CN112560026A - Method for realizing intelligent tracking analysis self-healing of information system alarm - Google Patents

Method for realizing intelligent tracking analysis self-healing of information system alarm Download PDF

Info

Publication number
CN112560026A
CN112560026A CN202011478230.0A CN202011478230A CN112560026A CN 112560026 A CN112560026 A CN 112560026A CN 202011478230 A CN202011478230 A CN 202011478230A CN 112560026 A CN112560026 A CN 112560026A
Authority
CN
China
Prior art keywords
information
abnormal
healing
tracking analysis
mirror image
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011478230.0A
Other languages
Chinese (zh)
Inventor
吕磊
田园
沈泺成
李嘉周
张瑞强
刘家宇
贾文瑞
郑吉祥
陈语
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
State Grid Sichuan Electric Power Co Ltd
Information and Telecommunication Branch of State Grid Sichuan Electric Power Co Ltd
Original Assignee
State Grid Sichuan Electric Power Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by State Grid Sichuan Electric Power Co Ltd filed Critical State Grid Sichuan Electric Power Co Ltd
Priority to CN202011478230.0A priority Critical patent/CN112560026A/en
Publication of CN112560026A publication Critical patent/CN112560026A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/566Dynamic detection, i.e. detection performed at run-time, e.g. emulation, suspicious activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Investigating Or Analysing Biological Materials (AREA)

Abstract

The invention discloses a method for realizing intelligent tracking analysis self-healing of information system alarm, which comprises the following steps: s1, information control, wherein information in an information control stage is compared in an information database, and then information screening and information transmission are carried out through processing of a central information processor; s2, information early warning, including information distinguishing, information verification and information warning; s3, information tracking analysis; s4, self-healing of information, including information investigation, information correction and information deletion; and S5, updating the system, including information sample production and information storage. According to the method for realizing the intelligent tracking analysis self-healing of the information system alarm, suspected abnormal information is operated in advance through the mirror image server, whether the abnormal information harms a main system or not is judged, the interference of the abnormal information on the main system is reduced, and the main system is enabled to keep high-speed operation.

Description

Method for realizing intelligent tracking analysis self-healing of information system alarm
Technical Field
The invention relates to the technical field of information, in particular to a method for realizing intelligent tracking analysis self-healing of information system alarm.
Background
The information system is a man-machine integrated system composed of computer hardware, network and communication equipment, computer software, information resource, information user and regulation system and aimed at processing information flow. In short, the information system is a system for inputting data \ information and generating information through processing, and the information system has security risks from a human environment, a technical environment and a physical natural environment, and the security threats of the information system are ubiquitous. For the security problem of the large-scale enterprise information system, the security problem cannot be solved by utilizing some security products integrating information security technology, but technical, management and institutional factors must be considered to comprehensively solve the system security problem in an all-round way and establish an information system security guarantee system of the enterprise.
The existing information system has poor protection capability, cannot track and process information, easily causes a plurality of system bugs, and carries out technical innovation on the basis of the existing information system technology aiming at the above situation.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a method for realizing intelligent tracking analysis self-healing of alarm of an information system, which solves the problems in the background technology.
In order to achieve the purpose, the invention is realized by the following technical scheme: an implementation method for intelligent tracking analysis self-healing of information system alarm comprises the following steps:
s1, information control, wherein information in the information control stage is compared in an information database and then is processed by a central information processor to carry out information screening and information transmission;
s2, information early warning, including information distinguishing, information verification and information warning;
s3, information tracking analysis;
s4, self-healing of information, including information investigation, information correction and information deletion;
and S5, updating the system, including information sample production and information storage.
Preferably, the information database in S1 stores abnormal information and virus information samples; the central information processor is used for receiving and carrying out comprehensive analysis on various instructions in the system; the information screening is used for receiving information transmitted from the outside and carrying out comparison screening analysis for distinguishing through an information database; and the information transmission is used for connecting the system with a big data server and updating abnormal information and virus information samples in the information database in time.
Preferably, the information early warning in S2 includes a main server and at least two mirror servers, where the information differentiation is connected to the main server and is used to differentiate normal information and abnormal information, the normal information enters the main server for command output, and the abnormal information enters the information verification for verification through the information differentiation; the information verification corresponds to a mirror image server and is used for verifying abnormal information from the information distinction, command circulation is carried out through the mirror image server after the abnormal information is received, the abnormal information which cannot complete normal command circulation enters the information alarm when circulation is completed and normally enters the main server; the information alarm is connected with a mirror image server, information is screened in the information database through information screening in S1 under the information control of S1 through the mirror image server, and the information is labeled after screening is corresponding to abnormal information.
Preferably, the information tracking analysis in S3 includes: the system comprises information labeling, information circulation, information monitoring and information analysis, wherein the information tracking analysis comprises a main server and at least more than two mirror image servers.
Preferably, the information label is used for labeling the received abnormal information, connecting a label information sequence at the end of the sequence of the abnormal information, and then performing command circulation on the abnormal information in the mirror image server.
Preferably, the information loop comprises a mirror image server, and is used for performing command loop on the marked abnormal information in the mirror image server, and the cycled command is connected to the main server through the mirror image server.
Preferably, the information monitoring is used for monitoring the state of the whole system after the command of the abnormal information enters the system through information circulation, and sending the abnormal information to information analysis after the abnormal information is found.
Preferably, the information analysis is used for receiving information transmission from information monitoring, and then whether the abnormal information is suitable for the system operation is analyzed through a self algorithm.
Preferably, the information investigation in S4 is used to investigate the abnormal information in the information analysis, find the abnormal information according to the tagged information sequence, and then transmit the abnormal information to the next step; the information correction is used for correcting abnormal information; the information deletion is used to delete abnormal information that cannot be corrected.
Preferably, in S5, the information sample production is used to label the abnormal information and process the abnormal information to generate a sample, and the information storage is used to store the abnormal information sample in the information database and update the information in the information database.
The invention provides a method for realizing intelligent tracking analysis self-healing of information system alarm, which has the following beneficial effects:
1. according to the method for realizing the intelligent tracking analysis self-healing of the information system alarm, suspected abnormal information is operated in advance through the mirror image server, whether the abnormal information harms a main system or not is judged, the interference of the abnormal information on the main system is reduced, and the main system is enabled to keep high-speed operation.
2. According to the method for realizing the intelligent tracking analysis self-healing of the alarm of the information system, similar abnormal information can be rapidly inquired through comparison and screening of the data information base, the information is corrected and processed corresponding to the corresponding processing mode, and the method is very efficient.
3. The method for realizing the intelligent tracking analysis self-healing of the alarm of the information system can track abnormal information, once the information harms a main system in the running process, the tracked information can be processed in a targeted manner, and the method has the characteristics of quick and accurate response.
Detailed Description
The technical solutions in the embodiments of the present invention are clearly and completely described below, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments.
In the description of the present invention, "a plurality" means two or more unless otherwise specified; the terms "upper," "lower," "left," "right," "inner," "outer," "front," "rear," "leading," "trailing," and the like are used in an orientation or positional relationship indicated for convenience in describing the invention and to simplify the description, and are not intended to indicate or imply that the referenced device or element must have a particular orientation, be constructed and operated in a particular orientation, and are not to be construed as limiting the invention. Furthermore, the terms "first," "second," "third," and the like are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
In the description of the present invention, it is to be noted that, unless otherwise explicitly specified or limited, the terms "connected" and "connected" are to be interpreted broadly, e.g., as being fixed or detachable or integrally connected; can be mechanically or electrically connected; may be directly connected or indirectly connected through an intermediate. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
The invention provides a technical scheme that: an implementation method for intelligent tracking analysis self-healing of information system alarm comprises the following steps:
s1, information control, wherein information in the information control stage is compared in an information database and then is processed by a central information processor to carry out information screening and information transmission;
s2, information early warning, including information distinguishing, information verification and information warning;
s3, information tracking analysis;
s4, self-healing of information, including information investigation, information correction and information deletion;
and S5, updating the system, including information sample production and information storage.
Abnormal information and virus information samples are stored in the information database in the S1; the central information processor is used for receiving and carrying out comprehensive analysis on various instructions in the system; the information screening is used for receiving information transmitted from the outside and carrying out comparison screening analysis for distinguishing through an information database; and the information transmission is used for connecting the system with a big data server and updating abnormal information and virus information samples in the information database in time.
The information early warning in S2 comprises a main server and at least more than two mirror image servers, wherein the information distinguishing connection main server is used for distinguishing normal information and abnormal information, the normal information enters the main server for outputting a command, and the abnormal information enters the information verification for verification through the information distinguishing; the information verification corresponds to a mirror image server and is used for verifying abnormal information from the information distinction, command circulation is carried out through the mirror image server after the abnormal information is received, the abnormal information which cannot complete normal command circulation enters the information alarm when circulation is completed and normally enters the main server; the information alarm is connected with a mirror image server, information is screened in the information database through information screening in S1 under the information control of S1 through the connection of the mirror image server, and abnormal information is marked after screening is correspondingly carried out.
The information tracking analysis in the S3 includes: the system comprises information labeling, information circulation, information monitoring and information analysis, wherein the information tracking analysis comprises a main server and at least more than two mirror image servers.
The information marking is used for marking the received abnormal information, the end of the sequence of the abnormal information is connected with a marked information sequence, and then the abnormal information is subjected to command circulation in the mirror image server.
The information cycle comprises a mirror image server used for carrying out command cycle on the marked abnormal information in the mirror image server, and the command after the cycle is connected to the main server through the mirror image server.
The information monitoring is used for monitoring the state of the whole system after the command of abnormal information enters the system through information circulation, and sending the abnormal information to information analysis after the abnormal information is found.
The information analysis is used for receiving information transmission from information monitoring, and then whether the abnormal information is suitable for the system operation is analyzed through an algorithm of the information analysis.
The information investigation in the S4 is used for investigating abnormal information in the information analysis, finding the abnormal information according to the labeling information sequence and then transmitting the abnormal information to the next step; the information correction is used for correcting (namely correcting) abnormal information; the information deletion is used to delete abnormal information that cannot be corrected.
It should be understood that, while deleting the abnormal information that cannot be corrected, an information source of the abnormal information that cannot be corrected (i.e. a source that transmits the abnormal information that cannot be corrected) is also obtained and marked, or after determining the abnormal information that cannot be corrected, all information transmitted by the information source is suspended from being received.
And in the S5, the information sample production is used for labeling abnormal information and generating a sample in a processing mode, and the information storage is used for storing the abnormal information sample into an information database and updating the information in the information database.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be considered to be within the technical scope of the present invention, and the technical solutions and the inventive concepts thereof according to the present invention should be equivalent or changed within the scope of the present invention.

Claims (10)

1. An implementation method for intelligent tracking analysis self-healing of information system alarm is characterized by comprising the following steps:
s1, information control, wherein information in the information control stage is compared in an information database and then is processed by a central information processor to carry out information screening and information transmission;
s2, information early warning, including information distinguishing, information verification and information warning;
s3, information tracking analysis;
s4, self-healing of information, including information investigation, information correction and information deletion;
and S5, updating the system, including information sample production and information storage.
2. The method for implementing intelligent tracking analysis self-healing of information system alarm according to claim 1, characterized in that: abnormal information and virus information samples are stored in the information database in the S1; the central information processor is used for receiving and carrying out comprehensive analysis on various instructions in the system; the information screening is used for receiving information transmitted from the outside and carrying out comparison screening analysis for distinguishing through an information database; and the information transmission is used for connecting the system with a big data server and updating abnormal information and virus information samples in the information database in time.
3. The method for implementing intelligent tracking analysis self-healing of information system alarm according to claim 1, characterized in that: the information early warning in the S2 comprises a main server and at least more than two mirror image servers, wherein the information distinguishing connection main server is used for distinguishing normal information and abnormal information, the normal information enters the main server for outputting a command, and the abnormal information enters the information verification for verification through the information distinguishing; the information verification corresponds to a mirror image server and is used for verifying abnormal information from the information distinction, command circulation is carried out through the mirror image server after the abnormal information is received, the abnormal information which cannot complete normal command circulation enters the information alarm when circulation is completed and normally enters the main server; the information alarm is connected with a mirror image server, information is screened in the information database through information screening in S1 under the information control of S1 through the mirror image server, and the information is labeled after screening is corresponding to abnormal information.
4. The method for implementing intelligent tracking analysis self-healing of information system alarm according to claim 1, characterized in that: the information tracking analysis in S3 includes: the system comprises information labeling, information circulation, information monitoring and information analysis, wherein the information tracking analysis comprises a main server and at least more than two mirror image servers.
5. The method for implementing intelligent tracking analysis self-healing of information system alarms according to claim 4, characterized in that: the information label is used for labeling the received abnormal information, the label information sequence is connected at the tail of the sequence of the abnormal information, and then the abnormal information is subjected to command circulation in the mirror image server.
6. The method for implementing intelligent tracking analysis self-healing of information system alarms according to claim 4, characterized in that: the information cycle comprises a mirror image server used for carrying out command cycle on the marked abnormal information in the mirror image server, and the command after the cycle is connected to the main server through the mirror image server.
7. The method for implementing intelligent tracking analysis self-healing of information system alarms according to claim 4, characterized in that: the information monitoring is used for monitoring the state of the whole system after the command of abnormal information enters the system through information circulation, and sending the abnormal information to information analysis after the abnormal information is found.
8. The method for implementing intelligent tracking analysis self-healing of information system alarms according to claim 4, characterized in that: the information analysis is used for receiving information transmission from information monitoring and then analyzing whether the abnormal information is suitable for the system operation or not through an algorithm of the information analysis.
9. The method for implementing intelligent tracking analysis self-healing of information system alarms according to claim 8, characterized in that: the information investigation in the S4 is used for investigating abnormal information in the information analysis, finding the abnormal information according to the tagged information sequence, and then transmitting the abnormal information to the next step; the information correction is used for correcting abnormal information; the information deletion is used to delete abnormal information that cannot be corrected.
10. The method for implementing intelligent tracking analysis self-healing of information system alarm according to claim 1, characterized in that: and in the step S5, the information sample production is used for labeling abnormal information and generating a sample by a processing method, and the information storage is used for storing the abnormal information sample into an information database and updating information in the information database.
CN202011478230.0A 2020-12-15 2020-12-15 Method for realizing intelligent tracking analysis self-healing of information system alarm Pending CN112560026A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011478230.0A CN112560026A (en) 2020-12-15 2020-12-15 Method for realizing intelligent tracking analysis self-healing of information system alarm

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011478230.0A CN112560026A (en) 2020-12-15 2020-12-15 Method for realizing intelligent tracking analysis self-healing of information system alarm

Publications (1)

Publication Number Publication Date
CN112560026A true CN112560026A (en) 2021-03-26

Family

ID=75063739

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011478230.0A Pending CN112560026A (en) 2020-12-15 2020-12-15 Method for realizing intelligent tracking analysis self-healing of information system alarm

Country Status (1)

Country Link
CN (1) CN112560026A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1668015A (en) * 2004-12-20 2005-09-14 华中科技大学 Cooperative intrusion detection based large-scale network security defense system
CN202798798U (en) * 2012-07-17 2013-03-13 江西省电力公司信息通信分公司 High availability system based on cloud computing technology
CN105204973A (en) * 2015-09-25 2015-12-30 浪潮集团有限公司 Abnormal behavior monitoring and analysis system and method based on virtual machine technology under cloud platform
CN108596229A (en) * 2018-04-13 2018-09-28 北京华电智慧科技产业有限公司 Online abnormal monitoring, diagnosing method and system
CN109358975A (en) * 2018-09-28 2019-02-19 珠海市君天电子科技有限公司 A kind of analysis method, device, electronic equipment and storage medium that software is operating abnormally
US20190066377A1 (en) * 2017-08-22 2019-02-28 Software Ag Systems and/or methods for virtual reality based process optimization
CN109728979A (en) * 2019-03-01 2019-05-07 国网新疆电力有限公司信息通信公司 Automatic warning system and method suitable for information O&M comprehensive supervision platform

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1668015A (en) * 2004-12-20 2005-09-14 华中科技大学 Cooperative intrusion detection based large-scale network security defense system
CN202798798U (en) * 2012-07-17 2013-03-13 江西省电力公司信息通信分公司 High availability system based on cloud computing technology
CN105204973A (en) * 2015-09-25 2015-12-30 浪潮集团有限公司 Abnormal behavior monitoring and analysis system and method based on virtual machine technology under cloud platform
US20190066377A1 (en) * 2017-08-22 2019-02-28 Software Ag Systems and/or methods for virtual reality based process optimization
CN108596229A (en) * 2018-04-13 2018-09-28 北京华电智慧科技产业有限公司 Online abnormal monitoring, diagnosing method and system
CN109358975A (en) * 2018-09-28 2019-02-19 珠海市君天电子科技有限公司 A kind of analysis method, device, electronic equipment and storage medium that software is operating abnormally
CN109728979A (en) * 2019-03-01 2019-05-07 国网新疆电力有限公司信息通信公司 Automatic warning system and method suitable for information O&M comprehensive supervision platform

Similar Documents

Publication Publication Date Title
US20210294820A1 (en) Device discovery system
EP2729895B1 (en) Syntactical fingerprinting
CN106888106A (en) The extensive detecting system of IT assets in intelligent grid
US8181069B2 (en) Method and system for problem determination using probe collections and problem classification for the technical support services
US9191398B2 (en) Method and system for alert classification in a computer network
CN106101130A (en) A kind of network malicious data detection method, Apparatus and system
CN107785073A (en) Medical examination result-sharing methods, devices and systems based on block chain
US10210068B2 (en) Device topology definition system
US11706236B2 (en) Autonomous application of security measures to IoT devices
US20170061133A1 (en) Automated Security Vulnerability Exploit Tracking on Social Media
CN105095769A (en) Information service software vulnerability detection method
CN110020262A (en) Pushed information sending method, device, computer equipment and storage medium
CN112817814A (en) Abnormity monitoring method, system, storage medium and electronic device
CN114124837A (en) Asset information discovery system and method based on passive flow
CN112560026A (en) Method for realizing intelligent tracking analysis self-healing of information system alarm
US20200280583A1 (en) Url abnormality positioning method and device, and server and storage medium
CN111090655B (en) Early warning method and device based on monitoring data, electronic equipment and storage medium
CN109474529B (en) Method for feeding back terminal network associated data
US20220173980A1 (en) Ai machine learning technology based fault management system for network equpment that supports sdn open flow protocol
KR102332727B1 (en) Anomaly detection system using distrubuted storage of traffic of power plant contrl netwrok assets
CN115544202A (en) Alarm processing method, device and storage medium
US20220182260A1 (en) Detecting anomalies on a controller area network bus
CN115022152A (en) Method and device for judging threat degree of event and electronic equipment
CN112988441A (en) Exception handling method and device
CN116260640B (en) Information interception control method and system for big data analysis based on artificial intelligence

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination