CN113746950B - IP address conflict pre-detection method, system, computer equipment and storage medium - Google Patents

IP address conflict pre-detection method, system, computer equipment and storage medium Download PDF

Info

Publication number
CN113746950B
CN113746950B CN202111041810.8A CN202111041810A CN113746950B CN 113746950 B CN113746950 B CN 113746950B CN 202111041810 A CN202111041810 A CN 202111041810A CN 113746950 B CN113746950 B CN 113746950B
Authority
CN
China
Prior art keywords
address
network
network equipment
configuration information
detection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111041810.8A
Other languages
Chinese (zh)
Other versions
CN113746950A (en
Inventor
刘永生
廖军
刘畅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202111041810.8A priority Critical patent/CN113746950B/en
Publication of CN113746950A publication Critical patent/CN113746950A/en
Application granted granted Critical
Publication of CN113746950B publication Critical patent/CN113746950B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5046Resolving address allocation conflicts; Testing of addresses

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides an IP address conflict pre-detection method, an IP address conflict pre-detection system, computer equipment and a storage medium, wherein the method comprises the following steps: collecting configuration information of the network equipment after the network equipment is configured and before the network equipment is online; constructing a knowledge graph of an IP address based on configuration information of network equipment, wherein the knowledge graph of the IP address takes the configuration information of the network equipment as an entity and takes a network connection relationship between the network equipment as a relationship between the entities; and carrying out IP address conflict pre-detection in the knowledge graph. The technical scheme provided by the invention carries out the pre-detection of the IP address conflict before the network equipment is on line, and can effectively avoid the network operation risk caused by the error configuration of the IP address.

Description

IP address conflict pre-detection method, system, computer equipment and storage medium
Technical Field
The present invention relates to the field of communication networks, and in particular, to an IP address collision pre-detection method, an IP address collision pre-detection system, a computer device, and a computer readable storage medium.
Background
The IP protocol is an abbreviation of Internet Protocol (internet protocol), and is located in a network layer of the OSI model (Open System Interconnection Reference Model, open system interconnection communication reference model), and provides an end-to-end data transmission service for an upper layer protocol TCP (Transmission Control Protocol )/UDP (User Datagram Protocol, user datagram protocol), and IP packets are encapsulated into a data link layer for transmission. The IP address is a unified address format provided by the IP protocol, and a unique identifier is specified for each host and other devices on the internet, so if different hosts in the same network configure the same IP address, routing confusion will be caused, and data packets cannot be delivered, which is called an IP address collision.
The present method for detecting IP address conflict mainly focuses on various network types, such as IP address conflict detection in a local area network using ARP protocol (Address Resolution Protocol ), IP address conflict detection in a public network and VPN network (Virtual Private Network ), and IP address conflict detection in a cloud platform. However, the inventor finds that the existing IP address conflict detection method is to detect after the device is on line, ARP, SNMP (Simple Network Management Protocol ), a network management system and the like are needed to assist, and the existing IP address conflict detection method belongs to a positioning problem after a problem occurs, which directly affects the normal operation of the network.
Disclosure of Invention
The invention is completed in order to at least partially solve the technical problem that the network normal operation is affected by the detection of the IP address conflict after the network equipment is on line in the prior art.
According to an aspect of the present invention, there is provided an IP address collision pre-detection method, the method including:
collecting configuration information of the network equipment after the network equipment is configured and before the network equipment is online;
constructing a knowledge graph of an IP address based on configuration information of network equipment, wherein the knowledge graph of the IP address takes the configuration information of the network equipment as an entity and takes a network connection relationship between the network equipment as a relationship between the entities; the method comprises the steps of,
and carrying out IP address conflict pre-detection in the knowledge graph.
Optionally, the configuration information of the network device includes: device ID, interface ID, and IP address.
Optionally, performing IP address collision pre-detection in the knowledge graph includes:
and traversing all IP address entities in the knowledge graph, searching whether a certain IP address entity is connected with two or more interface ID entities at the same time, and if so, judging that the IP address has conflict.
Optionally, after determining that there is a conflict with a certain IP address, the method further includes:
each interface ID that is simultaneously connected to the IP address is detected and the IP address of the interface connection is modified at the interface where the IP address needs to be modified.
Further, after detecting each interface ID connected to the IP address at the same time, the method further includes:
and locating the router to which each interface ID connected with the IP address belongs.
Optionally, the configuration information of the network device further includes: the IP address attributes are classified into public networks and virtual private networks VPNs.
Optionally, performing IP address collision pre-detection in the knowledge graph further includes:
when the IP address attribute of the network equipment is public network, comparing the IP address of the network equipment with all public network IP addresses to determine whether IP address conflict exists or not;
when the IP address attribute of the network device is VPN, comparing the IP address with the IP address in VPN with the same ID to determine whether there is IP address conflict.
Optionally, the knowledge graph is an undirected graph g= (V, E), where V is a set of entities and E is a set of relationships between entities; and the data contained in the knowledge graph is stored by adopting a graph database.
Alternatively, the graph database employs Neo4J, arangoDB or oreientdb.
According to another aspect of the present invention, there is provided an IP address collision pre-detection system, the system comprising:
the acquisition module is used for acquiring configuration information of the network equipment after the network equipment is configured and before the network equipment is online;
the construction module is configured to construct a knowledge graph of the IP address based on configuration information of the network devices, wherein the knowledge graph of the IP address takes the configuration information of the network devices as an entity and takes a network connection relationship between the network devices as a relationship between the entities; the method comprises the steps of,
and the detection module is used for carrying out IP address conflict pre-detection in the knowledge graph.
According to a further aspect of the present invention there is provided a computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor performing the aforementioned IP address collision pre-detection method when the processor runs the computer program stored in the memory.
According to still another aspect of the present invention, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the aforementioned IP address collision pre-detection method.
The technical scheme provided by the invention can comprise the following beneficial effects:
the IP address conflict pre-detection method provided by the invention collects the configuration information of the network equipment after the network equipment is configured and before the network equipment is on line, constructs the knowledge graph of the IP address based on the collected information, and then executes the IP address conflict pre-detection based on the knowledge graph so as to avoid the problem of IP address conflict after the network equipment is on line, belongs to the problem solution before the problem occurs, and effectively avoids the risk of network operation caused by the error configuration of the IP address.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate and do not limit the invention.
Fig. 1 is a flow chart of an IP address collision pre-detection method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an IP address knowledge graph according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an IP address collision pre-detection system according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the following detailed description of the embodiments of the present invention will be given with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the invention, are not intended to limit the invention.
In the following description, the suffix such as "module", "part" or "unit" for representing the element is used only for facilitating the description of the present invention, and is not particularly significant in itself. Thus, "module," "component," or "unit" may be used in combination.
Fig. 1 is a flowchart illustrating an IP address collision pre-detection method according to an embodiment of the present invention. As shown in fig. 1, the method includes the following steps S101 to S103.
S101, acquiring configuration information of network equipment after the network equipment is configured and before the network equipment is online;
s102, constructing a knowledge graph of an IP address based on configuration information of network equipment, wherein the knowledge graph of the IP address takes the configuration information of the network equipment as an entity and takes a network connection relationship between the network equipment as a relationship between the entities;
s103, carrying out IP address conflict pre-detection in the knowledge graph.
In this embodiment, configuration information of the network device is collected after the network device is configured and before the network device is online, then a Knowledge Graph (knowledgegraph) of an IP address is constructed based on the collected information, and then IP address conflict pre-detection is performed based on the Knowledge Graph, so as to avoid the problem of IP address conflict after the network device is online, and to solve the problem before the problem, thereby effectively avoiding risks brought to network operation by incorrect configuration of the IP address.
In a specific embodiment, the configuration information of the network device includes: device ID, interface ID, and IP address.
In this embodiment, the network device mainly refers to a router, a host computer (such as a terminal and a server), and other devices that need to configure an IP address.
Taking a router as an example, since the router has a command for displaying all configuration information, the router can display all configuration information thereof, such as router ID, protocol, parameter, interface ID, interface IP, etc., at this time, required configuration information, specifically, router ID (i.e., device ID), interface ID and interface IP (i.e., IP address) can be collected.
Taking a computer host as an example, a host ID (i.e., a device ID), a network card ID (i.e., an interface ID), and a network card IP (i.e., an IP address) of the computer host need to be collected.
When the knowledge graph of the IP address is constructed later, the router ID/host ID, the interface ID/network card ID and the interface IP/network card IP can be designated as entities of the knowledge graph, and the network connection relationship of the network equipment is designated as the relationship among the entities.
In one specific embodiment, step S103 includes:
and traversing all IP address entities in the knowledge graph, searching whether a certain IP address entity is connected with two or more interface ID entities at the same time, and if so, judging that the IP address has conflict.
In this embodiment, when performing IP address collision prediction, it is necessary to traverse all the IP address entities in the knowledge graph, find the IP address entities in which two or more interface ID entities are connected simultaneously, and determine that there is a collision in the IP address. Of course, in the constructed knowledge graph, more than one IP address may be needed, and each IP address having a conflict needs to be found out in the process of traversing the knowledge graph, and then the interface ID and the device ID (such as the router ID or the host ID) connected with the IP address need to be checked and modified, so as to avoid the problem of IP address conflict after the network device is online.
In a specific embodiment, the configuration information of the network device further includes: the IP address attributes are classified into public networks and VPN (virtual private networks, virtual private network).
Specifically, if VPN is configured in the network, VPN information is displayed in the collected network device information. Accordingly, the attribute of the IP address may be designated as VPN in the knowledge graph, otherwise the attribute of the IP address is designated as public network in the knowledge graph (the attribute of the IP address is not an entity in the knowledge graph).
In this embodiment, in addition to marking entities such as a device ID, an interface ID, and an IP address in a knowledge graph of IP addresses, attributes of IP addresses may be marked to distinguish which IP addresses belong to a public network and which IP addresses belong to a VPN, where the attributes indicate a range of IP address detection.
In a specific embodiment, step S103 further includes:
when the IP address attribute of the network equipment is public network, comparing the IP address of the network equipment with all public network IP addresses to determine whether IP address conflict exists or not;
when the IP address attribute of the network device is VPN, comparing the IP address with the IP address in VPN with the same ID to determine whether there is IP address conflict.
In this embodiment, in the process of traversing all the IP address entities in the knowledge graph, the IP address detection range may be defined by the IP address attribute of the network device. Specifically, the public network indication is compared with all public network IPs, and the VPN indication is compared with all IP addresses inside the VPN of the same ID. And, IP addresses with different attributes belong to different entities.
In a specific embodiment, the knowledge graph is an undirected graph g= (V, E), where V is a set of entities and E is a set of relationships between entities; and the data contained in the knowledge graph is stored by adopting a graph database.
The graph database, also called a graph database, is a type of NoSQL database (Not Only SQL, which is generally referred to as a non-relational database), and it is very intuitive to apply graph theory to store relationship information between entities.
In one embodiment, the graph database employs Neo4J, arangoDB or OrientDB.
Wherein Neo4J is a network-oriented database, and the network (called a graph from a mathematical perspective) is a flexible data structure, so that a more agile and rapid development mode can be applied. Neo4J is an embedded disk-based Java persistence engine with full transactional properties that stores structured data on the network rather than in tables; neo4J can be seen as a high performance graph engine with all the features of the mature database.
Arangodub is a native multimodal database with key/value pairs, graph graphs and document data models, provides a unified database query language that covers three data models, and allows mixed use of the three models in a single query. The arango db adopts a unified kernel and a unified database query language which are tried for all data models, so that a user can use multiple models in a mixed manner in a single query process; and the arangodub does not need to "switch" between different data models when performing the query process, nor does it need to perform the data transfer process.
OrientDB is a deeply scalable document-graphics database management system with both the flexibility of a document database and the ability of a graphics database to manage links. OrientDB may be modeless, full-mode, or mixed-mode, supporting functions such as ACID transactions, fast indexing, native, and SQL queries.
All three of the above-mentioned graph databases can be used for storing the data in the knowledge graph according to the present invention.
Further, the query language of the knowledge graph adopts SPARQL or Cypher.
Among them, SPARQL, collectively SPARQL Protocol and RDF Query Language, is a query language and data acquisition protocol developed for RDF (Resource Description Framework ). SPARQL allows users to write queries for content that may be referred to as "key-value" data, or more specifically, data that complies with the RDF specification of W3C (World Wide Web Consortium ).
Cypher is a declarative graphical query language for Neo4J that allows users to efficiently query graphical data without having to write the traversal code of the graphical structure. The capabilities of which include: create, update, delete nodes and relationships, query and modify nodes and relationships through pattern matching, manage indexes and constraints, and the like.
Both query languages can be used for traversing the knowledge graph database to search the IP address entity which is simultaneously connected with two or more interface ID entities, so that the detection of conflict IP addresses can be conveniently realized.
Fig. 2 is a schematic diagram of an IP address knowledge graph according to an embodiment of the present invention, where R represents a router ID, P represents an interface ID, and IP represents an IP address. As can be seen from fig. 2, IP1 and IP6 belong to the same VPN, and are connected through R1, R2 and R3; IP2, IP3, IP4 and IP5 all belong to the public network.
When the IP address collision prediction is performed in the knowledge graph shown in fig. 2, all the IP address entities, specifically, IP1 to IP6, need to be traversed to find out whether there are IP address entities simultaneously connected with two or more interface ID entities. According to the query, IP3 is a public network address and is connected with interfaces P1 and P4, so that IP3 is an interface address of P1 and an interface address of P4, and therefore, the IP3 is judged to be a conflict address and needs to be modified on P1 or P4; meanwhile, the knowledge graph can see that the interface P1 belongs to the router R1 and the interface P4 belongs to the router R2, so that when the IP address conflict is detected, the specific router can be quickly and intuitively positioned, and the conflicting IP address can be conveniently and timely modified.
Accordingly, after it is determined in step S103 that there is a conflict with a certain IP address, the following step S104 is further included.
S104, detecting each interface ID connected with the IP address simultaneously, and modifying the IP address of the interface connection at the interface where the IP address needs to be modified.
In the step, the IP address modification is carried out on the interface needing to modify the IP address, so that the condition that the same IP address is simultaneously connected with two or more interface IDs is avoided, and the normal operation of the network is ensured.
Further, step S104, after detecting each interface ID connected to the IP address at the same time, further includes: and positioning routers to which the interface IDs connected with the IP address simultaneously belong respectively in the knowledge graph.
In the step, routers to which the interface IDs with the IP address conflict belong are positioned in the knowledge graph, so that the conflicting IP addresses can be modified in time.
It should be noted that the order of the steps is only a specific example provided for illustrating the embodiments of the present invention, and the present invention is not limited to the order of the steps, and those skilled in the art may adjust the order of the steps as required in practical applications.
According to the IP address conflict pre-detection method provided by the embodiment of the invention, an artificial intelligent knowledge graph technology is introduced into IP address conflict detection, specifically, after network equipment configuration is completed and before the network equipment is online, the knowledge graph of the IP address is constructed through the acquired network equipment configuration information, so that the position of the IP address in the network can be visually marked, the attribute of the IP address is marked, finally, the IP address conflict pre-detection is carried out, and the IP address conflict pre-detection can be timely modified when the IP address is found to have conflict, thereby carrying out the IP address conflict pre-detection before the network equipment is online, and effectively avoiding the network operation risk caused by the error configuration of the IP address.
Fig. 3 is a schematic structural diagram of an IP address collision pre-detection system according to an embodiment of the present invention. As shown in fig. 3, the system 3 includes: an acquisition module 301, a construction module 302 and a detection module 303.
The acquisition module 301 is configured to acquire configuration information of the network device after the network device is configured and before the network device is online; the construction module 302 is configured to construct a knowledge graph of an IP address based on configuration information of the network devices, where the knowledge graph of the IP address uses the configuration information of the network devices as entities and uses a network connection relationship between the network devices as a relationship between the entities; the detection module 303 is configured to perform IP address collision pre-detection in the knowledge-graph.
In a specific embodiment, the configuration information of the network device collected by the collection module 301 includes: device ID, interface ID, and IP address.
In a specific embodiment, the detection module 303 is specifically configured to traverse all the IP address entities in the knowledge graph, find whether there is a certain IP address entity that is connected to two or more interface ID entities at the same time, and if so, determine that there is a conflict in the IP address.
In a specific embodiment, the configuration information of the network device collected by the collection module 301 further includes: the IP address attribute is classified into public network and VPN.
In a specific embodiment, the detection module 303 is further configured to, when the IP address attribute of the network device is a public network, compare the IP address of the network device with all the public network IP addresses to determine whether there is an IP address conflict; when the IP address attribute of the network device is VPN, comparing the IP address with the IP address in VPN with the same ID to determine whether there is IP address conflict.
In a specific embodiment, the knowledge graph is an undirected graph g= (V, E), where V is a set of entities and E is a set of relationships between entities; and the data contained in the knowledge graph is stored by adopting a graph database.
In one embodiment, the graph database employs Neo4J, arangoDB or OrientDB.
In a specific embodiment, the system 3 further comprises: a modifying module (not shown in the figure) configured to detect, after the detecting module 303 determines that there is a conflict with a certain IP address, each interface ID connected simultaneously with the IP address, and modify the IP address of the interface connection at the interface where the IP address needs to be modified.
In a specific embodiment, the system 3 further comprises: and the positioning module (not shown in the figure) is configured to position routers to which the interface IDs connected with the IP address respectively belong in the knowledge graph after the modification module detects the interface IDs connected with the IP address simultaneously, so that the modification module can modify the conflicting IP address timely.
According to the IP address conflict pre-detection system provided by the embodiment of the invention, an artificial intelligent knowledge graph technology is introduced into IP address conflict detection, specifically, after network equipment configuration is completed and before the network equipment is online, the knowledge graph of the IP address is constructed through the acquired network equipment configuration information, so that the position of the IP address in the network can be visually marked, the attribute of the IP address is marked, finally, the IP address conflict pre-detection is performed, and the IP address conflict pre-detection can be timely modified when the IP address is found to have conflict, thereby the IP address conflict pre-detection is performed before the network equipment is online, and the network operation risk caused by the error configuration of the IP address is effectively avoided.
Based on the same technical concept, the embodiment of the present invention correspondingly provides a computer device, as shown in fig. 4, where the computer device 4 includes a memory 41 and a processor 42, where the memory 41 stores a computer program, and when the processor 42 runs the computer program stored in the memory 41, the processor 42 executes the foregoing IP address conflict pre-detection method.
Based on the same technical concept, the embodiment of the invention correspondingly provides a computer readable storage medium, on which a computer program is stored, wherein when the computer program is executed by a processor, the processor executes the IP address conflict pre-detection method.
In summary, the method, the system, the computer device and the storage medium for pre-detecting the IP address conflict provided by the embodiment of the invention acquire the configuration information of the network device, construct the knowledge graph of the IP address based on the acquired information, and execute the pre-detection of the IP address conflict based on the knowledge graph.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, functional modules/units in the apparatus, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between the functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed cooperatively by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention.

Claims (12)

1. An IP address collision pre-detection method, comprising:
acquiring configuration information of the network equipment based on commands of the network equipment for displaying all configuration information after the network equipment is configured and before the network equipment is online;
constructing a knowledge graph of an IP address based on configuration information of network equipment, wherein the knowledge graph of the IP address takes the configuration information of the network equipment as an entity and takes a network connection relationship between the network equipment as a relationship between the entities; the method comprises the steps of,
and carrying out IP address conflict pre-detection in the knowledge graph.
2. The method of claim 1, wherein the configuration information of the network device comprises: device ID, interface ID, and IP address.
3. The method of claim 2, wherein performing IP address collision pre-detection in the knowledge-graph comprises:
and traversing all IP address entities in the knowledge graph, searching whether a certain IP address entity is connected with two or more interface ID entities at the same time, and if so, judging that the IP address has conflict.
4. A method according to claim 3, further comprising, after determining that there is a conflict with a certain IP address:
each interface ID that is simultaneously connected to the IP address is detected and the IP address of the interface connection is modified at the interface where the IP address needs to be modified.
5. The method of claim 4, further comprising, after detecting each interface ID that is simultaneously connected to the IP address:
and positioning routers to which the interface IDs connected with the IP address simultaneously belong respectively in the knowledge graph.
6. The method according to any of claims 3-5, wherein the configuration information of the network device further comprises: the IP address attributes are classified into public networks and virtual private networks VPNs.
7. The method of claim 6, wherein performing IP address collision pre-detection in the knowledge-graph further comprises:
when the IP address attribute of the network equipment is public network, comparing the IP address of the network equipment with all public network IP addresses to determine whether IP address conflict exists or not;
when the IP address attribute of the network device is VPN, comparing the IP address with the IP address in VPN with the same ID to determine whether there is IP address conflict.
8. The method of claim 1, wherein the knowledge-graph is an undirected graph g= (V, E), where V is a set of entities and E is a set of relationships between entities; and the data contained in the knowledge graph is stored by adopting a graph database.
9. The method of claim 8, wherein the graph database employs Neo4J, arangoDB or OrientDB.
10. An IP address collision pre-detection system, comprising:
the acquisition module is used for acquiring configuration information of the network equipment based on commands of the network equipment for displaying all configuration information after the configuration of the network equipment is completed and before the network equipment is online;
the construction module is configured to construct a knowledge graph of the IP address based on configuration information of the network devices, wherein the knowledge graph of the IP address takes the configuration information of the network devices as an entity and takes a network connection relationship between the network devices as a relationship between the entities; the method comprises the steps of,
and the detection module is used for carrying out IP address conflict pre-detection in the knowledge graph.
11. A computer device comprising a memory and a processor, the memory having stored therein a computer program, which when executed by the processor performs the IP address collision pre-detection method according to any one of claims 1 to 9.
12. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when executed by a processor, performs the IP address collision pre-detection method according to any one of claims 1 to 9.
CN202111041810.8A 2021-09-07 2021-09-07 IP address conflict pre-detection method, system, computer equipment and storage medium Active CN113746950B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111041810.8A CN113746950B (en) 2021-09-07 2021-09-07 IP address conflict pre-detection method, system, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111041810.8A CN113746950B (en) 2021-09-07 2021-09-07 IP address conflict pre-detection method, system, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113746950A CN113746950A (en) 2021-12-03
CN113746950B true CN113746950B (en) 2023-11-21

Family

ID=78736356

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111041810.8A Active CN113746950B (en) 2021-09-07 2021-09-07 IP address conflict pre-detection method, system, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113746950B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114915539B (en) * 2022-05-20 2023-07-28 电子科技大学 SDN flow rule conflict fault detection method based on knowledge graph

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011153886A1 (en) * 2010-06-11 2011-12-15 中兴通讯股份有限公司 Method, system and dynamic host configuration protocol server, client terminal for avoiding internet protocol address conflict
CN105430114A (en) * 2015-11-13 2016-03-23 上海斐讯数据通信技术有限公司 Internet protocol (IP) address conflict detection method and system, and access stratum device
CN105530326A (en) * 2014-10-24 2016-04-27 中兴通讯股份有限公司 Method and device for detecting IP address conflict of three-layer interface
CN105939403A (en) * 2016-03-31 2016-09-14 杭州迪普科技有限公司 Address conflict detection method and device
CN107770294A (en) * 2016-08-18 2018-03-06 中兴通讯股份有限公司 The processing method and processing device of IP address conflicts in EVPN
EP3754950A1 (en) * 2019-06-20 2020-12-23 Nokia Solutions and Networks Oy Method, device, apparatus for mac address conflict detection and computer readable storage medium
CN112491636A (en) * 2019-09-11 2021-03-12 华为技术有限公司 Data processing method and device and computer storage medium
CN112565193A (en) * 2020-11-06 2021-03-26 西安电子科技大学 Network security policy conflict resolution method, system, storage medium and equipment
CN112818131A (en) * 2021-02-01 2021-05-18 亚信科技(成都)有限公司 Method, system and storage medium for constructing graph of threat information

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7633855B2 (en) * 2005-11-03 2009-12-15 Cisco Technology, Inc. System and method for resolving address conflicts in a network
US20120131197A1 (en) * 2010-11-23 2012-05-24 Sensormatic Electronics, LLC Method and apparatus for automatically resolving conflicting devices on a network
CN102546849B (en) * 2010-12-30 2014-10-08 华为技术有限公司 Detection method for IP (Internet Protocol) address conflict and network equipment

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011153886A1 (en) * 2010-06-11 2011-12-15 中兴通讯股份有限公司 Method, system and dynamic host configuration protocol server, client terminal for avoiding internet protocol address conflict
CN105530326A (en) * 2014-10-24 2016-04-27 中兴通讯股份有限公司 Method and device for detecting IP address conflict of three-layer interface
WO2016061947A1 (en) * 2014-10-24 2016-04-28 中兴通讯股份有限公司 Method and apparatus for detecting three-layer interface ip address conflict
CN105430114A (en) * 2015-11-13 2016-03-23 上海斐讯数据通信技术有限公司 Internet protocol (IP) address conflict detection method and system, and access stratum device
CN105939403A (en) * 2016-03-31 2016-09-14 杭州迪普科技有限公司 Address conflict detection method and device
CN107770294A (en) * 2016-08-18 2018-03-06 中兴通讯股份有限公司 The processing method and processing device of IP address conflicts in EVPN
EP3754950A1 (en) * 2019-06-20 2020-12-23 Nokia Solutions and Networks Oy Method, device, apparatus for mac address conflict detection and computer readable storage medium
CN112491636A (en) * 2019-09-11 2021-03-12 华为技术有限公司 Data processing method and device and computer storage medium
CN112565193A (en) * 2020-11-06 2021-03-26 西安电子科技大学 Network security policy conflict resolution method, system, storage medium and equipment
CN112818131A (en) * 2021-02-01 2021-05-18 亚信科技(成都)有限公司 Method, system and storage medium for constructing graph of threat information

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Nikhil Tripathi,et al ."Exploiting DHCP Server-side IP Address Conflict Detection: A DHCP Starvation Attack".《IEEE》.2015,全文. *
校园网IP地址冲突的分析及解决方案;王元国;;计算机时代(第03期);全文 *
校园网IP地址冲突的解决方法;沈思;许晓光;;科技信息(第06期);全文 *
解决网络中IP地址冲突的途径综述;许丽光;;电脑知识与技术(学术交流)(第12期);全文 *

Also Published As

Publication number Publication date
CN113746950A (en) 2021-12-03

Similar Documents

Publication Publication Date Title
US20230289255A1 (en) Automatic correlation of dynamic system events within computing devices
CN108712286B (en) Method and device for determining network topology structure and storage medium
US7673031B1 (en) Resource mapping in a network environment
US9047574B2 (en) Storage capacity planning
US7702655B1 (en) Maintaining and using user-created mapping history for network resource mapping
JP2019536331A (en) System and method for interactive network analysis platform
US11159390B2 (en) Systems and methods for service-aware mapping of a system infrastructure
AU2020202851B2 (en) Automated electronic computing and communication system event analysis and management
US20160188609A1 (en) System and Method for Model-based Search and Retrieval of Networked Data
US20240146799A1 (en) System and method for analyzing network objects in a cloud environment
US20180006884A1 (en) Infrastructure management device
CN113746950B (en) IP address conflict pre-detection method, system, computer equipment and storage medium
US20240056487A1 (en) Static analysis techniques for determining reachability properties of network and computing objects
CN112751704B (en) Method, device and equipment for checking connectivity of heterogeneous network in network target range
US20200311003A1 (en) Infrastructure management device
CN110855803B (en) Data acquisition method and device
CN108763922A (en) Authority detection method and device, electronic equipment and medium
CN112436993B (en) VPN private line discovery method and device based on configuration file analysis
CN117354390A (en) Tracking method and device of TCP connection, electronic equipment and storage medium
CN115775136A (en) Asset management method and device
CN116996383A (en) Verification method and device for network equipment configuration, electronic equipment and storage medium
CN117290550A (en) Method and device for discovering resource relationship in graph database
CN117493461A (en) Ledger data management method, system, equipment and storage medium
CN117743646A (en) Query method and device for network access path, storage medium and electronic device
CN117997706A (en) Fault monitoring method and device for multi-level network topology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant