CN113746950B - IP address conflict pre-detection method, system, computer equipment and storage medium - Google Patents
IP address conflict pre-detection method, system, computer equipment and storage medium Download PDFInfo
- Publication number
- CN113746950B CN113746950B CN202111041810.8A CN202111041810A CN113746950B CN 113746950 B CN113746950 B CN 113746950B CN 202111041810 A CN202111041810 A CN 202111041810A CN 113746950 B CN113746950 B CN 113746950B
- Authority
- CN
- China
- Prior art keywords
- address
- network
- network equipment
- configuration information
- detection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 61
- 238000000034 method Methods 0.000 claims abstract description 26
- 238000004590 computer program Methods 0.000 claims description 10
- 238000010276 construction Methods 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 5
- 230000008569 process Effects 0.000 description 5
- 238000004891 communication Methods 0.000 description 4
- 238000013499 data model Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 4
- 230000004048 modification Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 239000002253 acid Substances 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002688 persistence Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000007723 transport mechanism Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/50—Address allocation
- H04L61/5046—Resolving address allocation conflicts; Testing of addresses
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides an IP address conflict pre-detection method, an IP address conflict pre-detection system, computer equipment and a storage medium, wherein the method comprises the following steps: collecting configuration information of the network equipment after the network equipment is configured and before the network equipment is online; constructing a knowledge graph of an IP address based on configuration information of network equipment, wherein the knowledge graph of the IP address takes the configuration information of the network equipment as an entity and takes a network connection relationship between the network equipment as a relationship between the entities; and carrying out IP address conflict pre-detection in the knowledge graph. The technical scheme provided by the invention carries out the pre-detection of the IP address conflict before the network equipment is on line, and can effectively avoid the network operation risk caused by the error configuration of the IP address.
Description
Technical Field
The present invention relates to the field of communication networks, and in particular, to an IP address collision pre-detection method, an IP address collision pre-detection system, a computer device, and a computer readable storage medium.
Background
The IP protocol is an abbreviation of Internet Protocol (internet protocol), and is located in a network layer of the OSI model (Open System Interconnection Reference Model, open system interconnection communication reference model), and provides an end-to-end data transmission service for an upper layer protocol TCP (Transmission Control Protocol )/UDP (User Datagram Protocol, user datagram protocol), and IP packets are encapsulated into a data link layer for transmission. The IP address is a unified address format provided by the IP protocol, and a unique identifier is specified for each host and other devices on the internet, so if different hosts in the same network configure the same IP address, routing confusion will be caused, and data packets cannot be delivered, which is called an IP address collision.
The present method for detecting IP address conflict mainly focuses on various network types, such as IP address conflict detection in a local area network using ARP protocol (Address Resolution Protocol ), IP address conflict detection in a public network and VPN network (Virtual Private Network ), and IP address conflict detection in a cloud platform. However, the inventor finds that the existing IP address conflict detection method is to detect after the device is on line, ARP, SNMP (Simple Network Management Protocol ), a network management system and the like are needed to assist, and the existing IP address conflict detection method belongs to a positioning problem after a problem occurs, which directly affects the normal operation of the network.
Disclosure of Invention
The invention is completed in order to at least partially solve the technical problem that the network normal operation is affected by the detection of the IP address conflict after the network equipment is on line in the prior art.
According to an aspect of the present invention, there is provided an IP address collision pre-detection method, the method including:
collecting configuration information of the network equipment after the network equipment is configured and before the network equipment is online;
constructing a knowledge graph of an IP address based on configuration information of network equipment, wherein the knowledge graph of the IP address takes the configuration information of the network equipment as an entity and takes a network connection relationship between the network equipment as a relationship between the entities; the method comprises the steps of,
and carrying out IP address conflict pre-detection in the knowledge graph.
Optionally, the configuration information of the network device includes: device ID, interface ID, and IP address.
Optionally, performing IP address collision pre-detection in the knowledge graph includes:
and traversing all IP address entities in the knowledge graph, searching whether a certain IP address entity is connected with two or more interface ID entities at the same time, and if so, judging that the IP address has conflict.
Optionally, after determining that there is a conflict with a certain IP address, the method further includes:
each interface ID that is simultaneously connected to the IP address is detected and the IP address of the interface connection is modified at the interface where the IP address needs to be modified.
Further, after detecting each interface ID connected to the IP address at the same time, the method further includes:
and locating the router to which each interface ID connected with the IP address belongs.
Optionally, the configuration information of the network device further includes: the IP address attributes are classified into public networks and virtual private networks VPNs.
Optionally, performing IP address collision pre-detection in the knowledge graph further includes:
when the IP address attribute of the network equipment is public network, comparing the IP address of the network equipment with all public network IP addresses to determine whether IP address conflict exists or not;
when the IP address attribute of the network device is VPN, comparing the IP address with the IP address in VPN with the same ID to determine whether there is IP address conflict.
Optionally, the knowledge graph is an undirected graph g= (V, E), where V is a set of entities and E is a set of relationships between entities; and the data contained in the knowledge graph is stored by adopting a graph database.
Alternatively, the graph database employs Neo4J, arangoDB or oreientdb.
According to another aspect of the present invention, there is provided an IP address collision pre-detection system, the system comprising:
the acquisition module is used for acquiring configuration information of the network equipment after the network equipment is configured and before the network equipment is online;
the construction module is configured to construct a knowledge graph of the IP address based on configuration information of the network devices, wherein the knowledge graph of the IP address takes the configuration information of the network devices as an entity and takes a network connection relationship between the network devices as a relationship between the entities; the method comprises the steps of,
and the detection module is used for carrying out IP address conflict pre-detection in the knowledge graph.
According to a further aspect of the present invention there is provided a computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor performing the aforementioned IP address collision pre-detection method when the processor runs the computer program stored in the memory.
According to still another aspect of the present invention, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the aforementioned IP address collision pre-detection method.
The technical scheme provided by the invention can comprise the following beneficial effects:
the IP address conflict pre-detection method provided by the invention collects the configuration information of the network equipment after the network equipment is configured and before the network equipment is on line, constructs the knowledge graph of the IP address based on the collected information, and then executes the IP address conflict pre-detection based on the knowledge graph so as to avoid the problem of IP address conflict after the network equipment is on line, belongs to the problem solution before the problem occurs, and effectively avoids the risk of network operation caused by the error configuration of the IP address.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate and do not limit the invention.
Fig. 1 is a flow chart of an IP address collision pre-detection method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of an IP address knowledge graph according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an IP address collision pre-detection system according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the following detailed description of the embodiments of the present invention will be given with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating and illustrating the invention, are not intended to limit the invention.
In the following description, the suffix such as "module", "part" or "unit" for representing the element is used only for facilitating the description of the present invention, and is not particularly significant in itself. Thus, "module," "component," or "unit" may be used in combination.
Fig. 1 is a flowchart illustrating an IP address collision pre-detection method according to an embodiment of the present invention. As shown in fig. 1, the method includes the following steps S101 to S103.
S101, acquiring configuration information of network equipment after the network equipment is configured and before the network equipment is online;
s102, constructing a knowledge graph of an IP address based on configuration information of network equipment, wherein the knowledge graph of the IP address takes the configuration information of the network equipment as an entity and takes a network connection relationship between the network equipment as a relationship between the entities;
s103, carrying out IP address conflict pre-detection in the knowledge graph.
In this embodiment, configuration information of the network device is collected after the network device is configured and before the network device is online, then a Knowledge Graph (knowledgegraph) of an IP address is constructed based on the collected information, and then IP address conflict pre-detection is performed based on the Knowledge Graph, so as to avoid the problem of IP address conflict after the network device is online, and to solve the problem before the problem, thereby effectively avoiding risks brought to network operation by incorrect configuration of the IP address.
In a specific embodiment, the configuration information of the network device includes: device ID, interface ID, and IP address.
In this embodiment, the network device mainly refers to a router, a host computer (such as a terminal and a server), and other devices that need to configure an IP address.
Taking a router as an example, since the router has a command for displaying all configuration information, the router can display all configuration information thereof, such as router ID, protocol, parameter, interface ID, interface IP, etc., at this time, required configuration information, specifically, router ID (i.e., device ID), interface ID and interface IP (i.e., IP address) can be collected.
Taking a computer host as an example, a host ID (i.e., a device ID), a network card ID (i.e., an interface ID), and a network card IP (i.e., an IP address) of the computer host need to be collected.
When the knowledge graph of the IP address is constructed later, the router ID/host ID, the interface ID/network card ID and the interface IP/network card IP can be designated as entities of the knowledge graph, and the network connection relationship of the network equipment is designated as the relationship among the entities.
In one specific embodiment, step S103 includes:
and traversing all IP address entities in the knowledge graph, searching whether a certain IP address entity is connected with two or more interface ID entities at the same time, and if so, judging that the IP address has conflict.
In this embodiment, when performing IP address collision prediction, it is necessary to traverse all the IP address entities in the knowledge graph, find the IP address entities in which two or more interface ID entities are connected simultaneously, and determine that there is a collision in the IP address. Of course, in the constructed knowledge graph, more than one IP address may be needed, and each IP address having a conflict needs to be found out in the process of traversing the knowledge graph, and then the interface ID and the device ID (such as the router ID or the host ID) connected with the IP address need to be checked and modified, so as to avoid the problem of IP address conflict after the network device is online.
In a specific embodiment, the configuration information of the network device further includes: the IP address attributes are classified into public networks and VPN (virtual private networks, virtual private network).
Specifically, if VPN is configured in the network, VPN information is displayed in the collected network device information. Accordingly, the attribute of the IP address may be designated as VPN in the knowledge graph, otherwise the attribute of the IP address is designated as public network in the knowledge graph (the attribute of the IP address is not an entity in the knowledge graph).
In this embodiment, in addition to marking entities such as a device ID, an interface ID, and an IP address in a knowledge graph of IP addresses, attributes of IP addresses may be marked to distinguish which IP addresses belong to a public network and which IP addresses belong to a VPN, where the attributes indicate a range of IP address detection.
In a specific embodiment, step S103 further includes:
when the IP address attribute of the network equipment is public network, comparing the IP address of the network equipment with all public network IP addresses to determine whether IP address conflict exists or not;
when the IP address attribute of the network device is VPN, comparing the IP address with the IP address in VPN with the same ID to determine whether there is IP address conflict.
In this embodiment, in the process of traversing all the IP address entities in the knowledge graph, the IP address detection range may be defined by the IP address attribute of the network device. Specifically, the public network indication is compared with all public network IPs, and the VPN indication is compared with all IP addresses inside the VPN of the same ID. And, IP addresses with different attributes belong to different entities.
In a specific embodiment, the knowledge graph is an undirected graph g= (V, E), where V is a set of entities and E is a set of relationships between entities; and the data contained in the knowledge graph is stored by adopting a graph database.
The graph database, also called a graph database, is a type of NoSQL database (Not Only SQL, which is generally referred to as a non-relational database), and it is very intuitive to apply graph theory to store relationship information between entities.
In one embodiment, the graph database employs Neo4J, arangoDB or OrientDB.
Wherein Neo4J is a network-oriented database, and the network (called a graph from a mathematical perspective) is a flexible data structure, so that a more agile and rapid development mode can be applied. Neo4J is an embedded disk-based Java persistence engine with full transactional properties that stores structured data on the network rather than in tables; neo4J can be seen as a high performance graph engine with all the features of the mature database.
Arangodub is a native multimodal database with key/value pairs, graph graphs and document data models, provides a unified database query language that covers three data models, and allows mixed use of the three models in a single query. The arango db adopts a unified kernel and a unified database query language which are tried for all data models, so that a user can use multiple models in a mixed manner in a single query process; and the arangodub does not need to "switch" between different data models when performing the query process, nor does it need to perform the data transfer process.
OrientDB is a deeply scalable document-graphics database management system with both the flexibility of a document database and the ability of a graphics database to manage links. OrientDB may be modeless, full-mode, or mixed-mode, supporting functions such as ACID transactions, fast indexing, native, and SQL queries.
All three of the above-mentioned graph databases can be used for storing the data in the knowledge graph according to the present invention.
Further, the query language of the knowledge graph adopts SPARQL or Cypher.
Among them, SPARQL, collectively SPARQL Protocol and RDF Query Language, is a query language and data acquisition protocol developed for RDF (Resource Description Framework ). SPARQL allows users to write queries for content that may be referred to as "key-value" data, or more specifically, data that complies with the RDF specification of W3C (World Wide Web Consortium ).
Cypher is a declarative graphical query language for Neo4J that allows users to efficiently query graphical data without having to write the traversal code of the graphical structure. The capabilities of which include: create, update, delete nodes and relationships, query and modify nodes and relationships through pattern matching, manage indexes and constraints, and the like.
Both query languages can be used for traversing the knowledge graph database to search the IP address entity which is simultaneously connected with two or more interface ID entities, so that the detection of conflict IP addresses can be conveniently realized.
Fig. 2 is a schematic diagram of an IP address knowledge graph according to an embodiment of the present invention, where R represents a router ID, P represents an interface ID, and IP represents an IP address. As can be seen from fig. 2, IP1 and IP6 belong to the same VPN, and are connected through R1, R2 and R3; IP2, IP3, IP4 and IP5 all belong to the public network.
When the IP address collision prediction is performed in the knowledge graph shown in fig. 2, all the IP address entities, specifically, IP1 to IP6, need to be traversed to find out whether there are IP address entities simultaneously connected with two or more interface ID entities. According to the query, IP3 is a public network address and is connected with interfaces P1 and P4, so that IP3 is an interface address of P1 and an interface address of P4, and therefore, the IP3 is judged to be a conflict address and needs to be modified on P1 or P4; meanwhile, the knowledge graph can see that the interface P1 belongs to the router R1 and the interface P4 belongs to the router R2, so that when the IP address conflict is detected, the specific router can be quickly and intuitively positioned, and the conflicting IP address can be conveniently and timely modified.
Accordingly, after it is determined in step S103 that there is a conflict with a certain IP address, the following step S104 is further included.
S104, detecting each interface ID connected with the IP address simultaneously, and modifying the IP address of the interface connection at the interface where the IP address needs to be modified.
In the step, the IP address modification is carried out on the interface needing to modify the IP address, so that the condition that the same IP address is simultaneously connected with two or more interface IDs is avoided, and the normal operation of the network is ensured.
Further, step S104, after detecting each interface ID connected to the IP address at the same time, further includes: and positioning routers to which the interface IDs connected with the IP address simultaneously belong respectively in the knowledge graph.
In the step, routers to which the interface IDs with the IP address conflict belong are positioned in the knowledge graph, so that the conflicting IP addresses can be modified in time.
It should be noted that the order of the steps is only a specific example provided for illustrating the embodiments of the present invention, and the present invention is not limited to the order of the steps, and those skilled in the art may adjust the order of the steps as required in practical applications.
According to the IP address conflict pre-detection method provided by the embodiment of the invention, an artificial intelligent knowledge graph technology is introduced into IP address conflict detection, specifically, after network equipment configuration is completed and before the network equipment is online, the knowledge graph of the IP address is constructed through the acquired network equipment configuration information, so that the position of the IP address in the network can be visually marked, the attribute of the IP address is marked, finally, the IP address conflict pre-detection is carried out, and the IP address conflict pre-detection can be timely modified when the IP address is found to have conflict, thereby carrying out the IP address conflict pre-detection before the network equipment is online, and effectively avoiding the network operation risk caused by the error configuration of the IP address.
Fig. 3 is a schematic structural diagram of an IP address collision pre-detection system according to an embodiment of the present invention. As shown in fig. 3, the system 3 includes: an acquisition module 301, a construction module 302 and a detection module 303.
The acquisition module 301 is configured to acquire configuration information of the network device after the network device is configured and before the network device is online; the construction module 302 is configured to construct a knowledge graph of an IP address based on configuration information of the network devices, where the knowledge graph of the IP address uses the configuration information of the network devices as entities and uses a network connection relationship between the network devices as a relationship between the entities; the detection module 303 is configured to perform IP address collision pre-detection in the knowledge-graph.
In a specific embodiment, the configuration information of the network device collected by the collection module 301 includes: device ID, interface ID, and IP address.
In a specific embodiment, the detection module 303 is specifically configured to traverse all the IP address entities in the knowledge graph, find whether there is a certain IP address entity that is connected to two or more interface ID entities at the same time, and if so, determine that there is a conflict in the IP address.
In a specific embodiment, the configuration information of the network device collected by the collection module 301 further includes: the IP address attribute is classified into public network and VPN.
In a specific embodiment, the detection module 303 is further configured to, when the IP address attribute of the network device is a public network, compare the IP address of the network device with all the public network IP addresses to determine whether there is an IP address conflict; when the IP address attribute of the network device is VPN, comparing the IP address with the IP address in VPN with the same ID to determine whether there is IP address conflict.
In a specific embodiment, the knowledge graph is an undirected graph g= (V, E), where V is a set of entities and E is a set of relationships between entities; and the data contained in the knowledge graph is stored by adopting a graph database.
In one embodiment, the graph database employs Neo4J, arangoDB or OrientDB.
In a specific embodiment, the system 3 further comprises: a modifying module (not shown in the figure) configured to detect, after the detecting module 303 determines that there is a conflict with a certain IP address, each interface ID connected simultaneously with the IP address, and modify the IP address of the interface connection at the interface where the IP address needs to be modified.
In a specific embodiment, the system 3 further comprises: and the positioning module (not shown in the figure) is configured to position routers to which the interface IDs connected with the IP address respectively belong in the knowledge graph after the modification module detects the interface IDs connected with the IP address simultaneously, so that the modification module can modify the conflicting IP address timely.
According to the IP address conflict pre-detection system provided by the embodiment of the invention, an artificial intelligent knowledge graph technology is introduced into IP address conflict detection, specifically, after network equipment configuration is completed and before the network equipment is online, the knowledge graph of the IP address is constructed through the acquired network equipment configuration information, so that the position of the IP address in the network can be visually marked, the attribute of the IP address is marked, finally, the IP address conflict pre-detection is performed, and the IP address conflict pre-detection can be timely modified when the IP address is found to have conflict, thereby the IP address conflict pre-detection is performed before the network equipment is online, and the network operation risk caused by the error configuration of the IP address is effectively avoided.
Based on the same technical concept, the embodiment of the present invention correspondingly provides a computer device, as shown in fig. 4, where the computer device 4 includes a memory 41 and a processor 42, where the memory 41 stores a computer program, and when the processor 42 runs the computer program stored in the memory 41, the processor 42 executes the foregoing IP address conflict pre-detection method.
Based on the same technical concept, the embodiment of the invention correspondingly provides a computer readable storage medium, on which a computer program is stored, wherein when the computer program is executed by a processor, the processor executes the IP address conflict pre-detection method.
In summary, the method, the system, the computer device and the storage medium for pre-detecting the IP address conflict provided by the embodiment of the invention acquire the configuration information of the network device, construct the knowledge graph of the IP address based on the acquired information, and execute the pre-detection of the IP address conflict based on the knowledge graph.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, functional modules/units in the apparatus, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between the functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed cooperatively by several physical components. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some or all of the technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit of the invention.
Claims (12)
1. An IP address collision pre-detection method, comprising:
acquiring configuration information of the network equipment based on commands of the network equipment for displaying all configuration information after the network equipment is configured and before the network equipment is online;
constructing a knowledge graph of an IP address based on configuration information of network equipment, wherein the knowledge graph of the IP address takes the configuration information of the network equipment as an entity and takes a network connection relationship between the network equipment as a relationship between the entities; the method comprises the steps of,
and carrying out IP address conflict pre-detection in the knowledge graph.
2. The method of claim 1, wherein the configuration information of the network device comprises: device ID, interface ID, and IP address.
3. The method of claim 2, wherein performing IP address collision pre-detection in the knowledge-graph comprises:
and traversing all IP address entities in the knowledge graph, searching whether a certain IP address entity is connected with two or more interface ID entities at the same time, and if so, judging that the IP address has conflict.
4. A method according to claim 3, further comprising, after determining that there is a conflict with a certain IP address:
each interface ID that is simultaneously connected to the IP address is detected and the IP address of the interface connection is modified at the interface where the IP address needs to be modified.
5. The method of claim 4, further comprising, after detecting each interface ID that is simultaneously connected to the IP address:
and positioning routers to which the interface IDs connected with the IP address simultaneously belong respectively in the knowledge graph.
6. The method according to any of claims 3-5, wherein the configuration information of the network device further comprises: the IP address attributes are classified into public networks and virtual private networks VPNs.
7. The method of claim 6, wherein performing IP address collision pre-detection in the knowledge-graph further comprises:
when the IP address attribute of the network equipment is public network, comparing the IP address of the network equipment with all public network IP addresses to determine whether IP address conflict exists or not;
when the IP address attribute of the network device is VPN, comparing the IP address with the IP address in VPN with the same ID to determine whether there is IP address conflict.
8. The method of claim 1, wherein the knowledge-graph is an undirected graph g= (V, E), where V is a set of entities and E is a set of relationships between entities; and the data contained in the knowledge graph is stored by adopting a graph database.
9. The method of claim 8, wherein the graph database employs Neo4J, arangoDB or OrientDB.
10. An IP address collision pre-detection system, comprising:
the acquisition module is used for acquiring configuration information of the network equipment based on commands of the network equipment for displaying all configuration information after the configuration of the network equipment is completed and before the network equipment is online;
the construction module is configured to construct a knowledge graph of the IP address based on configuration information of the network devices, wherein the knowledge graph of the IP address takes the configuration information of the network devices as an entity and takes a network connection relationship between the network devices as a relationship between the entities; the method comprises the steps of,
and the detection module is used for carrying out IP address conflict pre-detection in the knowledge graph.
11. A computer device comprising a memory and a processor, the memory having stored therein a computer program, which when executed by the processor performs the IP address collision pre-detection method according to any one of claims 1 to 9.
12. A computer-readable storage medium, on which a computer program is stored, characterized in that the computer program, when executed by a processor, performs the IP address collision pre-detection method according to any one of claims 1 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111041810.8A CN113746950B (en) | 2021-09-07 | 2021-09-07 | IP address conflict pre-detection method, system, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111041810.8A CN113746950B (en) | 2021-09-07 | 2021-09-07 | IP address conflict pre-detection method, system, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113746950A CN113746950A (en) | 2021-12-03 |
CN113746950B true CN113746950B (en) | 2023-11-21 |
Family
ID=78736356
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111041810.8A Active CN113746950B (en) | 2021-09-07 | 2021-09-07 | IP address conflict pre-detection method, system, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113746950B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114915539B (en) * | 2022-05-20 | 2023-07-28 | 电子科技大学 | SDN flow rule conflict fault detection method based on knowledge graph |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011153886A1 (en) * | 2010-06-11 | 2011-12-15 | 中兴通讯股份有限公司 | Method, system and dynamic host configuration protocol server, client terminal for avoiding internet protocol address conflict |
CN105430114A (en) * | 2015-11-13 | 2016-03-23 | 上海斐讯数据通信技术有限公司 | Internet protocol (IP) address conflict detection method and system, and access stratum device |
CN105530326A (en) * | 2014-10-24 | 2016-04-27 | 中兴通讯股份有限公司 | Method and device for detecting IP address conflict of three-layer interface |
CN105939403A (en) * | 2016-03-31 | 2016-09-14 | 杭州迪普科技有限公司 | Address conflict detection method and device |
CN107770294A (en) * | 2016-08-18 | 2018-03-06 | 中兴通讯股份有限公司 | The processing method and processing device of IP address conflicts in EVPN |
EP3754950A1 (en) * | 2019-06-20 | 2020-12-23 | Nokia Solutions and Networks Oy | Method, device, apparatus for mac address conflict detection and computer readable storage medium |
CN112491636A (en) * | 2019-09-11 | 2021-03-12 | 华为技术有限公司 | Data processing method and device and computer storage medium |
CN112565193A (en) * | 2020-11-06 | 2021-03-26 | 西安电子科技大学 | Network security policy conflict resolution method, system, storage medium and equipment |
CN112818131A (en) * | 2021-02-01 | 2021-05-18 | 亚信科技(成都)有限公司 | Method, system and storage medium for constructing graph of threat information |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7633855B2 (en) * | 2005-11-03 | 2009-12-15 | Cisco Technology, Inc. | System and method for resolving address conflicts in a network |
US20120131197A1 (en) * | 2010-11-23 | 2012-05-24 | Sensormatic Electronics, LLC | Method and apparatus for automatically resolving conflicting devices on a network |
CN102546849B (en) * | 2010-12-30 | 2014-10-08 | 华为技术有限公司 | Detection method for IP (Internet Protocol) address conflict and network equipment |
-
2021
- 2021-09-07 CN CN202111041810.8A patent/CN113746950B/en active Active
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2011153886A1 (en) * | 2010-06-11 | 2011-12-15 | 中兴通讯股份有限公司 | Method, system and dynamic host configuration protocol server, client terminal for avoiding internet protocol address conflict |
CN105530326A (en) * | 2014-10-24 | 2016-04-27 | 中兴通讯股份有限公司 | Method and device for detecting IP address conflict of three-layer interface |
WO2016061947A1 (en) * | 2014-10-24 | 2016-04-28 | 中兴通讯股份有限公司 | Method and apparatus for detecting three-layer interface ip address conflict |
CN105430114A (en) * | 2015-11-13 | 2016-03-23 | 上海斐讯数据通信技术有限公司 | Internet protocol (IP) address conflict detection method and system, and access stratum device |
CN105939403A (en) * | 2016-03-31 | 2016-09-14 | 杭州迪普科技有限公司 | Address conflict detection method and device |
CN107770294A (en) * | 2016-08-18 | 2018-03-06 | 中兴通讯股份有限公司 | The processing method and processing device of IP address conflicts in EVPN |
EP3754950A1 (en) * | 2019-06-20 | 2020-12-23 | Nokia Solutions and Networks Oy | Method, device, apparatus for mac address conflict detection and computer readable storage medium |
CN112491636A (en) * | 2019-09-11 | 2021-03-12 | 华为技术有限公司 | Data processing method and device and computer storage medium |
CN112565193A (en) * | 2020-11-06 | 2021-03-26 | 西安电子科技大学 | Network security policy conflict resolution method, system, storage medium and equipment |
CN112818131A (en) * | 2021-02-01 | 2021-05-18 | 亚信科技(成都)有限公司 | Method, system and storage medium for constructing graph of threat information |
Non-Patent Citations (4)
Title |
---|
Nikhil Tripathi,et al ."Exploiting DHCP Server-side IP Address Conflict Detection: A DHCP Starvation Attack".《IEEE》.2015,全文. * |
校园网IP地址冲突的分析及解决方案;王元国;;计算机时代(第03期);全文 * |
校园网IP地址冲突的解决方法;沈思;许晓光;;科技信息(第06期);全文 * |
解决网络中IP地址冲突的途径综述;许丽光;;电脑知识与技术(学术交流)(第12期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN113746950A (en) | 2021-12-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20230289255A1 (en) | Automatic correlation of dynamic system events within computing devices | |
CN108712286B (en) | Method and device for determining network topology structure and storage medium | |
US7673031B1 (en) | Resource mapping in a network environment | |
US9047574B2 (en) | Storage capacity planning | |
US7702655B1 (en) | Maintaining and using user-created mapping history for network resource mapping | |
JP2019536331A (en) | System and method for interactive network analysis platform | |
US11159390B2 (en) | Systems and methods for service-aware mapping of a system infrastructure | |
AU2020202851B2 (en) | Automated electronic computing and communication system event analysis and management | |
US20160188609A1 (en) | System and Method for Model-based Search and Retrieval of Networked Data | |
US20240146799A1 (en) | System and method for analyzing network objects in a cloud environment | |
US20180006884A1 (en) | Infrastructure management device | |
CN113746950B (en) | IP address conflict pre-detection method, system, computer equipment and storage medium | |
US20240056487A1 (en) | Static analysis techniques for determining reachability properties of network and computing objects | |
CN112751704B (en) | Method, device and equipment for checking connectivity of heterogeneous network in network target range | |
US20200311003A1 (en) | Infrastructure management device | |
CN110855803B (en) | Data acquisition method and device | |
CN108763922A (en) | Authority detection method and device, electronic equipment and medium | |
CN112436993B (en) | VPN private line discovery method and device based on configuration file analysis | |
CN117354390A (en) | Tracking method and device of TCP connection, electronic equipment and storage medium | |
CN115775136A (en) | Asset management method and device | |
CN116996383A (en) | Verification method and device for network equipment configuration, electronic equipment and storage medium | |
CN117290550A (en) | Method and device for discovering resource relationship in graph database | |
CN117493461A (en) | Ledger data management method, system, equipment and storage medium | |
CN117743646A (en) | Query method and device for network access path, storage medium and electronic device | |
CN117997706A (en) | Fault monitoring method and device for multi-level network topology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |