CN107040548A - The monitoring method of terminal traffic state - Google Patents

The monitoring method of terminal traffic state Download PDF

Info

Publication number
CN107040548A
CN107040548A CN201710426116.5A CN201710426116A CN107040548A CN 107040548 A CN107040548 A CN 107040548A CN 201710426116 A CN201710426116 A CN 201710426116A CN 107040548 A CN107040548 A CN 107040548A
Authority
CN
China
Prior art keywords
key
business datum
server
data
service condition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710426116.5A
Other languages
Chinese (zh)
Inventor
卢航
付莹
冯方方
孙健
刘斌
付强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Universal Wisdom Technology Beijing Co Ltd
Original Assignee
Universal Wisdom Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Universal Wisdom Technology Beijing Co Ltd filed Critical Universal Wisdom Technology Beijing Co Ltd
Priority to CN201710426116.5A priority Critical patent/CN107040548A/en
Publication of CN107040548A publication Critical patent/CN107040548A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/02Standardisation; Integration
    • H04L41/0246Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols
    • H04L41/026Exchanging or transporting network management information using the Internet; Embedding network management web servers in network elements; Web-services-based protocols using e-messaging for transporting management information, e.g. email, instant messaging or chat
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention discloses a kind of monitoring method of terminal traffic state, including:Terminal obtains business datum, and business datum is sent into server, and business datum includes database back-up data, program backup data and service condition data;Server is parsed to business datum, extracts the first key;Judge whether the first key matches with default second key of server, if it is, business datum storage is arrived into database;Business datum is generated into service condition list and shown;The service condition of business datum is detected according to the default cycle very first time according to service condition data, when the abnormal state of business datum, abnormal traffic data are sent to Mail Gateway;Mail Gateway obtains the first key of abnormal traffic data and the second key of server respectively;Judge the first key with the second key whether match, if it is, generating warning message and being sent to server.

Description

The monitoring method of terminal traffic state
Technical field
The present invention relates to technical field of data processing, more particularly to a kind of monitoring method of terminal traffic state.
Background technology
With flourishing for Internet technology, user becomes increasingly popular to handle various industry by terminal access internet Business.Due to the continuous growth of portfolio, in order to provide more preferable Consumer's Experience, it is ensured that line upward stability is, it is necessary to service condition It is monitored, is solved in order to be taken measures on customs clearance in time when finding that service condition is abnormal.
At present, the third party software of the monitoring business state monitoring system such as including Hostmonitor, Zabbix.Existing skill The business judgment rule of monitoring system in art is fixed, it is impossible to which realization is monitored according to business characteristic, and use is not clever enough It is living;Moreover, configuration monitoring judge module is relatively complicated, use is not easy enough.
The content of the invention
The invention provides a kind of monitoring method of terminal traffic state, monitored with solving service condition of the prior art The problem of method is easy using underaction and not enough.
The embodiments of the invention provide a kind of monitoring method of terminal traffic state, including:
Terminal obtains business datum, and the business datum is sent into server, and the business datum includes database Backup Data, program backup data and service condition data;
The server is parsed to the business datum, extracts the first key;
Judge whether first key matches with default second key of the server, if it is, by the industry Business data Cun Chudao databases;
The business datum is generated into service condition list and shown;
The service condition of the business datum is entered according to the default cycle very first time according to the service condition data The abnormal traffic data, when the abnormal state of the business datum, are sent to Mail Gateway by row detection;
The Mail Gateway obtains the first key of the abnormal traffic data and the second key of the server respectively;
Judge whether first key matches with the second described key, if it is, generating warning message and sending To the server.
Further, the list item data of the service condition list are specifically included:
Traffic ID, service scenario program, business datum send time and business description information.
Further, the terminal obtains business datum, and the business datum is sent into server specifically included:
The terminal obtains business datum, and adds the first key, obtains encrypted transaction data;
The encrypted transaction data is sent to the server according to default second time cycle.
Further, when the server judges the first key and the server default second of the business datum When key is mismatched, the server sends a notification message to the terminal, and deletes the business datum.
Further, the service condition data specifically include service condition code and corresponding business state information.
Further, when the Mail Gateway judges first key and second key mismatch, to described Server sends a notification message, and deletes the business datum.
Further, the warning message is specially alarm mail information.
The monitoring method of terminal traffic state provided in an embodiment of the present invention, terminal obtains business datum, and by business number According to server is sent to, business datum includes database back-up data, program backup data and service condition data;Server pair Business datum is parsed, and extracts the first key;Judge whether the first key matches with default second key of server, if It is that database then is arrived into business datum storage;Service condition list is generated according to business datum and shown;According to service condition number The service condition of business datum is detected according to according to the default cycle very first time, when the abnormal state of business datum, Abnormal traffic data are sent to Mail Gateway;Mail Gateway obtains first key and server of abnormal traffic data respectively Second key;Judge the first key with the second key whether match, if it is, generation warning message and being sent to service Device.Method provided in an embodiment of the present invention, the service condition Data Detection service condition that server is reported by terminal, Neng Gougen It is monitored according to business characteristic;When service condition occurs abnormal, triggering Mail Gateway sends warning message, it is achieved thereby that right Effective monitoring of service condition, without configuring, cumbersome judge module, easy to use.
Brief description of the drawings
Fig. 1 is the flow chart of the monitoring method of terminal traffic state provided in an embodiment of the present invention.
Fig. 2 is the schematic diagram of terminal traffic status list provided in an embodiment of the present invention.
Embodiment
In order that the object, technical solutions and advantages of the present invention are clearer, below in conjunction with accompanying drawing the present invention is made into One step it is described in detail, it is clear that described embodiment is only embodiment of the invention a part of, rather than whole implementation Example.Based on the embodiment in the present invention, what those of ordinary skill in the art were obtained under the premise of creative work is not made All other embodiment, belongs to the scope of protection of the invention.
Terminal in technical solution of the present invention specifically includes the terminal device with disposal ability, for example, desktop computer, pen Remember this computer, tablet personal computer etc..
With reference to the monitoring method flow chart of the terminal traffic state shown in Fig. 1, to end provided in an embodiment of the present invention The monitoring method of end service condition is described in detail.
As shown in figure 1, the monitoring method for the terminal traffic state that the present invention is provided mainly comprises the following steps:
Step 101, terminal obtains business datum, and business datum is sent into server.
Wherein, business datum includes database back-up data, program backup data and service condition data.Service condition number According to specifically including service condition code and corresponding business state information.
For example, service condition code is 0,1,2, corresponding business state information is respectively normal, warning, mistake.
Specifically, terminal obtains business datum by way of POST or GET, and the first key is added, encrypted Business datum.
For example, terminal definitions token values, are encrypted to business datum using md5sum encryption strings, obtain encryption data.
Encrypted transaction data is sent to server by terminal according to default second time cycle.
For example, terminal to server can report a business datum with every 3 seconds, it is easy to what timely discovery business occurred to ask Topic, takes measures to be solved in time.
Step 102, server is parsed to business datum, extracts the first key.
For GET modes, server end obtains the value of variable with Request.QueryString, for POST modes, clothes Business device end obtains the data submitted with Request.Form.
The data volume of GET transmission is smaller, it is impossible to more than 2KB.POST transmission data volume it is larger, be typically defaulted as not by Limitation.But in theory, limitation depends on the disposal ability of server.
The data that GET request please be submitted are placed in HTTP request protocol header, and the data that POST is submitted then are placed on entity In data;The data that GET modes are submitted can only at most have 2048 bytes, and POST is then limited without this.The parameter of POST transmission In the text that http protocol is transmitted, analytic parameter part again during data receiver obtains parameter, and POST submits data to be implicit 's.GET is by uniform resource locator (Uniform Resoure Locator, URL) Transfer Parameters, for transmitting some not The data of need for confidentiality.Those skilled in the art can take corresponding data acquiring mode according to specific needs.
The first key is extracted after server parsing data, in order to which whether subsequent authentication data are safe, if be What legal terminal was sent.
Step 103, when default second key of the first key and server is matched, then data are arrived into business datum storage Storehouse.
Specifically, server is received after the business datum that terminal is sent, it is necessary to carry out security verification.Judge the first key Whether matched with default second key of server, if the verification passes, then by business datum storage into database.
When server judges that default second key of the first key of business datum and server is mismatched, server to Terminal sends a notification message, and deletes business datum.
For example, server is received after business datum, token values are extracted, judge that the token values and server are default Whether token values match, if it is, explanation data are safe, data are entered into database, if it does not match, will abandon, Mismatch notification message is sent without processing, and to terminal.
Step 104, business datum is generated into service condition list and shown.
Specifically, server is handled the business datum being verified, the list item data of service condition list are obtained, And status list is subjected to page presentation, add and roll brush screen, as shown in Fig. 2 the purpose of page presentation makes business process state More understand, be easy to find practical business problem, monitoring programme data backup, business existing state etc..
Wherein, the list item data of service condition list are specifically included:Traffic ID, service scenario program, business datum are sent Time and business description information.
Step 105, the service condition of business datum is entered according to the default cycle very first time according to service condition data Abnormal traffic data, when the abnormal state of business datum, are sent to Mail Gateway by row detection.
Wherein, service condition data are the status datas that terminal is returned according to the regular behavior of business itself, according to business Status data can know whether the current running status of business has exception, and server is according to the default time cycle in business shape Detected in state list, for example, page detection can be carried out once with every 10 seconds, if it find that service exception is then sent to mail Gateway.
Step 106, Mail Gateway obtains the first key of abnormal traffic data and the second key of server respectively.
Specifically, Mail Gateway carries out safety verification to abnormal traffic data, it is different that Mail Gateway the reception server is sent After normal business datum, the key of abnormal traffic data is extracted;Key is sent to server and obtains request, and server will be default secret Key is sent to Mail Gateway.
Step 107, when the first key with the second key match when, generation warning message is simultaneously sent to server.
Mail Gateway judges whether the key of abnormal traffic data is consistent with the default key of server, if it is, really It is the data that server is sent to recognize the business datum, and warning message is sent to server, and warning message can be specifically alarm postal Part information.
For example, Mail Gateway is received after business datum, token values are extracted, judge that the token values are preset with server Token values whether match, if it is, confirm the business datum be server send data, to server send alarm Mail.
When Mail Gateway judges the first key and the second key mismatch, sent a notification message to server, and delete Business datum.
The monitoring method of terminal traffic state provided in an embodiment of the present invention, terminal obtains business datum, and by business number According to server is sent to, business datum includes database back-up data, program backup data and service condition data;Server pair Business datum is parsed, and extracts the first key;Judge whether the first key matches with default second key of server, if It is that database then is arrived into business datum storage;Service condition list is generated according to business datum and shown;According to service condition number The service condition of business datum is detected according to according to the default cycle very first time, when the abnormal state of business datum, Abnormal traffic data are sent to Mail Gateway;Mail Gateway obtains first key and server of abnormal traffic data respectively Second key;Judge the first key with the second key whether match, if it is, generation warning message and being sent to service Device.Method provided in an embodiment of the present invention, the service condition Data Detection service condition that server is reported by terminal, Neng Gougen It is monitored according to business characteristic;When service condition occurs abnormal, triggering Mail Gateway sends warning message, it is achieved thereby that right Effective monitoring of service condition, without configuring, cumbersome judge module, easy to use.
Professional should further appreciate that, each example described with reference to the embodiments described herein Unit and algorithm steps, can be realized with electronic hardware, be generally described respectively according to function in the above description The composition and step of example.Function described by being realized to each specific application using distinct methods, but this reality Now it is not considered that beyond the scope of the embodiment of the present invention.Specifically, the computing and control section can dredging collateral logic hardwares Realize, it can be the logical integrated circuit manufactured using integrated circuit technology, and the present embodiment is not construed as limiting to this.
The method that is described with reference to the embodiments described herein can use hardware, computing device the step of algorithm Software module, or the two combination are implemented.Software module can be placed in random access memory (RAM), internal memory, read-only storage (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field In any other form of storage medium well known to interior.
Above-described embodiment, purpose, technical scheme and beneficial effect to the embodiment of the present invention are carried out It is further described, should be understood that the embodiment that the foregoing is only the embodiment of the present invention, and without It is all within the spirit and principle of the embodiment of the present invention in the protection domain for limiting the embodiment of the present invention, any modification for being made, Equivalent substitution, improvement etc., should be included within the protection domain of the embodiment of the present invention.

Claims (7)

1. a kind of monitoring method of terminal traffic state, it is characterised in that methods described includes:
Terminal obtains business datum, and the business datum is sent into server, and the business datum includes DB Backup Data, program backup data and service condition data;
The server is parsed to the business datum, extracts the first key;
Judge whether first key matches with default second key of the server, if it is, by the business number Database is arrived according to storage;
The business datum is generated into service condition list and shown;
The service condition of the business datum is examined according to the default cycle very first time according to the service condition data Survey, when the abnormal state of the business datum, the abnormal traffic data are sent to Mail Gateway;
The Mail Gateway obtains the first key of the abnormal traffic data and the second key of the server respectively;
Judge whether first key matches with the second described key, if it is, generating warning message and being sent to institute State server.
2. the monitoring method of terminal traffic state according to claim 1, it is characterised in that the service condition list List item data are specifically included:
Traffic ID, service scenario program, business datum send time and business description information.
3. the monitoring method of terminal traffic state according to claim 1, it is characterised in that the terminal obtains business number According to, and the business datum is sent to server specifically included:
The terminal obtains business datum, and adds the first key, obtains encrypted transaction data;
The encrypted transaction data is sent to the server according to default second time cycle.
4. the monitoring method of terminal traffic state according to claim 1, it is characterised in that when the server judges institute When the first key for stating business datum is mismatched with default second key of the server, the server is sent out to the terminal Notification message is sent, and deletes the business datum.
5. the monitoring method of terminal traffic state according to claim 1, it is characterised in that the service condition data tool Body includes service condition code and corresponding business state information.
6. the monitoring method of terminal traffic state according to claim 1, it is characterised in that when the Mail Gateway judges When first key and second key mismatch, sent a notification message to the server, and delete the business number According to.
7. the monitoring method of terminal traffic state according to claim 1, it is characterised in that the warning message is specially Alarm mail information.
CN201710426116.5A 2017-06-08 2017-06-08 The monitoring method of terminal traffic state Pending CN107040548A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710426116.5A CN107040548A (en) 2017-06-08 2017-06-08 The monitoring method of terminal traffic state

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710426116.5A CN107040548A (en) 2017-06-08 2017-06-08 The monitoring method of terminal traffic state

Publications (1)

Publication Number Publication Date
CN107040548A true CN107040548A (en) 2017-08-11

Family

ID=59541018

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710426116.5A Pending CN107040548A (en) 2017-06-08 2017-06-08 The monitoring method of terminal traffic state

Country Status (1)

Country Link
CN (1) CN107040548A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050015477A1 (en) * 2003-05-26 2005-01-20 Chih-Wei Chen Server management method and system
CN101355443A (en) * 2008-09-11 2009-01-28 浪潮齐鲁软件产业有限公司 Method for acquiring ARM terminal equipment status
CN102263673A (en) * 2010-05-27 2011-11-30 珠海格力电器股份有限公司 Gateway-based remote service system and method
EP2930644A1 (en) * 2014-04-08 2015-10-14 Fujitsu Limited Terminal device, data management server, terminal program, data management program, and data management system
CN105282157A (en) * 2015-10-22 2016-01-27 中国人民解放军装备学院 Secure communication control method
CN106776226A (en) * 2016-12-26 2017-05-31 东软集团股份有限公司 The monitoring method and device of self-aided terminal

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050015477A1 (en) * 2003-05-26 2005-01-20 Chih-Wei Chen Server management method and system
CN101355443A (en) * 2008-09-11 2009-01-28 浪潮齐鲁软件产业有限公司 Method for acquiring ARM terminal equipment status
CN102263673A (en) * 2010-05-27 2011-11-30 珠海格力电器股份有限公司 Gateway-based remote service system and method
EP2930644A1 (en) * 2014-04-08 2015-10-14 Fujitsu Limited Terminal device, data management server, terminal program, data management program, and data management system
CN105282157A (en) * 2015-10-22 2016-01-27 中国人民解放军装备学院 Secure communication control method
CN106776226A (en) * 2016-12-26 2017-05-31 东软集团股份有限公司 The monitoring method and device of self-aided terminal

Similar Documents

Publication Publication Date Title
AU2014101545A4 (en) Software behavior monitoring and verification system
CN104320377B (en) The anti-stealing link method and equipment of a kind of files in stream media
TWI587672B (en) Login authentication method, client, server and system
US8051484B2 (en) Method and security system for indentifying and blocking web attacks by enforcing read-only parameters
CN110012005B (en) Method and device for identifying abnormal data, electronic equipment and storage medium
CN103139193B (en) phishing website processing method and system
TW201824047A (en) Attack request determination method, apparatus and server
WO2014142791A1 (en) Event correlation based on confidence factor
CN104519018A (en) Method, device and system for preventing malicious requests for server
CN107046518A (en) The detection method and device of network attack
CN108063833B (en) HTTP DNS analysis message processing method and device
CN105337993A (en) Dynamic and static combination-based mail security detection device and method
CN105049232A (en) Network information log audit system
CN105743905A (en) Method, device and system for realizing security login and security equipment
EP4052417A1 (en) Security mechanisms for preventing retry or replay attacks
ITTO20130513A1 (en) SYSTEM AND METHOD FOR FILTERING ELECTRONIC MESSAGES
CN108737446A (en) Multi-party communications method based on dual identity and system
CN113660216B (en) Password attack detection method, device, electronic device and storage medium
CN108809678A (en) A kind of method and server of information push
TWI422206B (en) Tolerant key verification method
CN206619143U (en) A kind of computer network security shielding system
CN104219219B (en) A kind of method of data processing, server and system
CN107181619A (en) The monitoring system of service condition
CN104396216A (en) Methods for identifying network traffic characteristics to correlate and manage one or more subsequent flows and devices thereof
CN104348816B (en) Protect the method and the preposition gateway of Web server of cookie information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20170811

WD01 Invention patent application deemed withdrawn after publication