CN111209149B - Server stability testing method and system - Google Patents
Server stability testing method and system Download PDFInfo
- Publication number
- CN111209149B CN111209149B CN201911416759.7A CN201911416759A CN111209149B CN 111209149 B CN111209149 B CN 111209149B CN 201911416759 A CN201911416759 A CN 201911416759A CN 111209149 B CN111209149 B CN 111209149B
- Authority
- CN
- China
- Prior art keywords
- test
- file
- server
- data
- error
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000012430 stability testing Methods 0.000 title claims abstract description 12
- 238000012360 testing method Methods 0.000 claims abstract description 152
- 241000700605 Viruses Species 0.000 claims abstract description 62
- 238000004364 calculation method Methods 0.000 claims description 14
- 238000012986 modification Methods 0.000 claims description 8
- 230000004048 modification Effects 0.000 claims description 8
- 230000005540 biological transmission Effects 0.000 claims description 7
- 230000002155 anti-virotic effect Effects 0.000 claims description 6
- 238000013500 data storage Methods 0.000 claims description 6
- 230000008878 coupling Effects 0.000 description 3
- 238000010168 coupling process Methods 0.000 description 3
- 238000005859 coupling reaction Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 238000004519 manufacturing process Methods 0.000 description 3
- 238000006467 substitution reaction Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000011056 performance test Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 238000013112 stability test Methods 0.000 description 1
- 238000010998 test method Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/22—Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
- G06F11/2273—Test methods
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
- G06F21/562—Static detection
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0825—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Virology (AREA)
- Quality & Reliability (AREA)
- Test And Diagnosis Of Digital Computers (AREA)
- Debugging And Monitoring (AREA)
Abstract
The invention provides a method and a system for testing the stability of a server, comprising the following steps: acquiring a test file from an auxiliary terminal through a serial port; executing the test program to obtain test data; encrypting the test data; judging that the test is passed according to whether the error between the test data and the standard value is within a preset error threshold range or not; according to the server stability testing method and system provided by the invention, virus scanning is carried out before testing, the safety of the server can be ensured, and the adopted performance judgment method is convenient for technicians to visually analyze the performance of the server, so that the server is convenient to maintain; the encryption method adopted by the invention can realize three-level encryption of the test data, and improves the security of the test data.
Description
Technical Field
The invention belongs to the technical field of server detection, and particularly relates to a method and a system for testing the stability of a server.
Background
With the development of cloud computing technology, a data center containing a large number of servers becomes indispensable, and the stability of the servers becomes a key point of attention. As the scale of computer products increases and the complexity of computer products increases, their performance is receiving more and more attention from the industry, and performance testing performed to verify the performance of the system becomes more and more important.
In daily production, a server needs to perform stability test on a product in both a development stage and a production stage. In the conventional test method, generally, a single server is tested by a tool or a script in a manner of DC power on/off, cold Reset, and the like.
The existing testing mode is complex and the testing efficiency is low; the testing precision is low, the testing deviation is easy to cause, and the production of the server is influenced; in addition, viruses are easy to invade the server in the testing process, and serious threats are caused to the safety of data inside the server.
Disclosure of Invention
In view of the above-mentioned deficiencies of the prior art, the present invention provides a method and a system for testing server stability, so as to solve the above-mentioned technical problems.
In a first aspect, the present invention provides a server stability testing method, including:
acquiring a test file from an auxiliary terminal through a serial port;
executing the test program to obtain test data;
encrypting the test data;
and judging that the test is passed if the error between the test data and the standard value is within the preset error threshold range.
Further, the method further comprises:
receiving a test file, and transmitting the test file to a virus characteristic database to detect whether a virus characteristic code is contained;
if yes, upgrading the local virus characteristic database to a target virus database, scanning the compared test file by using an antivirus engine, and continuously matching the test file with virus data in the target virus database;
the scanning result after virus scanning comprises file attribute information determined to be a malicious file or a non-malicious file, wherein the file attribute information comprises file size, file modification time and file path.
Further, the test data includes the startup duration, the shutdown duration, the average data transmission rate, the bug generation times and the bug interval time of the server to be tested.
Further, the encrypting the test data comprises the following steps:
encrypting the test data by using a first public key to obtain a primary encrypted data packet;
encrypting the first-level encrypted data packet by using a second public key to obtain a second-level encrypted data packet;
and encrypting the second-level encrypted data packet by adopting a second public key to obtain a third-level data encrypted packet, namely completing the encryption of the test.
Further, the method further comprises:
calculating the average value of the test data obtained for multiple times, and carrying out error calculation on the average value and preset data;
if the error is less than 0.5%, judging that the performance of the server to be tested is excellent;
if the error is more than or equal to 0.5% and less than 1%, judging that the performance of the server to be tested is good;
if the error is more than or equal to 1% and less than 2%, judging that the performance of the server to be tested is general;
and if the error is more than or equal to 2%, determining that the performance of the server to be tested is poor.
In a second aspect, the present invention provides a server stability testing system, including:
the file acquisition unit is configured to acquire a test file from the auxiliary terminal through a serial port;
the program execution unit is configured to execute the test program to obtain test data;
the data encryption unit is configured to encrypt the test data;
and the test judgment unit is configured for judging that the test is passed according to whether the error between the test data and the standard value is within a preset error threshold range or not.
Further, the system further comprises a virus scanning unit, the virus scanning unit comprising:
the feature code comparison module is configured for receiving the test file and transmitting the test file to the virus feature database to detect whether the virus feature code is contained;
the virus matching module is configured to upgrade the local virus characteristic database into a target virus database if the local virus characteristic database exists, scan the compared test file by using the antivirus engine, and continuously match the test file with virus data in the target virus database;
and the result output module is configured to enable the scanning result after virus scanning to comprise file attribute information determined as a malicious file or a non-malicious file, wherein the file attribute information comprises file size, file modification time and file path.
Further, the system further comprises a test data storage unit,
the test data storage unit is configured to store the startup time, the shutdown time, the average data transmission rate, the bug generation times and the bug interval time of the server to be tested.
Further, the data encryption unit includes:
the first-level encryption module is configured for encrypting a first public key of the test data to obtain a first-level encrypted data packet;
the second-level encryption module is configured to encrypt the first-level encrypted data packet by using a second public key to obtain a second-level encrypted data packet;
and the third-level encryption module is configured to encrypt the second-level encrypted data packet by adopting a second public key to obtain a third-level data encryption packet, namely, to complete the encryption of the test.
Further, the test judgment unit includes:
the average value calculation module is configured for calculating the average value of the test data obtained for multiple times;
the error calculation module is configured for performing error calculation on the average value and preset data;
the performance judgment module is configured to judge that the server to be tested has excellent performance if the error is less than 0.5 percent;
if the error is more than or equal to 0.5% and less than 1%, judging that the performance of the server to be tested is good;
if the error is more than or equal to 1% and less than 2%, judging that the performance of the server to be tested is general;
and if the error is more than or equal to 2%, determining that the performance of the server to be tested is poor.
The beneficial effect of the invention is that,
according to the server stability testing method and system provided by the invention, virus scanning is carried out before testing, so that the safety of the server can be ensured, and the adopted file virus scanning method does not need to decomcompile the file to be scanned, so that the time for determining the virus file is effectively reduced, meanwhile, a large amount of memory is avoided, and the scanning speed is improved; the test is carried out in a repeated test mode, so that the running conditions of the server in different time periods can be tested, and the test accuracy is improved; the performance judgment method adopted by the invention is convenient for technicians to visually analyze the performance of the server, thereby being convenient for maintaining the server; the encryption method adopted by the invention can realize three-level encryption of the test data, and improves the security of the test data.
In addition, the invention has reliable design principle, simple structure and very wide application prospect.
Drawings
In order to more clearly illustrate the embodiments or technical solutions in the prior art of the present invention, the drawings used in the description of the embodiments or prior art will be briefly described below, and it is obvious for those skilled in the art that other drawings can be obtained based on these drawings without creative efforts.
FIG. 1 is a schematic flow diagram of a method of one embodiment of the invention.
FIG. 2 is a schematic block diagram of a system of one embodiment of the present invention.
Detailed Description
In order to make those skilled in the art better understand the technical solution of the present invention, the technical solution in the embodiment of the present invention will be clearly and completely described below with reference to the drawings in the embodiment of the present invention, and it is obvious that the described embodiment is only a part of the embodiment of the present invention, and not all embodiments. All other embodiments, which can be obtained by a person skilled in the art without making any creative effort based on the embodiments in the present invention, shall fall within the protection scope of the present invention.
FIG. 1 is a schematic flow diagram of a method of one embodiment of the invention. The execution subject in fig. 1 may be a server stability testing system.
As shown in fig. 1, the method 100 includes:
and 140, judging that the test is passed according to whether the error between the test data and the standard value is within a preset error threshold range or not.
Optionally, as an embodiment of the present invention, the method further includes:
receiving a test file, and transmitting the test file to a virus characteristic database to detect whether a virus characteristic code is contained;
if yes, upgrading the local virus characteristic database to a target virus database, scanning the compared test file by using an antivirus engine, and continuously matching the test file with virus data in the target virus database;
the scanning result after virus scanning comprises file attribute information determined to be a malicious file or a non-malicious file, wherein the file attribute information comprises file size, file modification time and file path.
Optionally, as an embodiment of the present invention, the test data includes a startup duration, a shutdown duration, a data transmission average rate, a bug generation frequency, and a bug interval time of the server to be tested.
Optionally, as an embodiment of the present invention, the encrypting the test data includes:
encrypting the test data by using a first public key to obtain a primary encrypted data packet;
encrypting the first-level encrypted data packet by using a second public key to obtain a second-level encrypted data packet;
and encrypting the second-level encrypted data packet by adopting a second public key to obtain a third-level data encrypted packet, namely completing the encryption of the test.
Optionally, as an embodiment of the present invention, the method further includes:
calculating the average value of the test data obtained for multiple times, and carrying out error calculation on the average value and preset data;
if the error is less than 0.5%, judging that the performance of the server to be tested is excellent;
if the error is more than or equal to 0.5% and less than 1%, judging that the performance of the server to be tested is good;
if the error is more than or equal to 1% and less than 2%, judging that the performance of the server to be tested is general;
and if the error is more than or equal to 2%, determining that the performance of the server to be tested is poor.
In order to facilitate understanding of the present invention, the server stability testing method provided in the present invention is further described below with reference to the principle of the server stability testing method of the present invention and the process of testing the performance of the server in the embodiments.
Specifically, the server stability testing method includes:
s1, acquiring a test file from an auxiliary terminal through a serial port;
the method comprises the steps of connecting a test terminal with a server to be tested through a serial port, sending a test instruction to the test terminal by the server to be tested, and sending a test file to the server to be tested by the test terminal.
S2, executing the test program to obtain test data;
the server executes a test program in the test file to perform performance test according to the received test file, and finally outputs test data; the test data comprise the starting-up time, the shutdown time, the average data transmission rate, the bug generation times and the bug interval time of the server to be tested, the test data all reflect the performance of the server, in order to avoid the contingency of the data, the embodiment adopts the same test mode for 4 times to test, the time interval between two adjacent tests is 1-2h, the test time is 20min-30min each time, and the test mode can test the running condition of the server in different time periods, so that the test accuracy is improved.
S3, encrypting the test data;
and the test data is encrypted by three different public keys, so that the safety of the data is ensured, and the information of the server is prevented from being stolen.
And S4, judging that the test is passed according to whether the error between the test data and the standard value is within a preset error threshold value range or not.
In the step S2, multiple tests are carried out to avoid the accidental of the data, then the average value of the test data obtained by the multiple tests is obtained, the error calculation is carried out on the average value and the preset data, whether the error is in a reasonable threshold range or not is judged, and the performance of the server to be tested is judged according to the error calculation, so that technicians can visually analyze the performance of the server, and the server can be maintained conveniently.
As shown in fig. 2, the system 200 includes:
a file obtaining unit 210 configured to obtain a test file from the auxiliary terminal through the serial port;
a program executing unit 220 configured to execute the test program to obtain test data;
a data encryption unit 230 configured to encrypt the test data;
and the test judgment unit 240 is configured to judge that the test is passed according to whether the error between the test data and the standard value is within a preset error threshold range or not.
Optionally, as an embodiment of the present invention, the system further includes a virus scanning unit, where the virus scanning unit includes:
the characteristic code comparison module is configured for receiving the test file and transmitting the test file to the virus characteristic database to detect whether the virus characteristic code is contained;
the virus matching module is configured to upgrade the local virus characteristic database to a target virus database if the local virus characteristic database exists, scan the compared test file by using the antivirus engine, and continuously match the test file with virus data in the target virus database;
and the result output module is configured to enable the scanning result after virus scanning to comprise file attribute information determined to be a malicious file or a non-malicious file, wherein the file attribute information comprises file size, file modification time and file path.
Optionally, as an embodiment of the present invention, the system further includes a test data storage unit,
the test data storage unit is configured to store the startup time, the shutdown time, the average data transmission rate, the bug generation times and the bug interval time of the server to be tested.
Optionally, as an embodiment of the present invention, the data encryption unit includes:
the first-level encryption module is configured for encrypting a first public key of the test data to obtain a first-level encrypted data packet;
the second-level encryption module is configured to encrypt the first-level encrypted data packet by using a second public key to obtain a second-level encrypted data packet;
and the third-level encryption module is configured to encrypt the second-level encrypted data packet by adopting a second public key to obtain a third-level data encryption packet, namely, to complete the encryption of the test.
Optionally, as an embodiment of the present invention, the test determining unit includes:
the average value calculation module is configured for calculating the average value of the test data obtained for multiple times;
the error calculation module is configured for performing error calculation on the average value and preset data;
the performance judgment module is configured to judge that the server to be tested has excellent performance if the error is less than 0.5 percent;
if the error is more than or equal to 0.5% and less than 1%, judging that the performance of the server to be tested is good;
if the error is more than or equal to 1% and less than 2%, judging that the performance of the server to be tested is general;
and if the error is more than or equal to 2%, determining that the performance of the server to be tested is poor.
Therefore, the server stability testing method and system provided by the invention can ensure the safety of the server by scanning the viruses before testing, and the adopted file virus scanning method does not need to perform decompilation on the file to be scanned, thereby effectively reducing the time for determining the virus file, avoiding a large amount of occupied memory and improving the scanning speed; the testing is carried out by adopting a multi-time testing mode, so that the running conditions of the server in different time periods can be tested, and the testing accuracy is further improved; the performance judgment method adopted by the invention is convenient for technicians to visually analyze the performance of the server, thereby being convenient for maintaining the server; the encryption method adopted by the invention can realize three-level encryption of the test data, so that the safety of the test data is improved.
Those skilled in the art will readily appreciate that the techniques of the embodiments of the present invention may be implemented using software plus any required general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be embodied in the form of a software product, where the computer software product is stored in a storage medium, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and the like, and the storage medium can store program codes, and includes instructions for enabling a computer terminal (which may be a personal computer, a server, or a second terminal, a network terminal, and the like) to perform all or part of the steps of the method in the embodiments of the present invention.
The same and similar parts in the various embodiments in this specification may be referred to each other. Especially, for the terminal embodiment, since it is basically similar to the method embodiment, the description is relatively simple, and the relevant points can be referred to the description in the method embodiment.
In the embodiments provided by the present invention, it should be understood that the disclosed system, system and method can be implemented in other ways. For example, the above-described system embodiments are merely illustrative, and for example, the division of the units is only one logical functional division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, systems or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
Although the present invention has been described in detail by referring to the drawings in connection with the preferred embodiments, the present invention is not limited thereto. Various equivalent modifications or substitutions can be made on the embodiments of the present invention by those skilled in the art without departing from the spirit and scope of the present invention, and these modifications or substitutions should be within the scope of the present invention/any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present disclosure and the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (6)
1. A method for testing the stability of a server is characterized by comprising the following steps:
acquiring a test file from an auxiliary terminal through a serial port;
executing the test program in the test file to obtain test data;
encrypting the test data;
judging that the test is passed according to whether the error between the test data and the standard value is within a preset error threshold range or not;
the method further comprises the following steps:
receiving a test file, and transmitting the test file to a virus characteristic database to detect whether a virus characteristic code is contained;
if yes, upgrading the local virus characteristic database to a target virus database, scanning the compared test file by using an antivirus engine, and continuously matching the test file with virus data in the target virus database;
the scanning result after virus scanning comprises file attribute information which is determined to be a malicious file or a non-malicious file, wherein the file attribute information comprises file size, file modification time and file path;
the test data comprises the startup time length, the shutdown time length, the average data transmission rate, the bug generation times and the bug interval time of the server to be tested.
2. The method for testing the stability of the server according to claim 1, wherein the encrypting the test data comprises:
encrypting the test data by using a first public key to obtain a primary encrypted data packet;
encrypting the first-level encrypted data packet by using a second public key to obtain a second-level encrypted data packet;
and encrypting the second-level encrypted data packet by adopting a second public key to obtain a third-level data encrypted packet, namely completing the encryption of the test.
3. The method for testing the stability of the server according to claim 1, wherein the method further comprises:
calculating the average value of the test data obtained for multiple times, and carrying out error calculation on the average value and preset data;
if the error is less than 0.5%, judging that the performance of the server to be tested is excellent;
if the error is more than or equal to 0.5% and less than 1%, judging that the performance of the server to be tested is good;
if the error is more than or equal to 1% and less than 2%, judging that the performance of the server to be tested is general;
and if the error is more than or equal to 2%, determining that the performance of the server to be tested is poor.
4. A server stability testing system, comprising:
the file acquisition unit is configured to acquire a test file from the auxiliary terminal through a serial port;
the program execution unit is configured to execute the test program in the test file to obtain test data;
the data encryption unit is configured to encrypt the test data;
the test judgment unit is configured for judging whether the error between the test data and the standard value is within a preset error threshold value range or not, and if so, judging that the test is passed;
the system further includes a virus scanning unit, the virus scanning unit comprising:
the characteristic code comparison module is configured for receiving the test file and transmitting the test file to the virus characteristic database to detect whether the virus characteristic code is contained;
the virus matching module is configured to upgrade the local virus characteristic database into a target virus database if the local virus characteristic database exists, scan the compared test file by using the antivirus engine, and continuously match the test file with virus data in the target virus database;
the result output module is configured for scanning results after virus scanning to comprise file attribute information determined as malicious files or non-malicious files, wherein the file attribute information comprises file size, file modification time and file paths;
the system further comprises a test data storage unit,
the test data storage unit is configured to store the startup time, the shutdown time, the average data transmission rate, the bug generation times and the bug interval time of the server to be tested.
5. The system for testing the stability of the server according to claim 4, wherein the data encryption unit comprises:
the first-level encryption module is configured to encrypt the first public key of the test data to obtain a first-level encrypted data packet;
the second-level encryption module is configured to encrypt the first-level encrypted data packet by using a second public key to obtain a second-level encrypted data packet;
and the third-level encryption module is configured to encrypt the second-level encrypted data packet by adopting a second public key to obtain a third-level data encryption packet, namely, to complete the encryption of the test.
6. The system according to claim 4, wherein the test determining unit comprises:
the average value calculation module is configured for calculating the average value of the test data obtained for multiple times;
the error calculation module is configured for performing error calculation on the average value and preset data;
the performance judgment module is configured to judge that the performance of the server to be tested is excellent if the error is less than 0.5%;
if the error is more than or equal to 0.5% and less than 1%, judging that the performance of the server to be tested is good;
if the error is more than or equal to 1% and less than 2%, judging that the performance of the server to be tested is general;
and if the error is more than or equal to 2%, determining that the performance of the server to be tested is poor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911416759.7A CN111209149B (en) | 2019-12-31 | 2019-12-31 | Server stability testing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911416759.7A CN111209149B (en) | 2019-12-31 | 2019-12-31 | Server stability testing method and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111209149A CN111209149A (en) | 2020-05-29 |
CN111209149B true CN111209149B (en) | 2022-11-18 |
Family
ID=70789821
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911416759.7A Active CN111209149B (en) | 2019-12-31 | 2019-12-31 | Server stability testing method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111209149B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115118627B (en) * | 2022-08-29 | 2022-12-09 | 卡斯柯信号(北京)有限公司 | Temporary speed limiting server testing method and device |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108021479A (en) * | 2017-12-05 | 2018-05-11 | 郑州云海信息技术有限公司 | A kind of test method, device and the equipment of storage medium and server stability |
CN108280347A (en) * | 2017-12-25 | 2018-07-13 | 北京奇安信科技有限公司 | A kind of method and device of virus scan |
-
2019
- 2019-12-31 CN CN201911416759.7A patent/CN111209149B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108021479A (en) * | 2017-12-05 | 2018-05-11 | 郑州云海信息技术有限公司 | A kind of test method, device and the equipment of storage medium and server stability |
CN108280347A (en) * | 2017-12-25 | 2018-07-13 | 北京奇安信科技有限公司 | A kind of method and device of virus scan |
Also Published As
Publication number | Publication date |
---|---|
CN111209149A (en) | 2020-05-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11218510B2 (en) | Advanced cybersecurity threat mitigation using software supply chain analysis | |
US20200259866A1 (en) | Rating organization cybersecurity using active and passive external reconnaissance | |
CN108471429B (en) | Network attack warning method and system | |
EP4080368A1 (en) | Alarm information generation method and apparatus, electronic device, and storage medium | |
US20220210202A1 (en) | Advanced cybersecurity threat mitigation using software supply chain analysis | |
Ugarte-Pedrero et al. | Countering entropy measure attacks on packed software detection | |
US20210281609A1 (en) | Rating organization cybersecurity using probe-based network reconnaissance techniques | |
Nguyen et al. | Human-in-the-loop XAI-enabled vulnerability detection, investigation, and mitigation | |
Tabrizi et al. | A model-based intrusion detection system for smart meters | |
CN109446053A (en) | Test method, computer readable storage medium and the terminal of application program | |
Choi et al. | All‐in‐One Framework for Detection, Unpacking, and Verification for Malware Analysis | |
CN111209149B (en) | Server stability testing method and system | |
US11550920B2 (en) | Determination apparatus, determination method, and determination program | |
Ntambu et al. | Machine learning-based anomalies detection in cloud virtual machine resource usage | |
CN105207842A (en) | Android plug-in characteristic detection method and system | |
Feng et al. | Selecting critical data flows in Android applications for abnormal behavior detection | |
CN115827379A (en) | Abnormal process detection method, device, equipment and medium | |
Alsumaidaie et al. | An Assessment of Ensemble Voting Approaches, Random Forest, and Decision Tree Techniques in Detecting Distributed Denial of Service (DDoS) Attacks | |
CN115643044A (en) | Data processing method, device, server and storage medium | |
CN112084504A (en) | Virus file processing method and device, electronic equipment and readable storage medium | |
CN115102728B (en) | Scanner identification method, device, equipment and medium for information security | |
Lyu et al. | AGCM: A multi-stage attack correlation and scenario reconstruction method based on graph aggregation | |
CN113992436B (en) | Local information generating method, device, equipment and storage medium | |
Ekroth et al. | Data Quality Analysis and Improvements in Malware Information Sharing Platform (MISP) | |
US20240195841A1 (en) | System and method for manipulation of secure data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |