CN110430103A - A kind of message monitoring method - Google Patents
A kind of message monitoring method Download PDFInfo
- Publication number
- CN110430103A CN110430103A CN201910880948.3A CN201910880948A CN110430103A CN 110430103 A CN110430103 A CN 110430103A CN 201910880948 A CN201910880948 A CN 201910880948A CN 110430103 A CN110430103 A CN 110430103A
- Authority
- CN
- China
- Prior art keywords
- message
- content
- format
- monitoring method
- file
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0823—Errors, e.g. transmission errors
- H04L43/0847—Transmission error
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/16—Threshold monitoring
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention relates to a kind of message monitoring methods, which comprises step S1: network node receives message, carries out iterative testing;Step S2: format and content verification is carried out to request message;Step S3: it carries out the monitoring of duplicate message anomalous event and reports.The present invention is based on red black tree to carry out duplicate message detection, and the complexity of duplicate message detection greatly reduces;The format and content verification for detecting and considering content and format dependence by independent format and content, greatly improves the accuracy of verification.The detection that duplicate message anomalous event is carried out from two dimensions of Annual distribution and check results, can timely find improper duplicate message event, reduce the duplicate message frequency of occurrences.
Description
[technical field]
The invention belongs to field of communication technology more particularly to a kind of message monitoring methods.
[background technique]
With the development of communication technology, Ethernet comes into being, and becomes the most general communication protocol of current local area network
Standard.Message is important link therein in data communication in ethernet networks.At the same time, big data, cloud computing, distribution
The concepts such as network represent the newest hot spot and developing direction of current Internet information technique revolution.Big data be after cloud computing,
The another big subversive technological revolution of IT industry after Internet of Things.The increasing of the birth related service Internet-based of cloud computing
Add, use and delivery mode, cloud computing be after the 1980's mainframe computer to the big change of client-server again
A kind of great change, and as the quantity of electronic equipment access network and demand are increasing, the prospect in cloud computing market is limitless.
It or distributed computing, parallel computation, effectiveness calculating, network storage, virtualization, load balancing and hot-standby redundancy etc. are traditional
The product of computer and network technologies development fusion.With the fast development of big data, the scale of big data network is much
The bearing capacity of existing network framework and infrastructure is surmounted, networked-induced delay requires also to have surmounted existing calculating energy significantly
Power.It can be seen that as the scale of data center constantly expands, network node dynamic organization more in network nodes such as cloud computings,
In the closely related network environment of network node task, in face of message will receive communication mode in ethernet communication protocol and
In the case that the intrinsic communication pattern such as channel multiplexing influences, message checking how is carried out to stablize to upper layer data calculating
Support becomes hot issue.The present invention is based on red black tree to carry out duplicate message detection, and duplicate message detection greatly reduces
Complexity;The format and content verification of content and format dependence is detected and considered by independent format and content, significantly
The accuracy for improving verification.The treatment effeciency of message is greatly improved by the re-organized of message;From Annual distribution and
Two dimensions of check results carry out the detection of duplicate message anomalous event, can timely find improper duplicate message thing
Part reduces the duplicate message frequency of occurrences, and the duplicate message by transmitting figure monitors, and improves the accuracy of message repeatability monitoring
And efficiency.
[summary of the invention]
In order to solve the above problem in the prior art, the invention proposes a kind of message monitoring method, the method packets
Contain:
Step S1: network node receives message, carries out iterative testing;
Step S2: format and content verification is carried out to request message;
Step S3: it carries out the monitoring of duplicate message anomalous event and reports.
Further, the carry out iterative testing, specifically: simple iterative testing is carried out, to by simply repeating
Property inspection message carry out structure iterative testing.
Further, the simple iterative testing, specifically: the message identification for checking request message, to message identification
Duplicate message, should be regarded as duplicate message can directly abandon.
Further, the progress structure iterative testing, specifically: the institutional framework based on message carries out repeated inspection
It looks into, duplicate message is directly abandoned.
Further, the institutional framework based on message carries out iterative testing, specifically: by message according to its tissue
Structure is converted into red black tree, and the key assignments in red black tree is key-value pair;By red black tree stored messages, realized using key-value pair to red
It is black tree interior joint element it is quick lookup and compare one by one, by the node elements compared deletion, during comparison by
The capacity of diminution red black tree gradually.
Further, message is XML format, and key-value pair is the key-value pair that XML tag and label substance are converted into.
Further, format and content verification is carried out to request message;Specifically: it obtains message identification and searches corresponding lattice
Formula verifies file, is verified based on format of the format check file to message;Content authentication is determined based on format check file
File verifies content based on content authentication file.
Further, format check file includes structural element and content element, wherein structural element, for describing to report
Which element in text and when occurring, which type of attribute content element is used to describe element with;Based on interior
Hold the verification that verification file carries out content;Wherein, content element is the index of content authentication file, can by the content element
To find corresponding content authentication file.
Further, the re-organized of clear text is carried out before the format and content verification for carrying out message;It is specific:
The clear text received is stored in the order received in clear text queue, is obtained in clear text queue
All clear texts in each clear text content authentication file index set;Phase between computation index set
Like degree, the index for being adjusted so that similarity is high for carrying out the sequence of clear text processing gathers corresponding clear text
The processing time is close, conversely, the processing time that corresponding clear text is gathered in low the indexing of similarity is kept off.
Further, the re-organized that clear text is carried out using sliding window, within the scope of sliding window in queue
Message carries out re-organized, after the completion of the message within the scope of current sliding window mouth is by re-organized, slides sliding window in the queue
A dynamic sliding window length carries out re-organized to continue the message within the scope of next sliding window;Wherein, the place
Reason message queue is round-robin queue.
The beneficial effect comprise that carrying out duplicate message detection based on red black tree, duplicate message greatly reduces
The complexity of detection;The format and content school of content and format dependence is detected and considered by independent format and content
It tests, greatly improves the accuracy of verification.The treatment effeciency of message is greatly improved by the re-organized of message;From the time
Two dimensions of distribution and check results carry out the detection of duplicate message anomalous event, can timely find that improper repetition is reported
Literary event reduces the duplicate message frequency of occurrences, and the duplicate message by transmitting figure monitors, and improves the standard of message repeatability monitoring
True property and efficiency.
[Detailed description of the invention]
Described herein the drawings are intended to provide a further understanding of the invention, constitutes part of this application, but
It does not constitute improper limitations of the present invention, in the accompanying drawings:
Fig. 1 is message monitoring method schematic diagram of the invention.
[specific embodiment]
Come that the present invention will be described in detail below in conjunction with attached drawing and specific embodiment, illustrative examples therein and says
It is bright to be only used to explain the present invention but not as a limitation of the invention.
A kind of message monitoring method applied by the present invention is described in detail, as shown in Fig. 1, the method packet
Contain:
Step S1: network node receives message, carries out iterative testing;
Preferred: network node carries out real-time monitoring to receive message, and carries out iterative testing and anomalous event monitoring
With the processing such as report;
The carry out iterative testing, specifically: simple iterative testing is carried out, to the report for passing through simple iterative testing
Text carries out structure iterative testing;
The simple iterative testing, specifically: the message identification for checking request message, to the duplicate report of message identification
Text, should be regarded as duplicate message can directly abandon;
The progress structure iterative testing, specifically: the institutional framework based on message carries out iterative testing, for weight
Multiple message directly abandons;Common iterative testing be all based on mark simply monitored, but this be clearly it is inadequate,
Message identical or homologous series for mark, and for the different message of substantially identical only message identification, this
The monitoring of sample is inadequate certainly;
The institutional framework based on message carries out iterative testing, specifically: message is converted according to its institutional framework
At red black tree, the key assignments in red black tree is key-value pair;By red black tree stored messages, realized using key-value pair to being saved in red black tree
The quick of point element searches and compares one by one, and the node elements compared are deleted, thus gradual during comparison
The capacity for reducing red black tree, since the knot removal in red black tree is considerably less than depositing for common balanced tree on time complexity
Method for storing compares the time to be greatly saved, and time complexity is O (logN-1).In practice process, by red black tree into
Row storage was compared in " source code compares " and " API document structure tree " using Mr. Yu's large size nationalized bank, can be in 1-2 minutes
Complete the comparison work of several ten million data.
Preferred: message is XML format, and key-value pair is the key-value pair that XML tag and label substance are converted into;
It is all apparently the message content for being parsed and being used in principle for the message by iterative testing,
The format and content verification adaptable to message progress and receiving node is needed then to carry out subsequent analysis;It is past in the prior art
Toward the verification mode using general fixation between node, cannot with network node at that time the case where be adapted, thus by problem
It has been left in subsequent analysis, or even the application layer for making problem rise to upper layer, user experience greatly reduces.When in problem
It is often difficult to parse when being raised to upper layer, the reason of problem;
Step S2: format and content verification is carried out to request message;Specifically: it obtains message identification and searches corresponding format
File is verified, is verified based on format of the format check file to message;Content authentication text is determined based on format check file
Part verifies content based on content authentication file;
What format check file and content authentication file were to discriminate between out, preferred: wherein format check file is XML
Scheme format;The format check file and content authentication file are maintained in local verification space;This is locally verified
Content in space needs regularly to be updated, and the mode of update is network update or two kinds of hardware update;Hardware update
It needs to obtain in such a way that hardware accesses;The local verification space is encryption storage;Using network update mode plaid matching
Formula verification file is updated, and regularly obtains the format check file from network monitor server, and place it in fixation
Local verification space in;Content authentication file is updated using hardware update mode, content authentication file will be stored with
Storage device access network nodes in, by the storage of updated content authentication file into local verification space;It is former in covering
Before content authentication file, raw content is verified into file and new content verification file is compared, is carried out in different situations
Covering storage;Preferred: the comparison is to be compared version, abstract, file name etc.;The network monitor server is used
In the monitoring of offer content authentication file and progress duplicate message anomalous event;
A kind of safety and simple way are to carry out the mapping in local verification space, by the visit in the local verification space
Ask that address of cache is the storage device of hardware mode access, the storage device is led to by fixed mode access network nodes
The mapping for crossing access address, when needing access stencil verification file or content authentication file, access can be directed to hardware
The storage device that mode accesses, so that network node more flexible simply can carry out verifying the update of file, simultaneously
Also ensure the adaptability and safety of verification file.
Format check file includes structural element and content element, wherein structural element, for describing which in message
A element and when occurring, which type of attribute content element is used to describe element with;Based on content authentication text
The verification of part progress content;Wherein, content element is the index of content authentication file, can find phase by the content element
The content authentication file answered;In this way, so that content and format check separate, on the one hand increase it is safety-type, separately
On the one hand make to change content authentication relatively more, for the more message checking of verification content, it is literary that format check can be reduced
The times of acquisition of part reduce because of the verification various expenses of bring;Preferred: format check file is XML Scheme lattice
Formula;Different type network receiving nodes is to format and requires variant, and content authentication may be implemented by separated mode
Extension;
Format and content verification is carried out to request message, including (can also can be with message standard one based on XML Schema
Rise and issue) carry out format checking.Format check will be carried out to the message received, refused for being unsatisfactory for giving for call format
Processing is effectively isolated message transmitting party failure situation to realize.
It is preferred: message being carried out based on format check file to carry out content authentication file before or while format check
Preloading;Specifically: the mark based on format check file is preloaded;Based on format check file acquisition and the report
Text verifies relevant all the elements and verifies file, and by the verification file load of described all the elements in spatial cache;Pass through this
The access mode of mode and the hardware access of sample combines, and will not reduce processing speed.
It is preferred: the re-organized of clear text is carried out before the format and content verification for carrying out message;It is specific: will
The clear text received is stored in the order received in clear text queue, is obtained in clear text queue
The index set of the content authentication file of each clear text in all clear texts;It is similar between computation index set
Degree, the index for being adjusted so that similarity is high for carrying out the sequence of clear text processing gather the place of corresponding clear text
The reason time is close, conversely, the processing time that corresponding clear text is gathered in low the indexing of similarity is kept off;It is preferred: only
The mark of clear text is saved in clear text queue only to reduce the time overhead from re-organized;
Similarity between the computation index set, specifically: by index element identical in two index set
Quantity is as the similarity between two index set;Cause when not considering that set element is less when calculating similarity really include
And the higher similarity of bring, when index element is less, corresponding content authentication file is less, at this point, carrying out content school
The expense for testing the preloading of file is also few;
It is preferred: the re-organized of clear text to be carried out using sliding window, to the report within the scope of sliding window in queue
Text carries out re-organized, after the completion of the message within the scope of current sliding window mouth is by re-organized, slides sliding window in the queue
One sliding window length carries out re-organized to continue the message within the scope of next sliding window;Wherein, the processing
Message queue is round-robin queue;The size of the sliding window is preset value, the length of the preset value and processing message queue
And the quantity of clear text is related, and the adjustment of the preset value can be carried out according to the two relevant length and quantity;
Step S3: it carries out the monitoring of duplicate message anomalous event and reports;Specifically: carry out independent repeated events monitoring and company
Continuous anomalous event monitoring;
It is described to carry out independent repeated events monitoring, specifically: it obtains and identifies identical duplicate message, the number of duplicate message
Whether it is more than or equal to and repeats threshold value, independent repeated events occurs if it is, determining, obtain the transmission path of all duplicate messages
To constitute transmission path set, the mark of the duplicate message and its transmission path set are reported;The quantity mistake of duplicate message
The network node failure in transmission path is mostly often implied, at this time by that can determine for failure reporting for transmission path set
Position provides effective clue;
Preferred: network monitor server receives duplicate message mark and its transmission path set, by transmission path set
In path merge with constitute weighting transmission figure, wherein transmission figure in node be path in each network node,
The weight of network node is the number that network node occurs in the paths;Scheme to carry out network node monitoring based on the transmission, it is right
Wherein the high node of weight carries out emphasis monitoring;
The node high to weight carries out emphasis monitoring, specifically: the expansion that transmission figure is carried out based on weighted value, to warp
The each network node crossed in widened transmission figure is monitored;Wherein, big to the monitoring granularity of network node in former transmission figure
In the monitoring granularity for the network node for belonging to widened transmission figure but being not belonging in former transmission figure;
The expansion that transmission figure is carried out based on weighted value, specifically: each node in transmission figure is successively expanded,
For a network node, it is directly connected to node based on the determination of its weighted value is corresponding with its weighted value, is directly connected to save by described
It puts and its is directly connected to path and increase in widened transmission figure;It is corresponding with weighted value to be directly connected to node to determine, so that
Its widened range of the higher node of weighted value is bigger, and the range monitored in this way is more extensive, so that relatively accurate expands inspection
The range of survey;When weighted value is higher, transmit in figure the fault incidence may more light, so needing to carry out widened monitoring;
The monitoring granularity include monitor the size of interval of events, monitoring type number and monitoring dynamics size
Deng;
The progress continuous abnormal event monitoring, specifically: based on duplicate message Annual distribution situation and verification situation into
The anomalous event of row duplicate message monitors, and the specific exceptions event that will test reports;Wherein, Annual distribution situation describes weight
The case where multiple message changes over time, verification situation describe duplicate message not by the type of above-mentioned verification, such as: do not pass through
Content authentication etc.;
The anomalous event monitoring that duplicate message is carried out based on duplicate message Annual distribution situation, specifically: it will repeat
The time and quantity that message occurs are fitted to obtain matched curve, and the matched curve is compared with first kind curve
To determine whether matched curve and first kind curve are similar, if similar, report without anomalous event;Otherwise, if not
It is similar, then continue to judge whether matched curve and the second class curve are similar, if similar, carry out continuous abnormal event and report,
Otherwise continue the subsequent anomalous event monitoring that duplicate message is carried out based on verification situation;Wherein first kind curve is normal
Duplicate message the case where occurring, the case where this kind of duplicate message changes over time often and network topology structure, network section
The type of point is relevant, is not need to carry out individually if the appearance situation of duplicate message is similar with this kind of curves
Monitoring and report;And the second class curve is the duplicate message of specific abnormal condition;In the prior art often all
Without the abnormality detection based on Annual distribution situation, and there is situation and is excluded in the normal duplicate message of non-team, weight
Multiple messaging system detection effect is bad;
The anomalous event monitoring that duplicate message is carried out based on verification situation, specifically: it determines within the scope of the set time
The number of check errors occurs, if the number is more than upper limit threshold and corresponding anomalous event is concentrated in less than first
In the network node of quantity, then anomalous event is sent to the network node less than the first quantity, otherwise taken to network monitor
Business device sends anomalous event;Wherein: the first quantity is less quantitative value, is preset value;It is only focusing only in verification seldom
When in range, the efficiency for doing monitoring can be proposed by carrying out local solution.Here, upper limit threshold, first quantity etc. are preset values;
The above description is only a preferred embodiment of the present invention, thus it is all according to the configuration described in the scope of the patent application of the present invention,
The equivalent change or modification that feature and principle are done, is included in the scope of the patent application of the present invention.
Claims (10)
1. a kind of message monitoring method, which is characterized in that the method includes:
Step S1: network node receives message, carries out iterative testing;
Step S2: format and content verification is carried out to request message;
Step S3: it carries out the monitoring of duplicate message anomalous event and reports.
2. message monitoring method according to claim 1, which is characterized in that the carry out iterative testing, specifically: into
The simple iterative testing of row carries out structure iterative testing to by the message of simple iterative testing.
3. message monitoring method according to claim 2, which is characterized in that the simple iterative testing, specifically: inspection
The message identification for looking into request message, to the duplicate message of message identification, should be regarded as duplicate message can directly be abandoned.
4. message monitoring method according to claim 3, which is characterized in that the progress structure iterative testing, specifically
Are as follows: the institutional framework based on message carries out iterative testing, and duplicate message is directly abandoned.
5. message monitoring method according to claim 4, which is characterized in that the institutional framework based on message carries out weight
Renaturation inspection, specifically: message is converted into red black tree according to its institutional framework, the key assignments in red black tree is key-value pair;Pass through
Red black tree stored messages are realized quick lookup to red black tree interior joint element using key-value pair and are one by one compared, will compare
The node elements crossed are deleted, and the capacity of red black tree is gradually reduced during comparison.
6. message monitoring method according to claim 5, which is characterized in that message is XML format, and key-value pair is XML mark
The key-value pair that label and label substance are converted into.
7. message monitoring method according to claim 6, which is characterized in that carry out format and content school to request message
It tests;Specifically: it obtains message identification and searches corresponding format check file, carried out based on format of the format check file to message
Verification;Content authentication file is determined based on format check file, and content is verified based on content authentication file.
8. message monitoring method according to claim 7, which is characterized in that format check file, comprising structural element and
Content element, wherein structural element, for describing which element in message and when occurring, content element is used
To describe element with which type of attribute;The verification of content is carried out based on content authentication file;Wherein, content element is content
The index for verifying file, can find corresponding content authentication file by the content element.
9. message monitoring method according to claim 8, which is characterized in that verify it in the format and content for carrying out message
The preceding re-organized for carrying out clear text;Specific: the clear text that will be received is stored in the order received wait locate
It manages in message queue, obtains the content authentication text of each clear text in all clear texts in clear text queue
The index set of part;Similarity between computation index set, carry out the sequence of clear text processing is adjusted so that phase
Like spend high index gather corresponding clear text the processing time it is close, conversely, similarity it is low index set it is corresponding
The processing time of clear text is kept off.
10. message monitoring method according to claim 9, which is characterized in that carry out clear text using sliding window
Re-organized, re-organized, message quilt within the scope of current sliding window mouth are carried out to the message within the scope of sliding window in queue
After the completion of re-organized, sliding window is made to slide a sliding window length in the queue to continue next sliding window range
Interior message is to carry out re-organized;Wherein, the processing message queue is round-robin queue.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910880948.3A CN110430103B (en) | 2019-09-18 | 2019-09-18 | Message monitoring method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910880948.3A CN110430103B (en) | 2019-09-18 | 2019-09-18 | Message monitoring method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110430103A true CN110430103A (en) | 2019-11-08 |
CN110430103B CN110430103B (en) | 2020-06-05 |
Family
ID=68418291
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910880948.3A Active CN110430103B (en) | 2019-09-18 | 2019-09-18 | Message monitoring method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110430103B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111641662A (en) * | 2020-07-01 | 2020-09-08 | 中国银行股份有限公司 | Message format inspection method and device |
CN112261060A (en) * | 2020-10-30 | 2021-01-22 | 四川创智联恒科技有限公司 | Repeated data packet detection method for reliable communication transmission |
CN114301812A (en) * | 2021-12-29 | 2022-04-08 | 北京物芯科技有限责任公司 | Method, device, equipment and storage medium for monitoring message processing result |
CN114299634A (en) * | 2021-12-30 | 2022-04-08 | 上海柴油机股份有限公司 | Method for judging abnormality of transmission data of automobile networking equipment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080027916A1 (en) * | 2006-07-31 | 2008-01-31 | Fujitsu Limited | Computer program, method, and apparatus for detecting duplicate data |
CN101505218A (en) * | 2009-03-18 | 2009-08-12 | 杭州华三通信技术有限公司 | Detection method and apparatus for attack packet |
US8091007B2 (en) * | 2007-09-13 | 2012-01-03 | Dell Products L.P. | Detection of duplicate packets |
CN104717105A (en) * | 2015-02-11 | 2015-06-17 | 西安航天自动化股份有限公司 | Industrial sensor network data repeated detecting method based on standard ISA 100.11a |
CN106130950A (en) * | 2016-05-20 | 2016-11-16 | 南京理工大学 | Method for detecting abnormality for IEC61850 agreement SV message |
CN107632789A (en) * | 2017-09-29 | 2018-01-26 | 郑州云海信息技术有限公司 | Method, system and Data duplication detection method are deleted based on distributed storage again |
CN109039822A (en) * | 2018-08-23 | 2018-12-18 | 烽火通信科技股份有限公司 | A kind of BFD protocol massages filter method and system |
CN109379326A (en) * | 2018-08-29 | 2019-02-22 | 中国建设银行股份有限公司 | XML message rule method of calibration, equipment and storage medium |
-
2019
- 2019-09-18 CN CN201910880948.3A patent/CN110430103B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080027916A1 (en) * | 2006-07-31 | 2008-01-31 | Fujitsu Limited | Computer program, method, and apparatus for detecting duplicate data |
US8091007B2 (en) * | 2007-09-13 | 2012-01-03 | Dell Products L.P. | Detection of duplicate packets |
CN101505218A (en) * | 2009-03-18 | 2009-08-12 | 杭州华三通信技术有限公司 | Detection method and apparatus for attack packet |
CN104717105A (en) * | 2015-02-11 | 2015-06-17 | 西安航天自动化股份有限公司 | Industrial sensor network data repeated detecting method based on standard ISA 100.11a |
CN106130950A (en) * | 2016-05-20 | 2016-11-16 | 南京理工大学 | Method for detecting abnormality for IEC61850 agreement SV message |
CN107632789A (en) * | 2017-09-29 | 2018-01-26 | 郑州云海信息技术有限公司 | Method, system and Data duplication detection method are deleted based on distributed storage again |
CN109039822A (en) * | 2018-08-23 | 2018-12-18 | 烽火通信科技股份有限公司 | A kind of BFD protocol massages filter method and system |
CN109379326A (en) * | 2018-08-29 | 2019-02-22 | 中国建设银行股份有限公司 | XML message rule method of calibration, equipment and storage medium |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111641662A (en) * | 2020-07-01 | 2020-09-08 | 中国银行股份有限公司 | Message format inspection method and device |
CN112261060A (en) * | 2020-10-30 | 2021-01-22 | 四川创智联恒科技有限公司 | Repeated data packet detection method for reliable communication transmission |
CN112261060B (en) * | 2020-10-30 | 2023-04-07 | 四川创智联恒科技有限公司 | Repeated data packet detection method for reliable communication transmission |
CN114301812A (en) * | 2021-12-29 | 2022-04-08 | 北京物芯科技有限责任公司 | Method, device, equipment and storage medium for monitoring message processing result |
CN114299634A (en) * | 2021-12-30 | 2022-04-08 | 上海柴油机股份有限公司 | Method for judging abnormality of transmission data of automobile networking equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110430103B (en) | 2020-06-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110430103A (en) | A kind of message monitoring method | |
Lu et al. | Stream bench: Towards benchmarking modern distributed stream computing frameworks | |
US8443074B2 (en) | Constructing an inference graph for a network | |
US8015139B2 (en) | Inferring candidates that are potentially responsible for user-perceptible network problems | |
CN110362473B (en) | Test environment optimization method and device, storage medium and terminal | |
CN105577454A (en) | Method for quickly positioning service fault based on log | |
CN109684052B (en) | Transaction analysis method, device, equipment and storage medium | |
CN103428042A (en) | Method and system for carrying out stress test on server | |
CN110764980A (en) | Log processing method and device | |
CN104468207B (en) | The method, apparatus and system of terminal management | |
JP2009527839A (en) | Method and system for transaction monitoring in a communication network | |
CN113242157B (en) | Centralized data quality monitoring method under distributed processing environment | |
Gu | Fast discrepancy identification for RFID-enabled IoT networks | |
Fu et al. | Clustering-preserving network flow sketching | |
CN106874371A (en) | A kind of data processing method and device | |
RU2532714C2 (en) | Method of acquiring data when evaluating network resources and apparatus therefor | |
CN107357557A (en) | A kind of information updating method and device | |
Qi et al. | Double-edged sword: Incentivized verifiable product path query for RFID-enabled supply chain | |
Xi et al. | RuleOut forwarding anomalies for SDN | |
CN115481026A (en) | Test case generation method and device, computer equipment and storage medium | |
CN116107801A (en) | Transaction processing method and related product | |
US20090164623A1 (en) | Methods and systems for tracking event loss | |
Li et al. | Online Mining Changes of Items over Continuous Append-only and Dynamic Data Streams. | |
EP2698966B1 (en) | Tracking end-users in web databases | |
CN110489460A (en) | A kind of optimization method and system of express statistic |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |