |
CN108664395A (en) * | 2018-04-26 | 2018-10-16 | 武汉斗鱼网络科技有限公司 | Applied program testing method, device, equipment and storage medium |
-
2019
- 2019-06-26 CN CN201910561118.4A patent/CN110224897B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105227569A (en) * | 2015-10-16 | 2016-01-06 | 百度在线网络技术(北京)有限公司 | The data pack transmission method of application and device |
CN106375142A (en) * | 2016-08-26 | 2017-02-01 | 腾讯科技(深圳)有限公司 | Application program test method and apparatus |
CN108664395A (en) * | 2018-04-26 | 2018-10-16 | 武汉斗鱼网络科技有限公司 | Applied program testing method, device, equipment and storage medium |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113472607A (en) * | 2021-06-29 | 2021-10-01 | 未鲲(上海)科技服务有限公司 | Application program network environment detection method, device, equipment and storage medium |
CN114143213A (en) * | 2021-11-30 | 2022-03-04 | 中国工商银行股份有限公司 | Mapping test system, method, device, computer equipment and storage medium |
CN114143213B (en) * | 2021-11-30 | 2024-03-26 | 中国工商银行股份有限公司 | Benchmarking test system, benchmarking test method, benchmarking test device, benchmarking test computer equipment and benchmarking test storage medium |
CN114710429A (en) * | 2022-03-28 | 2022-07-05 | 重庆长安汽车股份有限公司 | Weak network simulation system and method and weak network vehicle unloading machine test method |
CN115021831A (en) * | 2022-06-22 | 2022-09-06 | 北京有竹居网络技术有限公司 | Weak network testing method, device, system, equipment and storage medium |
CN115021831B (en) * | 2022-06-22 | 2024-03-12 | 北京有竹居网络技术有限公司 | Weak network test method, device, system, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110224897B (en) | 2022-10-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110224897A (en) | Vulnerable network test method, device, mobile device and the storage medium of application program | |
US8874736B2 (en) | Event extractor | |
EP3974994A1 (en) | Dynamic tracing control for edge computing with containers and microservices | |
US20210112090A1 (en) | Network visualization, intrusion detection, and network healing | |
US20190052551A1 (en) | Cloud verification and test automation | |
US11032126B2 (en) | Diagnostic traffic generation for automatic testing and troubleshooting | |
CN108256118B (en) | Data processing method, device, system, computing equipment and storage medium | |
CN105787364B (en) | Automatic testing method, device and system for tasks | |
US9559915B2 (en) | System and method for dynamically testing networked target systems | |
CN108632110A (en) | Equipment performance test method, system, computer equipment and storage medium | |
US11159416B1 (en) | Systems and methods of testing virtual private network communications using remote connectivity | |
CN108718347A (en) | A kind of domain name analytic method, system, device and storage medium | |
CN105068876A (en) | Method for acquiring mobile phone APP performance data based on distributed true phones | |
CN109815115A (en) | Method and device, the computer equipment, storage medium of debugging bridge joint mouth | |
CN115643112A (en) | Method and device for testing safety protection capability | |
US11677650B2 (en) | Network flow attribution in service mesh environments | |
CN109922484A (en) | A kind of test method and test device | |
CN104992112A (en) | Method and device used for detecting sensitive information leakage of Android | |
CN111526028B (en) | Data processing method, device and equipment | |
CN110874276B (en) | Cross-process communication method and device and computer readable storage medium | |
Schneider et al. | A generic emulation framework for reusing and evaluating vnf placement algorithms | |
CN103581980B (en) | Network impairment simulation system and method | |
Alvarenga et al. | RIO: A denial of service experimentation platform in a Future Internet Testbed | |
Santos | Net neutrality in the 5G/6G era | |
CN107885659A (en) | Method and device, the equipment of request analog response to client |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |