CN110011873A - A kind of working state detecting method, device and the medium of no IP device - Google Patents

A kind of working state detecting method, device and the medium of no IP device Download PDF

Info

Publication number
CN110011873A
CN110011873A CN201910290866.3A CN201910290866A CN110011873A CN 110011873 A CN110011873 A CN 110011873A CN 201910290866 A CN201910290866 A CN 201910290866A CN 110011873 A CN110011873 A CN 110011873A
Authority
CN
China
Prior art keywords
packet
target
equipment
data packet
response information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910290866.3A
Other languages
Chinese (zh)
Other versions
CN110011873B (en
Inventor
郭刚
于腾飞
郭经宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Yuweng Information Technology Co ltd
Original Assignee
SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd filed Critical SHANDONG YUWENG INFORMATION TECHNOLOGY Co Ltd
Priority to CN201910290866.3A priority Critical patent/CN110011873B/en
Publication of CN110011873A publication Critical patent/CN110011873A/en
Application granted granted Critical
Publication of CN110011873B publication Critical patent/CN110011873B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention discloses working state detecting method, device and the computer readable storage mediums of a kind of no IP device to be handled according to preset data conversion rule initial data packets, obtains the identifiable target packet of no IP device;Initial data packets and target packet are sent to pre-stored access address.In the case of equipment normal operation, no IP device can filter out initial data packets, and the relevant device without IP device only receives target packet at this time, correspondingly, only feeding back target response information corresponding with target packet to equipment management system without IP device.When receiving only target response information corresponding with target packet, then equipment normal operation is determined.When not receiving only target response information corresponding with target packet, then determine that equipment is operating abnormally.Type according to response message may determine that the working condition of equipment, realize the automatic detection of the working condition to no IP device.

Description

A kind of working state detecting method, device and the medium of no IP device
Technical field
The present invention relates to network security management technical fields, more particularly to a kind of working condition detection side of no IP device Method, device and computer readable storage medium.
Background technique
No IP network equipment is commonly used in network security detection, such as firewall, the stealthy equipment such as black box.No IP network is set Standby is a kind of access control scale executed in two network communications, it can allow the people of your " agreement " and data to enter yours Network, while the people of your " disagreeing " and data being kept outside of the door, prevent the hacker in network to the maximum extent to access yours Network.No IP network equipment has good protective effect, and invader must pass through the security perimeter of no IP network equipment first, The relevant device of no IP network equipment can just be touched.
It is fixed that management at present without IP network equipment is typically based on network administrator or the system manager scene of carrying out to it Phase checks management, needs to spend more human resources, causes maintenance cost higher.
It is those skilled in the art's urgent problem to be solved as it can be seen that how to reduce the maintenance cost of no IP device.
Summary of the invention
The purpose of the embodiment of the present invention is that the working state detecting method, device and the computer that provide a kind of no IP device can Storage medium is read, the maintenance cost of no IP device can be reduced.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of working state detecting method of no IP device, packet It includes:
According to preset data conversion rule, initial data packets are handled, it is identifiable to obtain no IP device Target packet;
The initial data packets and the target packet are sent to pre-stored access address;Wherein, the visit Ask that address is the address of the relevant device of the no IP device;
Judge whether to receive only target response information corresponding with the target packet;
If so, determining equipment normal operation;
If it is not, then determining that equipment is operating abnormally.
Optionally, the no IP device is the equipment being filtered to clear data packet;
Correspondingly, the initial data packets are clear data packet;The target packet is ciphertext data packet;
Described to be handled according to preset data conversion rule initial data packets, obtaining no IP device can know Other target packet includes:
According to preset data encryption algorithm, clear data packet is encrypted, obtaining no IP device can know Other ciphertext data packet.
Optionally, described to judge whether to receive only target response information corresponding with the target packet;If so, Then determine equipment normal operation;If it is not, then determining that equipment operation exception includes:
Judge whether to receive target response information corresponding with the ciphertext data packet and receives and stated clearly The corresponding plaintext response message of literary data packet;
When receiving only target response information corresponding with the ciphertext data packet, do not receive and the clear data When wrapping corresponding plaintext response message, then the no IP device and the relevant device normal operation are determined;
When receiving only plaintext response message corresponding with the clear data packet, do not receive and the ciphertext data When wrapping corresponding target response information, then determine that the no IP device is operating abnormally;
When not receiving target response information corresponding with the ciphertext data packet, and do not receive and the plaintext When the corresponding plaintext response message of data packet, then determine that equipment is operating abnormally;Wherein the equipment be the no IP device and/ Or the relevant device.
Optionally, described to send the initial data packets and the target packet packet to pre-stored access address It includes:
At set time intervals, the initial data packets and institute periodically are sent to pre-stored access address State target packet.
Optionally, after judgement equipment operation exception further include:
Record log information.
Optionally, after judgement equipment operation exception further include:
Carry out alarm prompt.
The embodiment of the invention also provides a kind of working state detection devices of no IP device, including processing unit, transmission Unit, judging unit, the first judging unit and the second judging unit;
The processing unit, for handling initial data packets, obtaining according to preset data conversion rule Without the identifiable target packet of IP device;
The transmission unit, for sending the initial data packets and the number of targets to pre-stored access address According to packet;Wherein, the access address is the address of the relevant device of the no IP device;
The judging unit receives only target response letter corresponding with the target packet for judging whether Breath;If so, triggering first judging unit;If it is not, then triggering second judging unit;
First judging unit, for determining equipment normal operation;
Second judging unit, for determining that equipment is operating abnormally.
Optionally, the no IP device is the equipment being filtered to clear data packet;
Correspondingly, the initial data packets are clear data packet;The target packet is ciphertext data packet;
The processing unit is specifically used for carrying out at encryption clear data packet according to preset data encryption algorithm Reason, obtains the identifiable ciphertext data packet of no IP device.
Optionally, the judging unit is specifically used for judging whether to receive target corresponding with the ciphertext data packet Response message and receive plaintext response message corresponding with the clear data packet;
First judging unit, which is specifically used for working as, receives only target response letter corresponding with the ciphertext data packet Breath when not receiving plaintext response message corresponding with the clear data packet, then determines the no IP device and described Relevant device normal operation;
First judging unit, which is specifically used for working as, receives only plaintext response letter corresponding with the clear data packet Breath when not receiving target response information corresponding with the ciphertext data packet, then determines that the no IP device is operating abnormally; When not receiving target response information corresponding with the ciphertext data packet, and do not receive and the clear data packet phase When corresponding plaintext response message, then determine that equipment is operating abnormally;Wherein the equipment is the no IP device and/or the phase Answer equipment.
Optionally, the transmission unit is specifically used at set time intervals, periodically to pre-stored access Address sends the initial data packets and the target packet.
It optionally, further include recording unit;
The recording unit is used for after judgement equipment operation exception, record log information.
It optionally, further include prompt unit;
The prompt unit, for carrying out alarm prompt after judgement equipment operation exception.
The embodiment of the invention also provides a kind of working state detection devices of no IP device, comprising:
Memory, for storing computer program;
Processor, for executing the computer program to realize such as the working state detecting method of above-mentioned no IP device Step.
The embodiment of the invention also provides a kind of computer readable storage medium, deposited on the computer readable storage medium Computer program is contained, the working condition detection side such as above-mentioned no IP device is realized when the computer program is executed by processor The step of method.
According to preset data conversion rule it can be seen from above-mentioned technical proposal, at initial data packets Reason, obtains the identifiable target packet of no IP device;No IP device is equivalent to the filter for the relevant device that it is managed, can To filter out the data for not meeting security request data.Initial data packets and number of targets are sent to pre-stored access address According to packet;Wherein, access address is the address of the relevant device without IP device.In the case of equipment normal operation, no IP device can mistake Initial data packets are filtered, relevant device only receives target packet at this time, correspondingly, without IP device only to equipment management system Feed back target response information corresponding with target packet.Judge whether to receive only target corresponding with target packet Response message;When receiving only target response information corresponding with target packet, then explanation is without IP device and its corresponding Equipment can operate normally, and can be determined that equipment normal operation at this time.It is corresponding with target packet when not receiving only When target response information, then explanation is operating abnormally without IP device or its relevant device, determines that equipment is operating abnormally at this time.At this In technical solution, according to the functional characteristic of no IP device, to relevant device transmission without the identifiable target packet of IP device with And the initial data packets that can be filtered out without IP device, the type according to response message can judge the working condition of equipment, The automatic detection for realizing the working condition to no IP device effectively reduces the maintenance cost of no IP device.
Detailed description of the invention
In order to illustrate the embodiments of the present invention more clearly, attached drawing needed in the embodiment will be done simply below It introduces, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ordinary skill people For member, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow chart of the working state detecting method of no IP device provided in an embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of the working state detection device of no IP device provided in an embodiment of the present invention;
Fig. 3 is a kind of hardware configuration signal of working state detection device of no IP device provided in an embodiment of the present invention Figure.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, rather than whole embodiments.Based on this Embodiment in invention, those of ordinary skill in the art are without making creative work, obtained every other Embodiment belongs to the scope of the present invention.
In order to enable those skilled in the art to better understand the solution of the present invention, with reference to the accompanying drawings and detailed description The present invention is described in further detail.
Next, a kind of working state detecting method of no IP device provided by the embodiment of the present invention is discussed in detail.Fig. 1 For a kind of flow chart of the working state detecting method of no IP device provided in an embodiment of the present invention, this method comprises:
S101: according to preset data conversion rule, being handled initial data packets, and obtaining no IP device can know Other target packet.
Include relevant device in an Intranet system and is set for what is be managed and protect to relevant device without IP It is standby.Wherein, the relevant device of no IP device, which can be in the Intranet equipment or outer net that no IP device is managed, transfers to no IP to set The equipment of standby management.
The equipment that no IP device either can be used to be filtered clear data packet for firewall.For the ease of retouching It states, explanation is unfolded by taking the equipment being filtered to clear data packet as an example in embodiments of the present invention.
It needs to pass through the transfer without IP device when outer net equipment transmits data to relevant device, no IP device can filter Fall not meeting the data of security request data.
Data conversion rule is used to indicate to be converted to initial data packets the behaviour of the identifiable target packet of no IP device Make step.When no IP device receives unrecognizable data packet, can filter this out namely these unrecognizable data Packet will not be transmitted to relevant device.
S102: initial data packets and target packet are sent to pre-stored access address.
Wherein, access address is the address of the relevant device without IP device.
In practical applications, the management system of no IP device can send an initial number to pre-stored access address According to packet and target packet, to realize the detection to no IP device and its relevant device current operating conditions.
In view of under the different time stage, the operating status of no IP device and relevant device may change, this It is influenced outside by factors such as networks, it is also possible to it will appear the case where management system transmits data failure to relevant device generation, because This, in embodiments of the present invention, the management system of no IP device can also at set time intervals, periodically to depositing in advance The access address of storage sends the initial data packets and the target packet.
Wherein, the value of time interval can be configured according to actual demand, it is not limited here.
Initial data packets and target packet are sent to pre-stored access address by periodicity, may be implemented pair Lasting detection without IP device operating status.Initial data packets of every transmission and target packet, according to subsequent processing Process can be determined that out without operating status corresponding to IP device current time.
By taking the equipment being filtered to clear data packet as an example, clear data is easy to be tampered in transmission process, in order to The clear data that outer net equipment is transmitted can be filtered the equipment that clear data packet is filtered by the safety for guaranteeing relevant device Fall, is transmitted to relevant device after ciphertext data are decrypted.
Based on this principle, in the concrete realization, the management system of no IP device can be according to preset data encryption Clear data packet is encrypted in algorithm, obtains the identifiable ciphertext data packet of no IP device.At this point, to being stored in advance The initial data packets that send of access address be clear data packet, which is to be unsatisfactory for the number of data conversion rule According to packet;Target packet is ciphertext data packet, which is to meet the data packet of data conversion rule.
S103: judge whether to receive only target response information corresponding with target packet.
When no IP device normal operation, no IP device can filter out unrecognizable initial data packets, transmit at this time To the only target packet of relevant device.
When management system receives only target response information corresponding with target packet, then explanation is transported without IP device Row is normal, can execute S104 at this time.
When management system not receives only target response information corresponding with target packet, then illustrate that equipment is transported There is exception in row, can execute S105 at this time.
S104: determine equipment normal operation.
S105: determine that equipment is operating abnormally.
By taking the equipment being filtered to clear data packet as an example, in the concrete realization, it can be determined that whether receive with it is close The corresponding target response information of literary data packet and receive plaintext response message corresponding with clear data packet.
When receiving only target response information corresponding with ciphertext data packet, do not receive corresponding with clear data packet Plaintext response message when, then determine without IP device and relevant device normal operation.
When receiving only plaintext response message corresponding with clear data packet, do not receive corresponding with ciphertext data packet Target response information when, then determine without IP device be operating abnormally.
When not receiving target response information corresponding with ciphertext data packet, and do not receive and clear data packet phase When corresponding plaintext response message, it may be possible to which no IP device and relevant device are operating abnormally simultaneously, it is also possible to only relevant device It is operating abnormally, can be determined that equipment is operating abnormally at this time;Wherein equipment is no IP device and/or relevant device.It is set when determining When standby operation exception, administrative staff can be transferred to further to detect the equipment for determining specific failure at this time.
According to preset data conversion rule it can be seen from above-mentioned technical proposal, at initial data packets Reason, obtains the identifiable target packet of no IP device;No IP device is equivalent to the filter for the relevant device that it is managed, can To filter out the data for not meeting security request data.Initial data packets and number of targets are sent to pre-stored access address According to packet;Wherein, access address is the address of the relevant device without IP device.In the case of equipment normal operation, no IP device can mistake Initial data packets are filtered, relevant device only receives target packet at this time, correspondingly, without IP device only to equipment management system Feed back target response information corresponding with target packet.Judge whether to receive only target corresponding with target packet Response message;When receiving only target response information corresponding with target packet, then explanation is without IP device and its corresponding Equipment can operate normally, and can be determined that equipment normal operation at this time.It is corresponding with target packet when not receiving only When target response information, then explanation is operating abnormally without IP device or its relevant device, determines that equipment is operating abnormally at this time.At this In technical solution, according to the functional characteristic of no IP device, to relevant device transmission without the identifiable target packet of IP device with And the initial data packets that can be filtered out without IP device, the type according to response message can judge the working condition of equipment, The automatic detection for realizing the working condition to no IP device effectively reduces the maintenance cost of no IP device.
The operating condition that equipment is understood for the ease of administrative staff can also record day after determining that equipment is operating abnormally Will information, in order to which administrative staff understand the specific fault condition of equipment according to log information.
In embodiments of the present invention, due to being related to no IP device and relevant device, when determine equipment be operating abnormally it After can carry out alarm prompt.
Wherein, the mode of alarm prompt can there are many, can be audio alert or light warning etc., do not limit herein It is fixed.
The operation of administrative staff's equipment can be reminded to occur in time by alarm prompt abnormal, in order to administrative staff in time into Row overhaul plan, reducing warping apparatus influences Intranet system stable operation bring.
Fig. 2 is a kind of structural schematic diagram of the working state detection device of no IP device provided in an embodiment of the present invention, packet Include processing unit 21, transmission unit 22, judging unit 23,24 second judging unit 25 of the first judging unit;
Processing unit 21, for handling initial data packets, obtaining nothing according to preset data conversion rule The identifiable target packet of IP device;
Transmission unit 22, for sending initial data packets and target packet to pre-stored access address;Wherein, Access address is the address of the relevant device without IP device;
Judging unit 23 receives only target response information corresponding with target packet for judging whether;If so, Then trigger the first judging unit 24;If it is not, then triggering the second judging unit 25;
First judging unit 24, for determining equipment normal operation;
Second judging unit 25, for determining that equipment is operating abnormally.
Optionally, no IP device is the equipment being filtered to clear data packet;
Correspondingly, initial data packets are clear data packet;Target packet is ciphertext data packet;
Processing unit is specifically used for that clear data packet is encrypted according to preset data encryption algorithm, Obtain the identifiable ciphertext data packet of no IP device.
Optionally, judging unit is specifically used for judging whether to receive target response information corresponding with ciphertext data packet And receive plaintext response message corresponding with clear data packet;
First judging unit is specifically used for not receiving when receiving only target response information corresponding with ciphertext data packet When to plaintext response message corresponding with clear data packet, then determine without IP device and relevant device normal operation;
First judging unit is specifically used for not receiving when receiving only plaintext response message corresponding with clear data packet When to target response information corresponding with ciphertext data packet, then determine to be operating abnormally without IP device;When not receiving and ciphertext The corresponding target response information of data packet, and when not receiving plaintext response message corresponding with clear data packet, then Determine that equipment is operating abnormally;Wherein equipment is no IP device and/or relevant device.
Optionally, transmission unit is specifically used at set time intervals, periodically to pre-stored access address Send initial data packets and target packet.
It optionally, further include recording unit;
Recording unit is used for after determining that equipment is operating abnormally, record log information.
It optionally, further include prompt unit;
Prompt unit, for carrying out alarm prompt after determining that equipment is operating abnormally.
The explanation of feature may refer to the related description of embodiment corresponding to Fig. 1 in embodiment corresponding to Fig. 2, here no longer It repeats one by one.
According to preset data conversion rule it can be seen from above-mentioned technical proposal, at initial data packets Reason, obtains the identifiable target packet of no IP device;No IP device is equivalent to the filter for the relevant device that it is managed, can To filter out the data for not meeting security request data.Initial data packets and number of targets are sent to pre-stored access address According to packet;Wherein, access address is the address of the relevant device without IP device.In the case of equipment normal operation, no IP device can mistake Initial data packets are filtered, relevant device only receives target packet at this time, correspondingly, without IP device only to equipment management system Feed back target response information corresponding with target packet.Judge whether to receive only target corresponding with target packet Response message;When receiving only target response information corresponding with target packet, then explanation is without IP device and its corresponding Equipment can operate normally, and can be determined that equipment normal operation at this time.It is corresponding with target packet when not receiving only When target response information, then explanation is operating abnormally without IP device or its relevant device, determines that equipment is operating abnormally at this time.At this In technical solution, according to the functional characteristic of no IP device, to relevant device transmission without the identifiable target packet of IP device with And the initial data packets that can be filtered out without IP device, the type according to response message can judge the working condition of equipment, The automatic detection for realizing the working condition to no IP device effectively reduces the maintenance cost of no IP device.
Fig. 3 is a kind of hardware configuration signal of working state detection device 30 of no IP device provided in an embodiment of the present invention Figure, comprising:
Memory 31, for storing computer program;
Processor 32 realizes the step of the working state detecting method such as above-mentioned no IP device for executing computer program Suddenly.
The embodiment of the invention also provides a kind of computer readable storage medium, it is stored on computer readable storage medium Computer program realizes the step of the working state detecting method such as above-mentioned no IP device when computer program is executed by processor Suddenly.
It is provided for the embodiments of the invention working state detecting method, device and the computer of a kind of no IP device above Readable storage medium storing program for executing is described in detail.Each embodiment is described in a progressive manner in specification, each embodiment weight Point explanation is the difference from other embodiments, and the same or similar parts in each embodiment may refer to each other.It is right For the device disclosed in embodiment, since it is corresponded to the methods disclosed in the examples, so be described relatively simple, it is related Place is referring to method part illustration.It should be pointed out that for those skilled in the art, not departing from this , can be with several improvements and modifications are made to the present invention under the premise of inventive principle, these improvement and modification also fall into the present invention In scope of protection of the claims.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond the scope of this invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology In any other form of storage medium well known in field.

Claims (10)

1. a kind of working state detecting method of no IP device characterized by comprising
According to preset data conversion rule, initial data packets are handled, obtain the identifiable target of no IP device Data packet;
The initial data packets and the target packet are sent to pre-stored access address;Wherein, the access Location is the address of the relevant device of the no IP device;
Judge whether to receive only target response information corresponding with the target packet;
If so, determining equipment normal operation;
If it is not, then determining that equipment is operating abnormally.
2. the method according to claim 1, wherein the no IP device is filtered clear data packet Equipment;
Correspondingly, the initial data packets are clear data packet;The target packet is ciphertext data packet;
It is described that initial data packets are handled according to preset data conversion rule, it is identifiable to obtain no IP device Target packet includes:
According to preset data encryption algorithm, clear data packet is encrypted, it is identifiable to obtain no IP device Ciphertext data packet.
3. according to the method described in claim 2, it is characterized in that, described judge whether to receive only and the target packet Corresponding target response information;If so, determining equipment normal operation;If it is not, then determining that equipment operation exception includes:
Judge whether to receive target response information corresponding with the ciphertext data packet and receive and the plaintext number According to the corresponding plaintext response message of packet;
When receiving only target response information corresponding with the ciphertext data packet, do not receive and the clear data packet phase When corresponding plaintext response message, then the no IP device and the relevant device normal operation are determined;
When receiving only plaintext response message corresponding with the clear data packet, do not receive and the ciphertext data packet phase When corresponding target response information, then determine that the no IP device is operating abnormally;
When not receiving target response information corresponding with the ciphertext data packet, and do not receive and the clear data When wrapping corresponding plaintext response message, then determine that equipment is operating abnormally;Wherein the equipment is the no IP device and/or institute State relevant device.
4. the method according to claim 1, wherein described described initial to the transmission of pre-stored access address Data packet and the target packet include:
At set time intervals, the initial data packets and the mesh periodically are sent to pre-stored access address Mark data packet.
5. method according to any of claims 1-4, which is characterized in that after judgement equipment operation exception Further include:
Record log information.
6. method according to any of claims 1-4, which is characterized in that after judgement equipment operation exception Further include:
Carry out alarm prompt.
7. a kind of working state detection device of no IP device, which is characterized in that single including processing unit, transmission unit, judgement Member, the first judging unit and the second judging unit;
The processing unit, for handling initial data packets, obtaining no IP according to preset data conversion rule The identifiable target packet of equipment;
The transmission unit, for sending the initial data packets and the target data to pre-stored access address Packet;Wherein, the access address is the address of the relevant device of the no IP device;
The judging unit receives only target response information corresponding with the target packet for judging whether;If It is then to trigger first judging unit;If it is not, then triggering second judging unit;
First judging unit, for determining equipment normal operation;
Second judging unit, for determining that equipment is operating abnormally.
8. device according to claim 7, which is characterized in that the no IP device is filtered clear data packet Equipment;
Correspondingly, the initial data packets are clear data packet;The target packet is ciphertext data packet;
The processing unit is specifically used for that clear data packet is encrypted according to preset data encryption algorithm, Obtain the identifiable ciphertext data packet of no IP device.
9. a kind of working state detection device of no IP device characterized by comprising
Memory, for storing computer program;
Processor, for executing the computer program to realize the work as described in claim 1 to 6 any one without IP device The step of making condition detection method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program realizes the work shape as described in any one of claim 1 to 6 without IP device when the computer program is executed by processor The step of state detection method.
CN201910290866.3A 2019-04-11 2019-04-11 Method, device and medium for detecting working state of IP-free equipment Active CN110011873B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910290866.3A CN110011873B (en) 2019-04-11 2019-04-11 Method, device and medium for detecting working state of IP-free equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910290866.3A CN110011873B (en) 2019-04-11 2019-04-11 Method, device and medium for detecting working state of IP-free equipment

Publications (2)

Publication Number Publication Date
CN110011873A true CN110011873A (en) 2019-07-12
CN110011873B CN110011873B (en) 2022-04-26

Family

ID=67171201

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910290866.3A Active CN110011873B (en) 2019-04-11 2019-04-11 Method, device and medium for detecting working state of IP-free equipment

Country Status (1)

Country Link
CN (1) CN110011873B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB0410150D0 (en) * 2004-05-07 2004-06-09 Ibm Methods,apparatus and computer programs for recovery from failures in a computing environment
US7055173B1 (en) * 1997-12-19 2006-05-30 Avaya Technology Corp. Firewall pooling in a network flowswitch
US20150089331A1 (en) * 2013-09-23 2015-03-26 Brian Skerry Detection and handling of virtual network appliance failures
CN106899616A (en) * 2017-04-20 2017-06-27 四川电科智造科技有限公司 A kind of safety regulation collocation method without IP fire walls
US20170359344A1 (en) * 2016-06-10 2017-12-14 Microsoft Technology Licensing, Llc Network-visitability detection control
WO2018053691A1 (en) * 2016-09-20 2018-03-29 Nokia Technologies Oy Method and apparatus for service restoration in a wireless communication system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7055173B1 (en) * 1997-12-19 2006-05-30 Avaya Technology Corp. Firewall pooling in a network flowswitch
GB0410150D0 (en) * 2004-05-07 2004-06-09 Ibm Methods,apparatus and computer programs for recovery from failures in a computing environment
US20150089331A1 (en) * 2013-09-23 2015-03-26 Brian Skerry Detection and handling of virtual network appliance failures
US20170359344A1 (en) * 2016-06-10 2017-12-14 Microsoft Technology Licensing, Llc Network-visitability detection control
WO2018053691A1 (en) * 2016-09-20 2018-03-29 Nokia Technologies Oy Method and apparatus for service restoration in a wireless communication system
CN106899616A (en) * 2017-04-20 2017-06-27 四川电科智造科技有限公司 A kind of safety regulation collocation method without IP fire walls

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
张瑛: "防火墙技术与DOS攻击防御", 《襄樊职业技术学院学报》 *
王绪军,刘博: "利用防火墙与入侵检测系统联合防范网络常见攻击", 《计算机与网络》 *
高飞: "网络设备中防火墙状态检测系统设计", 《通信技术》 *

Also Published As

Publication number Publication date
CN110011873B (en) 2022-04-26

Similar Documents

Publication Publication Date Title
EP2080317B1 (en) Apparatus and a security node for use in determining security attacks
Cameron et al. Using self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemes
JP4373779B2 (en) Stateful distributed event processing and adaptive maintenance
CN101283539B (en) Network security appliance
EP1461927B1 (en) A method and system for modelling, analysis, and display of network security events
US6775657B1 (en) Multilayered intrusion detection system and method
US7895641B2 (en) Method and system for dynamic network intrusion monitoring, detection and response
Jin et al. An event buffer flooding attack in DNP3 controlled SCADA systems
EP2036305B1 (en) Communication network application activity monitoring and control
Ganame et al. A global security architecture for intrusion detection on computer networks
Ollmann Botnet communication topologies
AU2002348415A1 (en) A method and system for modeling, analysis and display of network security events
Elbez et al. A new classification of attacks against the cyber-physical security of smart grids
KR20030056652A (en) Blacklist management apparatus in a policy-based network security management system and its proceeding method
CN101252487B (en) Method for processing safety warning and safety policy equipment
CN109040112B (en) Network control method and device
JP2000354035A (en) Centralized non-infiltration monitoring system and method for distributed independent data network
CN110011873A (en) A kind of working state detecting method, device and the medium of no IP device
CN109922055A (en) A kind of detection method, system and the associated component of risk terminal
Hunteman Automated information system (AIS) alarm system
CN111259383A (en) Safety management center system
CN110572353A (en) Cloud computing network security service
CN202679411U (en) Campus network intrusion prevention system
CN110493248A (en) A kind of method, apparatus that detecting illegal router, server and medium
JP2001333072A (en) Snmp network management system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 264210 No. 12-1, Chuhe North Road, chucun Town, gaoqu District, Weihai City, Shandong Province

Patentee after: Yuweng Information Technology Co.,Ltd.

Address before: No.12, Chuhe North Road, gaoqu District, Weihai City, Shandong Province

Patentee before: SHANDONG FISHERMAN INFORMATION TECHNOLOGY CO.,LTD.

CP03 Change of name, title or address