CN111949980A - Target client monitoring method and device, storage medium and electronic device - Google Patents
Target client monitoring method and device, storage medium and electronic device Download PDFInfo
- Publication number
- CN111949980A CN111949980A CN202010858741.9A CN202010858741A CN111949980A CN 111949980 A CN111949980 A CN 111949980A CN 202010858741 A CN202010858741 A CN 202010858741A CN 111949980 A CN111949980 A CN 111949980A
- Authority
- CN
- China
- Prior art keywords
- target
- target client
- client
- log
- communication connection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/50—Allocation of resources, e.g. of the central processing unit [CPU]
- G06F9/5061—Partitioning or combining of resources
- G06F9/5072—Grid computing
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Mathematical Physics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a target client monitoring method and device, a storage medium and an electronic device. Wherein, the method comprises the following steps: acquiring a target log generated in the running process of a target client, wherein the target client supports code implantation; under the condition that the target client side is determined to have external attack according to the target log, sending a target code to the target client side; the target client side runs the target code to prevent external attack, the target code is sent to the target client side under the condition that the target client side in the edge technology network is attacked, the target client side runs the target code to resist the external attack, the safety of the target client side is guaranteed, the technical effect of further guaranteeing the safety of the edge technology network is achieved, and the technical problem that the mode of improving the data safety of the edge computing network is single in the prior art is solved.
Description
Technical Field
The invention relates to the field of computers, in particular to a target client monitoring method and device, a storage medium and an electronic device.
Background
The development of edge computing reduces the load of cloud computing, and new problems are brought about because more core capabilities such as network connection, computing, storage and the like are given to the edge. First, process monitoring, where more processing occurs at the edge, lacks uniform supervision. Secondly, the security of the access identification algorithm is gradually reduced along with the time, and the whole network can be utilized after the access identification algorithm is cracked, so as to provide false data for other clients, and further influence the data security of the whole edge computing network.
At present, in order to improve the data security of an edge computing network, the existing high-complexity identification access algorithm is used; for example, the security of the certificate and the signature lies in the complexity of the algorithm, and assuming that the computer can calculate the content of the certificate in the future, the signature algorithm is cracked, and the security of the whole existing client side can be destructively damaged
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a target client monitoring method and device, a storage medium and an electronic device, and at least solves the technical problem that in the prior art, the data security mode for improving an edge computing network is single.
According to an aspect of an embodiment of the present invention, there is provided a target client control method, including: acquiring a target log generated in the running process of a target client, wherein the target client supports code implantation; under the condition that the target client side is determined to have external attack according to the target log, a target code is sent to the target client side; so that the target client runs the target code to prevent external attacks.
Optionally, before the target log generated in the running process of the target client is obtained, the method includes: acquiring an access request of the target client, wherein the access request is used for establishing communication connection with the target client, and verification information is carried in the access request; and establishing communication connection with the target client under the condition that the verification information is matched with preset verification information.
Optionally, after establishing a communication connection with the target client when the verification information is matched with preset verification information, the method further includes: acquiring a target log of the target client; checking the validity of the target client according to the target log according to a preset period; and under the condition that the target client does not have validity, canceling the communication connection with the target client.
Optionally, after the target log of the target client is obtained, the method further includes: and canceling the communication connection with the target client under the condition that the target client cannot normally access the network according to the target log.
Optionally, after the target log of the target client is obtained, the method further includes: and canceling the communication connection with the target client under the condition that the target client is determined to have illegal access to the network according to the target log.
According to another aspect of the embodiments of the present invention, there is also provided a target client control apparatus, including: the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring a target log generated in the running process of a target client, and the target client supports code implantation; the sending unit is used for sending a target code to the target client under the condition that the target client is determined to have external attack according to the target log; so that the target client runs the target code to prevent external attacks.
Optionally, the apparatus includes: a second obtaining unit, configured to obtain an access request of a target client before obtaining a target log generated in an operating process of the target client, where the access request is used to establish a communication connection with the target client, and the access request carries verification information; and the first establishing unit is used for establishing communication connection with the target client under the condition that the verification information is matched with preset verification information.
Optionally, the apparatus further comprises: a third obtaining unit, configured to, when the verification information matches preset verification information, after establishing a communication connection with the target client, obtain a target log of the target client; the checking unit is used for checking the validity of the target client according to the target log according to a preset period; the first canceling and establishing unit is used for canceling the communication connection with the target client under the condition that the target client does not have validity.
Optionally, the apparatus further comprises: and the second canceling and establishing unit is used for determining that the target client cannot normally access the network according to the target log and canceling the communication connection with the target client.
Optionally, the apparatus further comprises: and the third canceling and establishing unit is used for determining that the target client has an illegal access network according to the target log and canceling the communication connection with the target client.
According to still another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium in which a computer program is stored, wherein the computer program is configured to execute the above-mentioned target client control method when running.
According to another aspect of the embodiments of the present invention, there is also provided an electronic apparatus, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor executes the target client control method through the computer program.
In the embodiment of the invention, a target log generated in the running process of a target client is obtained, wherein the target client supports code implantation; under the condition that the target client side is determined to have external attack according to the target log, sending a target code to the target client side; the target client side runs the target code to prevent external attack, the target code is sent to the target client side under the condition that the target client side in the edge technology network is attacked, the target client side runs the target code to resist the external attack, the safety of the target client side is guaranteed, the technical effect of further guaranteeing the safety of the edge technology network is achieved, and the technical problem that the mode of improving the data safety of the edge computing network is single in the prior art is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a schematic diagram of an application environment of an alternative target client control method according to an embodiment of the invention;
FIG. 2 is a flow chart of an alternative target client control method according to an embodiment of the present invention;
FIG. 3 is a flowchart of an alternative control method for remotely and dynamically implanting a running code client based on edge computing according to an embodiment of the present invention;
FIG. 4 is an alternative client-edge computing network interaction diagram according to an embodiment of the present invention;
FIG. 5 is a schematic diagram of an alternative client-edge computing network interaction according to an embodiment of the present invention;
FIG. 6 is a schematic diagram (one) of an alternative interaction between an edge computing network and a cloud server according to an embodiment of the present invention;
fig. 7 is an alternative schematic diagram (two) of the interaction between the edge computing network and the cloud server according to the embodiment of the present invention;
FIG. 8 is an alternative client-edge computing network interaction diagram (III) according to an embodiment of the invention;
FIG. 9 is a schematic diagram of an alternative edge computing network process according to an embodiment of the present invention;
FIG. 10 is a schematic diagram of an alternative target client control device, according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of an alternative electronic device according to an embodiment of the invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to an aspect of the embodiments of the present invention, a target client control method is provided, and optionally, as an optional implementation manner, the target client control method may be applied to, but is not limited to, a hardware environment as shown in fig. 1, where the target client is operated in the terminal device 102, and may include, but is not limited to, the terminal device 102, the network 110, and the server 112.
The specific process comprises the following steps: S102-S106, the server 112 obtains a target log generated in the running process of a target client, wherein the target client supports code implantation; under the condition that the target client side is determined to have external attack according to the target log, sending a target code to the target client side; the target client side runs the target code to prevent external attack, the target code is sent to the target client side under the condition that the target client side in the edge technology network is attacked, the target client side runs the target code to resist the external attack, the safety of the target client side is guaranteed, the technical effect of further guaranteeing the safety of the edge technology network is achieved, and the technical problem that the mode of improving the data safety of the edge computing network is single in the prior art is solved.
Optionally, in this embodiment, the target client control method may be applied, but not limited to, in the server 112, and is used for monitoring the target client according to the running target log of the target client. The target client may be but not limited to run in the terminal device 102, and the terminal device 102 may be but not limited to a mobile phone, a tablet computer, a notebook computer, a PC, and other terminal devices that support running of the application client. The server 112 and the terminal device 102 may implement data interaction through a network, which may include but is not limited to a wireless network or a wired network. Wherein, this wireless network includes: bluetooth, WIFI, and other networks that enable wireless communication. Such wired networks may include, but are not limited to: wide area networks, metropolitan area networks, and local area networks. The above is merely an example, and this is not limited in this embodiment.
Optionally, as an optional implementation manner, as shown in fig. 2, the target client control method includes:
step S202, a target log generated in the running process of the target client is obtained, wherein the target client supports code implantation.
Step S204, sending a target code to the target client under the condition that the target client is determined to have external attack according to the target log; so that the target client runs the target code to prevent external attacks.
Optionally, in this embodiment, the application scenarios of the above scheme are as follows: monitoring the processing process of the edge computing client, and recovering the condition of paralysis of the edge computing network caused by shielding the behavior of hacker attack.
It should be noted that the above-mentioned schemes may include, but are not limited to, being applied to a server and a terminal.
According to the embodiment provided by the application, the target log generated in the running process of the target client is obtained, wherein the target client supports code implantation; under the condition that the target client side is determined to have external attack according to the target log, sending a target code to the target client side; the target client side runs the target code to prevent external attack, the target code is sent to the target client side under the condition that the target client side in the edge technology network is attacked, the target client side runs the target code to resist the external attack, the safety of the target client side is guaranteed, the technical effect of further guaranteeing the safety of the edge technology network is achieved, and the technical problem that the mode of improving the data safety of the edge computing network is single in the prior art is solved.
Optionally, before obtaining a target log generated in the running process of the target client, the method includes: acquiring an access request of a target client, wherein the access request is used for establishing communication connection with the target client, and verification information is carried in the access request; and establishing communication connection with the target client under the condition that the verification information is matched with the preset verification information.
Optionally, in a case that the verification information is matched with the preset verification information, after establishing a communication connection with the target client, the method further includes: acquiring a target log of a target client; checking the validity of the target client according to the target log according to a preset period; and in the case that the target client does not have the validity, canceling the communication connection with the target client.
Optionally, after obtaining the target log of the target client, the method further includes: and canceling the communication connection with the target client under the condition that the target client cannot normally access the network according to the target log.
Optionally, after obtaining the target log of the target client, the method further includes: and canceling the communication connection with the target client under the condition that the target client is determined to have illegal access to the network according to the target log.
As an alternative embodiment, the present application further provides a control method for remotely and dynamically implanting a running code client based on edge computing. As shown in fig. 3, a flow chart of a control method for remotely and dynamically implanting a running code client based on edge calculation is provided.
The user can access the edge computing client which has access to the whole network to provide services.
Wherein, the current user uses the client to provide service, firstly accesses the client 1, and is directly processed and returned by the client 1 when the client 1 can process the data required by the visitor, and is processed by other clients if the client 1 can not process the request of the current visitor.
As shown in fig. 4, the client interacts with the edge computing network schematically (one). As shown in fig. 4, the request of the client to access the network device is checked, authenticated, log collected, and returned.
As shown in fig. 5, the client interacts with the edge computing network schematically (two). As shown in fig. 5, the authenticated client may provide a service to the network, the network sends a request to the client to provide the service, and the client returns a processing result and records a log.
As shown in fig. 6, the edge computing network interacts with the cloud server schematically (one). As shown in fig. 6, the collected logs are periodically sent to the cloud server.
As shown in fig. 7, the edge computing network interacts with the cloud server schematically (two). As shown in fig. 7, the cloud server issues an instruction, implants an operation code, and enhances the service capability of the client.
As shown in fig. 8, the client interacts with the edge computing network schematically (three). As shown in fig. 8, the validity of the accessed client is periodically checked, and the client is logged and kicked out for an illegal client.
As shown in fig. 9, the edge computing network processes the schematic. As shown in fig. 9, the log sent back by the network is analyzed, and the network is intelligently ordered to maintain the network security.
As shown in fig. 4 to 9, the client has the functions of accessing the network, recording logs, kicking out devices, sending logs, and providing service capability, the client records the logs to monitor the behavior of accessing the network, analyzes the logs to shield the client which frequently fails to normally access the network, periodically updates and checks the illegal check logic of the client to check the client, and eliminates the accessed illegal client to recover the normal network service.
Through the embodiment provided by the application, the client side of the edge computing is effectively supervised and maintained. The problem that the network paralysis is generated when the client is broken is avoided.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
According to another aspect of the embodiment of the present invention, there is also provided a target client control apparatus for implementing the above target client control method. As shown in fig. 10, the target client control apparatus includes: a first acquisition unit 1001 and a transmission unit 1003.
A first obtaining unit 1001, configured to obtain a target log generated during a target client running process, where the target client supports code implantation.
A sending unit 1003, configured to send a target code to the target client when determining that the target client has an external attack according to the target log; so that the target client runs the target code to prevent external attacks.
By the embodiment provided by the application, the first obtaining unit 1001 obtains a target log generated in the running process of a target client, wherein the target client supports code implantation; the sending unit 1003 sends a target code to the target client when determining that the target client has an external attack according to the target log; so that the target client runs the target code to prevent external attacks.
Optionally, the apparatus may include: the second acquisition unit is used for acquiring an access request of the target client before acquiring a target log generated in the running process of the target client, wherein the access request is used for establishing communication connection with the target client and carries verification information; and the first establishing unit is used for establishing communication connection with the target client under the condition that the verification information is matched with the preset verification information.
Optionally, the apparatus may further include: the third acquisition unit is used for acquiring a target log of the target client after establishing communication connection with the target client under the condition that the verification information is matched with the preset verification information; the checking unit is used for checking the validity of the target client according to the target log according to a preset period; and the first canceling and establishing unit is used for canceling the communication connection with the target client under the condition that the target client does not have validity.
Optionally, the apparatus may further include: and the second canceling and establishing unit is used for determining that the target client cannot normally access the network according to the target log and canceling the communication connection with the target client.
Optionally, the apparatus may further include: and the third canceling and establishing unit is used for determining that the target client has the illegal access network according to the target log and canceling the communication connection with the target client.
According to another aspect of the embodiments of the present invention, there is also provided an electronic device for implementing the target client control method, as shown in fig. 11, the electronic device includes a memory 1102 and a processor 1104, the memory 1102 stores therein a computer program, and the processor 1104 is configured to execute the steps in any one of the method embodiments through the computer program.
Optionally, in this embodiment, the electronic apparatus may be located in at least one network device of a plurality of network devices of a computer network.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
s1, acquiring a target log generated in the running process of the target client, wherein the target client supports code implantation;
s2, sending a target code to the target client under the condition that the target client is determined to have external attack according to the target log; so that the target client runs the target code to prevent external attacks.
Alternatively, it can be understood by those skilled in the art that the structure shown in fig. 11 is only an illustration, and the electronic device may also be a terminal device such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a palm computer, a Mobile Internet Device (MID), a PAD, and the like. Fig. 11 is a diagram illustrating a structure of the electronic device. For example, the electronic device may also include more or fewer components (e.g., network interfaces, etc.) than shown in FIG. 11, or have a different configuration than shown in FIG. 11.
The memory 1102 may be used to store software programs and modules, such as program instructions/modules corresponding to the target client control method and apparatus in the embodiments of the present invention, and the processor 1104 executes various functional applications and data processing by running the software programs and modules stored in the memory 1102, that is, implements the target client control method. The memory 1102 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 1102 can further include memory located remotely from the processor 1104 and such remote memory can be coupled to the terminal via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof. The memory 1102 may specifically include, but is not limited to, target log information for a target client. As an example, as shown in fig. 11, the memory 1102 may include, but is not limited to, a first obtaining unit 1001 and a sending unit 1003 in the target client control device. In addition, the client control device may further include, but is not limited to, other module units in the target client control device, which is not described in this example again.
Optionally, the transmitting device 1106 is used for receiving or transmitting data via a network. Examples of the network may include a wired network and a wireless network. In one example, the transmission device 1106 includes a Network adapter (NIC) that can be connected to a router via a Network cable to communicate with the internet or a local area Network. In one example, the transmission device 1106 is a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
According to a further aspect of an embodiment of the present invention, there is also provided a computer-readable storage medium having a computer program stored thereon, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
Alternatively, in the present embodiment, the above-mentioned computer-readable storage medium may be configured to store a computer program for executing the steps of:
s1, acquiring a target log generated in the running process of the target client, wherein the target client supports code implantation;
s2, sending a target code to the target client under the condition that the target client is determined to have external attack according to the target log; so that the target client runs the target code to prevent external attacks.
Alternatively, in this embodiment, a person skilled in the art may understand that all or part of the steps in the methods of the foregoing embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
The integrated unit in the above embodiments, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in the above computer-readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing one or more computer devices (which may be personal computers, servers, network devices, etc.) to execute all or part of the steps of the method according to the embodiments of the present invention.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.
Claims (12)
1. A target client control method, comprising:
acquiring a target log generated in the running process of a target client, wherein the target client supports code implantation;
under the condition that the target client side is determined to have external attack according to the target log, a target code is sent to the target client side;
so that the target client runs the target code to prevent external attacks.
2. The method of claim 1, wherein before obtaining the target log generated during the running process of the target client, the method comprises:
acquiring an access request of the target client, wherein the access request is used for establishing communication connection with the target client, and verification information is carried in the access request;
and establishing communication connection with the target client under the condition that the verification information is matched with preset verification information.
3. The method of claim 2, wherein after establishing the communication connection with the target client if the authentication information matches preset authentication information, the method further comprises:
acquiring a target log of the target client;
checking the validity of the target client according to the target log according to a preset period;
and under the condition that the target client does not have validity, canceling the communication connection with the target client.
4. The method of claim 3, wherein after obtaining the target log of the target client, the method further comprises:
and canceling the communication connection with the target client under the condition that the target client cannot normally access the network according to the target log.
5. The method of claim 3, wherein after obtaining the target log of the target client, the method further comprises:
and canceling the communication connection with the target client under the condition that the target client is determined to have illegal access to the network according to the target log.
6. A target client control apparatus, comprising:
the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is used for acquiring a target log generated in the running process of a target client, and the target client supports code implantation;
the sending unit is used for sending a target code to the target client under the condition that the target client is determined to have external attack according to the target log;
so that the target client runs the target code to prevent external attacks.
7. The apparatus of claim 6, wherein the apparatus comprises:
a second obtaining unit, configured to obtain an access request of a target client before obtaining a target log generated in an operating process of the target client, where the access request is used to establish a communication connection with the target client, and the access request carries verification information;
and the first establishing unit is used for establishing communication connection with the target client under the condition that the verification information is matched with preset verification information.
8. The apparatus of claim 7, further comprising:
a third obtaining unit, configured to, when the verification information matches preset verification information, after establishing a communication connection with the target client, obtain a target log of the target client;
the checking unit is used for checking the validity of the target client according to the target log according to a preset period;
the first canceling and establishing unit is used for canceling the communication connection with the target client under the condition that the target client does not have validity.
9. The apparatus of claim 8, further comprising:
and the second canceling and establishing unit is used for determining that the target client cannot normally access the network according to the target log and canceling the communication connection with the target client.
10. The apparatus of claim 8, further comprising:
and the third canceling and establishing unit is used for determining that the target client has an illegal access network according to the target log and canceling the communication connection with the target client.
11. A computer-readable storage medium, comprising a stored program, wherein the program is operable to perform the method of any one of claims 1 to 5.
12. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to execute the method of any of claims 1 to 5 by means of the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010858741.9A CN111949980A (en) | 2020-08-24 | 2020-08-24 | Target client monitoring method and device, storage medium and electronic device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010858741.9A CN111949980A (en) | 2020-08-24 | 2020-08-24 | Target client monitoring method and device, storage medium and electronic device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111949980A true CN111949980A (en) | 2020-11-17 |
Family
ID=73360345
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010858741.9A Pending CN111949980A (en) | 2020-08-24 | 2020-08-24 | Target client monitoring method and device, storage medium and electronic device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111949980A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115248809A (en) * | 2022-09-22 | 2022-10-28 | 山东康健因特智能控制科技有限公司 | User communication data management method based on edge calculation |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108123915A (en) * | 2016-11-28 | 2018-06-05 | 北京神州泰岳软件股份有限公司 | A kind of detection method and device of illegal connection to LAN equipment |
CN108768989A (en) * | 2018-05-18 | 2018-11-06 | 刘勇 | It is a kind of using the APT attack defense methods of mimicry technology, system |
CN110381045A (en) * | 2019-07-09 | 2019-10-25 | 腾讯科技(深圳)有限公司 | Treating method and apparatus, storage medium and the electronic device of attack operation |
CN111416767A (en) * | 2020-03-16 | 2020-07-14 | 广东科徕尼智能科技有限公司 | Log output method, device and storage medium of edge intelligent gateway |
-
2020
- 2020-08-24 CN CN202010858741.9A patent/CN111949980A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108123915A (en) * | 2016-11-28 | 2018-06-05 | 北京神州泰岳软件股份有限公司 | A kind of detection method and device of illegal connection to LAN equipment |
CN108768989A (en) * | 2018-05-18 | 2018-11-06 | 刘勇 | It is a kind of using the APT attack defense methods of mimicry technology, system |
CN110381045A (en) * | 2019-07-09 | 2019-10-25 | 腾讯科技(深圳)有限公司 | Treating method and apparatus, storage medium and the electronic device of attack operation |
CN111416767A (en) * | 2020-03-16 | 2020-07-14 | 广东科徕尼智能科技有限公司 | Log output method, device and storage medium of edge intelligent gateway |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115248809A (en) * | 2022-09-22 | 2022-10-28 | 山东康健因特智能控制科技有限公司 | User communication data management method based on edge calculation |
CN115248809B (en) * | 2022-09-22 | 2022-12-30 | 山东康健因特智能控制科技有限公司 | User communication data management method based on edge calculation |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103607385B (en) | Method and apparatus for security detection based on browser | |
CN107211016B (en) | Session security partitioning and application profiler | |
US9654480B2 (en) | Systems and methods for profiling client devices | |
CN110427785B (en) | Equipment fingerprint acquisition method and device, storage medium and electronic device | |
CN111683047B (en) | Unauthorized vulnerability detection method, device, computer equipment and medium | |
CN111898124B (en) | Process access control method and device, storage medium and electronic equipment | |
US9245118B2 (en) | Methods for identifying key logging activities with a portable device and devices thereof | |
CN112532605B (en) | Network attack tracing method and system, storage medium and electronic device | |
CN112528296B (en) | Vulnerability detection method and device, storage medium and electronic equipment | |
CN111131221A (en) | Interface checking device, method and storage medium | |
CN104751105A (en) | Fingerprint data verification method, fingerprint data verification device, related equipment and system | |
CN110688653A (en) | Client security protection method and device and terminal equipment | |
CN110958239A (en) | Method and device for verifying access request, storage medium and electronic device | |
CN107231245B (en) | Method and device for reporting monitoring log, and method and device for processing monitoring log | |
CN111949980A (en) | Target client monitoring method and device, storage medium and electronic device | |
CN111600769A (en) | Site detection method and device and storage medium | |
CN109583177B (en) | System and method for identifying new devices during user interaction with banking services | |
US20230344863A1 (en) | Enhancement of device security using machine learning and set of rules | |
CN111901305B (en) | Memory operation method and device, storage medium and electronic device | |
US20210306359A1 (en) | Intelligent detection and prevention of anomalies in interface protocols | |
CN113449167A (en) | Data acquisition abnormity detection method and device, electronic equipment and readable storage medium | |
CN107124390B (en) | Security defense and implementation method, device and system of computing equipment | |
KR102084516B1 (en) | Method to identify client device based on profiling | |
CN105376274A (en) | Login processing method, device and system | |
CN112437073A (en) | Network device login method and device, storage medium and electronic device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |