CN106294559A - A kind of application traffic analysis method and device - Google Patents
A kind of application traffic analysis method and device Download PDFInfo
- Publication number
- CN106294559A CN106294559A CN201610597004.1A CN201610597004A CN106294559A CN 106294559 A CN106294559 A CN 106294559A CN 201610597004 A CN201610597004 A CN 201610597004A CN 106294559 A CN106294559 A CN 106294559A
- Authority
- CN
- China
- Prior art keywords
- analyzed
- log
- application
- funnel
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Debugging And Monitoring (AREA)
Abstract
This application provides a kind of application traffic analysis method, belong to field of computer technology.The application is by obtaining the access log of application to be analyzed;Funnel configuration file based on default described application mates every described access log, is determined for compliance with the log index table of the access log of described funnel configuration file;The path list obtained after decomposing based on access path to be analyzed, mates the actual access path determined according to described log index table;The flow analysis index of described application to be analyzed is calculated according to matching result, solve in prior art and represent rate or clicking rate based on frequent path excavation calculating, the problem that same type page or module cannot be carried out macroscopic analysis, by to the analysis object identity identical with type page setup, the data of same type page can be carried out polymerization analysis, obtain macroscopic analysis result.
Description
Technical field
The application relates to field of computer technology, particularly relates to a kind of application traffic analysis method and device.
Background technology
In prior art, for application, promote Consumer's Experience further, need the flow of application is analyzed,
As the conversion ratio of application, clicking rate are analyzed.At the stream analyzing application (such as: web application, application program for mobile terminal)
During amount, it usually needs each module of application or the behavior of the page are added up.Behavior for module or the page specifically includes that
Represent, click on.Application product is used preference in order to analyze user, analyzes the using effect etc. of application product, prior art
In, generally use the method that the module for application and the page are got ready, analysis module or the page represents rate or clicking rate.At system
When meter represents rate and clicking rate, conventional method is that frequent path excavates, and start with in the path accessed from user, for the core accessed
Wit footpath calculates and optimizes.
At least there is following defect in the method for analysis application traffic of the prior art: excavates based on calculating frequent path,
Being applicable to analyze the conversion ratio of adjacent page, Result is partial to detailed user path, it is impossible to rapid pin is to same type page
Or the macroscopic analysis that module merges.
Summary of the invention
Technical problems to be solved in this application are: provide a kind of application traffic analysis method, solve base in prior art
Excavate calculating in frequent path and represent rate or clicking rate, it is impossible to the problem that same type page or module are carried out macroscopic analysis.
In order to solve the problems referred to above, the embodiment of the present application provides a kind of application traffic analysis method, including:
Obtain the access log of application to be analyzed;
Funnel configuration file based on default application described to be analyzed mates every described access log, is determined for compliance with institute
State the log index table of the access log of funnel configuration file;
The path list obtained after decomposing based on access path to be analyzed, to the reality determined according to described log index table
Border access path is mated;
The flow analysis index of described application to be analyzed is calculated according to matching result;
Wherein, described access log includes the analysis object identity of the application described to be analyzed accessed;Described funnel configures
File includes the formula carrying out log matches based on analysis object identity previously generated;With type in described application to be analyzed
Analyze object and there is identical analysis object identity.
Accordingly, the embodiment of the present application additionally provides a kind of application traffic analysis device, including:
Access log acquisition module, for obtaining the access log of application to be analyzed;
Log index table determines module, described for funnel configuration file based on default application described to be analyzed coupling
Every described access log that access log acquisition module obtains, is determined for compliance with the day of the access log of described funnel configuration file
Will concordance list;
Route matching module, the path list obtained after decomposing based on access path to be analyzed, to according to described
The actual access path that log index table determines is mated;
Flow analysis module, calculates the stream of described application to be analyzed for the matching result according to described route matching module
Component analysis index;
Wherein, described access log includes the analysis object identity of the application described to be analyzed accessed;Described funnel configures
File includes the formula carrying out log matches based on analysis object identity previously generated;With type in described application to be analyzed
Analyze the page and there is identical analysis object identity.
Application traffic analysis method disclosed in the present application, by obtaining the access log of application to be analyzed;Based on default
The funnel configuration file of described application mates every described access log, is determined for compliance with the access log of described funnel configuration file
Log index table;The path list obtained after decomposing based on access path to be analyzed, to true according to described log index table
Fixed actual access path is mated;The flow analysis index of described application to be analyzed is calculated according to matching result;Wherein, institute
State access log and include the analysis object identity of the application described to be analyzed accessed;Described funnel configuration file includes previously generating
Carry out the formula of log matches based on analyzing object identity;In described application to be analyzed, the analysis object with type has identical
Analysis object identity, solve in prior art based on frequent path excavate calculating represent rate or clicking rate, it is impossible to similar
The problem that the type page or module carry out macroscopic analysis.The application is by arranging identical analysis object with type page or module
The data of same type page or module can be carried out polymerization analysis, obtain macroscopic analysis result by mark.
Meanwhile, the application passes through configuration file, can be according to the business demand flexible configuration page to be analyzed or module, spirit
Living and configure pathdepth to be analyzed, the flow indicator of flexible configuration application, practicality is higher.
Accompanying drawing explanation
In order to be illustrated more clearly that the technical scheme of the embodiment of the present application, below will be in embodiment or description of the prior art
The required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only some realities of the application
Execute example, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to attached according to these
Figure obtains other accompanying drawing.
Fig. 1 is the application traffic analysis method flow diagram of the embodiment of the present application one;
Fig. 2 is the application traffic analysis method flow diagram of the embodiment of the present application two;
Fig. 3 is the application traffic analysis apparatus structure schematic diagram of the embodiment of the present application three;
Fig. 4 is the application traffic analysis apparatus structure schematic diagram of the embodiment of the present application four.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present application, the technical scheme in the embodiment of the present application is carried out clear, complete
Describe, it is clear that described embodiment is some embodiments of the present application rather than whole embodiments wholely.Based on this Shen
Embodiment in please, the every other enforcement that those of ordinary skill in the art are obtained under not making creative work premise
Example, broadly falls into the scope of the application protection.
Marketing funnel model full name be " search marketing effectiveness conversion funnel ", the enterprise search marketing of five layers of correspondence of funnel
Links, reflect from representing, click on, access, seeking advice from, until the customer quantity generated in order process and loss.From
The maximum amount of representing to minimum order volume, this procedural representation reduced from level to level constantly have client because a variety of causes from
Open, enterprise is lost interest or abandons buying.The application thought based on marketing funnel model, goes out from the actual demand of application
Sending out, the flow funnel of definition application, reflection is applied each page or the customer flow of each module, is analyzed the flow of application further.
Application described in the embodiment of the present application includes: the application of web application, mobile terminal and PC end application etc., and the module of application.
Embodiment one
A kind of application traffic analysis method disclosed in the present application, as it is shown in figure 1, the method includes: step 100 is to step
130。
Step 100, obtains the access log of application to be analyzed.
The daily record data of application stores in distributed file system, and log system can collect the daily record data of application, institute
State daily record data and include that all users access the daily record of this application.Daily record data generally includes: ID (id), application mark
Know, analyze object identity, the time of access analysis object and analysis object upstream-downstream relationship (the i.e. page or the module accessed
Redirect relation) etc..Then, log system, according to preset rules, extracts from the daily record data of application to be analyzed and belongs to certain
The daily record data of the session each time of individual user, generates the access log that a session is relevant.Wherein, once of certain user
The access log of words includes: ID, application identities, session identification, session step.Wherein, session step is used for expression one
The order of the access log of secondary session.Described preset rules can be: analyzes the upstream-downstream relationship of object, access time interval
Deng.Wherein, described access log includes the analysis object identity of the application described to be analyzed accessed.
When being embodied as, analyzing object can be the module on the page or the page.
Step 110, funnel configuration file based on default application described to be analyzed mates every described access log, really
Surely the log index table of the access log of described funnel configuration file is met.
When being embodied as, before carrying out application traffic analysis, first pass through to be analyzed the answering of graphic user interface configuration
Funnel configuration file.Described funnel configuration file includes that previously generate carries out daily record based on analysis object (such as the page)
The formula joined.Described funnel configuration file, according to based on analyzing the parameters that object configures, also includes according to the daily record preset
Matching condition, the parameters of configuration, and the corresponding relation generation of each field of the access log preset and parameters
For carrying out the formula of log matches.
Then, funnel configuration file based on default application described to be analyzed, to every the described access log obtained
Mate, be determined for compliance with the access log of funnel configuration file, and extract relevant information and the funnel configuration literary composition of access log
Part relevant parameter information generates log index table.Such as, extract log sessions mark, daily record mark, session step, and relevant
The parameter daily record mark of funnel configuration file, log sessions mark, session step and described funnel describe, funnel level describes raw
Become log index table.
Step 120, the path list obtained after decomposing based on access path to be analyzed, to according to described log index table
The actual access path determined is mated.
When product personnel or attendant need to analyze certain access path or the conversion ratio of the page, the clicking rate etc. of application
During index, the to be analyzed access path analyzing object can be inputted.
When being embodied as, first access path to be analyzed is decomposed, obtain multiple path, form path list.
Then, according to the log index table obtained in previous step in described log index table index access log according to access
Step sequencing arranges, and the access log after arrangement represents user and accesses the actual access road analyzing object of application
Footpath.When being embodied as, access analysis object queue can be generated according to the access log after arrangement, the leakage corresponding with analyzing object
The funnel hierarchical identification arranged in bucket configuration file identifies the analysis object queue of generation further, it is possible to obtain actual access
Path.Finally, each path in the actual access path obtained and path list is mated.
Step 130, calculates the flow analysis index of described application to be analyzed according to matching result.
After being mated in each path in the actual access path obtained and path list, determine that the match is successful
Path (path i.e. comprised in actual access path), and the number of times that the match is successful (i.e. comprises path in actual access path
Number of times) etc..Then, the data obtained according to coupling, calculate the flow analysis index preset, such as page conversion ratio, clicking rate
Deng.
Application traffic analysis method disclosed in the embodiment of the present application, by obtaining the access log of application to be analyzed;Based on
The funnel configuration file of the application described to be analyzed preset mates every described access log, is determined for compliance with described funnel configuration literary composition
The log index table of the access log of part;The path list obtained after decomposing based on access path to be analyzed, to according to described
The actual access path that log index table determines is mated;The flow analysis of described application to be analyzed is calculated according to matching result
Index;Wherein, described access log includes the analysis object identity of the application described to be analyzed accessed;Described funnel configuration file
Including the formula carrying out log matches based on analysis object identity previously generated;With the analysis of type in described application to be analyzed
Object has identical analysis object identity, solves in prior art and represents rate or click based on frequent path excavation calculating
Rate, it is impossible to the problem that same type page or module are carried out macroscopic analysis.By to arranging identical dividing with type analysis object
The data of same type analysis object can be carried out polymerization analysis, obtain macroscopic analysis result by analysis object identity.
Meanwhile, the application passes through configuration file, can according to business demand flexible configuration analysis object to be analyzed, flexibly
Configuring pathdepth to be analyzed, the flow indicator of flexible configuration application, practicality is higher.
Embodiment two
A kind of application traffic analysis method disclosed in the present application, as in figure 2 it is shown, the method includes: step 200 is to step
270。
Step 200, obtains the funnel configuration file of described application to be analyzed.
When being embodied as, joining of the funnel that attendant or business personnel are applied by the graphic user interface configuration preset
Put file.Funnel refers to during application uses, the user's Conversion Model between different step, and being used for analyzing user's access should
The degree of depth and the efficiency of each step, this programme is readily adaptable for use in the active pointer pair of a certain module, some particular location
The efficiency of specific objective.The funnel configuration file obtaining described application to be analyzed includes: obtains and is configured by graphic user interface
Application to be analyzed funnel describe, funnel level describe, wherein, described funnel level describe at least include: funnel level mark
The analysis object identity of the application described to be analyzed that knowledge, each level comprise and matching condition;According to described analysis object identity and
Matching condition, default analysis object identity and the mapping relations of each field of access log, generate level defined formula;By described
Funnel description, the description of funnel level and level defined formula are integrated into the funnel configuration file of described application to be analyzed.
The configuration file of the funnel of described application is configured by default human-computer interaction interface, including: funnel describes, level
Description, level defined formula.Wherein, funnel describes and is used for defining evaluation index;Level describes the number of levels for defining funnel
The analysis object information that amount, hierarchical identification, level path, and each level comprise;It is right that described analysis object information includes analyzing
As mark, it is also possible to include the additional conditions analyzing object.Level defined formula is according to the analysis object letter of each level of configuration
Breath generates, and described analysis object at least includes analyzing object identity, it is also possible to include additional conditions.Described additional conditions are according to tool
Body evaluation index determines.
Analyzing object can be the page of application, module, answers in order to make it easy to understand, the present embodiment is one with analysis object
By the specific implementation process illustrating application traffic analysis method as a example by the page of program.With one three layers of funnel of configuration it is below
Example, illustrates the generation process of the configuration file of funnel.
First, the funnel of definition funnel describes, as funnel includes conversion ratio for the evaluation index calculated.
Then, the level of definition funnel describes.Described level describes and includes: level quantity, hierarchical identification, level path,
And the page info that each level comprises.In the present embodiment, funnel being set to three layers, the mark of each level is respectively as follows: ground floor
For " homepage ", the second layer is " purpose page ", and third layer is " order ".The level path of funnel is " homepage-purpose page-order ".
Level based on aforementioned definitions, the page info that the definition each level of funnel comprises.The head of commonly used program application
Page only one of which, for opening first page after application program.User can be entered by the module in application program homepage
To multiple next stage pages, eventually enter into target pages or enter object module.During application program uses, it is also possible to go out
After existing user enters into the next stage page by the module in application program homepage, return to homepage or exit the feelings of application program
Condition.In order to identify the access track to the page to be analyzed in application program of user, being analysed to page configuration is each layer of funnel
The page of level, it is simple to be analyzed by funnel.Therefore, it can to arrange the page (i.e. " homepage ") that ground floor comprises should for opening
With first page after program;Arrange the page (i.e. " purpose page ") that the second layer comprises be analysis indexes pay close attention to from " homepage "
The page entered;Arranging the page (i.e. " order ") that third layer comprises is target pages.When being embodied as, it is also possible to funnel is set
The adnexa condition of each layer page, such as, arrange the additional conditions of " homepage ", and such as 1.1 versions, for the application to indicated release
Program is analyzed index and calculates.
When being embodied as, Page Name pagename can be used to identify each page.Carry out adopting during configuration file configuration
Unique mark of page iden-tity and each page of this application program in journal file consistent.
When application is web application, such as Website page, if analysis object is Website page, then analyzing object identity is
The URL (URL) of webpage;If quoting is application program for mobile terminal, if analyzing object module, then object
It is designated unique mark of module.
Finally, describe according to described funnel and level describes and generates funnel configuration file.
When being embodied as, the backstage of graphic user interface pre-builds each of each configuration item and application program running log
The corresponding relation of field, and matching operation rule, when the configuration being completed funnel parameters by described graphic user interface
Afterwards, the backstage of graphic user interface is described according to the described funnel configured by described graphic user interface and level describes raw
Become the configuration file of funnel.Particularly as follows: the parameters of funnel that will configure according to graphic user interface, it is mapped to the word of daily record
Section, forms a judgment formula for daily record, such as, version number is mapped to app_version field, forms such as " app_
Version.equals (' 1.1 ') " such formula.The structure of funnel configuration file is: funnel describes, level describes, level
Defined formula, wherein, the page info during level defined formula describes according to the level of configuration generates.When being embodied as, level
Defined formula can only generate according to the analysis object identity (such as page iden-tity) in the page info in the level description of configuration,
Can also generate according to the analysis object identity in page info and additional conditions.Then, by the write distribution of funnel configuration file
Formula file system HDFS.
Step 210, obtains the access log of application to be analyzed.
The specific embodiments of the access log obtaining application to be analyzed sees the corresponding steps of embodiment one, the most no longer
Repeat.
After the funnel configuration file presetting application to be analyzed and the access log getting application to be analyzed, based on
The funnel configuration file of the described application preset mates every described access log, is determined for compliance with the visit of described funnel configuration file
Ask the log index table of daily record, including: define public affairs based on the level in the funnel configuration file of default application described to be analyzed
Formula mates every described access log, is determined for compliance with the access log of described funnel configuration file;According to the access that the match is successful
The daily record mark of daily record, log sessions mark, session step and described funnel describe, funnel level describes and generates daily record index
Table.
Step 220, mates every based on the level defined formula in the funnel configuration file of default application described to be analyzed
Access log described in bar, is determined for compliance with the access log of described funnel configuration file.
When being embodied as, before carrying out application traffic analysis, first pass through to be analyzed the answering of graphic user interface configuration
Funnel configuration file.Described funnel configuration file includes the formula carrying out log matches based on the page previously generated.Institute
State funnel configuration file according to parameters based on page configuration, also include according to the log matches condition preset, configuration
Parameters, and being used for of generating of the corresponding relation of each field of access log of presetting and parameters carry out daily record
The formula joined.
Then, funnel configuration file based on default described application, every the described access log obtained is carried out
Join, be determined for compliance with the access log of funnel configuration file.When being embodied as, can be to access log every described, in conjunction with presetting
Described application funnel configuration file in level defined formula, use JexlContext comparator go mate access log,
Obtain meeting the journal file of level defined formula in funnel configuration file.
Step 230, according to the daily record mark of the access log that the match is successful, log sessions mark, session step and described
Funnel describes, funnel level describes and generates log index table.
For the access log that the match is successful, extract relevant information and the funnel configuration file relevant parameter letter of access log
Breath generates log index table.Such as, log sessions mark, daily record mark, session step, and associated funnel configuration file are extracted
Parameter daily record mark, log sessions mark, session step and described funnel describe, funnel level describes and generates daily record index
Table.In log index table, the form of each index can be: daily record id, and funnel describes, and funnel level describes, log sessions id,
Session step, ID.Wherein, daily record id is used for identifying a unique daily record;Step describes and is used for mating access road to be analyzed
Footpath;Daily record ID and ID are for calculating the index of conversion ratio.When being embodied as, can be according to the different increasings of flow analysis index
Add deduct the list item of few log index table.
Step 240, decomposes access path to be analyzed, obtains path list to be matched.
Wherein, described access path to be analyzed is made up of at least one funnel hierarchical identification.
When product personnel or attendant need to analyze certain access path or the conversion ratio of the page, the clicking rate etc. of application
During index, access path to be analyzed can be inputted.When being embodied as, access path to be analyzed is decomposed, obtain treating
Joining path list to include: use dividing mode based on prefix, the access path being analysed to resolves into multiple subpath composition
Path list.(N is equal to the path node of described access path to be analyzed to intercept front 1 to the N in this path to be visited the most successively
Number) individual path node, form N number of new path, described N number of new path forms path list to be matched.With to be analyzed
Access path be " A-B-C " as a example by, intercept respectively: A, A-B, A-B-C obtain 3 new paths, and by A, A-B, A-B-C group
Become path list to be matched.
Afterwards, the path list obtained after decomposing based on access path to be analyzed, to true according to described log index table
Fixed actual access path is mated, including: according to the vertical order of session step, described log index table is carried out
Sequence;By the actual access path of the funnel hierarchical identification composition of every index in the log index table after sequence, and based on treating
All paths in the path list that the access path analyzed obtains after decomposing are mated respectively;Wherein, described to be analyzed
Access path is made up of at least one funnel hierarchical identification.
Step 250, is ranked up described log index table according to the vertical order of session step.
According to the vertical order of session step of the access log of index in log index table, described daily record is indexed
Table is ranked up.
Step 260, by the actual access road of the funnel hierarchical identification composition of every index in the log index table after sequence
Footpath, mates respectively with based on all paths in the path list obtained after access path decomposition to be analyzed.
The order of the access log of the log index table index after sequence represents the reality that user accesses the page of application
Access path.When being embodied as, access analysis object queue can be generated according to the access log of concordance list index after sequence
(such as: page queue), the funnel hierarchical identification arranged in the funnel configuration file corresponding with analyzing object (such as: the page) is further
Represent the page queue generated, it is possible to obtain actual access path.Finally, by the actual access path obtained and path list
In each path mate.Such as, the funnel in the access log of first table item index of log index table after sequence
During level describes, funnel hierarchical identification is A, the funnel in the access log of second table item index of log index table after sequence
During level describes, funnel hierarchical identification is B, then can obtain actual access path is A-B.
Then, the actual access path obtained is mated respectively with all paths in the path list obtained.With
As a example by the result that abovementioned steps obtains, by all paths A, A-B, A-B-C difference in actual access path A-B and path list
Mate.
Step 270, calculates the flow analysis index of described application to be analyzed according to matching result.
After being mated in each path in the actual access path obtained and path list, determine that the match is successful
Path (path i.e. comprised in actual access path), and the number of times that the match is successful (i.e. comprises path in actual access path
Number of times) etc..Then, the data obtained according to coupling, calculate the flow analysis index preset, such as page conversion ratio, clicking rate
Deng.The example of the abovementioned steps that continues, the path that in this step, the match is successful includes: A, A-B, and respectively the match is successful 1 time.Then, root
The flow analysis index of described application to be analyzed is calculated according to matching result.
The step of the described flow analysis index calculating described application to be analyzed according to matching result, including: according to coupling
The analysis object identity that successfully node in the path in path list and/or each described path is corresponding calculates the flow of application and divides
Analysis index.The flow analysis index of application can be: conversion ratio, clicking rate.
Flow analysis index is mainly: the Pv of each step, UV, session number etc..The number of times that Pv i.e. accesses, can pass through
Statistical log ID calculates, and UV is calculated by counting user ID, and session number is calculated, typically by statistics session id
By the comparison of the UV between different step, calculating user's conversion ratio in funnel, this conversion ratio can be used to weigh to be used
The degree of depth at family or the efficiency of certain module;Simultaneously by monitoring the conversion ratio change of same funnel, or the two of AB test
Conversion ratio between individual funnel compares, and carries out the optimization of business.
Continue previous example, and the Pv of the step corresponding with path node A can being applied according to matching result is 2.
In order to make it easy to understand, the flow analysis method of application is carried out as a example by a session of a user by the present embodiment
Explanation.When being embodied as, use same method the access log of each session of all users is carried out abovementioned steps
After joining, the matching result of each session of each user is integrated, it is possible to the various flow analysis indexs being applied.
Application traffic analysis method disclosed in the embodiment of the present application, by obtaining the access log of application to be analyzed;Based on
The funnel configuration file of the application described to be allocated preset mates every described access log, is determined for compliance with described funnel configuration literary composition
The log index table of the access log of part;The path list obtained after decomposing based on access path to be analyzed, to according to described
The actual access path that log index table determines is mated;The flow analysis of described application to be analyzed is calculated according to matching result
Index;Wherein, described access log includes the analysis object identity of the application described to be analyzed accessed;Described funnel configuration file
Including the formula carrying out log matches based on analysis object identity previously generated;With the analysis of type in described application to be analyzed
Object has identical analysis object identity, solves in prior art and represents rate or click based on frequent path excavation calculating
Rate, it is impossible to the problem that same type page or module are carried out macroscopic analysis.By to same type analysis object (such as the page, module)
Identical analysis object identity is set, the data of same type can be carried out polymerization analysis, obtain macroscopic analysis result.
Meanwhile, the application passes through configuration file, can according to business demand flexible configuration analysis object to be analyzed (such as:
The page), flexible configuration pathdepth to be analyzed, flexible configuration application flow indicator, practicality is higher.
Embodiment three
Correspondingly, a kind of application traffic analysis device disclosed in the present application, as it is shown on figure 3, described device includes:
Access log acquisition module 300, for obtaining the access log of application to be analyzed;
Log index table determines module 310, mates for funnel configuration file based on default application described to be analyzed
Every described access log that described access log acquisition module 300 obtains, is determined for compliance with the access of described funnel configuration file
The log index table of daily record;
Route matching module 320, the path list obtained after decomposing based on access path to be analyzed, to according to institute
State the actual access path that log index table determines to mate;
Flow analysis module 330, for according to the matching result of described route matching module 320 calculate described to be analyzed should
Flow analysis index;
Wherein, described access log includes the analysis object identity of the application described to be analyzed accessed;Described funnel configures
File includes the formula carrying out log matches based on analysis object identity previously generated;With type in described application to be analyzed
Analyze object and there is identical analysis object identity.
Application traffic analysis device disclosed in the embodiment of the present application, by obtaining the access log of application to be analyzed;Based on
The funnel configuration file of the application described to be analyzed preset mates every described access log, is determined for compliance with described funnel configuration literary composition
The log index table of the access log of part;The path list obtained after decomposing based on access path to be analyzed, to according to described
The actual access path that log index table determines is mated;The flow analysis of described application to be analyzed is calculated according to matching result
Index;Wherein, described access log includes the analysis object identity of the application described to be analyzed accessed;Described funnel configuration file
Including the formula carrying out log matches based on analysis object identity previously generated;With the page of type in described application to be analyzed
There is identical analysis object identity, solve in prior art and represent rate or clicking rate, nothing based on frequent path excavation calculating
The problem that method carries out macroscopic analysis to same type page or module.By to arranging identical with type analysis object (such as: the page)
Analysis object identity, the data of same type analysis object can be carried out polymerization analysis, obtain macroscopic analysis result.
Meanwhile, the application passes through configuration file, can be according to the business demand flexible configuration page to be analyzed, flexible configuration
The flow indicator of pathdepth to be analyzed, flexible configuration application, practicality is higher.
Embodiment four
Based on embodiment three, a kind of application traffic analysis device disclosed in another embodiment of the application, as shown in Figure 4, institute
State device also to include:
Funnel configuration file generation module 340, for obtaining the leakage of the application to be analyzed configured by graphic user interface
Bucket describes, funnel level describes, and wherein, described funnel level describes and at least includes: the institute that funnel hierarchical identification, each level comprise
State analysis object identity and the matching condition of application to be analyzed;According to described analysis object identity and matching condition, default dividing
Analysis object identity and the mapping relations of each field of access log, generate level defined formula;By the description of described funnel, funnel level
Description and level defined formula are integrated into the funnel configuration file of described application to be analyzed.
Alternatively, described log index table determines that module 310 farther includes:
Log matches unit 3101, for fixed based on the level in the funnel configuration file of default application described to be analyzed
Justice formula mates every described access log, is determined for compliance with the access log of described funnel configuration file;
Log index table signal generating unit 3102, for according to the daily record mark of access log that the match is successful, log sessions
Mark, session step and described funnel describe, funnel level describes and generates log index table.
Alternatively, described route matching module 320 includes:
Sequencing unit 3201, for being ranked up described log index table according to the vertical order of session step;
Route matching unit 3202, every index in the log index table after described sequencing unit 3201 is sorted
The actual access path of funnel hierarchical identification composition, with decompose based on access path to be analyzed after in the path list that obtains
All paths are mated respectively;
Wherein, described access path to be analyzed is made up of at least one funnel hierarchical identification.
Described flow analysis module 330 specifically for: according to the path in the path list that the match is successful and/or each described
The object identity of analyzing that the node in path is corresponding calculates the flow analysis index of application.
Alternatively, described application traffic analysis device also includes:
Path list generation module 350 to be analyzed, for using dividing mode based on prefix, the access road being analysed to
The path list of multiple subpath composition is resolved in footpath.
Application traffic analysis device disclosed in the embodiment of the present application, by obtaining the access log of application to be analyzed;Based on
The funnel configuration file of the described application preset mates every described access log, is determined for compliance with the visit of described funnel configuration file
Ask the log index table of daily record;The path list obtained after decomposing based on access path to be analyzed, to according to described daily record rope
Draw the actual access path that table determines to mate;The flow analysis index of described application to be analyzed is calculated according to matching result;
Wherein, described access log includes the analysis object identity of the application described to be analyzed accessed;Described funnel configuration file includes
The formula carrying out log matches based on analysis object identity previously generated;Described application to be analyzed has with the page of type
Identical analysis object identity, solves in prior art and represents rate or clicking rate based on frequent path excavation calculating, it is impossible to be right
The problem carrying out macroscopic analysis with type page or module.By to arranging identical analysis object mark with type analysis object
Know, the data of same type analysis object can be carried out polymerization analysis, obtain macroscopic analysis result.
Meanwhile, the application passes through configuration file, can be according to the business demand flexible configuration page to be analyzed, flexible configuration
The flow indicator of pathdepth to be analyzed, flexible configuration application, practicality is higher.
Each embodiment in this specification all uses the mode gone forward one by one to describe, what each embodiment stressed is with
The difference of other embodiments, between each embodiment, identical similar part sees mutually.For device embodiment
For, due to itself and embodiment of the method basic simlarity, so describe is fairly simple, relevant part sees the portion of embodiment of the method
Defend oneself bright.
A kind of application traffic analysis method, the device that there is provided the application above are described in detail, used herein
Principle and the embodiment of the application are set forth by specific case, and the explanation of above example is only intended to help to understand
The present processes and core concept thereof;Simultaneously for one of ordinary skill in the art, according to the thought of the application, at tool
All will change on body embodiment and range of application, in sum, this specification content should not be construed as the application
Restriction.
Through the above description of the embodiments, those skilled in the art it can be understood that to each embodiment can
The mode adding required general hardware platform by software realizes, naturally it is also possible to realized by hardware.Based on such reason
Solving, the part that prior art is contributed by technique scheme the most in other words can embody with the form of software product
Coming, this computer software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD etc., including
Some instructions are with so that a computer equipment (can be personal computer, server, or the network equipment etc.) performs each
The method described in some part of individual embodiment or embodiment.
Claims (12)
1. an application traffic analysis method, it is characterised in that including:
Obtain the access log of application to be analyzed;
Funnel configuration file based on default application described to be analyzed mates every described access log, is determined for compliance with described leakage
The log index table of the access log of bucket configuration file;
The path list obtained after decomposing based on access path to be analyzed, to the actual visit determined according to described log index table
Footpath of asking the way is mated;
The flow analysis index of described application to be analyzed is calculated according to matching result;
Wherein, described access log includes the analysis object identity of the application described to be analyzed accessed;Described funnel configuration file
Including the formula carrying out log matches based on analysis object identity previously generated;With the analysis of type in described application to be analyzed
Object has identical analysis object identity.
2. the method for claim 1, it is characterised in that the described stream calculating described application to be analyzed according to matching result
The step of component analysis index, including:
The analysis object identity that node according to the path in the path list that the match is successful and/or each described path is corresponding calculates
The flow analysis index of application.
3. the method for claim 1, it is characterised in that the step of the access log of described acquisition application to be analyzed it
Before, also include:
The funnel of the application to be analyzed that acquisition is configured by graphic user interface describes, funnel level describes, wherein, and described funnel
Level describes and at least includes: the analysis object identity of the application described to be analyzed that funnel hierarchical identification, each level comprise and coupling
Condition;
Close according to described analysis object identity and matching condition, the default mapping analyzing object identity and each field of access log
System, generates level defined formula;
The description of described funnel, the description of funnel level and level defined formula are integrated into the funnel configuration literary composition of described application to be analyzed
Part.
4. method as claimed in claim 3, it is characterised in that described funnel based on default application described to be analyzed configures
File mates every described access log, is determined for compliance with the step of the log index table of the access log of described funnel configuration file
Suddenly, including:
Every described access day is mated based on the level defined formula in the funnel configuration file of default application described to be analyzed
Will, is determined for compliance with the access log of described funnel configuration file;
Daily record mark, log sessions mark, session step and the description of described funnel, funnel according to the access log that the match is successful
Level describes and generates log index table.
5. method as claimed in claim 4, it is characterised in that the path column obtained after decomposing based on access path to be analyzed
Table, the step that the actual access path determined according to described log index table is mated, including:
According to the vertical order of session step, described log index table is ranked up;
By the actual access path of the funnel hierarchical identification composition of every index in the log index table after sequence, and based on treating point
All paths in the path list that the access path of analysis obtains after decomposing are mated respectively;
Wherein, described access path to be analyzed is made up of at least one funnel hierarchical identification.
6. the method for claim 1, it is characterised in that the path column obtained after decomposing based on access path to be analyzed
Table, before the step mate, also include the actual access path determined according to described log index table:
Using dividing mode based on prefix, the access path being analysed to resolves into the path list of multiple subpath composition.
7. an application traffic analysis device, it is characterised in that including:
Access log acquisition module, for obtaining the access log of application to be analyzed;
Log index table determines module, mates described access for funnel configuration file based on default application described to be analyzed
Every described access log that log acquisition module obtains, is determined for compliance with the daily record rope of the access log of described funnel configuration file
Draw table;
Route matching module, the path list obtained after decomposing based on access path to be analyzed, to according to described daily record
The actual access path that concordance list determines is mated;
Flow analysis module, the flow calculating described application to be analyzed for the matching result according to described route matching module divides
Analysis index;
Wherein, described access log includes the analysis object identity of the application described to be analyzed accessed;Described funnel configuration file
Including the formula carrying out log matches based on analysis object identity previously generated;With the analysis of type in described application to be analyzed
Object has identical analysis object identity.
8. device as claimed in claim 7, it is characterised in that described flow analysis module specifically for: according to the match is successful
Path list in path and/or object identity of analyzing corresponding to the node in each described path calculate the flow analysis of application and refer to
Mark.
9. device as claimed in claim 7, it is characterised in that also include: funnel configuration file generation module, be used for:
The funnel of the application to be analyzed that acquisition is configured by graphic user interface describes, funnel level describes, wherein, and described funnel
Level describes and at least includes: the analysis object identity of the application described to be analyzed that funnel hierarchical identification, each level comprise and coupling
Condition;
Close according to described analysis object identity and matching condition, the default mapping analyzing object identity and each field of access log
System, generates level defined formula;
The description of described funnel, the description of funnel level and level defined formula are integrated into the funnel configuration literary composition of described application to be analyzed
Part.
10. device as claimed in claim 9, it is characterised in that described log index table determines that module farther includes:
Log matches unit, for based on the level defined formula in the funnel configuration file of default application described to be analyzed
Join every described access log, be determined for compliance with the access log of described funnel configuration file;
Log index table signal generating unit, for according to the daily record mark of access log that the match is successful, log sessions mark, session
Step and described funnel describe, funnel level describes and generates log index table.
11. devices as claimed in claim 10, it is characterised in that described route matching module includes:
Sequencing unit, for being ranked up described log index table according to the vertical order of session step;
Route matching unit, the funnel hierarchical identification of every index in the log index table after described sequencing unit is sorted
The actual access path of composition, distinguishes with based on all paths in the path list obtained after access path decomposition to be analyzed
Mate;
Wherein, described access path to be analyzed is made up of at least one funnel hierarchical identification.
12. devices as claimed in claim 7, it is characterised in that also include:
Path list generation module to be analyzed, for using dividing mode based on prefix, the access path being analysed to is decomposed
Become the path list that multiple subpath forms.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610597004.1A CN106294559B (en) | 2016-07-26 | 2016-07-26 | A kind of application traffic analysis method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610597004.1A CN106294559B (en) | 2016-07-26 | 2016-07-26 | A kind of application traffic analysis method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106294559A true CN106294559A (en) | 2017-01-04 |
CN106294559B CN106294559B (en) | 2019-09-17 |
Family
ID=57652664
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610597004.1A Active CN106294559B (en) | 2016-07-26 | 2016-07-26 | A kind of application traffic analysis method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106294559B (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107563621A (en) * | 2017-08-22 | 2018-01-09 | 北京金堤科技有限公司 | A kind of website user's wastage analysis method and device |
CN107580215A (en) * | 2017-09-25 | 2018-01-12 | 深圳市九洲电器有限公司 | Set top box component quality feedback method and system |
CN107943679A (en) * | 2017-11-24 | 2018-04-20 | 广州优视网络科技有限公司 | Generation method, device and the server of path funnel |
CN109145230A (en) * | 2017-06-15 | 2019-01-04 | 百度在线网络技术(北京)有限公司 | Information output method and device |
CN110019072A (en) * | 2017-11-21 | 2019-07-16 | 北京京东尚科信息技术有限公司 | AB experimental method and system based on real time data |
CN110119337A (en) * | 2019-04-16 | 2019-08-13 | 深圳市轱辘汽车维修技术有限公司 | A kind of data analysing method, device and server |
CN110278150A (en) * | 2019-06-02 | 2019-09-24 | 北京航空航天大学 | Polymerization route analysis method between a kind of domain based on fringe node solicited message feature |
CN110675194A (en) * | 2019-09-29 | 2020-01-10 | 北京思维造物信息科技股份有限公司 | Funnel analysis method, device, equipment and readable medium |
CN110941608A (en) * | 2019-09-29 | 2020-03-31 | 北京思维造物信息科技股份有限公司 | Method, device and equipment for generating buried point analysis and funnel analysis report |
CN111523921A (en) * | 2019-12-31 | 2020-08-11 | 支付宝实验室(新加坡)有限公司 | Funnel analysis method, analysis device, electronic device, and readable storage medium |
CN112148957A (en) * | 2019-06-26 | 2020-12-29 | 北京百度网讯科技有限公司 | Webpage access data analysis method, device and equipment and readable storage medium |
CN112612987A (en) * | 2020-12-25 | 2021-04-06 | 广州凡科互联网科技股份有限公司 | Method for calculating upstream and downstream flow of page access |
CN113176980A (en) * | 2021-05-25 | 2021-07-27 | 医声医事(北京)科技有限公司 | Dynamic construction method and system of flow funnel |
CN113486241A (en) * | 2021-07-08 | 2021-10-08 | 中国建设银行股份有限公司 | Service preference analysis method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103544298A (en) * | 2013-10-30 | 2014-01-29 | 曙光信息产业(北京)有限公司 | Log analysis method and analysis device for component |
US20150301996A1 (en) * | 2013-03-14 | 2015-10-22 | Vmware, Inc. | Dynamic field extraction of log data |
CN105357054A (en) * | 2015-11-26 | 2016-02-24 | 上海晶赞科技发展有限公司 | Website traffic analysis method and apparatus, and electronic equipment |
CN105550250A (en) * | 2015-12-09 | 2016-05-04 | 百度在线网络技术(北京)有限公司 | Access log processing method and apparatus |
CN105791247A (en) * | 2014-12-25 | 2016-07-20 | 中国移动通信集团公司 | Unified traffic payment business implementation method and associated equipment and system |
-
2016
- 2016-07-26 CN CN201610597004.1A patent/CN106294559B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150301996A1 (en) * | 2013-03-14 | 2015-10-22 | Vmware, Inc. | Dynamic field extraction of log data |
CN103544298A (en) * | 2013-10-30 | 2014-01-29 | 曙光信息产业(北京)有限公司 | Log analysis method and analysis device for component |
CN105791247A (en) * | 2014-12-25 | 2016-07-20 | 中国移动通信集团公司 | Unified traffic payment business implementation method and associated equipment and system |
CN105357054A (en) * | 2015-11-26 | 2016-02-24 | 上海晶赞科技发展有限公司 | Website traffic analysis method and apparatus, and electronic equipment |
CN105550250A (en) * | 2015-12-09 | 2016-05-04 | 百度在线网络技术(北京)有限公司 | Access log processing method and apparatus |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109145230A (en) * | 2017-06-15 | 2019-01-04 | 百度在线网络技术(北京)有限公司 | Information output method and device |
CN107563621A (en) * | 2017-08-22 | 2018-01-09 | 北京金堤科技有限公司 | A kind of website user's wastage analysis method and device |
CN107580215A (en) * | 2017-09-25 | 2018-01-12 | 深圳市九洲电器有限公司 | Set top box component quality feedback method and system |
CN110019072A (en) * | 2017-11-21 | 2019-07-16 | 北京京东尚科信息技术有限公司 | AB experimental method and system based on real time data |
CN110019072B (en) * | 2017-11-21 | 2021-05-25 | 北京京东尚科信息技术有限公司 | AB experiment method and system based on real-time data |
CN107943679A (en) * | 2017-11-24 | 2018-04-20 | 广州优视网络科技有限公司 | Generation method, device and the server of path funnel |
CN107943679B (en) * | 2017-11-24 | 2021-02-26 | 阿里巴巴(中国)有限公司 | Path funnel generation method and device and server |
CN110119337A (en) * | 2019-04-16 | 2019-08-13 | 深圳市轱辘汽车维修技术有限公司 | A kind of data analysing method, device and server |
CN110278150A (en) * | 2019-06-02 | 2019-09-24 | 北京航空航天大学 | Polymerization route analysis method between a kind of domain based on fringe node solicited message feature |
CN112148957A (en) * | 2019-06-26 | 2020-12-29 | 北京百度网讯科技有限公司 | Webpage access data analysis method, device and equipment and readable storage medium |
CN110941608A (en) * | 2019-09-29 | 2020-03-31 | 北京思维造物信息科技股份有限公司 | Method, device and equipment for generating buried point analysis and funnel analysis report |
CN110675194A (en) * | 2019-09-29 | 2020-01-10 | 北京思维造物信息科技股份有限公司 | Funnel analysis method, device, equipment and readable medium |
CN110941608B (en) * | 2019-09-29 | 2023-01-20 | 北京思维造物信息科技股份有限公司 | Method, device and equipment for generating buried point analysis and funnel analysis report |
CN111523921A (en) * | 2019-12-31 | 2020-08-11 | 支付宝实验室(新加坡)有限公司 | Funnel analysis method, analysis device, electronic device, and readable storage medium |
CN111523921B (en) * | 2019-12-31 | 2023-10-20 | 支付宝实验室(新加坡)有限公司 | Funnel analysis method, analysis device, electronic device, and readable storage medium |
CN112612987A (en) * | 2020-12-25 | 2021-04-06 | 广州凡科互联网科技股份有限公司 | Method for calculating upstream and downstream flow of page access |
CN113176980A (en) * | 2021-05-25 | 2021-07-27 | 医声医事(北京)科技有限公司 | Dynamic construction method and system of flow funnel |
CN113176980B (en) * | 2021-05-25 | 2023-09-12 | 医声医事(北京)科技有限公司 | Dynamic construction method and system of flow hopper |
CN113486241A (en) * | 2021-07-08 | 2021-10-08 | 中国建设银行股份有限公司 | Service preference analysis method and device |
Also Published As
Publication number | Publication date |
---|---|
CN106294559B (en) | 2019-09-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106294559A (en) | A kind of application traffic analysis method and device | |
Bergh et al. | Using meta‐analytic structural equation modeling to advance strategic management research: Guidelines and an empirical illustration via the strategic leadership‐performance relationship | |
Fielding et al. | Opening up open-ended survey data using qualitative software | |
Giordano et al. | Bayesian belief network to support conflict analysis for groundwater protection: the case of the Apulia region | |
Souza et al. | User experience evaluation using mouse tracking and artificial intelligence | |
Korzh et al. | Methods for forming an informational image of a higher education institution. | |
CN108023768A (en) | Network event chain establishment method and network event chain establish system | |
KR20120007889A (en) | Method, system and recording medium for verifying effect of advertisement | |
Van der Vlist | Counter-mapping surveillance: A critical cartography of mass surveillance technology after Snowden | |
CN110020687A (en) | Abnormal behaviour analysis method and device based on operator's Situation Awareness portrait | |
Andone et al. | Using open education tools for a higher education virtual campus | |
Hegeman et al. | Survey of graph analysis applications | |
Lenzi et al. | Disclosing cyber-attacks on water distribution systems. An experimental approach to the sonification of threats and anomalous data. | |
CN106777235A (en) | A kind of method and apparatus for assessing different data sources the data precision | |
CN117829291A (en) | Whole-process consultation knowledge integrated management system and method | |
Gill et al. | Semi-automation for ambiguity resolution in Open Source Software requirements | |
Akhuseyinoglu et al. | Exploring behavioral patterns for data-driven modeling of learners' individual differences | |
CN107430590A (en) | Data compare | |
Lebtag et al. | Strategies to evolve exm notations extracted from a survey with software engineering professionals perspective | |
Yahya et al. | A fuzzy logic-based approach for assessing the quality of business process models | |
CN110493044A (en) | A kind of method and system of quantifiable Situation Awareness | |
Schmidt et al. | Identifying the Giants: A Social Network Analysis of the Literature on Information Technology Outsourcing Relationships. | |
Dekker | Social data: CESSDA best practices | |
Berlanga et al. | Towards Semantic DigitalTwins for Social Networks | |
Bhatnagar et al. | Real-time analysis on finding significance of data mining on CRM of service sector organisations: an Indian perspective |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |