CN109672716B - Network equipment monitoring method, device, equipment and storage medium - Google Patents

Network equipment monitoring method, device, equipment and storage medium Download PDF

Info

Publication number
CN109672716B
CN109672716B CN201811090567.7A CN201811090567A CN109672716B CN 109672716 B CN109672716 B CN 109672716B CN 201811090567 A CN201811090567 A CN 201811090567A CN 109672716 B CN109672716 B CN 109672716B
Authority
CN
China
Prior art keywords
monitoring
monitored
network
network equipment
network device
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811090567.7A
Other languages
Chinese (zh)
Other versions
CN109672716A (en
Inventor
林明锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811090567.7A priority Critical patent/CN109672716B/en
Publication of CN109672716A publication Critical patent/CN109672716A/en
Application granted granted Critical
Publication of CN109672716B publication Critical patent/CN109672716B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0695Management of faults, events, alarms or notifications the faulty arrangement being the maintenance, administration or management system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

The invention belongs to the technical field of network monitoring, and discloses a monitoring method, a monitoring device, monitoring equipment and a storage medium of network equipment. The method comprises the following steps: acquiring a first identification number of network equipment to be monitored; generating a monitoring task acquisition request according to the first identification number and a pre-stored second identification number; sending the monitoring task acquisition request to a central server so that the central server searches storage blocks for storing each monitoring task which can be executed by the proxy server according to the second identification number, and searches the monitoring task aiming at the network equipment to be monitored from the storage blocks according to the first identification number; and receiving and executing the monitoring task issued by the central server, and acquiring monitoring data conforming to the monitoring task from the network equipment to be monitored. By the method, the problems of single monitoring mode, poor expandability and high monitoring cost of the network equipment in the prior art are solved.

Description

Network equipment monitoring method, device, equipment and storage medium
Technical Field
The present invention relates to the field of network monitoring technologies, and in particular, to a method, an apparatus, a device, and a storage medium for monitoring a network device.
Background
With the increasing scale of network environments, the number of devices accessing the network is increasing, and the variety of devices is also increasing, such as various routing switching devices, storage devices, mobile devices, and the like. The devices are distributed at each node of the network topology to form a systematic and complete computing environment, and in order to ensure the reliability and stability of the computing environment, various network devices accessing the network need to be monitored, so how to effectively monitor the various network devices becomes very important.
Currently, one commonly used monitoring method is: according to the network equipment to be monitored, the content to be monitored is planned in advance, then the monitoring task is compiled in advance and integrated into the agent program in the agent server in the area where the monitoring network equipment belongs, finally, the communication connection between the network equipment and the agent server is established, and the agent server executes the agent program integrated with the corresponding monitoring task to realize the monitoring of each network equipment. Although the monitoring mode can monitor the network device, the monitoring mode is too single and has poor expandability, so after the agent program is deployed, a monitoring task needs to be adjusted, for example, a specific monitoring item is added, and the whole agent program needs to be upgraded to replace the existing agent program in the agent server, which not only brings inconvenience to developers and operation and maintenance personnel, increases the workload of the developers and the operation and maintenance personnel, but also increases the monitoring cost.
Therefore, it is desirable to provide a monitoring method for a network device with high flexibility and scalability, so as to reduce the monitoring cost.
The above is only for the purpose of assisting understanding of the technical aspects of the present invention, and does not represent an admission that the above is prior art.
Disclosure of Invention
The invention mainly aims to provide a monitoring method, a monitoring device and a storage medium of network equipment, and aims to solve the technical problems of single monitoring mode, poor expandability and high monitoring cost of the network equipment in the prior art.
In order to achieve the above object, the present invention provides a method for monitoring a network device, the method comprising the following steps:
acquiring a first identification number of network equipment to be monitored;
generating a monitoring task obtaining request according to the first identification number and a prestored second identification number, wherein the second identification number is used for identifying a proxy server for monitoring the network equipment to be monitored;
sending the monitoring task acquisition request to a central server so that the central server searches a storage block for storing each monitoring task which can be executed by the proxy server according to the second identification number, and searches the monitoring task aiming at the network equipment to be monitored from the storage block according to the first identification number;
and receiving and executing the monitoring task issued by the central server, and acquiring monitoring data conforming to the monitoring task from the network equipment to be monitored.
Preferably, the monitoring task carries a preset network index to be monitored;
the acquiring of the monitoring data meeting the monitoring task from the network device to be monitored includes:
acquiring network index data provided by the network equipment to be monitored in different periods according to the network index to be monitored;
and taking the network index data as monitoring data conforming to the monitoring task.
Preferably, after acquiring the monitoring data meeting the monitoring task from the network device to be monitored, the method further includes:
analyzing the network index data of each time period to obtain the change rate corresponding to the network index to be monitored;
predicting whether the network equipment to be monitored is about to be abnormal or not according to the change rate and a preset early warning strategy;
and if the network equipment to be monitored is predicted to be abnormal, generating early warning information according to the change rate and the network index data of each time period.
Preferably, after generating the early warning information according to the change rate and the network index data of each time period, the method further includes:
and notifying the early warning information to a manager of the network equipment to be monitored according to a preset early warning notification mode.
Preferably, before notifying the manager of the network device to be monitored of the early warning information, the method further includes:
acquiring a first position coordinate of the network equipment to be monitored;
selecting a positioning differential base station according to the first position coordinate, and acquiring a target differential value corresponding to the positioning differential base station;
correcting the first position coordinate according to the target difference value to obtain a second position coordinate, and taking the second position coordinate as the current position coordinate of the network equipment to be monitored;
the notifying the manager of the network device to be monitored of the early warning information includes:
and informing a manager of the network equipment to be monitored of the early warning information and the current position coordinate of the network equipment to be monitored.
Preferably, after acquiring the monitoring data meeting the monitoring task from the network device to be monitored, the method further includes:
distributing a corresponding encryption key for each character in the monitoring data;
traversing each character in the monitoring data, and encrypting the current character according to an encryption key of the traversed current character based on a preset encryption algorithm to obtain an encrypted character of the current character;
and sequentially acquiring each encrypted character, acquiring encrypted data corresponding to the monitoring data according to all the acquired encrypted characters, and storing the encrypted data.
Preferably, the assigning a corresponding encryption key to each character in the monitoring data includes:
acquiring current system time as an encryption timestamp, and allocating a corresponding serial number to each character in the monitoring data, wherein the serial number is used for identifying the position of the corresponding character in the monitoring data;
and generating an encryption key of the character corresponding to the serial number according to the encryption timestamp and the serial number corresponding to each character.
In addition, in order to achieve the above object, the present invention further provides a monitoring apparatus for a network device, the apparatus including:
the first acquisition module is used for acquiring a first identification number of the network equipment to be monitored;
the generating module is used for generating a monitoring task obtaining request according to the first identification number and a prestored second identification number, wherein the second identification number is used for identifying a proxy server for monitoring the network equipment to be monitored;
the sending module is used for sending the monitoring task obtaining request to a central server so that the central server searches a storage block for storing each monitoring task which can be executed by the proxy server according to the second identification number, and searches the monitoring task aiming at the network equipment to be monitored from the storage block according to the first identification number;
the receiving module is used for receiving and executing the monitoring task issued by the central server;
and the second acquisition module is used for acquiring the monitoring data which accords with the monitoring task from the network equipment to be monitored.
In addition, to achieve the above object, the present invention further provides a monitoring device for a network device, where the monitoring device includes: a memory, a processor and a monitoring program of a network device stored on the memory and executable on the processor, the monitoring program of the network device being configured to implement the steps of the monitoring method of the network device as described above.
In addition, to achieve the above object, the present invention further provides a storage medium, in which a monitoring program of a network device is stored, and the monitoring program of the network device implements the steps of the monitoring method of the network device as described above when being executed by a processor.
The monitoring method of the network equipment provided by the invention is mainly applied to a proxy server for monitoring the network equipment to be monitored. In the scheme, when the proxy server monitors the network equipment to be monitored, a monitoring task acquisition request is generated by acquiring a first identification number for identifying the uniqueness of the network equipment to be monitored according to the acquired first identification number and a second identification number which is prestored and used for identifying the uniqueness of the local machine, and then the generated monitoring task acquisition request is sent to the central server, so that the monitoring task which is specially aimed at the network equipment to be monitored can be acquired from the central server, and finally the monitoring of the network equipment to be monitored is realized by executing the acquired monitoring task, and the monitoring data which are in accordance with the monitoring task are acquired from the network equipment to be monitored. By the monitoring mode that the monitoring tasks are separately stripped and stored in the central server according to the first identification number and the second identification number as the marks, when the network equipment to be monitored needs to be monitored, the proxy server actively acquires the corresponding monitoring tasks from the central server, so that in the monitoring process of the network equipment to be monitored, if the monitoring tasks need to be adjusted, only the monitoring tasks need to be modified, and the proxy program running in the proxy server does not need to be upgraded and replaced, thereby greatly improving the flexibility and the expansibility of the monitoring method and effectively reducing the monitoring cost.
Drawings
Fig. 1 is a schematic structural diagram of a monitoring device of a network device in a hardware operating environment according to an embodiment of the present invention;
fig. 2 is a flowchart illustrating a monitoring method for a network device according to a first embodiment of the present invention;
FIG. 3 is a flowchart illustrating a monitoring method for network devices according to a second embodiment of the present invention;
fig. 4 is a block diagram of a monitoring apparatus of a network device according to a first embodiment of the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a monitoring device of a network device in a hardware operating environment according to an embodiment of the present invention.
As shown in fig. 1, the monitoring device of the network device may include: a processor 1001, such as a Central Processing Unit (CPU), a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a WIreless interface (e.g., a WIreless-FIdelity (WI-FI) interface). The Memory 1005 may be a Random Access Memory (RAM) Memory, or may be a Non-Volatile Memory (NVM), such as a disk Memory. The memory 1005 may alternatively be a storage device separate from the processor 1001.
Those skilled in the art will appreciate that the configuration shown in fig. 1 does not constitute a limitation of the monitoring device of the network device and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a storage medium, may include therein an operating system, a data storage module, a network communication module, a user interface module, and a monitoring program of a network device.
In the monitoring device of the network device shown in fig. 1, the network interface 1004 is mainly used for data communication with the network device to be monitored and the central server; the user interface 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 in the monitoring device of the network device of the present invention may be disposed in the monitoring device of the network device, and the monitoring device of the network device calls the monitoring program of the network device stored in the memory 1005 through the processor 1001 and executes the monitoring method of the network device provided in the embodiment of the present invention.
An embodiment of the present invention provides a monitoring method for a network device, and referring to fig. 2, fig. 2 is a flowchart illustrating a first embodiment of the monitoring method for a network device according to the present invention.
In this embodiment, the monitoring method for the network device includes the following steps:
step S10, obtain the first identification number of the network device to be monitored.
Specifically, the execution main body of this embodiment is specifically a proxy server for monitoring each network device to be monitored. In addition, when the proxy server is deployed, the setting can be performed according to the area where the network devices to be monitored are distributed, and then the proxy server in the area supervises all the network devices to be monitored which can be connected with the proxy server in the area.
In addition, the proxy server can be regarded as a front-end server directly establishing communication connection with various network devices to be monitored, that is, the server is oriented to the network devices.
Accordingly, the central server appearing in step S30 is oriented to each proxy server, i.e. the central server does not cross the network device to be monitored during the whole operation process, and thus can be regarded as a back-end server.
In addition, it should be understood that, in a specific implementation, the proxy server and the central server may be both traditional physical servers (hardware server devices that need to occupy actual physical space), or may be virtual cloud servers, or may be configured by combining the two servers according to needs. In a specific implementation, a person skilled in the art may choose according to the application scenario, which is not limited herein.
In addition, in this embodiment, the network device to be monitored may specifically be a computer (no matter it is a personal computer or a server), a hub, a switch, a bridge, a router, a gateway, a Network Interface Card (NIC), a Wireless Access Point (WAP), a printer, a modem, an optical fiber transceiver, an optical cable, and the like, which are not listed here one by one, and this is not limited in this case.
Correspondingly, the first identification number is specifically used for identifying the uniqueness of the network device to be monitored, and the first identification number may be a device number set when the network device to be monitored leaves a factory.
In addition, it is worth mentioning that, in a specific implementation, the operation of obtaining the first identification number of the network device to be monitored may specifically be that, when the proxy server detects that the network device to be monitored is accessed, for example, when the proxy server receives a pairing request of any network device to be monitored within a signal coverage range of the proxy server, the proxy server passively extracts the first identification number from the received pairing request. Or after the proxy server establishes communication connection with the network device to be monitored, the proxy server actively initiates a request for acquiring the first identification number, and then the network device to be monitored feeds back the first identification number to the proxy server when responding to the request of the proxy server.
It should be noted that, the above is only an example, and the technical solution of the present invention is not limited, and in a specific implementation, a person skilled in the art may set, as needed, an operation of the proxy server to obtain the first identification number of the network device to be monitored, and the operation is not limited here.
And step S20, generating a monitoring task obtaining request according to the first identification number and a pre-stored second identification number.
Specifically, the second identification number is used to identify the uniqueness of the proxy server monitoring the network device to be monitored, that is, the second identification number is used to identify the uniqueness of the execution main body in the present application.
It should be understood that, in practical applications, the proxy server may be a physical server, and may also be a virtual cloud server. Thus, the second identification number that identifies the uniqueness of the proxy server may be different.
For example, when the obtained proxy server is a physical server, the second identification number may be a device number set by the proxy server when the proxy server leaves a factory; when the obtained proxy server is a virtual cloud server, the second identification number may be identification information set for the proxy server by a worker when deploying the function of the virtual cloud server, and the identification information is obtained by combining parameter information such as the size of a storage space of the virtual cloud server, a position coordinate of the virtual cloud server, a serial number and the like according to a preset rule.
In addition, in order to ensure that the central server can identify the information carried in the monitoring task acquisition request, a communication protocol between the central server and each proxy server may be preset, so that the generated monitoring task acquisition request can be identified by the central server.
It should be understood that in a specific implementation, the communication Protocol to be followed may specifically be a hypertext Transfer Protocol (HTTP), a firewall security session Transfer Protocol (protocols for sessions across wireless communication systems, Socks), a Transmission Control Protocol (TCP), and the like, which are not listed here, and are not limited thereto.
It should be noted that the above is only an example, and the technical solution of the present invention is not limited, and in the specific implementation, a person skilled in the art may set the technical solution as needed, and the present invention is not limited herein.
Step S30, sending the monitoring task obtaining request to a central server, so that the central server searches a storage block storing each monitoring task that the proxy server can execute according to the second identification number, and searches the monitoring task for the network device to be monitored from the storage block according to the first identification number.
Specifically, in this embodiment, the central server is configured to create respective corresponding storage blocks according to the second identification numbers of the proxy servers in communication therewith, set a monitoring task for monitoring the network device to be monitored according to the first identification number of the task to be monitored, and then store the monitoring tasks that can be executed by the corresponding proxy servers in the respective storage blocks. Through the storage mode, when the central server receives the monitoring task acquisition request, the central server can quickly position the storage block corresponding to the proxy server which sends the monitoring task acquisition request according to the second identification number carried in the monitoring task acquisition request, and then quickly extract the monitoring task for monitoring the current network equipment according to the first identification number carried in the monitoring task acquisition request.
As can be easily found from the above description, in this embodiment, the monitoring tasks used when monitoring the network devices to be monitored are separately stored in the central server, so that when the monitoring tasks for each network device to be monitored need to be adjusted at a later stage, only the monitoring tasks stored in the central server need to be modified, and the agent program deployed in the agent server and used for executing the monitoring tasks does not need to be recompiled and upgraded, thereby greatly improving the development and operation and maintenance efficiency and reducing the monitoring cost.
Step S40, receiving and executing the monitoring task issued by the central server, and acquiring monitoring data conforming to the monitoring task from the network device to be monitored.
Specifically, when the proxy server executes the monitoring task, the monitoring task is specifically implemented by a proxy program deployed on the proxy server, for example, only an interface for calling the monitoring task is set in the proxy program, and the specific content of the monitoring task is not limited.
In addition, in order to ensure the security of the data, the acquired monitoring data can be encrypted and stored in specific application. For convenience of understanding, in the embodiment, an encryption algorithm is taken as a symmetric encryption algorithm, for example, a DES encryption algorithm is taken as an example for brief description, and the specific steps are as follows:
step 1, distributing a corresponding encryption key for each character in the monitoring data.
Specifically, in this embodiment, the encryption key assigned to each character may be generated specifically in combination with the system time. For example, the current system time is obtained as an encryption timestamp, a corresponding serial number is allocated to each character in the monitoring data, and then an encryption key of the character corresponding to the serial number is generated according to the encryption timestamp and the serial number corresponding to each character.
It should be understood that the serial number is specifically used to identify the position of the corresponding character in the monitoring data, so that even if the sequence of the characters is disturbed in the subsequent encryption storage process, the characters can be restored to the original position according to the serial number corresponding to each character.
And 2, traversing each character in the monitoring data, and encrypting the current character according to the traversed encryption key of the current character based on a preset encryption algorithm (such as DES encryption algorithm) to obtain the encrypted character of the current character.
Since the use of the DES encryption algorithm is mature, regarding the specific encryption process of the DES encryption algorithm, those skilled in the art can search related data by themselves to implement the encryption process, and details are not described herein.
And 3, sequentially acquiring each encrypted character, acquiring encrypted data corresponding to the monitoring data according to all the acquired encrypted characters, and storing the encrypted data.
It should be understood that the above is only a specific implementation manner of the encryption algorithm, and the technical solution of the present invention is not limited thereto, and those skilled in the art can select a suitable encryption algorithm as needed in the specific implementation, and the present invention is not limited thereto.
In addition, it is worth mentioning that in the specific implementation, for convenience of subsequent operations, when the encrypted data is stored, the encrypted data may also be stored in blocks. Moreover, in order to further ensure data security, the encrypted data stored in each proxy server may also be periodically synchronized to the central server or other storage devices, and those skilled in the art may set the encryption mode as needed, which is not limited herein.
In the monitoring method for network devices provided in this embodiment, the monitoring task is separately stripped and stored in the central server according to the first identification number and the second identification number as the marks, when the network device to be monitored needs to be monitored, the proxy server obtains the first identification number for identifying the uniqueness of the network device to be monitored, then generates the monitoring task obtaining request according to the obtained first identification number and the second identification number which is prestored for identifying the uniqueness of the local computer, and actively sends the generated monitoring task obtaining request to the central server, so that the central server can quickly and accurately find the monitoring task suitable for the network device to be monitored and push the monitoring task to the proxy server according to the first identification number and the second identification number, and finally the proxy server executes the monitoring task which is obtained from the central server and is specially directed to the network device to be monitored, and monitoring the network equipment to be monitored, and further acquiring monitoring data which accords with the monitoring task from the network equipment to be monitored. By the monitoring method, the monitoring modes of the network equipment to be monitored by the proxy server are greatly enriched, and in the process of adjusting the monitoring tasks, the monitoring tasks only need to be modified without upgrading and replacing proxy programs running in the proxy server, so that the flexibility and expandability of the monitoring method are greatly improved, and the monitoring cost is effectively reduced.
Referring to fig. 3, fig. 3 is a flowchart illustrating a monitoring method for a network device according to a second embodiment of the present invention.
Based on the first embodiment, after step S40, the monitoring method for network devices in this embodiment further includes:
and step S50, generating early warning information according to the monitoring data, and notifying the early warning information to a manager of the network equipment to be monitored according to a preset early warning notification mode.
Specifically, in practical application, in order to better monitor the network device to be monitored, a monitoring task carrying a preset network index to be monitored may be preset, so that when the monitoring data meeting the monitoring task is obtained from the network device to be monitored, the network index data provided by the network device to be monitored is obtained in time-sharing according to the network index to be monitored, and the network index data is used as the monitoring data meeting the monitoring task. Thus, the operation performed in step S50 described above can be specifically detailed as two parts of generating the warning information and notifying the manager. For ease of understanding, the following description will be made separately for the two sections.
The operation of "generating the warning information according to the monitoring data" may be specifically implemented by the following sub-steps:
and a substep S501, analyzing the network index data of each time interval to obtain the change rate corresponding to the network index to be monitored.
For example, analyzing the network index data of each time period based on a preset analysis model to obtain an index value of the network index to be monitored in each time period; and then, calculating the change rate corresponding to the network index to be monitored according to the index value of each time period.
It should be noted that, in order to ensure that the analysis of the network index data at each time interval in the actual application can be smoothly performed, an analysis model to be applied in the analysis process needs to be constructed in advance. In addition, in order to make the subsequent prediction result more accurate, the analysis model is specifically constructed based on a deep machine learning method in the embodiment.
Specifically, the Deep learning method in this embodiment specifically uses a combination of an unsupervised learning manner (e.g., Deep Belief Networks (DBNs)) and a supervised learning manner (e.g., Convolutional Neural Networks (CNNs)) to construct the analysis model.
For the convenience of understanding, the following is a brief description of the operation of constructing the analysis model based on the deep machine learning method, and the specific steps are as follows:
(1) and constructing a first training model according to the sample data.
Specifically, the constructed first training model specifically comprises an input layer, an output layer and a plurality of hidden layers. And, a plurality of hidden layers all lie in between input layer and the output layer, adopt full connection between each layer.
In addition, in order to ensure the accuracy of the training result, a filter can be added before each layer for filtering out the interference information in the sample data.
In addition, it should be understood that in this embodiment, sample data used when the first training model is constructed may specifically be mass data stored in each big data platform, so that rich internal information and features of the data can be better carved by the constructed first training model, and a change rate corresponding to a network index to be monitored can be better predicted based on an analysis model trained by the first training model.
(2) And splitting an initial network layer of each hidden layer in the first training model into at least two sub-network layers according to a preset layering standard.
In particular, the above-mentioned layering standard is specifically used to specify the splitting of an initial network layer into at least two sub-network layers of multiple sizes.
For example, in a convolution kernel of size 5 × 5 for the initial network layer, the layering criterion may be to specify that the convolution kernel of size 5 × 5 is split into two convolution kernels of size 3 × 3.
Therefore, when the subsequent steps (3) and (4) are executed, the training model (the first training model and the second training model) split based on the initial network layer is used for training, so that the network depth of the training model can be increased, and the change rate corresponding to the network index to be monitored can be predicted accurately by the subsequently trained analysis model.
(3) And sequentially training the sub-network layers in all the hidden layers in the first training model by adopting an unsupervised training mode of ascending from bottom to top, taking the hidden layer connected with the input layer in the first training model as a starting point and the hidden layer connected with the output layer in the first training model as an end point to obtain a second training model.
Specifically, in practical application, the data for constructing the first training model may be calibrated data or uncalibrated data. The training mode of the first training model constructed according to different training data is also different, and for convenience of understanding, the training data is taken as the non-calibration data as an example and is specifically described below.
Specifically, when a sub-network layer in each hidden layer in the first training model is trained in an unsupervised training mode that ascends from bottom to top, it is necessary to train the first layer (the hidden layer connected to the input layer) first and learn parameters of the first layer. And then, after learning to obtain the parameters of the first layer, taking the output of the first layer as the input of the second layer, and so on, and after learning to obtain the n-1 th layer, taking the output of the n-1 th layer as the input of the n-th layer, training the n-th layer, thereby respectively obtaining the parameters of each layer.
Due to the limitation of the capacity of the first training model and sparsity constraint, the structure of the data can be learned in the training process, and therefore the second training model which has more expressive capability characteristics than the input training model is obtained.
It should be noted that the above is only an example, and the technical solution of the present invention is not limited, and in the specific implementation, a person skilled in the art may select training data to train according to needs, and the present invention is not limited herein.
(4) And training the sub-network layers in all the hidden layers in the second training model in sequence by adopting a top-down supervision training mode and taking the hidden layer connected with the output layer in the second training model as a starting point and the hidden layer connected with the input layer in the second training model as an end point to obtain the analysis model.
Specifically, each layer in the second training model obtained by training in the step (3) is trained in a top-down supervision training mode, so that errors are transmitted from top to bottom, fine adjustment of the whole network is achieved, and an analysis model with a better effect is obtained.
It should be understood that, regarding the specific usage of the above-mentioned unsupervised learning manner and supervised learning manner, those skilled in the art can implement this by looking up relevant information, and details are not described herein.
And a substep S502, predicting whether the network equipment to be monitored is about to be abnormal or not according to the change rate and a preset early warning strategy.
Specifically, the early warning policy is a preset early warning policy, and when the change rate meets a certain condition, it is considered that the network device to be monitored may be abnormal, and a corresponding early warning needs to be triggered.
For example, in the continuous time, the number of Address Resolution Protocols (ARP) processed by the network device to be monitored (e.g., a switch) at time t1 is n1, the number of ARP processed by the network device to be monitored at time t2 is n2, and the number of ARP processed by the network device to be monitored at time t3 is n 3. The set early warning strategy is as follows: and if each time point is increased by more than 20% from the time t1 to the time t2, and from the time t2 to the time t3, predicting that the network equipment to be monitored is increased according to the current change rate and an abnormity is about to occur.
It should be noted that, the above is only an example, and the technical solution of the present invention is not limited at all, and a person skilled in the art may set an early warning policy as needed, and the present invention is not limited here.
And a substep S503, if it is predicted that the network equipment to be monitored will be abnormal, generating early warning information according to the change rate and the network index data of each time period.
Specifically, when the network device to be monitored is predicted to be abnormal, the early warning information is generated according to the change rate and the network index data of each time period, so that the early warning information can more clearly reflect the current situation of the network device to be monitored.
In addition, regarding the operation of "notifying the administrator of the network device to be monitored of the warning information according to a preset warning notification manner", the following is a general description of possible problems:
it should be understood that the above-mentioned warning notification manner may be a notification manner such as a short message, an email, etc., which is not listed here any more, and is not limited to this.
Specifically, when the notification mode is adopted and the manager of the network device to be monitored is notified of the early warning information, in order to notify the manager more quickly, a corresponding template can be set for the set notification mode in advance, so that after the early warning information is obtained, the early warning information is directly input into the template and then sent to a mobile phone number or a mailbox reserved by the manager.
In addition, in order to enable the manager to check the early warning information in time, a countermeasure is made in time against possible abnormality of the network device to be monitored, such as modifying a monitoring task for the network device to be monitored, remotely adjusting parameters of the network device to be monitored, or directly checking the condition of the network device to be monitored on site. After the early warning information is sent to the device which receives the early warning information by the manager, the device which receives the early warning information can be controlled to give early warnings such as ringing, vibration, screen flicker and the like.
In addition, it is worth mentioning that the above-mentioned manager may be a supervisor who specially monitors the network device to be monitored, for example, when the network device to be monitored is a server of an enterprise, the supervisor may be an operation and maintenance person of the enterprise; or may be a user or an owner of the device to be monitored, for example, when the network device to be monitored is any user terminal, the administrator is the owner of the user terminal.
It should be noted that the above is only an example, and the technical solution of the present invention is not limited at all, and those skilled in the art can set the solution as needed, and the present invention is not limited herein.
In addition, in order to facilitate the manager to timely and accurately arrive at the location of the to-be-monitored device after receiving the early warning information, the manager of the to-be-monitored network device can send the position coordinates of the to-be-monitored network device to the manager together when the manager of the to-be-monitored network device is informed of the early warning information.
Accordingly, in order to send the location coordinates of the network device to be monitored to the administrator when the administrator of the network device to be monitored is notified of the warning information, the location coordinates of the network device to be monitored need to be obtained first when it is predicted that the network device to be monitored will be abnormal. Meanwhile, in order to ensure that the position coordinates sent to the manager are accurate enough, the acquired position coordinates of the network equipment to be monitored can be corrected.
For ease of understanding, a specific manner is given below for illustration:
first, a first position coordinate of the network device to be monitored is obtained.
Specifically, if the network device to be monitored is fixed and does not move, the acquired first position coordinate is a preset position coordinate when the network device to be monitored is initially deployed; if the network device to be monitored is movable, the acquired first position coordinate may specifically be a real-time position coordinate acquired by a satellite positioning module inside the network device to be monitored.
And then, selecting a positioning differential base station according to the first position coordinate, and acquiring a target differential value corresponding to the positioning differential base station.
Specifically, the positioning differential base station may be a device that performs positioning correction processing by using a dedicated positioning device prepared by a Real-time kinematic (RTK) carrier-phase differential technique, and the position coordinate of the positioning differential base station may be an absolute position coordinate.
And finally, correcting the first position coordinate according to the target difference value to obtain a second position coordinate, and taking the second position coordinate as the current position coordinate of the network equipment to be monitored.
That is, the target differential value is added or subtracted on the basis of the first position coordinates so that the accuracy of the first position coordinates can be the same as the absolute position coordinates of the positioning differential base station.
In addition, it is worth mentioning that, in order to reduce unnecessary investment, the positioning differential base station in this embodiment may specifically select a common street lamp. This is because, in current urban construction, street lamps are essential basic devices, and in order to facilitate maintenance and management of street lamps installed in different areas, coordinate information where street lamps are located is usually set in street lamps, and in order to ensure accuracy of street lamps, when street lamps are installed, special positioning devices prepared by Real-time kinematic (RTK) carrier phase difference division technology are also used to calibrate coordinates of street lamps, so that absolute position coordinates of street lamps can be determined. Therefore, in this embodiment, the street lamp with the absolute position coordinate is selected as the positioning differential base station, and the correction of the first position coordinate of the network device to be monitored can be achieved without increasing capital investment, so that the absolute position coordinate of the network device to be monitored is obtained, and thus it is ensured that a manager can quickly find the network device to be monitored.
For convenience of understanding, the operation performed when the positioning differential base station is selected according to the first position coordinate when the positioning differential base station is a street lamp is briefly described below.
For example, the street lamp closest to the first position coordinate may be searched according to the first position coordinate, and the street lamp closest to the first position coordinate is determined as the positioning differential base station.
Furthermore, it should be understood that, in a specific application, the above-mentioned finding the street lamp closest to the first position coordinate according to the first position coordinate may be implemented by: acquiring position coordinates of all street lamps in a preset area, wherein the preset area is determined by taking the first position coordinate as a circle center and a preset length as a radius; comparing the first position coordinate with the acquired position coordinates of each street lamp, and determining the position coordinate closest to the first position coordinate; and taking the street lamp corresponding to the determined position coordinate as the street lamp closest to the first position coordinate.
It should be noted that the above is only an example, and the technical solution of the present invention is not limited at all, and those skilled in the art may divide the functional modules included in the apparatus for predicting the abnormality of the network device as needed, and the present invention is not limited here.
According to the monitoring method of the network equipment, the change rate capable of reflecting the change condition of the preset network index to be monitored in the equipment to be monitored is obtained by analyzing the data of the network index to be monitored in a plurality of time periods, and then the obtained change rate and the preset early warning strategy are used as the prediction standard for monitoring whether the abnormality occurs in the network equipment to be monitored, so that whether the abnormality occurs in the near future or not can be predicted if the network equipment to be monitored develops according to the current change rate, and the purposes of predicting the abnormality of the network equipment to be monitored in advance and finding the equipment fault in advance are achieved.
In addition, after it is predicted that the network equipment to be monitored may be abnormal soon, the early warning information generated according to the change rate and the network index data of each time period is notified to the administrator of the network equipment to be monitored, which may be abnormal, according to a preset early warning notification mode, so that the administrator can take measures for dealing with the possible abnormality of the network equipment to be monitored in advance according to the early warning information, reduce the damage and loss caused by the abnormality to the network equipment to be monitored, other network equipment communicated with the network equipment to be monitored, an accessed network and the like as much as possible, and prevent the network equipment from being suffered in the future.
In addition, an embodiment of the present invention further provides a storage medium, where a monitoring program of a network device is stored on the storage medium, and the monitoring program of the network device, when executed by a processor, implements the steps of the monitoring method of the network device as described above.
Referring to fig. 4, fig. 4 is a block diagram of a monitoring apparatus of a network device according to a first embodiment of the present invention.
As shown in fig. 4, a monitoring apparatus for a network device according to an embodiment of the present invention includes: a first acquisition module 4001, a generation module 4002, a sending module 4003, a receiving module 4004, and a second acquisition module 5005.
The first obtaining module 4001 is configured to obtain a first identification number of a network device to be monitored. A generating module 4002, configured to generate a monitoring task obtaining request according to the first identification number and a pre-stored second identification number, where the second identification number is used to identify a proxy server that monitors the network device to be monitored. A sending module 4003, configured to send the monitoring task obtaining request to a central server, so that the central server searches, according to the second identification number, a storage block in which each monitoring task that the proxy server can execute is stored, and searches, according to the first identification number, a monitoring task for the network device to be monitored from the storage block. A receiving module 4004, configured to receive and execute the monitoring task issued by the central server. A second obtaining module 4005, configured to obtain, from the network device to be monitored, monitoring data that conforms to the monitoring task.
It should be understood that, in practical applications, in order to better monitor the network device to be monitored, a monitoring task may be preset to carry a preset network index to be monitored, so that when the second obtaining module 4005 obtains the monitoring data meeting the monitoring task from the network device to be monitored, the network index data provided by the network device to be monitored is obtained in time segments according to the network index to be monitored, and the network index data is used as the monitoring data meeting the monitoring task.
In addition, in order to ensure the security of the data, the acquired monitoring data can be encrypted and stored in specific application.
Correspondingly, the monitoring apparatus of the network device may further include: the device comprises an encryption module and a storage module.
Specifically, the encryption module is configured to assign a corresponding encryption key to each character in the monitoring data; traversing each character in the monitoring data, and encrypting the current character according to an encryption key of the traversed current character based on a preset encryption algorithm to obtain an encrypted character of the current character; and sequentially acquiring each encrypted character, and acquiring encrypted data corresponding to the monitoring data according to all the acquired encrypted characters.
The storage module is used for storing the encrypted data.
Furthermore, it is worth mentioning that, in order to facilitate understanding of the operation of "assigning a corresponding encryption key to each character in the monitoring data" performed by the encryption module in the process of encrypting the monitoring data, a specific way of assigning encryption keys is given below, which is roughly as follows:
firstly, acquiring current system time as an encryption timestamp, and allocating a corresponding serial number to each character in the monitoring data, wherein the serial number is used for identifying the position of the corresponding character in the monitoring data; and then, generating an encryption key of the character corresponding to the serial number according to the encryption timestamp and the serial number corresponding to each character.
It should be understood that the above is only a specific implementation manner for generating the encryption key, and the technical solution of the present invention is not limited thereto, and in the specific implementation, a person skilled in the art may select a suitable encryption algorithm as needed to determine a suitable encryption key generation manner, which is not limited herein.
In the monitoring apparatus for network device provided in this embodiment, the monitoring task is separately stripped and stored in the central server according to the first identification number and the second identification number as the marks, when the network device to be monitored needs to be monitored, the proxy server obtains the first identification number for identifying the uniqueness of the network device to be monitored, then generates the monitoring task obtaining request according to the obtained first identification number and the second identification number which is prestored for identifying the uniqueness of the local computer, and actively sends the generated monitoring task obtaining request to the central server, so that the central server can quickly and accurately find the monitoring task suitable for the network device to be monitored and push the monitoring task to the proxy server according to the first identification number and the second identification number, and finally the proxy server executes the monitoring task which is obtained from the central server and is specially directed to the network device to be monitored, and monitoring the network equipment to be monitored, and further acquiring monitoring data which accords with the monitoring task from the network equipment to be monitored. By the monitoring method, the monitoring modes of the network equipment to be monitored by the proxy server are greatly enriched, and in the process of adjusting the monitoring tasks, the monitoring tasks only need to be modified without upgrading and replacing proxy programs running in the proxy server, so that the flexibility and expandability of the monitoring method are greatly improved, and the monitoring cost is effectively reduced.
It should be noted that the above-described work flows are only exemplary, and do not limit the scope of the present invention, and in practical applications, a person skilled in the art may select some or all of them to achieve the purpose of the solution of the embodiment according to actual needs, and the present invention is not limited herein.
In addition, the technical details that are not described in detail in this embodiment may refer to the monitoring method of the network device provided in any embodiment of the present invention, and are not described herein again.
Based on the first embodiment of the monitoring apparatus for network devices, a second embodiment of the monitoring apparatus for network devices of the present invention is provided.
In this embodiment, the monitoring apparatus of the network device further includes: the device comprises an analysis module, a prediction module, an early warning information generation module and an early warning information sending module.
The analysis module is used for analyzing the network index data of each time period to obtain the change rate corresponding to the network index to be monitored.
And the test module is used for predicting whether the network equipment to be monitored is about to be abnormal or not according to the change rate and a preset early warning strategy.
And the early warning information generating module is used for generating early warning information according to the change rate and the network index data of each time period when the to-be-monitored network equipment is predicted to be abnormal. And the early warning information sending module is used for notifying the management personnel of the network equipment to be monitored of the early warning information according to a preset early warning notification mode.
In addition, in order to facilitate the manager to timely and accurately arrive at the location of the device to be monitored after receiving the early warning information, the monitoring device of the network device may further include a position information obtaining module. And the position information acquisition module is used for acquiring the position coordinates of the network equipment to be monitored.
Correspondingly, the early warning information sending module is also used for sending the position coordinates of the network equipment to be monitored to the manager together.
In addition, in order to send the location coordinates of the network device to be monitored to the administrator when the administrator of the network device to be monitored is notified of the warning information, the location coordinates of the network device to be monitored need to be obtained first when it is predicted that the network device to be monitored will be abnormal. Meanwhile, in order to ensure that the position coordinates sent to the manager are accurate enough, the acquired position coordinates of the network equipment to be monitored can be corrected.
For ease of understanding, a specific manner is given below for illustration:
first, a first position coordinate of the network device to be monitored is obtained.
Specifically, if the network device to be monitored is fixed and does not move, the acquired first position coordinate is a preset position coordinate when the network device to be monitored is initially deployed; if the network device to be monitored is movable, the acquired first position coordinate may specifically be a real-time position coordinate acquired by a satellite positioning module inside the network device to be monitored.
And then, selecting a positioning differential base station according to the first position coordinate, and acquiring a target differential value corresponding to the positioning differential base station.
Specifically, the positioning differential base station may be a device that performs positioning correction processing by using a dedicated positioning device prepared by a Real-time kinematic (RTK) carrier-phase differential technique, and the position coordinate of the positioning differential base station may be an absolute position coordinate.
And finally, correcting the first position coordinate according to the target difference value to obtain a second position coordinate, and taking the second position coordinate as the current position coordinate of the network equipment to be monitored.
That is, the target differential value is added or subtracted on the basis of the first position coordinates so that the accuracy of the first position coordinates can be the same as the absolute position coordinates of the positioning differential base station.
It should be noted that, the above is only an example, and the technical solution of the present invention is not limited at all, and a person skilled in the art may divide the functional modules included in the monitoring apparatus of the network device as needed, and the present invention is not limited here.
The monitoring device for network equipment provided by this embodiment obtains the change rate capable of reflecting the change condition of the preset network index to be monitored in the equipment to be monitored by analyzing the data of the network index to be monitored in a plurality of time periods, and then uses the obtained change rate and the preset early warning strategy as the prediction standard for monitoring whether the network equipment to be monitored is abnormal or not, so that whether the network equipment to be monitored is abnormal or not in the near future or not can be predicted if the network equipment to be monitored is developed according to the current change rate, thereby realizing the purposes of predicting the abnormality of the network equipment to be monitored in advance and discovering the equipment fault in advance.
In addition, after it is predicted that the network equipment to be monitored may be abnormal soon, the early warning information generated according to the change rate and the network index data of each time period is notified to the administrator of the network equipment to be monitored, which may be abnormal, according to a preset early warning notification mode, so that the administrator can take measures for dealing with the possible abnormality of the network equipment to be monitored in advance according to the early warning information, reduce the damage and loss caused by the abnormality to the network equipment to be monitored, other network equipment communicated with the network equipment to be monitored, an accessed network and the like as much as possible, and prevent the network equipment from being suffered in the future.
It should be noted that the above-described work flows are only exemplary, and do not limit the scope of the present invention, and in practical applications, a person skilled in the art may select some or all of them to achieve the purpose of the solution of the embodiment according to actual needs, and the present invention is not limited herein.
In addition, the technical details that are not described in detail in this embodiment may refer to the monitoring method of the network device provided in any embodiment of the present invention, and are not described herein again.
Further, it is to be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention or portions thereof that contribute to the prior art may be embodied in the form of a software product, where the computer software product is stored in a storage medium (e.g. Read Only Memory (ROM)/RAM, magnetic disk, optical disk), and includes several instructions for enabling a terminal device (e.g. a mobile phone, a computer, a server, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A method for monitoring a network device, the method comprising:
acquiring a first identification number of network equipment to be monitored;
generating a monitoring task obtaining request according to the first identification number and a prestored second identification number, wherein the second identification number is used for identifying a proxy server for monitoring the network equipment to be monitored;
sending the monitoring task acquisition request to a central server so that the central server searches a storage block for storing each monitoring task which can be executed by the proxy server according to the second identification number, and searches the monitoring task aiming at the network equipment to be monitored from the storage block according to the first identification number;
and receiving and executing the monitoring task issued by the central server, and acquiring monitoring data conforming to the monitoring task from the network equipment to be monitored.
2. The method of claim 1, wherein the monitoring task carries a preset network index to be monitored;
the acquiring of the monitoring data meeting the monitoring task from the network device to be monitored includes:
acquiring network index data provided by the network equipment to be monitored in different periods according to the network index to be monitored;
and taking the network index data as monitoring data conforming to the monitoring task.
3. The method of claim 2, wherein after obtaining the monitoring data conforming to the monitoring task from the network device to be monitored, the method further comprises:
analyzing the network index data of each time period to obtain the change rate corresponding to the network index to be monitored;
predicting whether the network equipment to be monitored is about to be abnormal or not according to the change rate and a preset early warning strategy;
and if the network equipment to be monitored is predicted to be abnormal, generating early warning information according to the change rate and the network index data of each time period.
4. The method of claim 3, wherein after generating early warning information based on the rate of change and the network metric data for each time period, the method further comprises:
and notifying the early warning information to a manager of the network equipment to be monitored according to a preset early warning notification mode.
5. The method of claim 4, wherein before notifying the administrator of the network device to be monitored of the early warning information, the method further comprises:
acquiring a first position coordinate of the network equipment to be monitored;
selecting a positioning differential base station according to the first position coordinate, and acquiring a target differential value corresponding to the positioning differential base station;
correcting the first position coordinate according to the target difference value to obtain a second position coordinate, and taking the second position coordinate as the current position coordinate of the network equipment to be monitored;
the notifying the manager of the network device to be monitored of the early warning information includes:
and informing a manager of the network equipment to be monitored of the early warning information and the current position coordinate of the network equipment to be monitored.
6. The method according to any one of claims 1 to 5, wherein after acquiring the monitoring data conforming to the monitoring task from the network device to be monitored, the method further comprises:
distributing a corresponding encryption key for each character in the monitoring data;
traversing each character in the monitoring data, and encrypting the current character according to an encryption key of the traversed current character based on a preset encryption algorithm to obtain an encrypted character of the current character;
and sequentially acquiring each encrypted character, acquiring encrypted data corresponding to the monitoring data according to all the acquired encrypted characters, and storing the encrypted data.
7. The method of claim 6, wherein said assigning a corresponding encryption key to each character in said monitoring data comprises:
acquiring current system time as an encryption timestamp, and allocating a corresponding serial number to each character in the monitoring data, wherein the serial number is used for identifying the position of the corresponding character in the monitoring data;
and generating an encryption key of the character corresponding to the serial number according to the encryption timestamp and the serial number corresponding to each character.
8. An apparatus for monitoring a network device, the apparatus comprising:
the first acquisition module is used for acquiring a first identification number of the network equipment to be monitored;
the generating module is used for generating a monitoring task obtaining request according to the first identification number and a prestored second identification number, wherein the second identification number is used for identifying a proxy server for monitoring the network equipment to be monitored;
the sending module is used for sending the monitoring task obtaining request to a central server so that the central server searches a storage block for storing each monitoring task which can be executed by the proxy server according to the second identification number, and searches the monitoring task aiming at the network equipment to be monitored from the storage block according to the first identification number;
the receiving module is used for receiving and executing the monitoring task issued by the central server;
and the second acquisition module is used for acquiring the monitoring data which accords with the monitoring task from the network equipment to be monitored.
9. A monitoring device for a network device, the device comprising: memory, processor and a monitoring program of a network device stored on the memory and executable on the processor, the monitoring program of a network device being configured to implement the steps of the monitoring method of a network device according to any of claims 1 to 7.
10. A storage medium, characterized in that the storage medium stores thereon a monitoring program of a network device, which when executed by a processor implements the steps of the monitoring method of a network device according to any one of claims 1 to 7.
CN201811090567.7A 2018-09-18 2018-09-18 Network equipment monitoring method, device, equipment and storage medium Active CN109672716B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811090567.7A CN109672716B (en) 2018-09-18 2018-09-18 Network equipment monitoring method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811090567.7A CN109672716B (en) 2018-09-18 2018-09-18 Network equipment monitoring method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109672716A CN109672716A (en) 2019-04-23
CN109672716B true CN109672716B (en) 2022-02-01

Family

ID=66142411

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811090567.7A Active CN109672716B (en) 2018-09-18 2018-09-18 Network equipment monitoring method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109672716B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114553740B (en) * 2022-03-11 2023-11-10 以萨技术股份有限公司 Method, system, readable storage medium and device for cross-network monitoring

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101847116A (en) * 2010-05-05 2010-09-29 中兴通讯股份有限公司 Monitoring system based on J2EE framework and method
WO2012073233A1 (en) * 2010-11-29 2012-06-07 Biocatch Ltd. Method and device for confirming computer end-user identity
CN106611000A (en) * 2015-10-26 2017-05-03 北京神州泰岳软件股份有限公司 Method, device and system for searching resource object
CN106888256A (en) * 2017-02-21 2017-06-23 广州神马移动信息科技有限公司 Distributed monitoring system and its monitoring and dispatching method and device
CN108494876A (en) * 2018-04-12 2018-09-04 北京达佳互联信息技术有限公司 Realize method, apparatus, plug-in component equipment and the proxy server of service gray scale publication

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101847116A (en) * 2010-05-05 2010-09-29 中兴通讯股份有限公司 Monitoring system based on J2EE framework and method
WO2012073233A1 (en) * 2010-11-29 2012-06-07 Biocatch Ltd. Method and device for confirming computer end-user identity
CN106611000A (en) * 2015-10-26 2017-05-03 北京神州泰岳软件股份有限公司 Method, device and system for searching resource object
CN106888256A (en) * 2017-02-21 2017-06-23 广州神马移动信息科技有限公司 Distributed monitoring system and its monitoring and dispatching method and device
CN108494876A (en) * 2018-04-12 2018-09-04 北京达佳互联信息技术有限公司 Realize method, apparatus, plug-in component equipment and the proxy server of service gray scale publication

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"On defining an hierarchical Secure proxy agent architecture for embedded communication network applications";Dimitrios A. Karras;《 2012 20th Telecommunications Forum (TELFOR)》;20121122;全文 *
"云环境下分布式监控系统设计与实现";陈博;《中国优秀硕士学位论文全文数据库 (信息科技辑)》;20160531;I140-301 *
"适用异构计算环境中监控软件系统的研究与实践";何东阳;《中国优秀博硕士学位论文全文数据库(硕士)信息科技辑》;20120731;I140-1119 *

Also Published As

Publication number Publication date
CN109672716A (en) 2019-04-23

Similar Documents

Publication Publication Date Title
CN109660419B (en) Method, device, equipment and storage medium for predicting abnormity of network equipment
Wen et al. Fog orchestration for internet of things services
US10445069B2 (en) System and method for generating an application structure for an application in a computerized organization
Sicari et al. A secure and quality-aware prototypical architecture for the Internet of Things
CN109639516B (en) Monitoring method, device, equipment and storage medium of distributed network system
JP2018106684A5 (en)
CN105099988B (en) Method, access method and device and system for supporting gray scale to issue
EP3798839A1 (en) Log analysis in vector space
US20180034847A1 (en) Regeneration and generational mutation for security and fidelity in software defined networks
CN106888106A (en) The extensive detecting system of IT assets in intelligent grid
CN106911648B (en) Environment isolation method and equipment
US20200389477A1 (en) Automatic identification of roles and connection anomalies
CN112367684B (en) Flow control method, device, storage medium and computer equipment
EP3544330B1 (en) System and method for validating correctness of changes to network device configurations
CN106790131B (en) Parameter modification method and device and distributed platform
CN105978844A (en) Network access control method, router and system based on router
CN108877188B (en) Environment-friendly data concurrent acquisition and multi-network publishing method and device
CN111083187A (en) Industrial application service processing method and system
US20140156820A1 (en) Configuration information selection based on extracted information
CN111935167A (en) Illegal external connection detection method, device, equipment and storage medium for industrial control
CN109672716B (en) Network equipment monitoring method, device, equipment and storage medium
CN106909197B (en) Virtualization host time management method and virtualization host system
CN105530323B (en) File upgrading method, related equipment and system
CN102141996A (en) Data access method and configuration management database system
CN114615066A (en) Target path determination method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant