CN110430103A - A kind of message monitoring method - Google Patents

A kind of message monitoring method Download PDF

Info

Publication number
CN110430103A
CN110430103A CN201910880948.3A CN201910880948A CN110430103A CN 110430103 A CN110430103 A CN 110430103A CN 201910880948 A CN201910880948 A CN 201910880948A CN 110430103 A CN110430103 A CN 110430103A
Authority
CN
China
Prior art keywords
message
content
format
monitoring method
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910880948.3A
Other languages
Chinese (zh)
Other versions
CN110430103B (en
Inventor
刘南雁
范杰
赵强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Everbright Xinglong Trust Co Ltd
Original Assignee
Everbright Xinglong Trust Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Everbright Xinglong Trust Co Ltd filed Critical Everbright Xinglong Trust Co Ltd
Priority to CN201910880948.3A priority Critical patent/CN110430103B/en
Publication of CN110430103A publication Critical patent/CN110430103A/en
Application granted granted Critical
Publication of CN110430103B publication Critical patent/CN110430103B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0823Errors, e.g. transmission errors
    • H04L43/0847Transmission error
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to a kind of message monitoring methods, which comprises step S1: network node receives message, carries out iterative testing;Step S2: format and content verification is carried out to request message;Step S3: it carries out the monitoring of duplicate message anomalous event and reports.The present invention is based on red black tree to carry out duplicate message detection, and the complexity of duplicate message detection greatly reduces;The format and content verification for detecting and considering content and format dependence by independent format and content, greatly improves the accuracy of verification.The detection that duplicate message anomalous event is carried out from two dimensions of Annual distribution and check results, can timely find improper duplicate message event, reduce the duplicate message frequency of occurrences.

Description

A kind of message monitoring method
[technical field]
The invention belongs to field of communication technology more particularly to a kind of message monitoring methods.
[background technique]
With the development of communication technology, Ethernet comes into being, and becomes the most general communication protocol of current local area network Standard.Message is important link therein in data communication in ethernet networks.At the same time, big data, cloud computing, distribution The concepts such as network represent the newest hot spot and developing direction of current Internet information technique revolution.Big data be after cloud computing, The another big subversive technological revolution of IT industry after Internet of Things.The increasing of the birth related service Internet-based of cloud computing Add, use and delivery mode, cloud computing be after the 1980's mainframe computer to the big change of client-server again A kind of great change, and as the quantity of electronic equipment access network and demand are increasing, the prospect in cloud computing market is limitless. It or distributed computing, parallel computation, effectiveness calculating, network storage, virtualization, load balancing and hot-standby redundancy etc. are traditional The product of computer and network technologies development fusion.With the fast development of big data, the scale of big data network is much The bearing capacity of existing network framework and infrastructure is surmounted, networked-induced delay requires also to have surmounted existing calculating energy significantly Power.It can be seen that as the scale of data center constantly expands, network node dynamic organization more in network nodes such as cloud computings, In the closely related network environment of network node task, in face of message will receive communication mode in ethernet communication protocol and In the case that the intrinsic communication pattern such as channel multiplexing influences, message checking how is carried out to stablize to upper layer data calculating Support becomes hot issue.The present invention is based on red black tree to carry out duplicate message detection, and duplicate message detection greatly reduces Complexity;The format and content verification of content and format dependence is detected and considered by independent format and content, significantly The accuracy for improving verification.The treatment effeciency of message is greatly improved by the re-organized of message;From Annual distribution and Two dimensions of check results carry out the detection of duplicate message anomalous event, can timely find improper duplicate message thing Part reduces the duplicate message frequency of occurrences, and the duplicate message by transmitting figure monitors, and improves the accuracy of message repeatability monitoring And efficiency.
[summary of the invention]
In order to solve the above problem in the prior art, the invention proposes a kind of message monitoring method, the method packets Contain:
Step S1: network node receives message, carries out iterative testing;
Step S2: format and content verification is carried out to request message;
Step S3: it carries out the monitoring of duplicate message anomalous event and reports.
Further, the carry out iterative testing, specifically: simple iterative testing is carried out, to by simply repeating Property inspection message carry out structure iterative testing.
Further, the simple iterative testing, specifically: the message identification for checking request message, to message identification Duplicate message, should be regarded as duplicate message can directly abandon.
Further, the progress structure iterative testing, specifically: the institutional framework based on message carries out repeated inspection It looks into, duplicate message is directly abandoned.
Further, the institutional framework based on message carries out iterative testing, specifically: by message according to its tissue Structure is converted into red black tree, and the key assignments in red black tree is key-value pair;By red black tree stored messages, realized using key-value pair to red It is black tree interior joint element it is quick lookup and compare one by one, by the node elements compared deletion, during comparison by The capacity of diminution red black tree gradually.
Further, message is XML format, and key-value pair is the key-value pair that XML tag and label substance are converted into.
Further, format and content verification is carried out to request message;Specifically: it obtains message identification and searches corresponding lattice Formula verifies file, is verified based on format of the format check file to message;Content authentication is determined based on format check file File verifies content based on content authentication file.
Further, format check file includes structural element and content element, wherein structural element, for describing to report Which element in text and when occurring, which type of attribute content element is used to describe element with;Based on interior Hold the verification that verification file carries out content;Wherein, content element is the index of content authentication file, can by the content element To find corresponding content authentication file.
Further, the re-organized of clear text is carried out before the format and content verification for carrying out message;It is specific: The clear text received is stored in the order received in clear text queue, is obtained in clear text queue All clear texts in each clear text content authentication file index set;Phase between computation index set Like degree, the index for being adjusted so that similarity is high for carrying out the sequence of clear text processing gathers corresponding clear text The processing time is close, conversely, the processing time that corresponding clear text is gathered in low the indexing of similarity is kept off.
Further, the re-organized that clear text is carried out using sliding window, within the scope of sliding window in queue Message carries out re-organized, after the completion of the message within the scope of current sliding window mouth is by re-organized, slides sliding window in the queue A dynamic sliding window length carries out re-organized to continue the message within the scope of next sliding window;Wherein, the place Reason message queue is round-robin queue.
The beneficial effect comprise that carrying out duplicate message detection based on red black tree, duplicate message greatly reduces The complexity of detection;The format and content school of content and format dependence is detected and considered by independent format and content It tests, greatly improves the accuracy of verification.The treatment effeciency of message is greatly improved by the re-organized of message;From the time Two dimensions of distribution and check results carry out the detection of duplicate message anomalous event, can timely find that improper repetition is reported Literary event reduces the duplicate message frequency of occurrences, and the duplicate message by transmitting figure monitors, and improves the standard of message repeatability monitoring True property and efficiency.
[Detailed description of the invention]
Described herein the drawings are intended to provide a further understanding of the invention, constitutes part of this application, but It does not constitute improper limitations of the present invention, in the accompanying drawings:
Fig. 1 is message monitoring method schematic diagram of the invention.
[specific embodiment]
Come that the present invention will be described in detail below in conjunction with attached drawing and specific embodiment, illustrative examples therein and says It is bright to be only used to explain the present invention but not as a limitation of the invention.
A kind of message monitoring method applied by the present invention is described in detail, as shown in Fig. 1, the method packet Contain:
Step S1: network node receives message, carries out iterative testing;
Preferred: network node carries out real-time monitoring to receive message, and carries out iterative testing and anomalous event monitoring With the processing such as report;
The carry out iterative testing, specifically: simple iterative testing is carried out, to the report for passing through simple iterative testing Text carries out structure iterative testing;
The simple iterative testing, specifically: the message identification for checking request message, to the duplicate report of message identification Text, should be regarded as duplicate message can directly abandon;
The progress structure iterative testing, specifically: the institutional framework based on message carries out iterative testing, for weight Multiple message directly abandons;Common iterative testing be all based on mark simply monitored, but this be clearly it is inadequate, Message identical or homologous series for mark, and for the different message of substantially identical only message identification, this The monitoring of sample is inadequate certainly;
The institutional framework based on message carries out iterative testing, specifically: message is converted according to its institutional framework At red black tree, the key assignments in red black tree is key-value pair;By red black tree stored messages, realized using key-value pair to being saved in red black tree The quick of point element searches and compares one by one, and the node elements compared are deleted, thus gradual during comparison The capacity for reducing red black tree, since the knot removal in red black tree is considerably less than depositing for common balanced tree on time complexity Method for storing compares the time to be greatly saved, and time complexity is O (logN-1).In practice process, by red black tree into Row storage was compared in " source code compares " and " API document structure tree " using Mr. Yu's large size nationalized bank, can be in 1-2 minutes Complete the comparison work of several ten million data.
Preferred: message is XML format, and key-value pair is the key-value pair that XML tag and label substance are converted into;
It is all apparently the message content for being parsed and being used in principle for the message by iterative testing, The format and content verification adaptable to message progress and receiving node is needed then to carry out subsequent analysis;It is past in the prior art Toward the verification mode using general fixation between node, cannot with network node at that time the case where be adapted, thus by problem It has been left in subsequent analysis, or even the application layer for making problem rise to upper layer, user experience greatly reduces.When in problem It is often difficult to parse when being raised to upper layer, the reason of problem;
Step S2: format and content verification is carried out to request message;Specifically: it obtains message identification and searches corresponding format File is verified, is verified based on format of the format check file to message;Content authentication text is determined based on format check file Part verifies content based on content authentication file;
What format check file and content authentication file were to discriminate between out, preferred: wherein format check file is XML Scheme format;The format check file and content authentication file are maintained in local verification space;This is locally verified Content in space needs regularly to be updated, and the mode of update is network update or two kinds of hardware update;Hardware update It needs to obtain in such a way that hardware accesses;The local verification space is encryption storage;Using network update mode plaid matching Formula verification file is updated, and regularly obtains the format check file from network monitor server, and place it in fixation Local verification space in;Content authentication file is updated using hardware update mode, content authentication file will be stored with Storage device access network nodes in, by the storage of updated content authentication file into local verification space;It is former in covering Before content authentication file, raw content is verified into file and new content verification file is compared, is carried out in different situations Covering storage;Preferred: the comparison is to be compared version, abstract, file name etc.;The network monitor server is used In the monitoring of offer content authentication file and progress duplicate message anomalous event;
A kind of safety and simple way are to carry out the mapping in local verification space, by the visit in the local verification space Ask that address of cache is the storage device of hardware mode access, the storage device is led to by fixed mode access network nodes The mapping for crossing access address, when needing access stencil verification file or content authentication file, access can be directed to hardware The storage device that mode accesses, so that network node more flexible simply can carry out verifying the update of file, simultaneously Also ensure the adaptability and safety of verification file.
Format check file includes structural element and content element, wherein structural element, for describing which in message A element and when occurring, which type of attribute content element is used to describe element with;Based on content authentication text The verification of part progress content;Wherein, content element is the index of content authentication file, can find phase by the content element The content authentication file answered;In this way, so that content and format check separate, on the one hand increase it is safety-type, separately On the one hand make to change content authentication relatively more, for the more message checking of verification content, it is literary that format check can be reduced The times of acquisition of part reduce because of the verification various expenses of bring;Preferred: format check file is XML Scheme lattice Formula;Different type network receiving nodes is to format and requires variant, and content authentication may be implemented by separated mode Extension;
Format and content verification is carried out to request message, including (can also can be with message standard one based on XML Schema Rise and issue) carry out format checking.Format check will be carried out to the message received, refused for being unsatisfactory for giving for call format Processing is effectively isolated message transmitting party failure situation to realize.
It is preferred: message being carried out based on format check file to carry out content authentication file before or while format check Preloading;Specifically: the mark based on format check file is preloaded;Based on format check file acquisition and the report Text verifies relevant all the elements and verifies file, and by the verification file load of described all the elements in spatial cache;Pass through this The access mode of mode and the hardware access of sample combines, and will not reduce processing speed.
It is preferred: the re-organized of clear text is carried out before the format and content verification for carrying out message;It is specific: will The clear text received is stored in the order received in clear text queue, is obtained in clear text queue The index set of the content authentication file of each clear text in all clear texts;It is similar between computation index set Degree, the index for being adjusted so that similarity is high for carrying out the sequence of clear text processing gather the place of corresponding clear text The reason time is close, conversely, the processing time that corresponding clear text is gathered in low the indexing of similarity is kept off;It is preferred: only The mark of clear text is saved in clear text queue only to reduce the time overhead from re-organized;
Similarity between the computation index set, specifically: by index element identical in two index set Quantity is as the similarity between two index set;Cause when not considering that set element is less when calculating similarity really include And the higher similarity of bring, when index element is less, corresponding content authentication file is less, at this point, carrying out content school The expense for testing the preloading of file is also few;
It is preferred: the re-organized of clear text to be carried out using sliding window, to the report within the scope of sliding window in queue Text carries out re-organized, after the completion of the message within the scope of current sliding window mouth is by re-organized, slides sliding window in the queue One sliding window length carries out re-organized to continue the message within the scope of next sliding window;Wherein, the processing Message queue is round-robin queue;The size of the sliding window is preset value, the length of the preset value and processing message queue And the quantity of clear text is related, and the adjustment of the preset value can be carried out according to the two relevant length and quantity;
Step S3: it carries out the monitoring of duplicate message anomalous event and reports;Specifically: carry out independent repeated events monitoring and company Continuous anomalous event monitoring;
It is described to carry out independent repeated events monitoring, specifically: it obtains and identifies identical duplicate message, the number of duplicate message Whether it is more than or equal to and repeats threshold value, independent repeated events occurs if it is, determining, obtain the transmission path of all duplicate messages To constitute transmission path set, the mark of the duplicate message and its transmission path set are reported;The quantity mistake of duplicate message The network node failure in transmission path is mostly often implied, at this time by that can determine for failure reporting for transmission path set Position provides effective clue;
Preferred: network monitor server receives duplicate message mark and its transmission path set, by transmission path set In path merge with constitute weighting transmission figure, wherein transmission figure in node be path in each network node, The weight of network node is the number that network node occurs in the paths;Scheme to carry out network node monitoring based on the transmission, it is right Wherein the high node of weight carries out emphasis monitoring;
The node high to weight carries out emphasis monitoring, specifically: the expansion that transmission figure is carried out based on weighted value, to warp The each network node crossed in widened transmission figure is monitored;Wherein, big to the monitoring granularity of network node in former transmission figure In the monitoring granularity for the network node for belonging to widened transmission figure but being not belonging in former transmission figure;
The expansion that transmission figure is carried out based on weighted value, specifically: each node in transmission figure is successively expanded, For a network node, it is directly connected to node based on the determination of its weighted value is corresponding with its weighted value, is directly connected to save by described It puts and its is directly connected to path and increase in widened transmission figure;It is corresponding with weighted value to be directly connected to node to determine, so that Its widened range of the higher node of weighted value is bigger, and the range monitored in this way is more extensive, so that relatively accurate expands inspection The range of survey;When weighted value is higher, transmit in figure the fault incidence may more light, so needing to carry out widened monitoring;
The monitoring granularity include monitor the size of interval of events, monitoring type number and monitoring dynamics size Deng;
The progress continuous abnormal event monitoring, specifically: based on duplicate message Annual distribution situation and verification situation into The anomalous event of row duplicate message monitors, and the specific exceptions event that will test reports;Wherein, Annual distribution situation describes weight The case where multiple message changes over time, verification situation describe duplicate message not by the type of above-mentioned verification, such as: do not pass through Content authentication etc.;
The anomalous event monitoring that duplicate message is carried out based on duplicate message Annual distribution situation, specifically: it will repeat The time and quantity that message occurs are fitted to obtain matched curve, and the matched curve is compared with first kind curve To determine whether matched curve and first kind curve are similar, if similar, report without anomalous event;Otherwise, if not It is similar, then continue to judge whether matched curve and the second class curve are similar, if similar, carry out continuous abnormal event and report, Otherwise continue the subsequent anomalous event monitoring that duplicate message is carried out based on verification situation;Wherein first kind curve is normal Duplicate message the case where occurring, the case where this kind of duplicate message changes over time often and network topology structure, network section The type of point is relevant, is not need to carry out individually if the appearance situation of duplicate message is similar with this kind of curves Monitoring and report;And the second class curve is the duplicate message of specific abnormal condition;In the prior art often all Without the abnormality detection based on Annual distribution situation, and there is situation and is excluded in the normal duplicate message of non-team, weight Multiple messaging system detection effect is bad;
The anomalous event monitoring that duplicate message is carried out based on verification situation, specifically: it determines within the scope of the set time The number of check errors occurs, if the number is more than upper limit threshold and corresponding anomalous event is concentrated in less than first In the network node of quantity, then anomalous event is sent to the network node less than the first quantity, otherwise taken to network monitor Business device sends anomalous event;Wherein: the first quantity is less quantitative value, is preset value;It is only focusing only in verification seldom When in range, the efficiency for doing monitoring can be proposed by carrying out local solution.Here, upper limit threshold, first quantity etc. are preset values;
The above description is only a preferred embodiment of the present invention, thus it is all according to the configuration described in the scope of the patent application of the present invention, The equivalent change or modification that feature and principle are done, is included in the scope of the patent application of the present invention.

Claims (10)

1. a kind of message monitoring method, which is characterized in that the method includes:
Step S1: network node receives message, carries out iterative testing;
Step S2: format and content verification is carried out to request message;
Step S3: it carries out the monitoring of duplicate message anomalous event and reports.
2. message monitoring method according to claim 1, which is characterized in that the carry out iterative testing, specifically: into The simple iterative testing of row carries out structure iterative testing to by the message of simple iterative testing.
3. message monitoring method according to claim 2, which is characterized in that the simple iterative testing, specifically: inspection The message identification for looking into request message, to the duplicate message of message identification, should be regarded as duplicate message can directly be abandoned.
4. message monitoring method according to claim 3, which is characterized in that the progress structure iterative testing, specifically Are as follows: the institutional framework based on message carries out iterative testing, and duplicate message is directly abandoned.
5. message monitoring method according to claim 4, which is characterized in that the institutional framework based on message carries out weight Renaturation inspection, specifically: message is converted into red black tree according to its institutional framework, the key assignments in red black tree is key-value pair;Pass through Red black tree stored messages are realized quick lookup to red black tree interior joint element using key-value pair and are one by one compared, will compare The node elements crossed are deleted, and the capacity of red black tree is gradually reduced during comparison.
6. message monitoring method according to claim 5, which is characterized in that message is XML format, and key-value pair is XML mark The key-value pair that label and label substance are converted into.
7. message monitoring method according to claim 6, which is characterized in that carry out format and content school to request message It tests;Specifically: it obtains message identification and searches corresponding format check file, carried out based on format of the format check file to message Verification;Content authentication file is determined based on format check file, and content is verified based on content authentication file.
8. message monitoring method according to claim 7, which is characterized in that format check file, comprising structural element and Content element, wherein structural element, for describing which element in message and when occurring, content element is used To describe element with which type of attribute;The verification of content is carried out based on content authentication file;Wherein, content element is content The index for verifying file, can find corresponding content authentication file by the content element.
9. message monitoring method according to claim 8, which is characterized in that verify it in the format and content for carrying out message The preceding re-organized for carrying out clear text;Specific: the clear text that will be received is stored in the order received wait locate It manages in message queue, obtains the content authentication text of each clear text in all clear texts in clear text queue The index set of part;Similarity between computation index set, carry out the sequence of clear text processing is adjusted so that phase Like spend high index gather corresponding clear text the processing time it is close, conversely, similarity it is low index set it is corresponding The processing time of clear text is kept off.
10. message monitoring method according to claim 9, which is characterized in that carry out clear text using sliding window Re-organized, re-organized, message quilt within the scope of current sliding window mouth are carried out to the message within the scope of sliding window in queue After the completion of re-organized, sliding window is made to slide a sliding window length in the queue to continue next sliding window range Interior message is to carry out re-organized;Wherein, the processing message queue is round-robin queue.
CN201910880948.3A 2019-09-18 2019-09-18 Message monitoring method Active CN110430103B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910880948.3A CN110430103B (en) 2019-09-18 2019-09-18 Message monitoring method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910880948.3A CN110430103B (en) 2019-09-18 2019-09-18 Message monitoring method

Publications (2)

Publication Number Publication Date
CN110430103A true CN110430103A (en) 2019-11-08
CN110430103B CN110430103B (en) 2020-06-05

Family

ID=68418291

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910880948.3A Active CN110430103B (en) 2019-09-18 2019-09-18 Message monitoring method

Country Status (1)

Country Link
CN (1) CN110430103B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111641662A (en) * 2020-07-01 2020-09-08 中国银行股份有限公司 Message format inspection method and device
CN112261060A (en) * 2020-10-30 2021-01-22 四川创智联恒科技有限公司 Repeated data packet detection method for reliable communication transmission
CN114301812A (en) * 2021-12-29 2022-04-08 北京物芯科技有限责任公司 Method, device, equipment and storage medium for monitoring message processing result
CN114299634A (en) * 2021-12-30 2022-04-08 上海柴油机股份有限公司 Method for judging abnormality of transmission data of automobile networking equipment

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080027916A1 (en) * 2006-07-31 2008-01-31 Fujitsu Limited Computer program, method, and apparatus for detecting duplicate data
CN101505218A (en) * 2009-03-18 2009-08-12 杭州华三通信技术有限公司 Detection method and apparatus for attack packet
US8091007B2 (en) * 2007-09-13 2012-01-03 Dell Products L.P. Detection of duplicate packets
CN104717105A (en) * 2015-02-11 2015-06-17 西安航天自动化股份有限公司 Industrial sensor network data repeated detecting method based on standard ISA 100.11a
CN106130950A (en) * 2016-05-20 2016-11-16 南京理工大学 Method for detecting abnormality for IEC61850 agreement SV message
CN107632789A (en) * 2017-09-29 2018-01-26 郑州云海信息技术有限公司 Method, system and Data duplication detection method are deleted based on distributed storage again
CN109039822A (en) * 2018-08-23 2018-12-18 烽火通信科技股份有限公司 A kind of BFD protocol massages filter method and system
CN109379326A (en) * 2018-08-29 2019-02-22 中国建设银行股份有限公司 XML message rule method of calibration, equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080027916A1 (en) * 2006-07-31 2008-01-31 Fujitsu Limited Computer program, method, and apparatus for detecting duplicate data
US8091007B2 (en) * 2007-09-13 2012-01-03 Dell Products L.P. Detection of duplicate packets
CN101505218A (en) * 2009-03-18 2009-08-12 杭州华三通信技术有限公司 Detection method and apparatus for attack packet
CN104717105A (en) * 2015-02-11 2015-06-17 西安航天自动化股份有限公司 Industrial sensor network data repeated detecting method based on standard ISA 100.11a
CN106130950A (en) * 2016-05-20 2016-11-16 南京理工大学 Method for detecting abnormality for IEC61850 agreement SV message
CN107632789A (en) * 2017-09-29 2018-01-26 郑州云海信息技术有限公司 Method, system and Data duplication detection method are deleted based on distributed storage again
CN109039822A (en) * 2018-08-23 2018-12-18 烽火通信科技股份有限公司 A kind of BFD protocol massages filter method and system
CN109379326A (en) * 2018-08-29 2019-02-22 中国建设银行股份有限公司 XML message rule method of calibration, equipment and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111641662A (en) * 2020-07-01 2020-09-08 中国银行股份有限公司 Message format inspection method and device
CN112261060A (en) * 2020-10-30 2021-01-22 四川创智联恒科技有限公司 Repeated data packet detection method for reliable communication transmission
CN112261060B (en) * 2020-10-30 2023-04-07 四川创智联恒科技有限公司 Repeated data packet detection method for reliable communication transmission
CN114301812A (en) * 2021-12-29 2022-04-08 北京物芯科技有限责任公司 Method, device, equipment and storage medium for monitoring message processing result
CN114299634A (en) * 2021-12-30 2022-04-08 上海柴油机股份有限公司 Method for judging abnormality of transmission data of automobile networking equipment

Also Published As

Publication number Publication date
CN110430103B (en) 2020-06-05

Similar Documents

Publication Publication Date Title
CN110430103A (en) A kind of message monitoring method
Lu et al. Stream bench: Towards benchmarking modern distributed stream computing frameworks
US8443074B2 (en) Constructing an inference graph for a network
US8015139B2 (en) Inferring candidates that are potentially responsible for user-perceptible network problems
CN110362473B (en) Test environment optimization method and device, storage medium and terminal
CN105577454A (en) Method for quickly positioning service fault based on log
CN109684052B (en) Transaction analysis method, device, equipment and storage medium
CN103428042A (en) Method and system for carrying out stress test on server
CN110764980A (en) Log processing method and device
CN104468207B (en) The method, apparatus and system of terminal management
JP2009527839A (en) Method and system for transaction monitoring in a communication network
CN113242157B (en) Centralized data quality monitoring method under distributed processing environment
Gu Fast discrepancy identification for RFID-enabled IoT networks
Fu et al. Clustering-preserving network flow sketching
CN106874371A (en) A kind of data processing method and device
RU2532714C2 (en) Method of acquiring data when evaluating network resources and apparatus therefor
CN107357557A (en) A kind of information updating method and device
Qi et al. Double-edged sword: Incentivized verifiable product path query for RFID-enabled supply chain
Xi et al. RuleOut forwarding anomalies for SDN
CN115481026A (en) Test case generation method and device, computer equipment and storage medium
CN116107801A (en) Transaction processing method and related product
US20090164623A1 (en) Methods and systems for tracking event loss
Li et al. Online Mining Changes of Items over Continuous Append-only and Dynamic Data Streams.
EP2698966B1 (en) Tracking end-users in web databases
CN110489460A (en) A kind of optimization method and system of express statistic

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant