CN105099829B - A kind of information resources service availability automatic monitoring method based on http protocol - Google Patents

A kind of information resources service availability automatic monitoring method based on http protocol Download PDF

Info

Publication number
CN105099829B
CN105099829B CN201510542835.4A CN201510542835A CN105099829B CN 105099829 B CN105099829 B CN 105099829B CN 201510542835 A CN201510542835 A CN 201510542835A CN 105099829 B CN105099829 B CN 105099829B
Authority
CN
China
Prior art keywords
service
message
http
information
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510542835.4A
Other languages
Chinese (zh)
Other versions
CN105099829A (en
Inventor
单世民
周建阳
刘振铎
于涛
王思齐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dalian University of Technology
Original Assignee
Dalian University of Technology
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dalian University of Technology filed Critical Dalian University of Technology
Priority to CN201510542835.4A priority Critical patent/CN105099829B/en
Publication of CN105099829A publication Critical patent/CN105099829A/en
Application granted granted Critical
Publication of CN105099829B publication Critical patent/CN105099829B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Computer And Data Communications (AREA)

Abstract

A kind of information resources service availability automatic monitoring method based on http protocol, includes three phases:Service access behavioural characteristic automation collection;Service access behavioural characteristic stores;Service access Behavior modeling is with differentiating.The present invention can be used for monitoring by http protocol offer the search of electronic resources and the network service running status of download service, using the monitoring for being used to carry out bought bibliographic data base service including institution of higher learning and scientific research institutions.The present invention in the case of information resources service device control authority is obtained, completes with monitoring to implement for the monitoring information collection of the information resources service availability based on http protocol without manual analysis information resources service web page code.The collection of the live network address for all information of retrieval Form lists and download file can be automatically performed completely without any manual analysis is carried out to retrieval page code using the user of monitoring function, there is high automatization level.

Description

A kind of information resources service availability automatic monitoring method based on http protocol
Technical field
The present invention relates to a kind of information resources service availability automatic monitoring method based on http protocol, for monitoring The network service running status of the search of electronic resources and download service is provided by http protocol.
Background technology
Current Web technology has goed deep into the daily life of the mankind, has existed and is largely externally provided by http protocol The search of electronic resources and the network service of download service, Typical Representative therein are exactly all kinds of bibliographic data base resource platforms, such as ACM, SCI-E, Springer Link etc..For the demand of teaching research, many institution of higher learning and scientific research institution can all buy greatly The bibliographic data base of amount.However, influenceed by network environment unstability and network service availability, domestic universities and colleges and scientific research machine Abnormal page access, search service dysfunction or resource downloading service work(occurs in access of the structure for bibliographic data base often Can be abnormal situations such as, directly compromise the consumption rights and interests of bibliographic data base buyer.Artificial periodic monitoring method takes time and effort, and imitates Rate is low.
In the prior art, can by the control to institute's monitoring server for the monitoring scheme of information resources service availability It is divided into two major classes:
First kind scheme is to network in the case of controllable and operation information resources service device and adjunct network device The availability monitoring that service is carried out, its implementation is typically making for the equipment such as the CPU, internal memory and hard disk of monitoring network server With the running status of the network based services facility such as situation and interchanger.Such mode is only applicable to monitor self-built electronics money Source services, library's OPAC systems of such as universities and colleges and scientific research institutions itself.
Second class scheme is from information resources service buyer's angle, can not obtain the control of information resources service device The monitoring of information resources service availability is carried out in the case of authority.Prior art is obtained by manual analysis web page source code mode The control title of corresponding search condition is taken, then submits retrieval by way of customizing and corresponding to control value in webpage Form lists Request, finally by judge information resources service device can correctly return to response message by anticipation mode realize monitor.It is such a Mode, which is disadvantageous in that, to be needed to obtain the title of corresponding control by manually reading web page source code, and current each The design framework and control naming rule of information resources service website are often not consistent, and this requires to use such a monitoring scheme User should have higher professional standards, automaticity is low, high using difficulty, and ease for use is poor, it is difficult to popularization and application.
The content of the invention
The technical problem to be solved in the present invention is how from information resources service buyer's angle, without people's work point Information resources service web page code is analysed, in the case of information resources service device control authority is obtained, is automated with one kind The mode that degree is high, is easily used complete monitoring information collection for the information resources service availability based on http protocol with Monitoring is implemented, and the information resources service type monitored includes the search of electronic resources service and the electronics provided by http protocol Resource downloading service.
In order to solve the above problems, the present invention is divided into three phases in network protocol analysis method as core:Service access Behavioural characteristic automation collection;Service access behavioural characteristic stores;Service access Behavior modeling is with differentiating and (monitoring);Specifically such as Under:
1) service access behavioural characteristic automation collection, this is the core content of the present invention.
As shown in Fig. 2 service access behavioural characteristic acquisition scheme of the present invention uses network equipment bottom layer driving Routine interface obtains user's caused all-network data message during by browser access information resources service. Based on the analysis to captured network message, the automatic feature for obtaining service access behavior is simply provided according to user's in this programme Information, i.e., the network message information generated is needed in monitoring process.
The operating process that user carries out service access behavioural characteristic collection using this programme is as shown in Figure 3.
Under user is set in selected information resources service website URL, selected searching character string and selected website first Link corresponding to published article part shows that character is (aobvious as corresponding to bibliographic data base retrieval result is used to downloading the hyperlink of full text Show word, and such as " Full Text "), then start service access behavioural characteristic capture program.It is special starting service access behavior After levying capture program, the subsequent network operations of user are recorded by behavioural characteristic capture program.
Now, user need to only retrieve according to the mode of operation of routine and download e-sourcing:Pass through any a net Page browsing device opens selected information resources service website, inputs selected searching character string and confirms to retrieve, is returned in website A certain resource is selected in the retrieval page returned, the hyperlink display text that resource is downloaded by clicking on performs down operation.
After user completes retrieval and the operation for downloading e-sourcing, pass through the life of service access behavioural characteristic capture program Order stops the collection to user network operation.Now service access behavioural characteristic capture program can be generated corresponding to user just now The service access behavioural characteristic operated.
Using the solution of the present invention, the operation that user is carried out in whole monitoring information gatherer process is that any have The operation that the personnel of most basic online experience can complete, anyone work point is carried out to retrieval page code completely without user Analysis can be automatically performed the collection for all information of retrieval Form lists and the live network address for downloading file, ensure that this Scheme has high automatization level, reduces and is monitored to the full extent on the premise of ensureing that scheme has versatility The technical difficulty of information gathering, the scheme of ensure that have best ease for use.
This programme continuously captures network message until obtaining individual features information during analysis (such as retrieval row It is characterized or downloads URL addresses of file etc.) stop afterwards.In the process, only to caused in user service access process, number Analyzed and processed according to length more than 0 Transmission Control Protocol message, and using " source IP address " in message for the machine address message as Request message, using the message that " purpose IP address " in message is the machine address as response message.Need what is analyzed for each Packet, Different Strategies are respectively adopted and are handled:
(1) request message is handled
Analyzed by request message, the characteristic information of retrieval behavior can be obtained.As shown in figure 4, this programme first determines whether Whether request message is Ajax request messages, in the case where the load of current TCP data bag is not Ajax request messages, foundation The searching character string and the difference of HTTP request method that user selectes, divide three major types situation to message using corresponding analysis side Case:
A) load of TCP data bag is HTTP message, and HTTP message using GET request method and comprising and retrieval Character string,.
B) load of TCP data bag is HTTP message, and HTTP message is using POST request method, and POST request It is overall that a TCP data bag is used only, while include searching character string.
C) load of TCP data bag is HTTP message, and HTTP message is using POST request method, and POST request Overall to use multiple TCP data bags, it is necessary to after to multiple data package-restructurings, differentiation includes searching character string.
Do not handled for the packet for finding to be not belonging to the class situation of the above three in analyzing deterministic process in packet content, Then follow-up packet is continued with, until terminating all packet crawls after obtaining all required behavior characteristic informations With analyzing work.
(2) response message is handled
Analyzed by response message, the characteristic information that e-sourcing downloads behavior can be obtained, core is to find user to exist Service access behavioural characteristic acquisition phase clicks on the download URL addresses of the e-sourcing of download.It should be noted that once examine Rope and downloading process can produce multiple different http response message, and the content of a response message is there is a possibility that with one Or in multiple TCP response messages.
The present invention needs to collect all TCP data bags according to the response corresponding relation of itself and HTTP request.Need It is noted that if multiple TCP data bags equally correspond to same HTTP request, chunked is not used in http response message , it is necessary to which these TCP data bags are needed to be analyzed again after forming complete http response message by restructuring during coded system.
Analyzed as shown in figure 5, this programme is divided into four kinds of situations for a TCP response message:
A) for http response message, it is first determined whether being that a TCP data bag is used only.If so, then according to message Whether pass through the judged result of GZIP compressions, carry out GZIP decompressions when necessary, finally give the load of HTTP message Content, and the file download URL addresses included in HTTP loads are obtained (if the address is in HTTP message using regular expression If being implicitly present in load).All packet crawl and analysis are terminated after all required behavior characteristic informations are obtained Work.
B) if http response message has used multiple TCP data bags, and has used chunked coded systems, then true Recognize http response and be not used in the case of GZIP compressions content in the current TCP data bag of Direct Analysis, and obtain it is all needed for Behavior characteristic information after terminate all packet crawls and analysis work.
C) if http response message has used multiple TCP data bags, and has used chunked coded systems, while again HTTP message load contents are compressed using GZIP modes, then needed all collect that http response message included The load contents obtained in HTTP message are decompressed by GZIP after TCP data bag.Then, regular expression is recycled to obtain The file download URL addresses included in HTTP loads (if being implicitly present in if the address in HTTP message load).Obtaining All packet crawls and analysis work are terminated after obtaining all required behavior characteristic informations.
If d) http response message has used multiple TCP data bags, and chunked coded systems are not used, then converging After all TCP data bags that collection http response message is included, complete http response report is obtained by TCP data package-restructuring Text.Then, the judged result of GZIP compressions whether is passed through according to message, carries out GZIP decompressions when necessary, it is final to obtain To the load contents of HTTP message, and using regular expression obtain HTTP load in include file download URL addresses (if If the address is implicitly present in HTTP message load).Terminated after all required behavior characteristic informations are obtained all Packet captures and analysis work.
2) service access behavioural characteristic stores
For the search of electronic resources service, the core of service access behavioural characteristic is caused bag in retrieving The header information of HTTP message containing searching character string and POST form informations that may be present.For e-sourcing download service For, the core of service access behavioural characteristic is the download address of e-sourcing.
Therefore, it is necessary to the letter of storage in using database or the similar data storage method with structures Breath includes:(included among these for all key-value pair informations in the header for the HTTP request message for retrieving access behavior Searching character string relevant information under GET request mode);For the message load for the HTTP request message for retrieving access behavior In correspond to POST lists all key-value pair informations (if present);E-sourcing download address.
3) service access Behavior modeling is with differentiating and (monitoring).As shown in fig. 6, it is divided into the monitoring of 5 types:
A) monitoring server Network Interface Unit availability monitors, and monitors whether to be due to the network of monitoring server in itself The failure that interface equipment has causes information resources service not access.
B) network gateway availability monitoring where monitoring server, monitor whether that network where being due to monitoring server is asked Topic causes information resources service not access.
C) information resources service device selectes the availability of webpage.Setting URL corresponding webpage is obtained by connecting, according to electricity The responsive state acquisition of information of child resource server selectes the usability status of webpage.
D) information resources service device retrieval service availability.HTTP request is constructed using the service behavior characteristic information of storage Message is sent to information resources service device, and it is normal that the content by analyzing response message differentiates whether retrieval service request returns Response message, so as to judge retrieval service usability status.
E) information resources service device file download service availability.Setting URL respective file is obtained by connecting, according to The responsive state acquisition of information of information resources service device selectes the usability status of webpage.
The present invention is from information resources service buyer's angle, without manual analysis information resources service webpage generation Code, in the case of information resources service device control authority is obtained, by a kind of automaticity it is high, be easily used in a manner of Complete with monitoring to implement for the monitoring information collection of the information resources service availability based on http protocol.Use monitoring function User can be automatically performed for retrieval Form lists institute completely without carrying out any manual analysis to retrieval page code There is information and download the collection of the live network address of file, there is high automatization level, ensureing that it is general that scheme has The technical difficulty for being monitored information gathering is reduced to the full extent on the premise of property, and the scheme of ensure that has best easy-to-use Property and good popularizing application prospect.
To the automation collection of configuration information needed for the monitoring of information resources service device service availability.The letter of institute's automatic data collection Breath can be used for monitoring the search of electronic resources service and e-sourcing download service.Automatic monitoring information resources service device monitoring net Stand availability, the availability of retrieval service, the availability of download service of the page.To prevent from reporting by mistake, automatic monitoring monitoring service The state of device local network context, including the state of monitoring server own network interface equipment and the gateway of residing network can use Character state.Regarded as output controlling can provide the analytic function for availability monitoring journal.
Brief description of the drawings
Fig. 1 is overview flow chart of the present invention.
Fig. 2 is service access behavioural characteristic gatherer process general principles block diagram.
Fig. 3 is service access behavioural characteristic acquisition operations flow chart.
Fig. 4 is request message processing routine flow chart.
Fig. 5 is response message processing routine flow chart.
Fig. 6 is that information resources service monitors flow chart.
Embodiment
Describe the embodiment of the present invention in detail below in conjunction with technical scheme and accompanying drawing.
1) service access behavioural characteristic automation collection
A) network equipment bsp driver interface
Using Winpcap free netses bsp driver and corresponding development library file acquisition by specifying the network equipment Network message packet.In Java language environment, Jpcap class libraries can be used to obtain the network message packet of bottom, can To obtain source IP address, purpose IP address, serial number that TCP data bag included, confirm number, urgent data flag, confirm number Effective marker, transmission enforcement functionalities mark, that mark, serial number acknowledgement indicator, transmission end mark, window are reseted in request connection is big The information such as small, emergency data pointer and data.
B) parsing of network message content
The TCP data bag load of transmission http data content can use Java standard class String to be converted to word Symbol string, the regular expression class Pattern of Java standards can be used to be parsed afterwards, String classes also can be used directly Character string function is analyzed.For the HTTP data compressed using GZIP methods, Java tool-class can be used Java.util.zip.GZIPInputStream is converted to character string after being decompressed, then carry out subsequent treatment again.
C) for the judgement of HTTP message attribute.
If HTTP message head includes " Transfer-Encoding:Chunked ", then show that HTTP message uses Chunked is encoded.If HTTP message head includes " Content-Encoding:Gzip ", then show in HTTP message load Appearance is compressed using gzip.If HTTP message head includes " X-Requested-With ", it is believed that current HTTP please Ask and asked for Ajax.
D) response message recombinates.
For the response message being made up of multiple TCP data bags, if the message is not encoded using chunked, need By all TCP data bag interim storages, and (believed after confirming to obtain all packets of message according to HTTP data packet headers Content-length and the data length in the packet obtained contrast understand whether obtain all packets in breath), according to According to the sequence number (sequence) in each packet by all TCP data packet sequencings, then successively by each TCP data bag Content is spliced in same byte arrays, and byte arrays then are converted into character string (in message by being needed during GZIP compressions Want necessary decompression operation).The character analysis operation for http protocol is finally carried out to obtained character string.
E) behavioural characteristic availability is captured with given HTTP request header information and the checking of POST form informations.
The org.apache.http.impl.client.HttpClients classes in Apache class libraries can be used to construct simultaneously Network request is sent, for the org.apache.http.client.methods.CloseableHttpResponse of its return Class object, the content of response can be obtained, whether (such as Content-Type values are comprising critical information by content Text/xml) or responsive state code (such as 200) or responsive state information can determine whether crawl behavioural characteristic (such as " OK " or " ok ") Availability.
2) service access behavioural characteristic stores
All key-value pair informations of form data can be by using Java standard characters in header and message load String class String character string takes substring function, string segmentation function, character to search combination of function and obtain.Also may be used in storage Whole header information and form data are directly stored with overall character string forms, key-value pair information extraction work is placed Completed in the initialization procedure of monitoring implementation phase.
All behavior characteristic informations and information-setting by user can be stored in JSON files or database, also can be used The transmission that JSON files carry out all behavior characteristic informations and information-setting by user (for example sets monitoring in monitoring information collection terminal Confidence breath is uploaded in the scene of monitoring server).
3) service access Behavior modeling is with differentiating
A) monitoring server Network Interface Unit availability monitoring method
Java.net.InetAddress.isReachable (int timeout) is called to access the machine address " 127.0.0.1 ", by checking whether time-out judges monitoring server Network Interface Unit availability for response.
B) network gateway availability monitoring method where monitoring server
By primary dns server used in program ping monitoring servers, check the response time, whether time-out judged Network gateway availability where monitoring server.
C) information resources service device selectes the availability monitoring method of webpage
With the use of org.apache.http.client.methods.HttpGet classes and The object formation of org.apache.http.impl.client.CloseableHttpClient classes please to selecting the GET of webpage Ask, responded by network in returned org.apache.http.client.methods.CloseableHttpResponse Information searching response message in whether comprising key responsive state code (such as 200) or responsive state information (such as " OK " or " ok "), the availability for judging to select webpage with this.
D) information resources service device retrieval service availability monitoring method
According to the monitoring information previously gathered, differentiation is monitored and asked used in information resources service device retrieval service Mode (GET request or POST request), then according to the monitoring information previously collected, it is used cooperatively HttpGet classes, HttpPost classes in org.apache.http.client.methods bags and The object of org.apache.http.impl.client.CloseableHttpClient classes, corresponding HTTP request is generated, led to The letter crossed in the returned org.apache.http.client.methods.CloseableHttpResponse of network response Whether breath is searched includes key responsive state code (such as 200) or responsive state information (such as " OK " or " ok ") in response message, The availability of retrieval service is judged with this.
E) information resources service device file download service availability monitoring method
According to the file download address previously gathered, it is used cooperatively
Org.apache.http.client.methods.HttpGet classes and org.apache.http.impl.client.
The object formation of CloseableHttpClient classes is returned to the GET request to select files by network response Org.apache.http.client.methods.CloseableHttpResponse in information searching response message in Whether comprising key responsive state code (such as 200) or responsive state information (such as " OK " or " ok "), download service is judged with this Availability.
The monitoring system based on multipad can be developed using this programme, can also develop the monitoring based on B/S patterns Server system and corresponding mobile client.For those skilled in the art, may be used also on the basis of the above description To make other various forms of changes or variation.

Claims (1)

1. a kind of method of information resources service availability of automatic monitoring based on http protocol, includes three phases:Service Access behavioural characteristic automation collection;Service access behavioural characteristic stores;Service access Behavior modeling is with differentiating;It is characterized in that Following steps,
(1) first stage:Service access behavioural characteristic automation collection;
User is obtained during by browser access information resources service using network equipment bsp driver interface Caused all-network message;Based on the analysis to captured network message, taken according to automatic obtain that be simply provided of user The characteristic information of business access behavior, i.e., need the network message information generated in monitoring process;By analyzing user to electronics The request message that Resource Server is sent, automatically analyze in the monitoring information needed during retrieval service monitoring;
When automatically analyzing request message, first determine whether request message is Ajax request messages, in current TCP data bag In the case that load is not Ajax request messages, the searching character string and the difference of HTTP request method selected according to user, point Three major types situation uses corresponding analytical plan to message:
A) load of TCP data bag is HTTP message, and HTTP message using GET request method and includes searching character String;
B) load of TCP data bag is HTTP message, and HTTP message is using POST request method, and POST request is overall Using only a TCP data bag, while include searching character string;
C) load of TCP data bag is HTTP message, and HTTP message is using POST request method, and POST request is overall Using multiple TCP data bags, it is necessary to after to multiple data package-restructurings, differentiation includes searching character string;
Do not handled for the packet for finding to be not belonging to the class situation of the above three in analyzing deterministic process in packet content, then Follow-up packet is continued with, until terminating all packet crawls after obtaining all required behavior characteristic informations and dividing Analyse work;
Analyzed by response message, obtain the characteristic information that e-sourcing downloads behavior, core is servicing to be automatically found user Access the download URL addresses that behavioural characteristic acquisition phase clicks on the e-sourcing of download;During response message is analyzed, it is Obtain and download file address, be divided into four kinds of situations for a TCP response message and analyze:
A) for http response message, it is first determined whether being that a TCP data bag is used only;Used if meeting in good time In the case that GZIP compresses, file download address is obtained by regular expression;Obtaining all required behavior characteristic informations All packet crawls and analysis work are terminated afterwards;
If b) http response message has used multiple TCP data bags, and has used chunked coded systems, then confirming Content in the current TCP data bag of Direct Analysis in the case of the unused GZIP compressions of http response, and it is all required obtaining All packet crawls and analysis work are terminated after behavior characteristic information;
C) if http response message has used multiple TCP data bags, and has used chunked coded systems, while uses again GZIP modes are compressed to HTTP message load contents, then need in all TCP for collecting http response message and being included The load contents obtained in HTTP message are decompressed by GZIP after packet;Then, regular expression is recycled to obtain HTTP The file download URL addresses included in load;All packets are terminated after all required behavior characteristic informations are obtained to grab Take and analysis work;
If d) http response message has used multiple TCP data bags, and chunked coded systems are not used, then collecting After all TCP data bags that http response message is included, complete http response message is obtained by TCP data package-restructuring; Then, the judged result of GZIP compressions whether is passed through according to message, GZIP decompressions is carried out when necessary, finally gives The load contents of HTTP message, and the file download URL addresses included in HTTP loads are obtained using regular expression;Obtaining All packet crawls and analysis work are terminated after all required behavior characteristic informations;
(2) service access behavioural characteristic stores
For the search of electronic resources service, the core of service access behavioural characteristic is comprising inspection caused by retrieving The header information of the HTTP message of rope character string and POST form informations that may be present;For e-sourcing download service Speech, the core of service access behavioural characteristic is the download address of e-sourcing;
, it is necessary to which the packet of storage contains in using database or the similar data storage method with structures:Pin To all key-value pair informations in the header for the HTTP request message for retrieving access behavior;For retrieval access behavior Correspond to all key-value pair informations of POST lists in the message load of HTTP request message;
(3) service access Behavior modeling is divided into the monitoring of 5 types with differentiating:
A) monitoring server Network Interface Unit availability monitors, and monitors whether to be due to the network interface of monitoring server in itself Failure be present and cause information resources service not access in equipment;
B) network gateway availability monitoring where monitoring server, monitor whether that network problem where being due to monitoring server is made It can not be accessed into information resources service;
C) information resources service device selectes the availability of webpage;Setting URL corresponding webpage is obtained by connecting, is provided according to electronics The responsive state acquisition of information of source server selectes the usability status of webpage;
D) information resources service device retrieval service availability;HTTP request message is constructed using the service behavior characteristic information of storage Send to information resources service device, the content by analyzing response message differentiates whether retrieval service request returns normal sound Information is answered, so as to judge retrieval service usability status;
E) information resources service device file download service availability;Setting URL respective file is obtained by connecting, according to electronics The responsive state acquisition of information of Resource Server selectes the usability status of webpage.
CN201510542835.4A 2015-08-30 2015-08-30 A kind of information resources service availability automatic monitoring method based on http protocol Active CN105099829B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510542835.4A CN105099829B (en) 2015-08-30 2015-08-30 A kind of information resources service availability automatic monitoring method based on http protocol

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510542835.4A CN105099829B (en) 2015-08-30 2015-08-30 A kind of information resources service availability automatic monitoring method based on http protocol

Publications (2)

Publication Number Publication Date
CN105099829A CN105099829A (en) 2015-11-25
CN105099829B true CN105099829B (en) 2018-04-10

Family

ID=54579440

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510542835.4A Active CN105099829B (en) 2015-08-30 2015-08-30 A kind of information resources service availability automatic monitoring method based on http protocol

Country Status (1)

Country Link
CN (1) CN105099829B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108073607B (en) * 2016-11-08 2020-03-06 北京国双科技有限公司 URL processing method and device
CN108259482B (en) * 2018-01-04 2019-05-28 平安科技(深圳)有限公司 Network Abnormal data detection method, device, computer equipment and storage medium
CN108595586B (en) * 2018-04-19 2021-12-24 杭州迪普科技股份有限公司 Method and device for determining search keywords
CN113726808A (en) * 2021-09-06 2021-11-30 杭州安恒信息安全技术有限公司 Website monitoring method, device, equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101909079A (en) * 2010-07-15 2010-12-08 北京迈朗世讯科技有限公司 User online behavior data acquisition method in backbone link and system
CN103401863A (en) * 2013-07-30 2013-11-20 北京奇虎科技有限公司 Network data flow analysis method and network data flow analysis device based on cloud security

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2013048986A1 (en) * 2011-09-26 2013-04-04 Knoa Software, Inc. Method, system and program product for allocation and/or prioritization of electronic resources

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101909079A (en) * 2010-07-15 2010-12-08 北京迈朗世讯科技有限公司 User online behavior data acquisition method in backbone link and system
CN103401863A (en) * 2013-07-30 2013-11-20 北京奇虎科技有限公司 Network data flow analysis method and network data flow analysis device based on cloud security

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"图书馆电子资源可否浏览及下载监测程序设计";朱玉强;《现代图书情报技术》;20131125;86-90 *
"高校图书馆电子资源服务监控系统设计与实现";彭晓庆;《中国优秀硕士学位论文全文数据库》;20120315;I138-1273 *

Also Published As

Publication number Publication date
CN105099829A (en) 2015-11-25

Similar Documents

Publication Publication Date Title
CN107895009B (en) Distributed internet data acquisition method and system
US11843505B1 (en) System and method of generation of a predictive analytics model and performance of centralized analytics therewith
CN101326503B (en) Method and device for monitoring page access
CN105099829B (en) A kind of information resources service availability automatic monitoring method based on http protocol
CN107957940B (en) Test log processing method, system and terminal
CN106953740A (en) The processing method of page access data, client, server and system in
CN110858192A (en) Log query method and system, log checking system and query terminal
CN106844204A (en) A kind of utilization mobile terminal generates the method and system of defect report
CN113760730B (en) Automatic test method and device
CN114465741B (en) Abnormality detection method, abnormality detection device, computer equipment and storage medium
CN111930614B (en) Automatic testing method, device, equipment and medium
CN107342910A (en) Simulate automated testing method and instrument that multi-user carries out network access
CN110932918A (en) Log data acquisition method and device and storage medium
CN113868248A (en) Index data pre-polymerization method
CN114528457A (en) Web fingerprint detection method and related equipment
CN107766224B (en) Test method and test device
CN105550179A (en) Webpage collection method and browser plug-in
CN112702430B (en) Data transmission method based on cloud edge mode and Web technology
CN201726425U (en) Embedded network server
CN114390033A (en) Loop state patrol instrument acquisition system and method based on extensible communication protocol
CN113726808A (en) Website monitoring method, device, equipment and storage medium
CN113515715B (en) Buried point event code generation method, buried point event code processing method and related equipment
CN106658081A (en) Automatic configuration method, set top box, and server
CN105338091A (en) High-transmission-efficiency personalized information interface display method and apparatus
CN117714262A (en) Equipment fault detection method, device, equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant