CN110034979A - A kind of proxy resources monitoring method, device, electronic equipment and storage medium - Google Patents

A kind of proxy resources monitoring method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN110034979A
CN110034979A CN201910328247.9A CN201910328247A CN110034979A CN 110034979 A CN110034979 A CN 110034979A CN 201910328247 A CN201910328247 A CN 201910328247A CN 110034979 A CN110034979 A CN 110034979A
Authority
CN
China
Prior art keywords
proxy resources
proxy
resources
internet protocol
protocol address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910328247.9A
Other languages
Chinese (zh)
Inventor
孟艳青
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Heng Jia Jia (beijing) Technology Co Ltd
Eversec Beijing Technology Co Ltd
Original Assignee
Heng Jia Jia (beijing) Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Heng Jia Jia (beijing) Technology Co Ltd filed Critical Heng Jia Jia (beijing) Technology Co Ltd
Priority to CN201910328247.9A priority Critical patent/CN110034979A/en
Publication of CN110034979A publication Critical patent/CN110034979A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services

Abstract

The invention discloses a kind of proxy resources monitoring method, device, electronic equipment and storage mediums, are related to technical field of network security, this method comprises: the proxy resources that configuration is to be monitored;Judge whether proxy resources survive;If proxy resources are survived, according to proxy resources access target website;If accessing successfully, it is determined that proxy resources are effective.It is higher relative to current proxy resources monitoring cost, proxy resources monitoring scheme provided in an embodiment of the present invention, it can judge automatically whether proxy resources survive by electronic equipment, when determining proxy resources survival, by the proxy resources access target website, and then the validity of the proxy resources is verified, does not need analysis simultaneously without reverse-direction derivation and also do not need to acquire a large amount of datas on flows, proxy resources monitoring efficiency is improved, proxy resources monitoring cost is reduced.

Description

A kind of proxy resources monitoring method, device, electronic equipment and storage medium
Technical field
The present embodiments relate to network security technologies more particularly to a kind of proxy resources monitoring method, device, electronics to set Standby and storage medium.
Background technique
With the development of internet technology, proxy server has become more universal top mode.It is led in network security Domain needs to be monitored proxy resources to guarantee internet security.
The monitoring mode of currently used network agent resource includes the following two kinds mode: mode one, passive flux acquisition With active simplation verification mode.Such mode acquires all access by disposing flow collection equipment in network exit node Data on flows extracts the solicited message of user by protocol assembly means.Then, by big data analysis technology, institute is filtered out Possible server-side IP address and serve port Port are further verified by actively simulation, can be confirmed and be obtained Whether the resource obtained is proxy resources.Mode two manually inversely cracks and active analysis mode.Such mode, by offer Software package of agency service, including the end PC, mobile terminal or plug in component etc. carry out binary system and inversely crack, analysis software operation Logic theory, and the relevant IP address of server-side and port information are obtained by dry run process.Then to the letter of acquisition Breath is further analyzed by artificial Proactive authentication, can confirm whether resource obtained is proxy resources.
Inventor has found the prior art, and at least there are the following problems: passive flux acquisition and the active that mode one uses are simulated Verification mode need to acquire a large amount of node flow data, and carry out protocol assembly to these datas on flows, occupy a large amount of storage And computing resource.The use of mode two manually inversely cracks and active analysis mode, need to carry out two to obtainable agent software packet System inversely cracks, and technical difficulty is big, and analysis cost is high.
Summary of the invention
The present invention provides a kind of proxy resources monitoring method, device, electronic equipment and storage medium, to reduce proxy resources Safety monitoring cost.
In a first aspect, the embodiment of the invention provides a kind of proxy resources monitoring methods, comprising:
Configure proxy resources to be monitored;
Judge whether proxy resources survive;
If proxy resources are survived, according to proxy resources access target website;
If accessing successfully, it is determined that proxy resources are effective.
Further, proxy resources to be monitored are configured, comprising:
Configure the internet protocol address of proxy resources to be monitored;
Port information is configured according to Internet protocol address.
Further, the Internet protocol address of proxy resources to be monitored is configured, comprising:
Internet protocol address is imported by the first file, using the Internet protocol address of importing as agency to be monitored The Internet protocol address of resource;Alternatively,
Configure the Internet protocol address section of proxy resources to be monitored.
Correspondingly, configuring port information according to Internet protocol address, comprising:
Port section is configured in Internet protocol address;Alternatively,
Configuration baseline port information and port floating information in Internet protocol address, according to benchmark port information with And port floating information determines port information.
Further, judge whether proxy resources survive, comprising:
Port monitoring task is established, whether port monitoring task deposits for monitoring port information and Internet protocol address It is living;If the port information on internet protocol address is effective, corresponding proxy resources survival;
Correspondingly, if proxy resources are survived, according to proxy resources access target website, comprising:
Analog access task is established, analog access task is for imitating user's operation access target website.
Further, judge whether proxy resources survive, comprising:
Data packet is sent according to Internet protocol address and port information;
Determine whether proxy resources survive according to the reception information of data packet.
Further, after determining that proxy resources are effective, further includes:
According to default access frequency, proxy resources access target website is used;
If accessing successfully, the effective information of renewal agency resource.
Further, after determining that proxy resources are effective, further includes:
Receiving Agent resource inquiry request;
According to the status information of proxy resources inquiry request feedback agent resource.
Second aspect, the embodiment of the invention also provides a kind of proxy resources monitoring devices, comprising:
Configuration module, for configuring proxy resources to be monitored;
Judgment module, for judging whether the proxy resources of configuration module configuration survive;
Access modules, when determining proxy resources survival for judgment module, according to proxy resources access target website;
Determining module determines that proxy resources are effective when accessing successfully for access modules.
The third aspect the embodiment of the invention also provides a kind of electronic equipment, including memory, processor and is stored in On memory and the computer program that can run on a processor, processor realize the generation as shown in first aspect when executing program Manage monitoring resource method.
Fourth aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer Program realizes the proxy resources monitoring method as shown in first aspect when the program is executed by processor.
Proxy resources monitoring method, device, electronic equipment and storage medium provided in an embodiment of the present invention configure to be monitored Proxy resources;Judge whether proxy resources survive;If proxy resources are survived, according to proxy resources access target website; If accessing successfully, it is determined that proxy resources are effective.Higher relative to current proxy resources monitoring cost, the embodiment of the present invention provides Proxy resources monitoring scheme, can judge automatically whether proxy resources survive by electronic equipment, determining proxy resources survive When, by the proxy resources access target website, and then the validity of the proxy resources is verified, is not required to simultaneously without reverse-direction derivation It analyzes and does not also need to acquire a large amount of datas on flows, improve proxy resources monitoring efficiency, reduce proxy resources monitoring cost.
Detailed description of the invention
Fig. 1 is a system architecture schematic diagram in the embodiment of the present invention;
Fig. 2 is the flow chart of a proxy resources monitoring method in the embodiment of the present invention;
Fig. 3 is the flow chart of another proxy resources monitoring method in the embodiment of the present invention;
Fig. 4 is the flow chart of another proxy resources monitoring method in the embodiment of the present invention;
Fig. 5 is the flow chart of another proxy resources monitoring method in the embodiment of the present invention;
Fig. 6 is the schematic diagram of the proxy resources monitoring system in the embodiment of the present invention;
Fig. 7 is the structural schematic diagram of a proxy resources monitoring device in the embodiment of the present invention;
Fig. 8 is the structural schematic diagram of another proxy resources monitoring device in the embodiment of the present invention;
Fig. 9 is the structural schematic diagram of an electronic equipment in the embodiment of the present invention.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to just Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
The monitoring mode of currently used network agent resource include passive flux acquisition with active simplation verification mode and Manually inversely crack and active analysis mode.But the acquisition of the passive flux of use need to acquire greatly with active simplation verification mode The node flow data of amount, and protocol assembly is carried out to these datas on flows, occupy a large amount of storage and computing resource.Mode two Using manually inversely cracking and active analysis mode, binary system need to be carried out to obtainable agent software packet and inversely cracked, technology Difficulty is big, and analysis cost is high.Although the resultant error analyzed is smaller, since proxy resources dynamic change timeliness is very big, Reference value will soon be lost.
The embodiment of the present application provides a kind of proxy resources monitoring method, can be after Configuration Agent resource, certainly by machine Whether dynamic identification proxy resources survive, when proxy resources survival, using the proxy resources analog access targeted website of survival, into And the validity of monitor agent resource.Without acquiring a large amount of flow informations, without reverse engineered and active analysis is carried out, in turn Proxy resources monitoring cost is reduced, resource utilization is improved.Concrete scheme is as follows:
Fig. 1 is the applicable system architecture diagram of proxy resources provided in an embodiment of the present invention monitoring, network O&M personnel operation Electronic equipment 001 is monitored proxy resources, and proxy resources are workable internet in the network of the connection of electronic equipment 001 The combination of network protocol address (also known as IP address) and port numbers.Proxy resources may include multiple IP address, in each IP address Multiple port numbers can be configured.The corresponding service of each port numbers.Electronic equipment may have access to internet 002 by proxy resources The server 003 of opposite end, server include but is not limited to ftp server, web server etc., and server provides clothes by port Business.
Fig. 2 is a kind of flow chart of proxy resources monitoring method provided in an embodiment of the present invention, and the present embodiment is applicable to The case where being monitored to proxy resources, this method can be executed by electronic equipment, and electronic equipment includes personal computer, pen Remember this computer, tablet computer, smart phone etc., this method specifically comprises the following steps:
Step S110, proxy resources to be monitored are configured.
Proxy resources are the combination of IP address and port information, some port in some IP address is agency's money Source.In one implementation, the internet protocol address of proxy resources to be monitored can be configured;According to Internet protocol Address configuration port information.
IP address occurs in pairs with port information, can configure multiple port informations in an IP address.
Specifically, configuring the Internet protocol address of proxy resources to be monitored, comprising:
Internet protocol address is imported by the first file, using the Internet protocol address of importing as agency to be monitored The Internet protocol address of resource;Alternatively, configuring the Internet protocol address section of proxy resources to be monitored.
First file is used for recording text data, and text data includes the preconfigured IP address of network O&M personnel.The It can also include the port information with IP address binding in one file.The IP address area of proxy resources to be detected can also be configured Between, and then each IP address in IP address section is monitored.
Correspondingly, configuring port information according to Internet protocol address, comprising:
Port section is configured in Internet protocol address;Alternatively, configuration baseline port is believed in Internet protocol address Breath and port floating information, determine port information according to benchmark port information and port floating information.
Multiple port informations can be configured for each IP address.Or port section is arranged in each IP address, in turn Each port information in ports zone is monitored.Benchmark port information includes known available port, port floating information It identifies centered on benchmark port information, the port information to float up and down.For example, benchmark port information is 30, float letter for port Breath is 10, then port information to be detected is 20 (30-10) to 40 (30+10).
Step S120, judge whether proxy resources survive.
If proxy resources can reply the request of visitor, proxy resources are survival.It in one implementation, can be with By sending data packet to proxy resources, determine whether proxy resources survive according to the feedback of data packet.It specifically includes: root Data packet is sent according to Internet protocol address and port information, determines whether proxy resources are deposited according to the reception information of data packet It is living.
If to proxy resources send data packet after, proxy resources mutually should data packet, then can receive feedback information, into And it determines the proxy resources and survives.After sending data packet, if (such as 2 seconds) do not receive the anti-of data packet within a preset time Feedforward information, it is determined that the proxy resources are not survived.
Optionally, if proxy resources are judged as after not surviving, it can monitor and not survive according to the default check period Whether proxy resources revert to survival.
If step S130, proxy resources are survived, according to proxy resources access target website.
Targeted website is the network address of network O&M personnel setting.Network address can may be foreign network for website in the country's network address It stands network address.It can be operated by proxy resources analog subscriber, access target website.Monitor the information of targeted website feedback.
If step S140, accessing successfully, it is determined that proxy resources are effective.
If targeted website has sent feedback information, illustrate that proxy resources are effective.If targeted website is not fed back, Although illustrating that proxy resources are survived, proxy resources can not be used as proxy access targeted website, then proxy resources are invalid.
Proxy resources monitoring method provided in an embodiment of the present invention, configures proxy resources to be monitored;Judge the agency Whether resource survives;If the proxy resources survival, according to proxy resources access target website;If accessing successfully, Then determine that the proxy resources are effective.Higher, the agency provided in an embodiment of the present invention relative to current proxy resources monitoring cost Monitoring resource scheme can be judged automatically whether proxy resources survive by electronic equipment, when determining proxy resources survival, be passed through The proxy resources access target website, and then the validity of the proxy resources is verified, it does not need to analyze simultaneously without reverse-direction derivation It does not need to acquire a large amount of datas on flows, improves proxy resources monitoring efficiency, reduce proxy resources monitoring cost yet.
Further, when stating embodiment on the implementation, inventor's discovery is after carrying out a proxy resources monitoring, if agency Resource then fails, then can not timely feedback proxy resources real time information.Based on this, the embodiment of the invention provides a kind of agencies Monitoring resource method, Fig. 3 are a kind of schematic diagram of proxy resources monitoring method provided in an embodiment of the present invention, comprising:
Step S210, proxy resources to be monitored are configured.
Step S220, judge whether proxy resources survive.
If step S230, proxy resources are survived, according to proxy resources access target website.
If step S240, accessing successfully, it is determined that proxy resources are effective.
Step S250, according to access frequency is preset, proxy resources access target website is used.
Default access frequency can be primary for every 1-10 minutes, and preferably every 5 minutes primary.
If step S260, accessing successfully, the effective information of renewal agency resource.
Proxy resources monitoring method provided in an embodiment of the present invention, can be after the effective proxy resources of determination, according to pre- If access frequency repeated accesses targeted website, guarantee proxy resources continuous and effective, improves proxy resources timeliness.
Further, when electronic equipment determines whether proxy resources are effective, network O&M personnel, which can not be known, works as former generation Manage Resource Availability.In order to solve this problem, the embodiment of the invention provides a kind of proxy resources monitoring method, Fig. 4 is this hair A kind of schematic diagram for proxy resources monitoring method that bright embodiment provides, comprising:
Step S310, proxy resources to be monitored are configured.
Step S320, judge whether proxy resources survive.
If step S330, proxy resources are survived, according to proxy resources access target website.
If step S340, accessing successfully, it is determined that proxy resources are effective.
Step S350, Receiving Agent resource inquiry request.
Inquiry request can be initiated by the terminal communicated with electronic equipment.Inquiry request includes agency's money of inquiry Source.
Step S360, according to the status information of proxy resources inquiry request feedback agent resource.
When receiving proxy resources inquiry request, the status information of the proxy resources of this storage is read.Status information For indicating that proxy resources are effectively or invalid.
Proxy resources monitoring method provided in an embodiment of the present invention can receive network O&M personnel and look into proxy resources It askes, effective information is provided.
Proxy resources can be monitored in a manner of task based access control in an implementation of the embodiment of the present invention, into And can network-oriented operation maintenance personnel more convenient and fast proxy resources management is provided, Fig. 5 is one kind provided in an embodiment of the present invention The schematic diagram of proxy resources monitoring method, specifically includes:
Step S410, proxy resources to be monitored are configured.
Step S420, port monitoring task is established.
Network O&M personnel can establish port monitoring task in proxy resources management software.Port monitoring task is used for Whether monitoring port information and Internet protocol address survive;If the port information on internet protocol address is effective, phase Proxy resources are answered to survive.
Step S430, analog access task is established.
When monitoring task execution finishes when port, analog access task is established.Analog access task is for imitating user behaviour Make access target website.
If step S440, accessing successfully, it is determined that proxy resources are effective.
Step S450, after determining that proxy resources are effective, effective judgment module is established.
Effective judgment module persistently tracks effective proxy resources according to default access frequency.
The embodiment of the present invention by way of establishing task, can more convenient network O&M monitored by personnel proxy resources, Improve ease for use.
In a usage scenario, Step 1: artificial selected a collection of IP address, and its correspondence is configured to this collection of IP address Port.Artificial select refers to that user can set a collection of IP address, wherein may include to have according to the monitoring requirements of oneself The agent IP address of effect, while configuring a series of port, that is to say, that it may be external comprising multiple ports in some IP address Agency service is provided.
Step 2: task is created based on the IP address of step 1 setting and its configuration port, and in a manner of task Judge whether the port configured in selected each IP address survives, and saves judging result.
Step 3: from step 2 save judging result in filter out survival port and corresponding IP address, Then successively as proxy server, and several websites that analog access is manually set (website including home and overseas, such as Artificial settings website in the country is Baidu, and external website is America Online etc.).
Step 4: if several domestic outer nets that the proxy server analog access of step 3 configuration is manually set It stands, then can confirm the IP address and its corresponding port is proxy resources.
Step 5: it using fixed proxy resources as proxy server, by the frequency of setting, such as every 5 minutes, repeats Several home and abroad websites being manually set in analog access above-mentioned steps, if each time can each website of successful access, Then illustrate that the timeliness of the proxy resources is long.
Further, in general proxy resources all have certain timeliness, that is to say, that proxy resources may be very It is just failed in the short time.For the angle of network security management, the meaning of control will have a greatly reduced quality, so to pass through The mode of above-mentioned steps five, to further determine the timeliness length of some proxy resources.
Based on the above embodiment, it the embodiment of the invention also provides a kind of set up the scheme of proxy resources monitoring system, uses In realizing method provided by the above embodiment, as shown in fig. 6, the system includes: parameter configuration module 510, task management module 520, port status judgment module 530, act on behalf of analog access module 540, act on behalf of timeliness judgment module 550, data access mould Block 560, query statistic module 570.
Parameter configuration module 510: mainly configuring the parameters such as IP address and serve port Port, and wherein IP address is joined Number configuration support area divides, user is customized, file imports etc., and serve port Port parameter configuration supports fixed port, end Mouthful interval range, float up and down it is customized etc..
Task management module 520: it realizes to different form task involved in proxy resources monitoring process in spool Reason.The task type being related to includes instant task or timed task, single task or iterative task etc., and task category includes port State judges task, acts on behalf of analog access task, acts on behalf of timeliness and judge task dispatching.The online creation of support task deletes, adds The functions such as load, cancellation, monitoring.
Port status judgment module 530: for the IP address and its configuration port set in each task, judge each IP Whether all serve port Port configured on address survive.
It acts on behalf of analog access module 540: the survival port filtered out and corresponding IP address takes as agency Business device, several websites for going access to be manually set judge whether may have access to.
Act on behalf of timeliness judgment module 550: by the frequency using fixed proxy resources as proxy server by setting Rate repeats domestic and international website set by analog access to judge the timeliness of the proxy resources.
Data access module 560: it to port condition judgment module, analog access module is acted on behalf of, acts on behalf of timeliness and judges mould Data result caused by block etc. is stored, while providing query interface, meets service inquiry demand.
Query statistic module 570: service-oriented operator's demand provides all kinds of associated traffic data inquiries, statistics etc. Function.
Fig. 7 is a kind of structural schematic diagram of proxy resources monitoring device provided in an embodiment of the present invention, which can position In on electronic equipment, electronic equipment includes personal computer, laptop, tablet computer, smart phone etc., the device packet It includes: configuration module 31, judgment module 32, access modules 33 and determining module 34.
Configuration module 31, for configuring proxy resources to be monitored;
Whether judgment module 32, the proxy resources for judging that configuration module 31 configures survive;
Access modules 33, when determining proxy resources survival for judgment module 32, according to proxy resources access target website;
Determining module 34 determines that proxy resources are effective when accessing successfully for access modules 33.
Further, configuration module 31 is used for:
Configure the internet protocol address of proxy resources to be monitored;
Port information is configured according to Internet protocol address.
Further, configuration module 31 is used for:
Internet protocol address is imported by the first file, using the Internet protocol address of importing as agency to be monitored The Internet protocol address of resource;Alternatively,
Configure the Internet protocol address section of proxy resources to be monitored.
Correspondingly, configuring port information according to Internet protocol address, comprising:
Port section is configured in Internet protocol address;Alternatively,
Configuration baseline port information and port floating information in Internet protocol address, according to benchmark port information with And port floating information determines port information.
Further, judgment module 32 is used for:
Port monitoring task is established, whether port monitoring task deposits for monitoring port information and Internet protocol address It is living;If the port information on internet protocol address is effective, corresponding proxy resources survival;
Correspondingly, access modules 33 are used for:
Analog access task is established, analog access task is for imitating user's operation access target website.
Further, judgment module 32 is used for:
Data packet is sent according to Internet protocol address and port information;
Determine whether proxy resources survive according to the reception information of data packet.
Further, as shown in figure 8, further including actual effect monitoring modular 35 and enquiry module 36.
Actual effect monitoring modular 35 is used for: according to default access frequency, using proxy resources access target website;
If accessing successfully, the effective information of renewal agency resource.
Further, enquiry module 36 is used for:
Receiving Agent resource inquiry request;
According to the status information of proxy resources inquiry request feedback agent resource.
Proxy resources monitoring device provided in an embodiment of the present invention, configuration module 31, for configuring agency's money to be monitored Source;Whether judgment module 32, the proxy resources for judging that configuration module 31 configures survive;Access modules 33, for judging mould When block 32 determines proxy resources survival, according to proxy resources access target website;Determining module 34 is accessed for access modules 33 When success, determine that proxy resources are effective.Higher, the agency provided in an embodiment of the present invention relative to current proxy resources monitoring cost Monitoring resource scheme can be judged automatically whether proxy resources survive by electronic equipment, when determining proxy resources survival, be passed through The proxy resources access target website, and then the validity of the proxy resources is verified, it does not need to analyze simultaneously without reverse-direction derivation It does not need to acquire a large amount of datas on flows, improves proxy resources monitoring efficiency, reduce proxy resources monitoring cost yet.
Method provided by the executable aforementioned all embodiments of the present invention of above-mentioned apparatus, it is corresponding to have the execution above method Functional module and beneficial effect.The not technical detail of detailed description in the present embodiment, reference can be made to the aforementioned all implementations of the present invention Method provided by example.
Fig. 9 is the structural schematic diagram of a kind of electronic equipment provided in an embodiment of the present invention.Fig. 9, which is shown, to be suitable for being used to realizing The block diagram of the electronic equipment 312 of embodiment of the present invention.The electronic equipment 312 that Fig. 9 is shown is only an example, should not be to this The function and use scope of inventive embodiments bring any restrictions.Equipment 312 is typically the individual for monitor agent resource Computer, tablet computer, tablet computer or smart mobile phone.
As shown in figure 9, electronic equipment 312 is showed in the form of universal computing device.The component of electronic equipment 312 can wrap Include but be not limited to: one or more processor 316, storage device 328 connect different system components (including storage device 328 With processor 316) bus 318.
Bus 318 indicates one of a few class bus structures or a variety of, including memory bus or Memory Controller, Peripheral bus, graphics acceleration port, processor or the local bus using any bus structures in a variety of bus structures.It lifts For example, these architectures include but is not limited to industry standard architecture (Industry Standard Architecture, ISA) bus, microchannel architecture (Micro Channel Architecture, MCA) bus, enhancing Type isa bus, electronic multimedia Standard Association (Video Electronics Standards Association, VESA) office Domain bus and peripheral component interconnection (Peripheral Component Interconnect, PCI) bus.
Electronic equipment 312 typically comprises a variety of computer system readable media.These media can be it is any can be by The usable medium that electronic equipment 312 accesses, including volatile and non-volatile media, moveable and immovable medium.
Storage device 328 may include the computer system readable media of form of volatile memory, such as arbitrary access Memory (Random Access Memory, RAM) 330 and/or cache memory 332.Electronic equipment 312 can be into one Step includes other removable/nonremovable, volatile/non-volatile computer system storage mediums.Only as an example, it stores System 334 can be used for reading and writing immovable, non-volatile magnetic media (Fig. 9 do not show, commonly referred to as " hard disk drive "). Although being not shown in Fig. 9, the disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk ") can be provided, And to removable anonvolatile optical disk (such as CD-ROM (Compact Disc-Read Only Memory, CD-ROM), Digital video disk (Digital Video Disc-Read Only Memory, DVD-ROM) or other optical mediums) read-write light Disk drive.In these cases, each driver can pass through one or more data media interfaces and 318 phase of bus Even.Storage device 328 may include at least one program product, which has one group of (for example, at least one) program mould Block, these program modules are configured to perform the function of various embodiments of the present invention.
Program 336 with one group of (at least one) program module 326, can store in such as storage device 328, this The program module 326 of sample includes but is not limited to operating system, one or more application program, other program modules and program It may include the realization of network environment in data, each of these examples or certain combination.Program module 326 usually executes Function and/or method in embodiment described in the invention.
Electronic equipment 312 can also be (such as keyboard, sensing equipment, camera, aobvious with one or more external equipments 314 Show device 324 etc.) communication, the equipment interacted with the electronic equipment 312 can be also enabled a user to one or more to be communicated, and/ Or (such as network interface card is adjusted with any equipment for enabling the electronic equipment 312 to be communicated with one or more of the other calculating equipment Modulator-demodulator etc.) communication.This communication can be carried out by input/output (I/O) interface 322.Also, electronic equipment 312 Can also by network adapter 320 and one or more network (such as local area network (Local Area Network, LAN), Wide area network Wide Area Network, WAN) and/or public network, such as internet) communication.As shown, network adapter 320 are communicated by bus 318 with other modules of electronic equipment 312.It should be understood that although not shown in the drawings, can be in conjunction with electricity Sub- equipment 312 uses other hardware and/or software module, including but not limited to: microcode, device driver, redundancy processing are single Member, external disk drive array, disk array (Redundant Arrays of Independent Disks, RAID) system, Tape drive and data backup storage system etc..
The program that processor 316 is stored in storage device 328 by operation, thereby executing various function application and number According to processing, such as realize proxy resources monitoring method provided by the above embodiment of the present invention.
The embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, the journey The proxy resources monitoring method as provided by the embodiment of the present invention is realized when sequence is executed by processor.
Certainly, a kind of computer readable storage medium provided by the embodiment of the present invention, the computer program stored thereon It is not limited to method operation as above, the adjusting side of eyeball tracking sensor provided by any embodiment of the invention can also be performed Relevant operation in method.
The computer storage medium of the embodiment of the present invention, can be using any of one or more computer-readable media Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or Device, or any above combination.The more specific example (non exhaustive list) of computer readable storage medium includes: tool There are electrical connection, the portable computer diskette, hard disk, random access memory (RAM), read-only memory of one or more conducting wires (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD- ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage Medium can be any tangible medium for including or store program, which can be commanded execution system, device or device Using or it is in connection.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, Wherein carry computer-readable program code.The data-signal of this propagation can take various forms, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof Program code, programming language include object oriented program language-such as Java, Smalltalk, C++, are also wrapped Include conventional procedural programming language-such as " C " language or similar programming language.Program code can be complete Ground executes on the user computer, partly executes on the user computer, executing as an independent software package, partially existing Part executes on the remote computer or executes on a remote computer or server completely on subscriber computer.It is being related to In the situation of remote computer, remote computer can pass through the network of any kind --- including local area network (LAN) or wide area Net (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as utilize ISP To be connected by internet).
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that The present invention is not limited to specific embodiments here, be able to carry out for a person skilled in the art it is various it is apparent variation, again Adjustment and substitution are without departing from protection scope of the present invention.Therefore, although by above embodiments to the present invention carried out compared with For detailed description, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, can be with Including more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.

Claims (10)

1. a kind of proxy resources monitoring method characterized by comprising
Configure proxy resources to be monitored;
Judge whether the proxy resources survive;
If the proxy resources survival, according to proxy resources access target website;
If accessing successfully, it is determined that the proxy resources are effective.
2. proxy resources monitoring method according to claim 1, which is characterized in that configuration agency's money to be monitored Source, comprising:
Configure the internet protocol address of proxy resources to be monitored;
Port information is configured according to the Internet protocol address.
3. proxy resources monitoring method according to claim 2, which is characterized in that configuration proxy resources to be monitored Internet protocol address, comprising:
Internet protocol address is imported by the first file, using the Internet protocol address of importing as proxy resources to be monitored Internet protocol address;Alternatively,
Configure the Internet protocol address section of proxy resources to be monitored.
Correspondingly, described configure port information according to the Internet protocol address, comprising:
Port section is configured in the Internet protocol address;Alternatively,
Configuration baseline port information and port floating information in the Internet protocol address, according to the reference edge message Breath and port floating information determine port information.
4. proxy resources monitoring method according to claim 2, which is characterized in that described whether to judge the proxy resources Survival, comprising:
Establish port monitoring task, whether port monitoring task is for monitoring the port information and Internet protocol address Survival;If the port information on the internet protocol address is effective, corresponding proxy resources survival;
Correspondingly, if the proxy resources are survived, according to proxy resources access target website, comprising:
Analog access task is established, the analog access task is for imitating user's operation access target website.
5. proxy resources monitoring method according to claim 1, which is characterized in that described whether to judge the proxy resources Survival, comprising:
Data packet is sent according to the Internet protocol address and port information;
Determine whether the proxy resources survive according to the reception information of the data packet.
6. proxy resources monitoring method according to any one of claims 1-5, which is characterized in that determining the agency After resource is effective, further includes:
According to default access frequency, the targeted website is accessed using the proxy resources;
If accessing the effective information for successfully updating the proxy resources.
7. proxy resources monitoring method according to claim 6, which is characterized in that determine the proxy resources effectively it Afterwards, further includes:
Receiving Agent resource inquiry request;
The status information of the proxy resources is fed back according to the proxy resources inquiry request.
8. a kind of proxy resources monitoring device characterized by comprising
Configuration module, for configuring proxy resources to be monitored;
Judgment module, for judging whether the proxy resources of the configuration module configuration survive;
Access modules, when determining proxy resources survival for the judgment module, according to the proxy resources access target Website;
Determining module determines that the proxy resources are effective when accessing successfully for the access modules.
9. a kind of electronic equipment including memory, processor and stores the meter that can be run on a memory and on a processor Calculation machine program, which is characterized in that the processor realizes the agency as described in any in claim 1-7 when executing described program Monitoring resource method.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The proxy resources monitoring method as described in any in claim 1-7 is realized when execution.
CN201910328247.9A 2019-04-23 2019-04-23 A kind of proxy resources monitoring method, device, electronic equipment and storage medium Pending CN110034979A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910328247.9A CN110034979A (en) 2019-04-23 2019-04-23 A kind of proxy resources monitoring method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910328247.9A CN110034979A (en) 2019-04-23 2019-04-23 A kind of proxy resources monitoring method, device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN110034979A true CN110034979A (en) 2019-07-19

Family

ID=67239797

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910328247.9A Pending CN110034979A (en) 2019-04-23 2019-04-23 A kind of proxy resources monitoring method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110034979A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572375A (en) * 2019-08-21 2019-12-13 北京金堤科技有限公司 IP address proxy method and device
CN112383626A (en) * 2020-11-16 2021-02-19 深圳市友华软件科技有限公司 Data reporting method and device in Internet of things
CN113449296A (en) * 2021-07-20 2021-09-28 恒安嘉新(北京)科技股份公司 System, method, apparatus, and medium for data security protection

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1549510A (en) * 2003-05-16 2004-11-24 中国移动通信集团公司 Method for proxy accessing informatin at Log-on interface of managed system
WO2016138612A1 (en) * 2015-03-02 2016-09-09 Microsoft Technology Licensing, Llc Proxy service for uploading data from a source to a destination
CN107948249A (en) * 2017-11-02 2018-04-20 华南理工大学 Big data plateau elastic telescopic method based on service discovery and container technique
CN107957999A (en) * 2016-10-14 2018-04-24 北京国双科技有限公司 A kind of web crawlers obtains the method and device of website data
CN108616525A (en) * 2018-04-16 2018-10-02 深圳市小满科技有限公司 Website access method and device, electronic equipment and storage medium
CN108924199A (en) * 2018-06-21 2018-11-30 中山英迈锐信息技术有限公司 Crawlers obtain the method, apparatus, computer storage medium and terminal device of network proxy server automatically
CN109274782A (en) * 2018-08-24 2019-01-25 北京创鑫旅程网络技术有限公司 A kind of method and device acquiring website data

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1549510A (en) * 2003-05-16 2004-11-24 中国移动通信集团公司 Method for proxy accessing informatin at Log-on interface of managed system
WO2016138612A1 (en) * 2015-03-02 2016-09-09 Microsoft Technology Licensing, Llc Proxy service for uploading data from a source to a destination
CN107957999A (en) * 2016-10-14 2018-04-24 北京国双科技有限公司 A kind of web crawlers obtains the method and device of website data
CN107948249A (en) * 2017-11-02 2018-04-20 华南理工大学 Big data plateau elastic telescopic method based on service discovery and container technique
CN108616525A (en) * 2018-04-16 2018-10-02 深圳市小满科技有限公司 Website access method and device, electronic equipment and storage medium
CN108924199A (en) * 2018-06-21 2018-11-30 中山英迈锐信息技术有限公司 Crawlers obtain the method, apparatus, computer storage medium and terminal device of network proxy server automatically
CN109274782A (en) * 2018-08-24 2019-01-25 北京创鑫旅程网络技术有限公司 A kind of method and device acquiring website data

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572375A (en) * 2019-08-21 2019-12-13 北京金堤科技有限公司 IP address proxy method and device
CN110572375B (en) * 2019-08-21 2021-08-17 北京金堤科技有限公司 IP address proxy method and device
CN112383626A (en) * 2020-11-16 2021-02-19 深圳市友华软件科技有限公司 Data reporting method and device in Internet of things
CN113449296A (en) * 2021-07-20 2021-09-28 恒安嘉新(北京)科技股份公司 System, method, apparatus, and medium for data security protection
CN113449296B (en) * 2021-07-20 2024-04-23 恒安嘉新(北京)科技股份公司 System, method, device and medium for data security protection

Similar Documents

Publication Publication Date Title
CN101764819A (en) methods and systems for detecting man-in-the-browser attacks
CN103139137B (en) Network service provider method and device
CN110034979A (en) A kind of proxy resources monitoring method, device, electronic equipment and storage medium
CN104410813A (en) Method and device for binding user account with monitoring equipment in video monitoring system
CN103780641B (en) Access method, home gateway and the system of cloud desktop
CN104717284A (en) Menu management method, device and system
CN104468592A (en) Login method and system
CN106789227B (en) A kind of internet behavior analysis method and internet behavior analytical equipment
CN103067372B (en) Cloud terminal logs in method and the login system of Cloud Server
CN109710490A (en) Acquisition method, device, storage medium and the electronic equipment of client log
CN104660557A (en) Operation processing method and device
CN109067785A (en) Cluster authentication method, device
CN103179099A (en) Unified certification method for accessing to open website platforms and website platform
CN105992204A (en) Access authentication method of applications of mobile intelligent terminal and device
CN109831310B (en) Identity verification method, system, equipment and computer readable storage medium
CN105208560A (en) WiFi certification-free log-in method, device and system
CN109981745A (en) A kind of journal file processing method and server
CN109783357A (en) The method and device of test application program, computer equipment, storage medium
CN105991610B (en) Log in the method and device of application server
CN106355470A (en) E-commerce snapping-up method and system
CN105306202A (en) Identity verification method and device, server
CN105184559B (en) A kind of payment system and method
CN103164324A (en) Microblog test method and device
CN102420808A (en) Method for realizing single signon on telecom on-line business hall
CN102299945A (en) Gateway configuration page registration method, system thereof and portal certificate server

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190719

RJ01 Rejection of invention patent application after publication