CN110011873A - A kind of working state detecting method, device and the medium of no IP device - Google Patents
A kind of working state detecting method, device and the medium of no IP device Download PDFInfo
- Publication number
- CN110011873A CN110011873A CN201910290866.3A CN201910290866A CN110011873A CN 110011873 A CN110011873 A CN 110011873A CN 201910290866 A CN201910290866 A CN 201910290866A CN 110011873 A CN110011873 A CN 110011873A
- Authority
- CN
- China
- Prior art keywords
- packet
- target
- equipment
- data packet
- response information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The embodiment of the invention discloses working state detecting method, device and the computer readable storage mediums of a kind of no IP device to be handled according to preset data conversion rule initial data packets, obtains the identifiable target packet of no IP device;Initial data packets and target packet are sent to pre-stored access address.In the case of equipment normal operation, no IP device can filter out initial data packets, and the relevant device without IP device only receives target packet at this time, correspondingly, only feeding back target response information corresponding with target packet to equipment management system without IP device.When receiving only target response information corresponding with target packet, then equipment normal operation is determined.When not receiving only target response information corresponding with target packet, then determine that equipment is operating abnormally.Type according to response message may determine that the working condition of equipment, realize the automatic detection of the working condition to no IP device.
Description
Technical field
The present invention relates to network security management technical fields, more particularly to a kind of working condition detection side of no IP device
Method, device and computer readable storage medium.
Background technique
No IP network equipment is commonly used in network security detection, such as firewall, the stealthy equipment such as black box.No IP network is set
Standby is a kind of access control scale executed in two network communications, it can allow the people of your " agreement " and data to enter yours
Network, while the people of your " disagreeing " and data being kept outside of the door, prevent the hacker in network to the maximum extent to access yours
Network.No IP network equipment has good protective effect, and invader must pass through the security perimeter of no IP network equipment first,
The relevant device of no IP network equipment can just be touched.
It is fixed that management at present without IP network equipment is typically based on network administrator or the system manager scene of carrying out to it
Phase checks management, needs to spend more human resources, causes maintenance cost higher.
It is those skilled in the art's urgent problem to be solved as it can be seen that how to reduce the maintenance cost of no IP device.
Summary of the invention
The purpose of the embodiment of the present invention is that the working state detecting method, device and the computer that provide a kind of no IP device can
Storage medium is read, the maintenance cost of no IP device can be reduced.
In order to solve the above technical problems, the embodiment of the present invention provides a kind of working state detecting method of no IP device, packet
It includes:
According to preset data conversion rule, initial data packets are handled, it is identifiable to obtain no IP device
Target packet;
The initial data packets and the target packet are sent to pre-stored access address;Wherein, the visit
Ask that address is the address of the relevant device of the no IP device;
Judge whether to receive only target response information corresponding with the target packet;
If so, determining equipment normal operation;
If it is not, then determining that equipment is operating abnormally.
Optionally, the no IP device is the equipment being filtered to clear data packet;
Correspondingly, the initial data packets are clear data packet;The target packet is ciphertext data packet;
Described to be handled according to preset data conversion rule initial data packets, obtaining no IP device can know
Other target packet includes:
According to preset data encryption algorithm, clear data packet is encrypted, obtaining no IP device can know
Other ciphertext data packet.
Optionally, described to judge whether to receive only target response information corresponding with the target packet;If so,
Then determine equipment normal operation;If it is not, then determining that equipment operation exception includes:
Judge whether to receive target response information corresponding with the ciphertext data packet and receives and stated clearly
The corresponding plaintext response message of literary data packet;
When receiving only target response information corresponding with the ciphertext data packet, do not receive and the clear data
When wrapping corresponding plaintext response message, then the no IP device and the relevant device normal operation are determined;
When receiving only plaintext response message corresponding with the clear data packet, do not receive and the ciphertext data
When wrapping corresponding target response information, then determine that the no IP device is operating abnormally;
When not receiving target response information corresponding with the ciphertext data packet, and do not receive and the plaintext
When the corresponding plaintext response message of data packet, then determine that equipment is operating abnormally;Wherein the equipment be the no IP device and/
Or the relevant device.
Optionally, described to send the initial data packets and the target packet packet to pre-stored access address
It includes:
At set time intervals, the initial data packets and institute periodically are sent to pre-stored access address
State target packet.
Optionally, after judgement equipment operation exception further include:
Record log information.
Optionally, after judgement equipment operation exception further include:
Carry out alarm prompt.
The embodiment of the invention also provides a kind of working state detection devices of no IP device, including processing unit, transmission
Unit, judging unit, the first judging unit and the second judging unit;
The processing unit, for handling initial data packets, obtaining according to preset data conversion rule
Without the identifiable target packet of IP device;
The transmission unit, for sending the initial data packets and the number of targets to pre-stored access address
According to packet;Wherein, the access address is the address of the relevant device of the no IP device;
The judging unit receives only target response letter corresponding with the target packet for judging whether
Breath;If so, triggering first judging unit;If it is not, then triggering second judging unit;
First judging unit, for determining equipment normal operation;
Second judging unit, for determining that equipment is operating abnormally.
Optionally, the no IP device is the equipment being filtered to clear data packet;
Correspondingly, the initial data packets are clear data packet;The target packet is ciphertext data packet;
The processing unit is specifically used for carrying out at encryption clear data packet according to preset data encryption algorithm
Reason, obtains the identifiable ciphertext data packet of no IP device.
Optionally, the judging unit is specifically used for judging whether to receive target corresponding with the ciphertext data packet
Response message and receive plaintext response message corresponding with the clear data packet;
First judging unit, which is specifically used for working as, receives only target response letter corresponding with the ciphertext data packet
Breath when not receiving plaintext response message corresponding with the clear data packet, then determines the no IP device and described
Relevant device normal operation;
First judging unit, which is specifically used for working as, receives only plaintext response letter corresponding with the clear data packet
Breath when not receiving target response information corresponding with the ciphertext data packet, then determines that the no IP device is operating abnormally;
When not receiving target response information corresponding with the ciphertext data packet, and do not receive and the clear data packet phase
When corresponding plaintext response message, then determine that equipment is operating abnormally;Wherein the equipment is the no IP device and/or the phase
Answer equipment.
Optionally, the transmission unit is specifically used at set time intervals, periodically to pre-stored access
Address sends the initial data packets and the target packet.
It optionally, further include recording unit;
The recording unit is used for after judgement equipment operation exception, record log information.
It optionally, further include prompt unit;
The prompt unit, for carrying out alarm prompt after judgement equipment operation exception.
The embodiment of the invention also provides a kind of working state detection devices of no IP device, comprising:
Memory, for storing computer program;
Processor, for executing the computer program to realize such as the working state detecting method of above-mentioned no IP device
Step.
The embodiment of the invention also provides a kind of computer readable storage medium, deposited on the computer readable storage medium
Computer program is contained, the working condition detection side such as above-mentioned no IP device is realized when the computer program is executed by processor
The step of method.
According to preset data conversion rule it can be seen from above-mentioned technical proposal, at initial data packets
Reason, obtains the identifiable target packet of no IP device;No IP device is equivalent to the filter for the relevant device that it is managed, can
To filter out the data for not meeting security request data.Initial data packets and number of targets are sent to pre-stored access address
According to packet;Wherein, access address is the address of the relevant device without IP device.In the case of equipment normal operation, no IP device can mistake
Initial data packets are filtered, relevant device only receives target packet at this time, correspondingly, without IP device only to equipment management system
Feed back target response information corresponding with target packet.Judge whether to receive only target corresponding with target packet
Response message;When receiving only target response information corresponding with target packet, then explanation is without IP device and its corresponding
Equipment can operate normally, and can be determined that equipment normal operation at this time.It is corresponding with target packet when not receiving only
When target response information, then explanation is operating abnormally without IP device or its relevant device, determines that equipment is operating abnormally at this time.At this
In technical solution, according to the functional characteristic of no IP device, to relevant device transmission without the identifiable target packet of IP device with
And the initial data packets that can be filtered out without IP device, the type according to response message can judge the working condition of equipment,
The automatic detection for realizing the working condition to no IP device effectively reduces the maintenance cost of no IP device.
Detailed description of the invention
In order to illustrate the embodiments of the present invention more clearly, attached drawing needed in the embodiment will be done simply below
It introduces, it should be apparent that, drawings in the following description are only some embodiments of the invention, for ordinary skill people
For member, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of flow chart of the working state detecting method of no IP device provided in an embodiment of the present invention;
Fig. 2 is a kind of structural schematic diagram of the working state detection device of no IP device provided in an embodiment of the present invention;
Fig. 3 is a kind of hardware configuration signal of working state detection device of no IP device provided in an embodiment of the present invention
Figure.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, rather than whole embodiments.Based on this
Embodiment in invention, those of ordinary skill in the art are without making creative work, obtained every other
Embodiment belongs to the scope of the present invention.
In order to enable those skilled in the art to better understand the solution of the present invention, with reference to the accompanying drawings and detailed description
The present invention is described in further detail.
Next, a kind of working state detecting method of no IP device provided by the embodiment of the present invention is discussed in detail.Fig. 1
For a kind of flow chart of the working state detecting method of no IP device provided in an embodiment of the present invention, this method comprises:
S101: according to preset data conversion rule, being handled initial data packets, and obtaining no IP device can know
Other target packet.
Include relevant device in an Intranet system and is set for what is be managed and protect to relevant device without IP
It is standby.Wherein, the relevant device of no IP device, which can be in the Intranet equipment or outer net that no IP device is managed, transfers to no IP to set
The equipment of standby management.
The equipment that no IP device either can be used to be filtered clear data packet for firewall.For the ease of retouching
It states, explanation is unfolded by taking the equipment being filtered to clear data packet as an example in embodiments of the present invention.
It needs to pass through the transfer without IP device when outer net equipment transmits data to relevant device, no IP device can filter
Fall not meeting the data of security request data.
Data conversion rule is used to indicate to be converted to initial data packets the behaviour of the identifiable target packet of no IP device
Make step.When no IP device receives unrecognizable data packet, can filter this out namely these unrecognizable data
Packet will not be transmitted to relevant device.
S102: initial data packets and target packet are sent to pre-stored access address.
Wherein, access address is the address of the relevant device without IP device.
In practical applications, the management system of no IP device can send an initial number to pre-stored access address
According to packet and target packet, to realize the detection to no IP device and its relevant device current operating conditions.
In view of under the different time stage, the operating status of no IP device and relevant device may change, this
It is influenced outside by factors such as networks, it is also possible to it will appear the case where management system transmits data failure to relevant device generation, because
This, in embodiments of the present invention, the management system of no IP device can also at set time intervals, periodically to depositing in advance
The access address of storage sends the initial data packets and the target packet.
Wherein, the value of time interval can be configured according to actual demand, it is not limited here.
Initial data packets and target packet are sent to pre-stored access address by periodicity, may be implemented pair
Lasting detection without IP device operating status.Initial data packets of every transmission and target packet, according to subsequent processing
Process can be determined that out without operating status corresponding to IP device current time.
By taking the equipment being filtered to clear data packet as an example, clear data is easy to be tampered in transmission process, in order to
The clear data that outer net equipment is transmitted can be filtered the equipment that clear data packet is filtered by the safety for guaranteeing relevant device
Fall, is transmitted to relevant device after ciphertext data are decrypted.
Based on this principle, in the concrete realization, the management system of no IP device can be according to preset data encryption
Clear data packet is encrypted in algorithm, obtains the identifiable ciphertext data packet of no IP device.At this point, to being stored in advance
The initial data packets that send of access address be clear data packet, which is to be unsatisfactory for the number of data conversion rule
According to packet;Target packet is ciphertext data packet, which is to meet the data packet of data conversion rule.
S103: judge whether to receive only target response information corresponding with target packet.
When no IP device normal operation, no IP device can filter out unrecognizable initial data packets, transmit at this time
To the only target packet of relevant device.
When management system receives only target response information corresponding with target packet, then explanation is transported without IP device
Row is normal, can execute S104 at this time.
When management system not receives only target response information corresponding with target packet, then illustrate that equipment is transported
There is exception in row, can execute S105 at this time.
S104: determine equipment normal operation.
S105: determine that equipment is operating abnormally.
By taking the equipment being filtered to clear data packet as an example, in the concrete realization, it can be determined that whether receive with it is close
The corresponding target response information of literary data packet and receive plaintext response message corresponding with clear data packet.
When receiving only target response information corresponding with ciphertext data packet, do not receive corresponding with clear data packet
Plaintext response message when, then determine without IP device and relevant device normal operation.
When receiving only plaintext response message corresponding with clear data packet, do not receive corresponding with ciphertext data packet
Target response information when, then determine without IP device be operating abnormally.
When not receiving target response information corresponding with ciphertext data packet, and do not receive and clear data packet phase
When corresponding plaintext response message, it may be possible to which no IP device and relevant device are operating abnormally simultaneously, it is also possible to only relevant device
It is operating abnormally, can be determined that equipment is operating abnormally at this time;Wherein equipment is no IP device and/or relevant device.It is set when determining
When standby operation exception, administrative staff can be transferred to further to detect the equipment for determining specific failure at this time.
According to preset data conversion rule it can be seen from above-mentioned technical proposal, at initial data packets
Reason, obtains the identifiable target packet of no IP device;No IP device is equivalent to the filter for the relevant device that it is managed, can
To filter out the data for not meeting security request data.Initial data packets and number of targets are sent to pre-stored access address
According to packet;Wherein, access address is the address of the relevant device without IP device.In the case of equipment normal operation, no IP device can mistake
Initial data packets are filtered, relevant device only receives target packet at this time, correspondingly, without IP device only to equipment management system
Feed back target response information corresponding with target packet.Judge whether to receive only target corresponding with target packet
Response message;When receiving only target response information corresponding with target packet, then explanation is without IP device and its corresponding
Equipment can operate normally, and can be determined that equipment normal operation at this time.It is corresponding with target packet when not receiving only
When target response information, then explanation is operating abnormally without IP device or its relevant device, determines that equipment is operating abnormally at this time.At this
In technical solution, according to the functional characteristic of no IP device, to relevant device transmission without the identifiable target packet of IP device with
And the initial data packets that can be filtered out without IP device, the type according to response message can judge the working condition of equipment,
The automatic detection for realizing the working condition to no IP device effectively reduces the maintenance cost of no IP device.
The operating condition that equipment is understood for the ease of administrative staff can also record day after determining that equipment is operating abnormally
Will information, in order to which administrative staff understand the specific fault condition of equipment according to log information.
In embodiments of the present invention, due to being related to no IP device and relevant device, when determine equipment be operating abnormally it
After can carry out alarm prompt.
Wherein, the mode of alarm prompt can there are many, can be audio alert or light warning etc., do not limit herein
It is fixed.
The operation of administrative staff's equipment can be reminded to occur in time by alarm prompt abnormal, in order to administrative staff in time into
Row overhaul plan, reducing warping apparatus influences Intranet system stable operation bring.
Fig. 2 is a kind of structural schematic diagram of the working state detection device of no IP device provided in an embodiment of the present invention, packet
Include processing unit 21, transmission unit 22, judging unit 23,24 second judging unit 25 of the first judging unit;
Processing unit 21, for handling initial data packets, obtaining nothing according to preset data conversion rule
The identifiable target packet of IP device;
Transmission unit 22, for sending initial data packets and target packet to pre-stored access address;Wherein,
Access address is the address of the relevant device without IP device;
Judging unit 23 receives only target response information corresponding with target packet for judging whether;If so,
Then trigger the first judging unit 24;If it is not, then triggering the second judging unit 25;
First judging unit 24, for determining equipment normal operation;
Second judging unit 25, for determining that equipment is operating abnormally.
Optionally, no IP device is the equipment being filtered to clear data packet;
Correspondingly, initial data packets are clear data packet;Target packet is ciphertext data packet;
Processing unit is specifically used for that clear data packet is encrypted according to preset data encryption algorithm,
Obtain the identifiable ciphertext data packet of no IP device.
Optionally, judging unit is specifically used for judging whether to receive target response information corresponding with ciphertext data packet
And receive plaintext response message corresponding with clear data packet;
First judging unit is specifically used for not receiving when receiving only target response information corresponding with ciphertext data packet
When to plaintext response message corresponding with clear data packet, then determine without IP device and relevant device normal operation;
First judging unit is specifically used for not receiving when receiving only plaintext response message corresponding with clear data packet
When to target response information corresponding with ciphertext data packet, then determine to be operating abnormally without IP device;When not receiving and ciphertext
The corresponding target response information of data packet, and when not receiving plaintext response message corresponding with clear data packet, then
Determine that equipment is operating abnormally;Wherein equipment is no IP device and/or relevant device.
Optionally, transmission unit is specifically used at set time intervals, periodically to pre-stored access address
Send initial data packets and target packet.
It optionally, further include recording unit;
Recording unit is used for after determining that equipment is operating abnormally, record log information.
It optionally, further include prompt unit;
Prompt unit, for carrying out alarm prompt after determining that equipment is operating abnormally.
The explanation of feature may refer to the related description of embodiment corresponding to Fig. 1 in embodiment corresponding to Fig. 2, here no longer
It repeats one by one.
According to preset data conversion rule it can be seen from above-mentioned technical proposal, at initial data packets
Reason, obtains the identifiable target packet of no IP device;No IP device is equivalent to the filter for the relevant device that it is managed, can
To filter out the data for not meeting security request data.Initial data packets and number of targets are sent to pre-stored access address
According to packet;Wherein, access address is the address of the relevant device without IP device.In the case of equipment normal operation, no IP device can mistake
Initial data packets are filtered, relevant device only receives target packet at this time, correspondingly, without IP device only to equipment management system
Feed back target response information corresponding with target packet.Judge whether to receive only target corresponding with target packet
Response message;When receiving only target response information corresponding with target packet, then explanation is without IP device and its corresponding
Equipment can operate normally, and can be determined that equipment normal operation at this time.It is corresponding with target packet when not receiving only
When target response information, then explanation is operating abnormally without IP device or its relevant device, determines that equipment is operating abnormally at this time.At this
In technical solution, according to the functional characteristic of no IP device, to relevant device transmission without the identifiable target packet of IP device with
And the initial data packets that can be filtered out without IP device, the type according to response message can judge the working condition of equipment,
The automatic detection for realizing the working condition to no IP device effectively reduces the maintenance cost of no IP device.
Fig. 3 is a kind of hardware configuration signal of working state detection device 30 of no IP device provided in an embodiment of the present invention
Figure, comprising:
Memory 31, for storing computer program;
Processor 32 realizes the step of the working state detecting method such as above-mentioned no IP device for executing computer program
Suddenly.
The embodiment of the invention also provides a kind of computer readable storage medium, it is stored on computer readable storage medium
Computer program realizes the step of the working state detecting method such as above-mentioned no IP device when computer program is executed by processor
Suddenly.
It is provided for the embodiments of the invention working state detecting method, device and the computer of a kind of no IP device above
Readable storage medium storing program for executing is described in detail.Each embodiment is described in a progressive manner in specification, each embodiment weight
Point explanation is the difference from other embodiments, and the same or similar parts in each embodiment may refer to each other.It is right
For the device disclosed in embodiment, since it is corresponded to the methods disclosed in the examples, so be described relatively simple, it is related
Place is referring to method part illustration.It should be pointed out that for those skilled in the art, not departing from this
, can be with several improvements and modifications are made to the present invention under the premise of inventive principle, these improvement and modification also fall into the present invention
In scope of protection of the claims.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and
The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These
Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession
Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered
Think beyond the scope of this invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can directly be held with hardware, processor
The combination of capable software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only deposit
Reservoir (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technology
In any other form of storage medium well known in field.
Claims (10)
1. a kind of working state detecting method of no IP device characterized by comprising
According to preset data conversion rule, initial data packets are handled, obtain the identifiable target of no IP device
Data packet;
The initial data packets and the target packet are sent to pre-stored access address;Wherein, the access
Location is the address of the relevant device of the no IP device;
Judge whether to receive only target response information corresponding with the target packet;
If so, determining equipment normal operation;
If it is not, then determining that equipment is operating abnormally.
2. the method according to claim 1, wherein the no IP device is filtered clear data packet
Equipment;
Correspondingly, the initial data packets are clear data packet;The target packet is ciphertext data packet;
It is described that initial data packets are handled according to preset data conversion rule, it is identifiable to obtain no IP device
Target packet includes:
According to preset data encryption algorithm, clear data packet is encrypted, it is identifiable to obtain no IP device
Ciphertext data packet.
3. according to the method described in claim 2, it is characterized in that, described judge whether to receive only and the target packet
Corresponding target response information;If so, determining equipment normal operation;If it is not, then determining that equipment operation exception includes:
Judge whether to receive target response information corresponding with the ciphertext data packet and receive and the plaintext number
According to the corresponding plaintext response message of packet;
When receiving only target response information corresponding with the ciphertext data packet, do not receive and the clear data packet phase
When corresponding plaintext response message, then the no IP device and the relevant device normal operation are determined;
When receiving only plaintext response message corresponding with the clear data packet, do not receive and the ciphertext data packet phase
When corresponding target response information, then determine that the no IP device is operating abnormally;
When not receiving target response information corresponding with the ciphertext data packet, and do not receive and the clear data
When wrapping corresponding plaintext response message, then determine that equipment is operating abnormally;Wherein the equipment is the no IP device and/or institute
State relevant device.
4. the method according to claim 1, wherein described described initial to the transmission of pre-stored access address
Data packet and the target packet include:
At set time intervals, the initial data packets and the mesh periodically are sent to pre-stored access address
Mark data packet.
5. method according to any of claims 1-4, which is characterized in that after judgement equipment operation exception
Further include:
Record log information.
6. method according to any of claims 1-4, which is characterized in that after judgement equipment operation exception
Further include:
Carry out alarm prompt.
7. a kind of working state detection device of no IP device, which is characterized in that single including processing unit, transmission unit, judgement
Member, the first judging unit and the second judging unit;
The processing unit, for handling initial data packets, obtaining no IP according to preset data conversion rule
The identifiable target packet of equipment;
The transmission unit, for sending the initial data packets and the target data to pre-stored access address
Packet;Wherein, the access address is the address of the relevant device of the no IP device;
The judging unit receives only target response information corresponding with the target packet for judging whether;If
It is then to trigger first judging unit;If it is not, then triggering second judging unit;
First judging unit, for determining equipment normal operation;
Second judging unit, for determining that equipment is operating abnormally.
8. device according to claim 7, which is characterized in that the no IP device is filtered clear data packet
Equipment;
Correspondingly, the initial data packets are clear data packet;The target packet is ciphertext data packet;
The processing unit is specifically used for that clear data packet is encrypted according to preset data encryption algorithm,
Obtain the identifiable ciphertext data packet of no IP device.
9. a kind of working state detection device of no IP device characterized by comprising
Memory, for storing computer program;
Processor, for executing the computer program to realize the work as described in claim 1 to 6 any one without IP device
The step of making condition detection method.
10. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program realizes the work shape as described in any one of claim 1 to 6 without IP device when the computer program is executed by processor
The step of state detection method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910290866.3A CN110011873B (en) | 2019-04-11 | 2019-04-11 | Method, device and medium for detecting working state of IP-free equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910290866.3A CN110011873B (en) | 2019-04-11 | 2019-04-11 | Method, device and medium for detecting working state of IP-free equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110011873A true CN110011873A (en) | 2019-07-12 |
CN110011873B CN110011873B (en) | 2022-04-26 |
Family
ID=67171201
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910290866.3A Active CN110011873B (en) | 2019-04-11 | 2019-04-11 | Method, device and medium for detecting working state of IP-free equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110011873B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0410150D0 (en) * | 2004-05-07 | 2004-06-09 | Ibm | Methods,apparatus and computer programs for recovery from failures in a computing environment |
US7055173B1 (en) * | 1997-12-19 | 2006-05-30 | Avaya Technology Corp. | Firewall pooling in a network flowswitch |
US20150089331A1 (en) * | 2013-09-23 | 2015-03-26 | Brian Skerry | Detection and handling of virtual network appliance failures |
CN106899616A (en) * | 2017-04-20 | 2017-06-27 | 四川电科智造科技有限公司 | A kind of safety regulation collocation method without IP fire walls |
US20170359344A1 (en) * | 2016-06-10 | 2017-12-14 | Microsoft Technology Licensing, Llc | Network-visitability detection control |
WO2018053691A1 (en) * | 2016-09-20 | 2018-03-29 | Nokia Technologies Oy | Method and apparatus for service restoration in a wireless communication system |
-
2019
- 2019-04-11 CN CN201910290866.3A patent/CN110011873B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7055173B1 (en) * | 1997-12-19 | 2006-05-30 | Avaya Technology Corp. | Firewall pooling in a network flowswitch |
GB0410150D0 (en) * | 2004-05-07 | 2004-06-09 | Ibm | Methods,apparatus and computer programs for recovery from failures in a computing environment |
US20150089331A1 (en) * | 2013-09-23 | 2015-03-26 | Brian Skerry | Detection and handling of virtual network appliance failures |
US20170359344A1 (en) * | 2016-06-10 | 2017-12-14 | Microsoft Technology Licensing, Llc | Network-visitability detection control |
WO2018053691A1 (en) * | 2016-09-20 | 2018-03-29 | Nokia Technologies Oy | Method and apparatus for service restoration in a wireless communication system |
CN106899616A (en) * | 2017-04-20 | 2017-06-27 | 四川电科智造科技有限公司 | A kind of safety regulation collocation method without IP fire walls |
Non-Patent Citations (3)
Title |
---|
张瑛: "防火墙技术与DOS攻击防御", 《襄樊职业技术学院学报》 * |
王绪军,刘博: "利用防火墙与入侵检测系统联合防范网络常见攻击", 《计算机与网络》 * |
高飞: "网络设备中防火墙状态检测系统设计", 《通信技术》 * |
Also Published As
Publication number | Publication date |
---|---|
CN110011873B (en) | 2022-04-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP2080317B1 (en) | Apparatus and a security node for use in determining security attacks | |
Cameron et al. | Using self-organizing architectures to mitigate the impacts of denial-of-service attacks on voltage control schemes | |
JP4373779B2 (en) | Stateful distributed event processing and adaptive maintenance | |
CN101283539B (en) | Network security appliance | |
EP1461927B1 (en) | A method and system for modelling, analysis, and display of network security events | |
US6775657B1 (en) | Multilayered intrusion detection system and method | |
US7895641B2 (en) | Method and system for dynamic network intrusion monitoring, detection and response | |
Jin et al. | An event buffer flooding attack in DNP3 controlled SCADA systems | |
EP2036305B1 (en) | Communication network application activity monitoring and control | |
Ganame et al. | A global security architecture for intrusion detection on computer networks | |
Ollmann | Botnet communication topologies | |
AU2002348415A1 (en) | A method and system for modeling, analysis and display of network security events | |
Elbez et al. | A new classification of attacks against the cyber-physical security of smart grids | |
KR20030056652A (en) | Blacklist management apparatus in a policy-based network security management system and its proceeding method | |
CN101252487B (en) | Method for processing safety warning and safety policy equipment | |
CN109040112B (en) | Network control method and device | |
JP2000354035A (en) | Centralized non-infiltration monitoring system and method for distributed independent data network | |
CN110011873A (en) | A kind of working state detecting method, device and the medium of no IP device | |
CN109922055A (en) | A kind of detection method, system and the associated component of risk terminal | |
Hunteman | Automated information system (AIS) alarm system | |
CN111259383A (en) | Safety management center system | |
CN110572353A (en) | Cloud computing network security service | |
CN202679411U (en) | Campus network intrusion prevention system | |
CN110493248A (en) | A kind of method, apparatus that detecting illegal router, server and medium | |
JP2001333072A (en) | Snmp network management system and method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: 264210 No. 12-1, Chuhe North Road, chucun Town, gaoqu District, Weihai City, Shandong Province Patentee after: Yuweng Information Technology Co.,Ltd. Address before: No.12, Chuhe North Road, gaoqu District, Weihai City, Shandong Province Patentee before: SHANDONG FISHERMAN INFORMATION TECHNOLOGY CO.,LTD. |
|
CP03 | Change of name, title or address |