CN107040548A - The monitoring method of terminal traffic state - Google Patents
The monitoring method of terminal traffic state Download PDFInfo
- Publication number
- CN107040548A CN107040548A CN201710426116.5A CN201710426116A CN107040548A CN 107040548 A CN107040548 A CN 107040548A CN 201710426116 A CN201710426116 A CN 201710426116A CN 107040548 A CN107040548 A CN 107040548A
- Authority
- CN
- China
- Prior art keywords
- key
- business datum
- server
- data
- service condition
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1425—Traffic logging, e.g. anomaly detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/02—Standardisation; Integration
- H04L41/0246—Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
- H04L41/026—Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using e-messaging for transporting management information, e.g. email, instant messaging or chat
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0245—Filtering by information in the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0807—Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The invention discloses a kind of monitoring method of terminal traffic state, including:Terminal obtains business datum, and business datum is sent into server, and business datum includes database back-up data, program backup data and service condition data;Server is parsed to business datum, extracts the first key;Judge whether the first key matches with default second key of server, if it is, business datum storage is arrived into database;Business datum is generated into service condition list and shown;The service condition of business datum is detected according to the default cycle very first time according to service condition data, when the abnormal state of business datum, abnormal traffic data are sent to Mail Gateway;Mail Gateway obtains the first key of abnormal traffic data and the second key of server respectively;Judge the first key with the second key whether match, if it is, generating warning message and being sent to server.
Description
Technical field
The present invention relates to technical field of data processing, more particularly to a kind of monitoring method of terminal traffic state.
Background technology
With flourishing for Internet technology, user becomes increasingly popular to handle various industry by terminal access internet
Business.Due to the continuous growth of portfolio, in order to provide more preferable Consumer's Experience, it is ensured that line upward stability is, it is necessary to service condition
It is monitored, is solved in order to be taken measures on customs clearance in time when finding that service condition is abnormal.
At present, the third party software of the monitoring business state monitoring system such as including Hostmonitor, Zabbix.Existing skill
The business judgment rule of monitoring system in art is fixed, it is impossible to which realization is monitored according to business characteristic, and use is not clever enough
It is living;Moreover, configuration monitoring judge module is relatively complicated, use is not easy enough.
The content of the invention
The invention provides a kind of monitoring method of terminal traffic state, monitored with solving service condition of the prior art
The problem of method is easy using underaction and not enough.
The embodiments of the invention provide a kind of monitoring method of terminal traffic state, including:
Terminal obtains business datum, and the business datum is sent into server, and the business datum includes database
Backup Data, program backup data and service condition data;
The server is parsed to the business datum, extracts the first key;
Judge whether first key matches with default second key of the server, if it is, by the industry
Business data Cun Chudao databases;
The business datum is generated into service condition list and shown;
The service condition of the business datum is entered according to the default cycle very first time according to the service condition data
The abnormal traffic data, when the abnormal state of the business datum, are sent to Mail Gateway by row detection;
The Mail Gateway obtains the first key of the abnormal traffic data and the second key of the server respectively;
Judge whether first key matches with the second described key, if it is, generating warning message and sending
To the server.
Further, the list item data of the service condition list are specifically included:
Traffic ID, service scenario program, business datum send time and business description information.
Further, the terminal obtains business datum, and the business datum is sent into server specifically included:
The terminal obtains business datum, and adds the first key, obtains encrypted transaction data;
The encrypted transaction data is sent to the server according to default second time cycle.
Further, when the server judges the first key and the server default second of the business datum
When key is mismatched, the server sends a notification message to the terminal, and deletes the business datum.
Further, the service condition data specifically include service condition code and corresponding business state information.
Further, when the Mail Gateway judges first key and second key mismatch, to described
Server sends a notification message, and deletes the business datum.
Further, the warning message is specially alarm mail information.
The monitoring method of terminal traffic state provided in an embodiment of the present invention, terminal obtains business datum, and by business number
According to server is sent to, business datum includes database back-up data, program backup data and service condition data;Server pair
Business datum is parsed, and extracts the first key;Judge whether the first key matches with default second key of server, if
It is that database then is arrived into business datum storage;Service condition list is generated according to business datum and shown;According to service condition number
The service condition of business datum is detected according to according to the default cycle very first time, when the abnormal state of business datum,
Abnormal traffic data are sent to Mail Gateway;Mail Gateway obtains first key and server of abnormal traffic data respectively
Second key;Judge the first key with the second key whether match, if it is, generation warning message and being sent to service
Device.Method provided in an embodiment of the present invention, the service condition Data Detection service condition that server is reported by terminal, Neng Gougen
It is monitored according to business characteristic;When service condition occurs abnormal, triggering Mail Gateway sends warning message, it is achieved thereby that right
Effective monitoring of service condition, without configuring, cumbersome judge module, easy to use.
Brief description of the drawings
Fig. 1 is the flow chart of the monitoring method of terminal traffic state provided in an embodiment of the present invention.
Fig. 2 is the schematic diagram of terminal traffic status list provided in an embodiment of the present invention.
Embodiment
In order that the object, technical solutions and advantages of the present invention are clearer, below in conjunction with accompanying drawing the present invention is made into
One step it is described in detail, it is clear that described embodiment is only embodiment of the invention a part of, rather than whole implementation
Example.Based on the embodiment in the present invention, what those of ordinary skill in the art were obtained under the premise of creative work is not made
All other embodiment, belongs to the scope of protection of the invention.
Terminal in technical solution of the present invention specifically includes the terminal device with disposal ability, for example, desktop computer, pen
Remember this computer, tablet personal computer etc..
With reference to the monitoring method flow chart of the terminal traffic state shown in Fig. 1, to end provided in an embodiment of the present invention
The monitoring method of end service condition is described in detail.
As shown in figure 1, the monitoring method for the terminal traffic state that the present invention is provided mainly comprises the following steps:
Step 101, terminal obtains business datum, and business datum is sent into server.
Wherein, business datum includes database back-up data, program backup data and service condition data.Service condition number
According to specifically including service condition code and corresponding business state information.
For example, service condition code is 0,1,2, corresponding business state information is respectively normal, warning, mistake.
Specifically, terminal obtains business datum by way of POST or GET, and the first key is added, encrypted
Business datum.
For example, terminal definitions token values, are encrypted to business datum using md5sum encryption strings, obtain encryption data.
Encrypted transaction data is sent to server by terminal according to default second time cycle.
For example, terminal to server can report a business datum with every 3 seconds, it is easy to what timely discovery business occurred to ask
Topic, takes measures to be solved in time.
Step 102, server is parsed to business datum, extracts the first key.
For GET modes, server end obtains the value of variable with Request.QueryString, for POST modes, clothes
Business device end obtains the data submitted with Request.Form.
The data volume of GET transmission is smaller, it is impossible to more than 2KB.POST transmission data volume it is larger, be typically defaulted as not by
Limitation.But in theory, limitation depends on the disposal ability of server.
The data that GET request please be submitted are placed in HTTP request protocol header, and the data that POST is submitted then are placed on entity
In data;The data that GET modes are submitted can only at most have 2048 bytes, and POST is then limited without this.The parameter of POST transmission
In the text that http protocol is transmitted, analytic parameter part again during data receiver obtains parameter, and POST submits data to be implicit
's.GET is by uniform resource locator (Uniform Resoure Locator, URL) Transfer Parameters, for transmitting some not
The data of need for confidentiality.Those skilled in the art can take corresponding data acquiring mode according to specific needs.
The first key is extracted after server parsing data, in order to which whether subsequent authentication data are safe, if be
What legal terminal was sent.
Step 103, when default second key of the first key and server is matched, then data are arrived into business datum storage
Storehouse.
Specifically, server is received after the business datum that terminal is sent, it is necessary to carry out security verification.Judge the first key
Whether matched with default second key of server, if the verification passes, then by business datum storage into database.
When server judges that default second key of the first key of business datum and server is mismatched, server to
Terminal sends a notification message, and deletes business datum.
For example, server is received after business datum, token values are extracted, judge that the token values and server are default
Whether token values match, if it is, explanation data are safe, data are entered into database, if it does not match, will abandon,
Mismatch notification message is sent without processing, and to terminal.
Step 104, business datum is generated into service condition list and shown.
Specifically, server is handled the business datum being verified, the list item data of service condition list are obtained,
And status list is subjected to page presentation, add and roll brush screen, as shown in Fig. 2 the purpose of page presentation makes business process state
More understand, be easy to find practical business problem, monitoring programme data backup, business existing state etc..
Wherein, the list item data of service condition list are specifically included:Traffic ID, service scenario program, business datum are sent
Time and business description information.
Step 105, the service condition of business datum is entered according to the default cycle very first time according to service condition data
Abnormal traffic data, when the abnormal state of business datum, are sent to Mail Gateway by row detection.
Wherein, service condition data are the status datas that terminal is returned according to the regular behavior of business itself, according to business
Status data can know whether the current running status of business has exception, and server is according to the default time cycle in business shape
Detected in state list, for example, page detection can be carried out once with every 10 seconds, if it find that service exception is then sent to mail
Gateway.
Step 106, Mail Gateway obtains the first key of abnormal traffic data and the second key of server respectively.
Specifically, Mail Gateway carries out safety verification to abnormal traffic data, it is different that Mail Gateway the reception server is sent
After normal business datum, the key of abnormal traffic data is extracted;Key is sent to server and obtains request, and server will be default secret
Key is sent to Mail Gateway.
Step 107, when the first key with the second key match when, generation warning message is simultaneously sent to server.
Mail Gateway judges whether the key of abnormal traffic data is consistent with the default key of server, if it is, really
It is the data that server is sent to recognize the business datum, and warning message is sent to server, and warning message can be specifically alarm postal
Part information.
For example, Mail Gateway is received after business datum, token values are extracted, judge that the token values are preset with server
Token values whether match, if it is, confirm the business datum be server send data, to server send alarm
Mail.
When Mail Gateway judges the first key and the second key mismatch, sent a notification message to server, and delete
Business datum.
The monitoring method of terminal traffic state provided in an embodiment of the present invention, terminal obtains business datum, and by business number
According to server is sent to, business datum includes database back-up data, program backup data and service condition data;Server pair
Business datum is parsed, and extracts the first key;Judge whether the first key matches with default second key of server, if
It is that database then is arrived into business datum storage;Service condition list is generated according to business datum and shown;According to service condition number
The service condition of business datum is detected according to according to the default cycle very first time, when the abnormal state of business datum,
Abnormal traffic data are sent to Mail Gateway;Mail Gateway obtains first key and server of abnormal traffic data respectively
Second key;Judge the first key with the second key whether match, if it is, generation warning message and being sent to service
Device.Method provided in an embodiment of the present invention, the service condition Data Detection service condition that server is reported by terminal, Neng Gougen
It is monitored according to business characteristic;When service condition occurs abnormal, triggering Mail Gateway sends warning message, it is achieved thereby that right
Effective monitoring of service condition, without configuring, cumbersome judge module, easy to use.
Professional should further appreciate that, each example described with reference to the embodiments described herein
Unit and algorithm steps, can be realized with electronic hardware, be generally described respectively according to function in the above description
The composition and step of example.Function described by being realized to each specific application using distinct methods, but this reality
Now it is not considered that beyond the scope of the embodiment of the present invention.Specifically, the computing and control section can dredging collateral logic hardwares
Realize, it can be the logical integrated circuit manufactured using integrated circuit technology, and the present embodiment is not construed as limiting to this.
The method that is described with reference to the embodiments described herein can use hardware, computing device the step of algorithm
Software module, or the two combination are implemented.Software module can be placed in random access memory (RAM), internal memory, read-only storage
(ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field
In any other form of storage medium well known to interior.
Above-described embodiment, purpose, technical scheme and beneficial effect to the embodiment of the present invention are carried out
It is further described, should be understood that the embodiment that the foregoing is only the embodiment of the present invention, and without
It is all within the spirit and principle of the embodiment of the present invention in the protection domain for limiting the embodiment of the present invention, any modification for being made,
Equivalent substitution, improvement etc., should be included within the protection domain of the embodiment of the present invention.
Claims (7)
1. a kind of monitoring method of terminal traffic state, it is characterised in that methods described includes:
Terminal obtains business datum, and the business datum is sent into server, and the business datum includes DB Backup
Data, program backup data and service condition data;
The server is parsed to the business datum, extracts the first key;
Judge whether first key matches with default second key of the server, if it is, by the business number
Database is arrived according to storage;
The business datum is generated into service condition list and shown;
The service condition of the business datum is examined according to the default cycle very first time according to the service condition data
Survey, when the abnormal state of the business datum, the abnormal traffic data are sent to Mail Gateway;
The Mail Gateway obtains the first key of the abnormal traffic data and the second key of the server respectively;
Judge whether first key matches with the second described key, if it is, generating warning message and being sent to institute
State server.
2. the monitoring method of terminal traffic state according to claim 1, it is characterised in that the service condition list
List item data are specifically included:
Traffic ID, service scenario program, business datum send time and business description information.
3. the monitoring method of terminal traffic state according to claim 1, it is characterised in that the terminal obtains business number
According to, and the business datum is sent to server specifically included:
The terminal obtains business datum, and adds the first key, obtains encrypted transaction data;
The encrypted transaction data is sent to the server according to default second time cycle.
4. the monitoring method of terminal traffic state according to claim 1, it is characterised in that when the server judges institute
When the first key for stating business datum is mismatched with default second key of the server, the server is sent out to the terminal
Notification message is sent, and deletes the business datum.
5. the monitoring method of terminal traffic state according to claim 1, it is characterised in that the service condition data tool
Body includes service condition code and corresponding business state information.
6. the monitoring method of terminal traffic state according to claim 1, it is characterised in that when the Mail Gateway judges
When first key and second key mismatch, sent a notification message to the server, and delete the business number
According to.
7. the monitoring method of terminal traffic state according to claim 1, it is characterised in that the warning message is specially
Alarm mail information.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710426116.5A CN107040548A (en) | 2017-06-08 | 2017-06-08 | The monitoring method of terminal traffic state |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710426116.5A CN107040548A (en) | 2017-06-08 | 2017-06-08 | The monitoring method of terminal traffic state |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107040548A true CN107040548A (en) | 2017-08-11 |
Family
ID=59541018
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710426116.5A Pending CN107040548A (en) | 2017-06-08 | 2017-06-08 | The monitoring method of terminal traffic state |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107040548A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050015477A1 (en) * | 2003-05-26 | 2005-01-20 | Chih-Wei Chen | Server management method and system |
CN101355443A (en) * | 2008-09-11 | 2009-01-28 | 浪潮齐鲁软件产业有限公司 | Method for acquiring ARM terminal equipment status |
CN102263673A (en) * | 2010-05-27 | 2011-11-30 | 珠海格力电器股份有限公司 | Gateway-based remote service system and method |
EP2930644A1 (en) * | 2014-04-08 | 2015-10-14 | Fujitsu Limited | Terminal device, data management server, terminal program, data management program, and data management system |
CN105282157A (en) * | 2015-10-22 | 2016-01-27 | 中国人民解放军装备学院 | Secure communication control method |
CN106776226A (en) * | 2016-12-26 | 2017-05-31 | 东软集团股份有限公司 | The monitoring method and device of self-aided terminal |
-
2017
- 2017-06-08 CN CN201710426116.5A patent/CN107040548A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20050015477A1 (en) * | 2003-05-26 | 2005-01-20 | Chih-Wei Chen | Server management method and system |
CN101355443A (en) * | 2008-09-11 | 2009-01-28 | 浪潮齐鲁软件产业有限公司 | Method for acquiring ARM terminal equipment status |
CN102263673A (en) * | 2010-05-27 | 2011-11-30 | 珠海格力电器股份有限公司 | Gateway-based remote service system and method |
EP2930644A1 (en) * | 2014-04-08 | 2015-10-14 | Fujitsu Limited | Terminal device, data management server, terminal program, data management program, and data management system |
CN105282157A (en) * | 2015-10-22 | 2016-01-27 | 中国人民解放军装备学院 | Secure communication control method |
CN106776226A (en) * | 2016-12-26 | 2017-05-31 | 东软集团股份有限公司 | The monitoring method and device of self-aided terminal |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
AU2014101545A4 (en) | Software behavior monitoring and verification system | |
CN104320377B (en) | The anti-stealing link method and equipment of a kind of files in stream media | |
TWI587672B (en) | Login authentication method, client, server and system | |
US8051484B2 (en) | Method and security system for indentifying and blocking web attacks by enforcing read-only parameters | |
CN110012005B (en) | Method and device for identifying abnormal data, electronic equipment and storage medium | |
CN103139193B (en) | phishing website processing method and system | |
TW201824047A (en) | Attack request determination method, apparatus and server | |
WO2014142791A1 (en) | Event correlation based on confidence factor | |
CN104519018A (en) | Method, device and system for preventing malicious requests for server | |
CN107046518A (en) | The detection method and device of network attack | |
CN108063833B (en) | HTTP DNS analysis message processing method and device | |
CN105337993A (en) | Dynamic and static combination-based mail security detection device and method | |
CN105049232A (en) | Network information log audit system | |
CN105743905A (en) | Method, device and system for realizing security login and security equipment | |
EP4052417A1 (en) | Security mechanisms for preventing retry or replay attacks | |
ITTO20130513A1 (en) | SYSTEM AND METHOD FOR FILTERING ELECTRONIC MESSAGES | |
CN108737446A (en) | Multi-party communications method based on dual identity and system | |
CN113660216B (en) | Password attack detection method, device, electronic device and storage medium | |
CN108809678A (en) | A kind of method and server of information push | |
TWI422206B (en) | Tolerant key verification method | |
CN206619143U (en) | A kind of computer network security shielding system | |
CN104219219B (en) | A kind of method of data processing, server and system | |
CN107181619A (en) | The monitoring system of service condition | |
CN104396216A (en) | Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof | |
CN104348816B (en) | Protect the method and the preposition gateway of Web server of cookie information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170811 |
|
WD01 | Invention patent application deemed withdrawn after publication |