Release a technical solution-mass P2P network for commercial use

Source: Internet
Author: User

At present, the main technical measures for anti-mass mailing are as follows:

(1)Account Control: only accounts can be sent, and the sending frequency of accounts is limited.

(2)IPControl: Restrict specifiedIPTransmission frequency

(3)Protocol control: non-open protocols

(4)Verification code control

 

This solution mainly breaks through the above (1),(2(3),(4) Two Points provide third-party support services

 

The slogan of this solution is not to do evil, but to achieve the goal of Group Sending with the smallest evil.

 

If a group of software installs a certain amount, these installed software forms a hugeP2PIf the network is usedP2PThe Network provides the following resources:

 

(1)RichIPAddress, each customer may rentIPResources

(2)You can use an account to lease and share a large number of accounts.

 

Mass mailingP2PThe network has a central server, which is mainly controllableP2PCommercial Network Proxy protocol management service, connected to other application serversProgram.

 

(1)ControllableP2PCommercial Network Proxy protocol:

A)Any client's lease of other client network resources must be authorized by the central server, which facilitates billing and controls the content to be sent-it is best not to send illegal information, the protocol can be designed to make it difficult for hackers to use the network, even if the central server is cracked by hackers.

B)This network proxy must be transparent to the client, that is, it is sent locally;

C)Resource Security-Account resources cannot be easily obtained by the proxy client. It is technically difficult to implement, which can reduce requirements and minimize the risk of easily obtaining account resources by proxy clients.

(2)Application Service:

A)Crawling and data extraction rule service: the client can crawl a website based on specified rules and extract data based on specified data extraction rules. Data can be extracted from the central server and crawled without being extracted, so as to avoid excessive pressure on the target website.

B)UIScript macro rule service: many groups, suchQqGroup Sending and trademanager Group Sending. If the simulation cannot be performed on the protocol layer, you can take a step back and call the official client software to send the group using the software such as the key wizard. Then, this script macro can be used as a rule and placed on the server side. For important rules, you need to divide the rules into two parts: one part is sent to the client, and the other part is left to the server (the client sends key data, and the server processes the data according to the rules to get the result, to prevent clients from intercepting rules.

C)Account Leasing Service: provides a large number of application account leasing services.

D)Verification code recognition service: simple verification codes can be identified by machines. For complex verification codes, they can be handed over to dedicated persons for recognition. in underdeveloped areas, dedicated employees are hired to reduce the recognition cost to a verification code.1About RMB. Of course, you will be charged for the Internet, and you will be charged for five cents per verification code.

E)Protocol simulation service: for non-public protocols, the protocol simulation service-the client submits the operation primitive, the server processes the Protocol content and sends it to the client, and then the client sends it to the official server.

 

Network role:

(1)Operator: responsible for maintaining and operating the entire network;

(2)Free users: free users can use some services at the cost of being controllableP2PThe commercial network proxy ProtocolIPShare resources;

(3)Paid users: paid users can useVIPService, the cost isMoney. A certain level of paid users can also close the clientP2PNetwork Service;

(4)AGENT: The agent is also a paying user. It can provide the Group agency service to external users, and the group agency is charged less than the ordinary paying users;

(5)Account subscriber: The account subscriber can manually register an account or use a program to register an account and submit it to the application account to rent a server. The registrar can be an operator, an agent, or a third party;

(6)Verification code recognition service provider: employees can be directly hired in underdeveloped areas, or a software can be designed, which can be downloaded by anyone, then the recognition task is obtained and submitted for identification;

(7)Rule and script submitter: for third-party development and submission of rules and scripts not available in the current system, divided by usage.

 

Operation Mode:

(1)Pay-as-you-go, subscription, and yearly subscription

 

How to Reduce evil:

 

(1)When capturing data, minimize the number of requests to the target server-the same page, the entireP2PThe network should have as few accesses as possible, the closer it is1The better;

(2)Precise extraction of sending targets: ensures data quality. At the same time, the prices for sending single-pick messages are increased;

(3)Approval-Sending mechanism: only approved information can be sent.

 

Technical solution:

 

(1)Client:C #, winform

(2)Server:Linux, C ++, Java

(3)Transport Layer Protocol Selection: Based onUDPProtocol development

(4)P2PProtocol Design: ConsiderationsGoogle protocol buff

(5)Protocol simulation tool:REPAST

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.