CN110224897A - Vulnerable network test method, device, mobile device and the storage medium of application program - Google Patents

Vulnerable network test method, device, mobile device and the storage medium of application program Download PDF

Info

Publication number
CN110224897A
CN110224897A CN201910561118.4A CN201910561118A CN110224897A CN 110224897 A CN110224897 A CN 110224897A CN 201910561118 A CN201910561118 A CN 201910561118A CN 110224897 A CN110224897 A CN 110224897A
Authority
CN
China
Prior art keywords
network
packet
parameter
vulnerable
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910561118.4A
Other languages
Chinese (zh)
Other versions
CN110224897B (en
Inventor
邹越
肖央
张鹏
彭凤婷
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Information Technology Co Ltd
Original Assignee
Shenzhen Tencent Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Information Technology Co Ltd filed Critical Shenzhen Tencent Information Technology Co Ltd
Priority to CN201910561118.4A priority Critical patent/CN110224897B/en
Publication of CN110224897A publication Critical patent/CN110224897A/en
Application granted granted Critical
Publication of CN110224897B publication Critical patent/CN110224897B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors
    • H04L43/0829Packet loss
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0852Delays
    • H04L43/087Jitter
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The present invention provides vulnerable network test method, device, mobile device and the storage mediums of application program, mobile device applied to the destination application for being equipped with vulnerable network test application program and the test of pending vulnerable network, vulnerable network test application program obtains the network packet transmitted between the destination application and the destination server, carries out vulnerable network control to the network packet according to preset vulnerable network parameter.Based on the above method and device, user directly can carry out vulnerable network configuration to application program on the mobile apparatus and simplify the vulnerable network test process to the application program installed in mobile device without relying on other equipment and other tools.

Description

Vulnerable network test method, device, mobile device and the storage medium of application program
Technical field
The present invention relates to technical field of network test, and more specifically, it relates to a kind of tests of the vulnerable network of application program Method, apparatus, mobile device and storage medium.
Background technique
Android (Android) is the operating system of a kind of freedom based on Linux and open source code, is mainly used in shifting Dynamic equipment by Google company and open mobile phone alliance leader and is developed such as smart phone and tablet computer.For carrying For the mobile device (hereinafter referred to as Android mobile device) of Android operation system, Android application program is its main structure At part, its diversity and multifunctionality are realized.Since the operation of most Android application programs needs to rely on network, because This, by simulation vulnerable network environment with test Android application program under vulnerable network environment with the presence or absence of abnormal behavior or Security risk seems particularly necessary.
Currently, commonly to the mode master of the vulnerable network test for the Android application program installed in Android mobile device There is the following two kinds:
The first, installs vulnerable network testing tool, such as on PC (PersonalComputer, personal computer) Fiddler, Charless, NET-Simulator etc. simulate vulnerable network ring by the vulnerable network testing tool installed on PC Android mobile device is connected on PC by border, to realize the weak net to the Android application program installed in Android mobile device Network test.
Second, vulnerable network environment is simulated by constructing vulnerable network Wi-Fi in private server, Android movement is set It is standby to be connected to vulnerable network Wi-Fi, to realize that the vulnerable network to the Android application program installed in Android mobile device is tested.
But above two mode needs to dispose additional tool configuration vulnerable network environment in other equipment, causes pair The vulnerable network test and comparison for the Android application program installed in Android mobile device is cumbersome.
Summary of the invention
In view of this, the present invention provides vulnerable network test method, device, mobile device and the storages of a kind of application program Medium enables a user to that vulnerable network test can be carried out to the application program installed in mobile device using plain mode.
To achieve the above object, on the one hand, this application provides a kind of vulnerable network test method of application program, the sides Method includes:
Determine the destination application and target corresponding with destination application clothes of pending vulnerable network test Business device;
Obtain the network packet transmitted between the destination application and the destination server;
Vulnerable network control is carried out to the network packet according to preset vulnerable network parameter.
In one possible implementation, described weak to network packet progress according to preset vulnerable network parameter Network-control, comprising:
According to preset delay parameter, delay jitter parameter, random packet loss parameter and continual data package dropout parameter to the net Network data packet carries out weak network control system.
It is described to be joined according to preset according to preset delay parameter, delay jitter in another possible implementation Number, random packet loss parameter and uplink continual data package dropout parameter carry out weak network control system to the network packet, comprising:
Judge whether the network packet meets the random packet loss parameter and the continual data package dropout parameter is corresponding Packet loss condition;
If it is satisfied, then the network packet is abandoned;
If conditions are not met, then calculating the network packet according to the delay parameter and the delay jitter parameter It is expected that sending instant;
In the expected sending instant, the network packet is sent.
It is described to be calculated according to the delay parameter and the delay jitter parameter in another possible implementation The expection sending instant of the network packet, comprising:
Determine current network inherent delay;
The network is calculated according to the current network inherent delay, the delay parameter and the delay jitter parameter The expection sending instant of data packet.
Another aspect, present invention also provides a kind of vulnerable network test device of application program, described device includes:
Determination unit, for determine the test of pending vulnerable network destination application and with the destination application Corresponding destination server;
Network packet acquiring unit is transmitted between the destination application and the destination server for obtaining Network packet;
Vulnerable network control unit, for carrying out vulnerable network control to the network packet according to preset vulnerable network parameter System.
Another aspect, present invention also provides a kind of mobile devices characterized by comprising
Processor and memory;
Wherein, the processor is for executing the program stored in the memory;
For storing program, described program is at least used for the memory:
Determine the destination application and target corresponding with destination application clothes of pending vulnerable network test Business device;
Obtain the network packet transmitted between the destination application and the destination server;
Vulnerable network control is carried out to the network packet according to preset vulnerable network parameter.
It is executable to be stored with computer present invention also provides a kind of storage medium for another aspect in the storage medium Instruction, when the computer executable instructions are loaded and executed by processor, realizes the vulnerable network of application program as described above Test method.
It can be seen via above technical scheme that compared with prior art, the present invention provides a kind of weak nets of application program Network test method, device, mobile device and storage medium, applied to being equipped with vulnerable network test application program and pending weak net The mobile device of the destination application of network test, vulnerable network test application program obtain the destination application and the mesh The network packet transmitted between mark server carries out vulnerable network control to the network packet according to preset vulnerable network parameter System.Based on the above method and device, user directly can carry out vulnerable network configuration to application program on the mobile apparatus, without according to Rely other equipment and other tools, simplifies the vulnerable network test process to the application program installed in mobile device.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is the structure composed schematic diagram of the vulnerable network test macro of application program provided in an embodiment of the present invention;
Fig. 2 is the flow chart of the vulnerable network test method of application program provided in an embodiment of the present invention;
Fig. 3 is a variety of vulnerable network test template schematic diagrames of vulnerable network test application program provided in an embodiment of the present invention;
Fig. 4 is the corresponding parameter assignment schematic diagram of vulnerable network test template provided in an embodiment of the present invention;
Fig. 5 be it is provided in an embodiment of the present invention according to preset according to preset delay parameter, it is delay jitter parameter, random Packet loss parameter and continual data package dropout parameter carry out the method flow diagram of weak network control to the network packet;
Fig. 6 is the time diagram of the application examples of the vulnerable network test method of application program provided in an embodiment of the present invention;
Fig. 7 is the structural block diagram of the vulnerable network test device of application program provided in an embodiment of the present invention;
Fig. 8 is a kind of composed structure schematic diagram of mobile device provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
In order to make it easy to understand, the structure composed for the system being first applicable in the scheme of the application is introduced.Such as, referring to figure 1, it illustrates a kind of structure composed schematic diagrames of the vulnerable network test macro of application program of the application.
As shown in Figure 1, the vulnerable network test macro of the application program includes: server 101 and mobile device 102.
The server 101 is server corresponding with application program to be measured.The server can be an independent service Device, or server cluster, or the distributed type assemblies being made of multiple servers.
The mobile device 102 is the client where application program to be measured and vulnerable network test application program.It specifically can be with For smart phone, tablet computer etc..Referring to Fig.1, A, B, C, D, E, F, G, H, I, J, K, L, M are that user pacifies in the mobile device The icon of the certain applications program of dress includes application program to be measured and vulnerable network test application program in these application programs.
Vulnerable network test macro based on application program shown in FIG. 1, below with the angle of mobile device, to of the invention real The vulnerable network test method for applying the application program of example offer is introduced.
Fig. 2 is the flow chart of the vulnerable network test method of application program provided in an embodiment of the present invention, and this method can be applied In the vulnerable network test application program installed in the mobile device, referring to Fig. 2, the method may include:
S201: the destination application and mesh corresponding with the destination application of pending vulnerable network test are determined Mark server.
The destination application of pending vulnerable network test is any one in the application program installed in mobile device Application program, destination server corresponding with destination application are in destination application operational process for target application The server of program offer background service.
In the present embodiment, pending weak net can be determined by the selection instruction that mobile device is sent by receiving user The destination application of network test.It, can be true according to the configuration information of destination application after determining destination application Fixed corresponding destination server.
S202: the network packet transmitted between the destination application and the destination server is obtained.
In the present embodiment, the network packet transmitted between the destination application and the destination server includes The destination application is sent to the network packet of the destination server, also includes that the destination server is sent to institute State the network packet of destination application.
It should be noted that in embodiments of the present invention, the target element that can use in the mobile device obtains institute State the network packet transmitted between destination application and the destination server.As an embodiment, when described It, can be in favor of described in the acquisition of the VpnService component in the mobile device when mobile device carries Android operation system The network packet transmitted between destination application and the destination server.
S203: vulnerable network control is carried out to the network packet according to preset vulnerable network parameter.
In the present embodiment, preset vulnerable network parameter include delay parameter, delay jitter parameter, random packet loss parameter, Continual data package dropout parameter etc., these parameters can be vulnerable network test application program when being installed to mobile device, in configuration file Default setting it is good.
A variety of vulnerable network test templates can be preset in the configuration file of vulnerable network test application program, specifically such as Fig. 3 institute Line delay up and down 100, continual data package dropout, 100% packet loss shown, delay parameter, delay jitter ginseng in each vulnerable network test template Number, random packet loss parameter, the assignment of continual data package dropout parameter are different, as " upper and lower line delay 100 " this vulnerable network tests mould in Fig. 3 After the corresponding parameter assignment of plate is as shown in figure 4, user selectes some vulnerable network test template, vulnerable network test application program is Vulnerable network control can be carried out to the network packet according to the template corresponding vulnerable network parameter.
In addition, user can also be by editing delay parameter, delay jitter parameter, random packet loss parameter, continual data package dropout parameter Customized vulnerable network test template is generated, vulnerable network test application program can test mould according to the customized vulnerable network of user The corresponding vulnerable network parameter of plate carries out vulnerable network control to the network packet, is not limited in any way to this application.
The vulnerable network test method for present embodiments providing a kind of application program, applied to being equipped with vulnerable network test application The mobile device of program and the destination application of pending vulnerable network test, vulnerable network test application program obtain the target The network packet transmitted between application program and the destination server, according to preset vulnerable network parameter to the network number Vulnerable network control is carried out according to packet.Based on the above method, user directly can carry out vulnerable network to application program on the mobile apparatus Configuration simplifies the vulnerable network test to the application program installed in mobile device without relying on other equipment and other tools Process.
Preferably, Fig. 5 show it is provided in an embodiment of the present invention according to it is preset according to preset delay parameter, delay tremble Dynamic parameter, random packet loss parameter and continual data package dropout parameter carry out the method flow diagram of weak network control to the network packet, Referring to Fig. 5, this method may include:
S301: judge whether the network packet meets the random packet loss parameter and the continual data package dropout parameter pair The packet loss condition answered;If it is satisfied, then S302 is executed, if conditions are not met, then executing S303 and S304.
In the present embodiment, in preset vulnerable network test template and customized vulnerable network test template, delay ginseng Number, delay jitter parameter, random packet loss parameter and continual data package dropout parameter will not possess valid value, such as random packet loss parameter simultaneously And continual data package dropout parameter is under normal circumstances, one of them is only arranged.
As an example, the random packet loss parameter is 100%, then corresponding packet loss condition is to obtain a network number A network packet is just abandoned according to packet.Continual data package dropout parameter is 0 at this time.
As another example, the continual data package dropout parameter be 8000 (clearance)/2000 (packet loss), then packet loss condition be with 10s is unit, and the network packet obtained in preceding 8s is all let pass, and the network packet obtained in rear 2s all abandons.
S302: the network packet is abandoned.
S303: the expected of the network packet is calculated according to the delay parameter and the delay jitter parameter and is sent Moment.
In embodiments of the present invention, when calculating the expection sending instant of the network packet, it is contemplated that current network Inherent delay, for being adapted to the delay of user setting, for example the delay of user setting is 200ms, if current network is intrinsic Delay is 50ms, then the expection sending instant of the network packet is then the 150ms after current time.
Show that delay jitter parameter is 50ms, then the expected of the network packet sends for example, delay parameter is 100ms Moment=current time+100ms+50ms- current network inherent delay.
Under normal circumstances, vulnerable network test application program can go acquisition current network solid with the ping utility of call instruction row There is delay.Specifically, then destination server can return a reply data by sending detection data packet to destination server Packet in this way the calculating time difference, can obtain current network inherent delay.But in this application, the operating system of mobile device Network packet of the target element in addition to destination application can be intercepted and captured, can also intercept the network of vulnerable network test application program Data packet.Moreover, the Socket object that the Java layer of operating system is packed only supports TCP and udp protocol, lead to ping tool Although probe data packet is intercepted and captured by target element, have no idea to be forwarded to destination server at Java layers, is based on this, this In application, in native layers of construction detection data packet of operating system that the mobile device of the destination application is carried;By institute Detection data wrapping is stated to open the target element and be sent to the destination server so that the destination server receive it is described Reply data packet is returned after probe data packet, and records sending instant;According to the transmission probe data packet to the target At the time of server, and, current network inherent delay is determined at the time of receiving the reply data packet.
As an embodiment, when the mobile device carries Android operation system, in the target application Native layers of construction Internet Control Message agreement ICMP data packet of Android operation system that the mobile device of program is carried; The ICMP data packet is got around into the VpnService component and is sent to the destination server, so that the destination server It receives the ICMP data packet and returns to reply data packet later, and record sending instant;According to the transmission ICMP data packet At the time of to the destination server, and, current network inherent delay is determined at the time of receiving the reply data packet.
S304: in the expected sending instant, the network packet is sent.
It is that the network packet is sent to destination server in the expected sending instant for uplink, it is right It is that the network packet is sent to destination application in the expected sending instant for downlink.
In this application, the target element that can use in the mobile device of the destination application obtains the target The network packet transmitted between application program and the destination server tests knot to obtain the vulnerable network of application program Fruit then needs to analyze these network packets.It is preferred, therefore, that the network packet that the present invention can also will acquire It is packaged into the data file that network package analysis tool can identify;Data file after encapsulation is sent to the network package Analysis tool is analyzed, to obtain the vulnerable network test result to the destination application.As an example, network seals Packet analysis tool can be wireshark software, and the data file that the corresponding network package analysis tool can identify is Pcap file.Other corresponding data files of network package tool set are also within the application protection scope.
The application examples of the vulnerable network test method of application program provided in an embodiment of the present invention can be such that
Fig. 6 is the time diagram of the application examples of the vulnerable network test method of application program provided in an embodiment of the present invention, In the application example, realizing that vulnerable network is surveyed when testing the vulnerable network of destination application using vulnerable network test application program Examination application program has been applied to the weak network control thread of downlink, VpnServer component, the weak network control thread of uplink, TCP/UDP Server。
Specifically, the interface provided using VpnService component, obtains the uplink network number that destination application is sent According at this point, the source IP address of the uplink network data is the local ip address of mobile device and purpose IP address is destination service The address of device.VpnService component handles uplink network data, the source port number for uplink network data that treated For the interface that the VpnService component provides, destination slogan is the interface that TCP/UDPserver component provides; Treated that uplink network data are added to uplink weak network control queue (this treatment process figure by described for VpnService component In be not shown);The weak network control thread of uplink obtains uplink network data from the weak network control queue of uplink, is implemented using the application After the vulnerable network test method for the application program that example provides carries out vulnerable network control to uplink network data, it is sent to TCP/UDP Uplink network data are sent to destination server by TCP/UDP Server by Server.
Destination server generates downlink network data according to uplink network data;And downlink network data are sent to TCP/ Downlink network data are sent to VpnService component by UDP Server component, TCP/UDP Server component; Downlink network data are sent to the weak network control queue of downlink (being not shown in Fig. 6), the weak network control system of downlink by VpnService component Thread obtains downlink network data from the weak network control queue of downlink, and using the weak of application program provided by the embodiments of the present application Downlink network data are sent to target and answered by network test method later to the downlink network data progress weak network control system of downlink Use program.
It should be noted that above-mentioned downlink network data and uplink network data may include multiple network packets, it is right Each network packet is all made of weak network control method provided by the embodiments of the present application and is controlled.
It can be seen that based on the application examples and movement set only with the vulnerable network test application program installed in mobile device The other applications of standby upper installation carry out vulnerable network test.
The vulnerable network test device of application program provided in an embodiment of the present invention is introduced below, it is described below to answer With the vulnerable network test device of program reference can be corresponded to each other with the vulnerable network test method of application program.
Fig. 7 is the structural block diagram of the vulnerable network test device of application program provided in an embodiment of the present invention, the application program Vulnerable network test device be specifically as follows the client of application program, referring to Fig. 7, which may include:
Determination unit 71, for determine the test of pending vulnerable network destination application and with the target application journey The corresponding destination server of sequence;
Network packet acquiring unit 72 is transmitted between the destination application and the destination server for obtaining Network packet;
Vulnerable network control unit 73, for carrying out vulnerable network control to the network packet according to preset vulnerable network parameter System.
The function of above-mentioned each unit realizes and is described in detail in embodiment of the method part that this embodiment is not repeated.
On the other hand, present invention also provides a kind of mobile devices, and such as referring to Fig. 8, it illustrates the movements of the application to set A kind of standby composed structure schematic diagram, the mobile device 1100 of the present embodiment may include: processor 1101 and memory 1102.
Optionally, which can also include communication interface 1103, input unit 1104 and display 1105 and lead to Believe bus 1106.
Processor 1101, communication interface 1103, input unit 1104, display 1105, passes through communication at memory 1102 Bus 1106 completes mutual communication.
In the embodiment of the present application, the processor 1101 can be central processing unit (Central Processing Unit, CPU), application-specific integrated circuit, digital signal processor, ready-made programmable gate array or other programmable logic Device etc..
The processor can call the program stored in memory 1102.Specifically, processor can be with executing application Vulnerable network test method embodiment in operation performed by mobile device.
For storing one or more than one program in memory 1102, program may include program code, the journey Sequence code includes computer operation instruction, in the embodiment of the present application, is at least stored in the memory for realizing following function The program of energy:
Determine the destination application and target corresponding with destination application clothes of pending vulnerable network test Business device;
Obtain the network packet transmitted between the destination application and the destination server;
Vulnerable network control is carried out to the network packet according to preset vulnerable network parameter.
In one possible implementation, which may include storing program area and storage data area, wherein Storing program area can application program needed for storage program area and at least one function (such as image player function etc.) Deng;Storage data area can store the data created in the use process according to computer, for example, user data, user's access Data and audio, video, image data etc..
In addition, memory 1102 may include high-speed random access memory, it can also include nonvolatile memory, example Such as at least one disk memory or other volatile solid-state parts.
The communication interface 1103 can be the interface of communication module, such as the interface of gsm module.
The application can also include display 1104 and input unit 1105 etc..
Certainly, the structure of mobile device shown in Fig. 8 does not constitute the restriction to mobile device in the embodiment of the present application, Mobile device may include than more or fewer components shown in Fig. 8, or the certain components of combination in practical application.
On the other hand, the embodiment of the present application also provides a kind of storage medium, computer is stored in the storage medium Executable instruction when the computer executable instructions are loaded and executed by processor, is realized in as above any one embodiment The vulnerable network test method for the application program that mobile device executes.
It should be noted that all the embodiments in this specification are described in a progressive manner, each embodiment weight Point explanation is the difference from other embodiments, and the same or similar parts between the embodiments can be referred to each other. For device class embodiment, since it is basically similar to the method embodiment, so being described relatively simple, related place ginseng See the part explanation of embodiment of the method.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in the process, method, article or equipment for including element.
The foregoing description of the disclosed embodiments can be realized those skilled in the art or using the present invention.To this A variety of modifications of a little embodiments will be apparent for a person skilled in the art, and the general principles defined herein can Without departing from the spirit or scope of the present invention, to realize in other embodiments.Therefore, the present invention will not be limited It is formed on the embodiments shown herein, and is to fit to consistent with the principles and novel features disclosed in this article widest Range.
The above is only the preferred embodiment of the present invention, it is noted that those skilled in the art are come It says, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should be regarded as Protection scope of the present invention.

Claims (10)

1. a kind of vulnerable network test method of application program, which is characterized in that the described method includes:
Determine the destination application and destination server corresponding with the destination application of pending vulnerable network test;
Obtain the network packet transmitted between the destination application and the destination server;
Vulnerable network control is carried out to the network packet according to preset vulnerable network parameter.
2. the method according to claim 1, wherein described obtain the destination application and target clothes The network packet transmitted between business device, comprising:
The destination application and the target are obtained using the target element in the mobile device of the destination application The network packet transmitted between server.
3. according to the method described in claim 2, it is characterized in that, it is described according to preset vulnerable network parameter to the network number Vulnerable network control is carried out according to packet, comprising:
According to preset delay parameter, delay jitter parameter, random packet loss parameter and continual data package dropout parameter to the network number Weak network control system is carried out according to packet.
4. according to the method described in claim 3, it is characterized in that, it is described according to preset according to preset delay parameter, prolong When jitter parameter, random packet loss parameter and uplink continual data package dropout parameter weak network control system is carried out to the network packet, comprising:
Judge whether the network packet meets the random packet loss parameter and the corresponding packet loss of the continual data package dropout parameter Condition;
If it is satisfied, then the network packet is abandoned;
If conditions are not met, then calculating the expection of the network packet according to the delay parameter and the delay jitter parameter Sending instant;
In the expected sending instant, the network packet is sent.
5. according to the method described in claim 4, it is characterized in that, described according to the delay parameter and the delay jitter Parameter calculates the expection sending instant of the network packet, comprising:
Determine current network inherent delay;
The network data is calculated according to the current network inherent delay, the delay parameter and the delay jitter parameter The expection sending instant of packet.
6. according to the method described in claim 5, it is characterized in that, the determining current network inherent delay, comprising:
In native layers of construction detection data packet of operating system that the mobile device of the destination application is carried;
The target element is opened into detection data wrapping and is sent to the destination server, so that the destination server connects It receives the probe data packet and returns to reply data packet later, and record sending instant;
At the time of according to the probe data packet to the destination server is sent, and, receive the reply data packet Moment determines current network inherent delay.
7. the method according to claim 1, wherein the method also includes:
The network packet that will acquire is packaged into the data file that network package analysis tool can identify;
Data file after encapsulation is sent to the network package analysis tool to analyze, to obtain to the target application The vulnerable network test result of program.
8. a kind of vulnerable network test device of application program, which is characterized in that described device includes:
Determination unit, for determining the destination application of pending vulnerable network test and corresponding with the destination application Destination server;
Network packet acquiring unit, for obtaining the network transmitted between the destination application and the destination server Data packet;
Vulnerable network control unit, for carrying out vulnerable network control to the network packet according to preset vulnerable network parameter.
9. a kind of mobile device characterized by comprising
Processor and memory;
Wherein, the processor is for executing the program stored in the memory;
For storing program, described program is at least used for the memory:
Determine the destination application and destination server corresponding with the destination application of pending vulnerable network test;
Obtain the network packet transmitted between the destination application and the destination server;
Vulnerable network control is carried out to the network packet according to preset vulnerable network parameter.
10. a kind of storage medium, which is characterized in that be stored with computer executable instructions, the calculating in the storage medium When machine executable instruction is loaded and executed by processor, the weak of the described in any item application programs of claim 1 to 7 as above is realized Network test method.
CN201910561118.4A 2019-06-26 2019-06-26 Weak network testing method and device of application program, mobile device and storage medium Active CN110224897B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910561118.4A CN110224897B (en) 2019-06-26 2019-06-26 Weak network testing method and device of application program, mobile device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910561118.4A CN110224897B (en) 2019-06-26 2019-06-26 Weak network testing method and device of application program, mobile device and storage medium

Publications (2)

Publication Number Publication Date
CN110224897A true CN110224897A (en) 2019-09-10
CN110224897B CN110224897B (en) 2022-10-04

Family

ID=67814818

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910561118.4A Active CN110224897B (en) 2019-06-26 2019-06-26 Weak network testing method and device of application program, mobile device and storage medium

Country Status (1)

Country Link
CN (1) CN110224897B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113472607A (en) * 2021-06-29 2021-10-01 未鲲(上海)科技服务有限公司 Application program network environment detection method, device, equipment and storage medium
CN114143213A (en) * 2021-11-30 2022-03-04 中国工商银行股份有限公司 Mapping test system, method, device, computer equipment and storage medium
CN114710429A (en) * 2022-03-28 2022-07-05 重庆长安汽车股份有限公司 Weak network simulation system and method and weak network vehicle unloading machine test method
CN115021831A (en) * 2022-06-22 2022-09-06 北京有竹居网络技术有限公司 Weak network testing method, device, system, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105227569A (en) * 2015-10-16 2016-01-06 百度在线网络技术(北京)有限公司 The data pack transmission method of application and device
CN106375142A (en) * 2016-08-26 2017-02-01 腾讯科技(深圳)有限公司 Application program test method and apparatus
CN108664395A (en) * 2018-04-26 2018-10-16 武汉斗鱼网络科技有限公司 Applied program testing method, device, equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105227569A (en) * 2015-10-16 2016-01-06 百度在线网络技术(北京)有限公司 The data pack transmission method of application and device
CN106375142A (en) * 2016-08-26 2017-02-01 腾讯科技(深圳)有限公司 Application program test method and apparatus
CN108664395A (en) * 2018-04-26 2018-10-16 武汉斗鱼网络科技有限公司 Applied program testing method, device, equipment and storage medium

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113472607A (en) * 2021-06-29 2021-10-01 未鲲(上海)科技服务有限公司 Application program network environment detection method, device, equipment and storage medium
CN114143213A (en) * 2021-11-30 2022-03-04 中国工商银行股份有限公司 Mapping test system, method, device, computer equipment and storage medium
CN114143213B (en) * 2021-11-30 2024-03-26 中国工商银行股份有限公司 Benchmarking test system, benchmarking test method, benchmarking test device, benchmarking test computer equipment and benchmarking test storage medium
CN114710429A (en) * 2022-03-28 2022-07-05 重庆长安汽车股份有限公司 Weak network simulation system and method and weak network vehicle unloading machine test method
CN115021831A (en) * 2022-06-22 2022-09-06 北京有竹居网络技术有限公司 Weak network testing method, device, system, equipment and storage medium
CN115021831B (en) * 2022-06-22 2024-03-12 北京有竹居网络技术有限公司 Weak network test method, device, system, equipment and storage medium

Also Published As

Publication number Publication date
CN110224897B (en) 2022-10-04

Similar Documents

Publication Publication Date Title
CN110224897A (en) Vulnerable network test method, device, mobile device and the storage medium of application program
US8874736B2 (en) Event extractor
EP3974994A1 (en) Dynamic tracing control for edge computing with containers and microservices
US20210112090A1 (en) Network visualization, intrusion detection, and network healing
US20190052551A1 (en) Cloud verification and test automation
US11032126B2 (en) Diagnostic traffic generation for automatic testing and troubleshooting
CN108256118B (en) Data processing method, device, system, computing equipment and storage medium
CN105787364B (en) Automatic testing method, device and system for tasks
US9559915B2 (en) System and method for dynamically testing networked target systems
CN108632110A (en) Equipment performance test method, system, computer equipment and storage medium
US11159416B1 (en) Systems and methods of testing virtual private network communications using remote connectivity
CN108718347A (en) A kind of domain name analytic method, system, device and storage medium
CN105068876A (en) Method for acquiring mobile phone APP performance data based on distributed true phones
CN109815115A (en) Method and device, the computer equipment, storage medium of debugging bridge joint mouth
CN115643112A (en) Method and device for testing safety protection capability
US11677650B2 (en) Network flow attribution in service mesh environments
CN109922484A (en) A kind of test method and test device
CN104992112A (en) Method and device used for detecting sensitive information leakage of Android
CN111526028B (en) Data processing method, device and equipment
CN110874276B (en) Cross-process communication method and device and computer readable storage medium
Schneider et al. A generic emulation framework for reusing and evaluating vnf placement algorithms
CN103581980B (en) Network impairment simulation system and method
Alvarenga et al. RIO: A denial of service experimentation platform in a Future Internet Testbed
Santos Net neutrality in the 5G/6G era
CN107885659A (en) Method and device, the equipment of request analog response to client

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant