CN112488895A - Informatization asset data anomaly analysis method - Google Patents

Informatization asset data anomaly analysis method Download PDF

Info

Publication number
CN112488895A
CN112488895A CN202011415351.0A CN202011415351A CN112488895A CN 112488895 A CN112488895 A CN 112488895A CN 202011415351 A CN202011415351 A CN 202011415351A CN 112488895 A CN112488895 A CN 112488895A
Authority
CN
China
Prior art keywords
detection
dimension
analyzing
asset data
abnormality
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011415351.0A
Other languages
Chinese (zh)
Inventor
张文韬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Cloud Information Technology Co Ltd
Original Assignee
Inspur Cloud Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Inspur Cloud Information Technology Co Ltd filed Critical Inspur Cloud Information Technology Co Ltd
Priority to CN202011415351.0A priority Critical patent/CN112488895A/en
Publication of CN112488895A publication Critical patent/CN112488895A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries

Abstract

The invention relates to the technical field of government affair service data governance, and particularly provides an informatization asset data anomaly analysis method which is characterized in that different informatization systems are detected according to different detection dimensions to generate detection reports, and the detection reports can be compared and a comparison report can be generated aiming at past detection and retention; the method comprises the steps of firstly sorting asset information related to the application system, cleaning the relation between each information and the application system, and analyzing each detectable related dimension. Compared with the prior art, the method and the system support flexible selection dimension detection, promote and accelerate elimination of suspected zombie information systems, promote integration and sharing of the information systems, and promote national unified electronic government affair network supporting capacity.

Description

Informatization asset data anomaly analysis method
Technical Field
The invention relates to the technical field of government affair service data governance, and particularly provides an informatization asset data anomaly analysis method.
Background
In the prior art, important emphasis is placed on the removal and integration of the bother information, and the 'review' and 'clear' are combined to accelerate the elimination of a 'bother' information system.
Basically finishes the cleaning work of the zombie information system with small use range and low frequency, and the system use is disconnected with the actual business process for a long time, the functions can be replaced by other systems, the occupied resources are in an idle state for a long time, the operation, the maintenance and the update are stopped.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a method for constructing the virtual machine image with strong practicability.
The technical scheme adopted by the invention for solving the technical problems is as follows:
an informatization asset data anomaly analysis method is characterized in that different informatization systems are detected according to different detection dimensions to generate detection reports, and the detection reports can be compared and comparison reports can be generated aiming at past detection retention;
the method comprises the steps of firstly sorting asset information related to the application system, cleaning the relation between each information and the application system, and analyzing each detectable related dimension.
Further, the method specifically comprises the following steps:
s1, detecting by a suspected zombie system;
s2, detecting by a high-input low-yield system;
and S3, detecting the system similarity.
Furthermore, the html page is used for detecting the dimension value selection, the selected latitude value is transmitted to the java background by using a js technology, the java background calls the mysql database to perform sql query, and the system which accords with the dimension is queried to be a suspected zombie system.
Further, in step S1, the detection dimension includes the number of tables, the amount of stored table data, the monthly growth amount of data, the ratio of the monthly growth amount of data to the total amount, the number of database instances, the number of system users, the time that the system has been online, the number of system servers, whether the service operation and maintenance time has ended, whether there is a corresponding service item, and whether an information resource directory is generated.
Further, in step S2, the html page performs detection dimension value selection, the js technology is used to transmit the selected latitude value to the java background, the java background calls the mysql database to perform sql query, and the system meeting the dimension is queried to be a high-input low-yield system.
Further, the detection dimension in step S2 includes system project funds, information resource catalog quantity, table data storage quantity, data month growth quantity, month growth data quantity to total quantity ratio, database instance quantity and system user quantity.
Further, in step S3, the html page performs detection dimension value selection, the js technology is used to transmit the selected latitude value to the java background, the java background calls the mysql database to perform sql query, and the system conforming to the dimension is queried as a similar system.
Further, the detection dimensions in step S3 include system name similarity, system function description similarity, system shared database similarity, system resource directory similarity, and system support business item similarity.
Compared with the prior art, the informatization asset data anomaly analysis method has the following outstanding beneficial effects:
the invention supports flexible selection of dimension detection, promotes and accelerates elimination of suspected zombie information systems, promotes integration and sharing of the information systems, and promotes national unified electronic government affair network supporting capability.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow diagram of a method for anomaly analysis of informative asset data.
Detailed Description
The present invention will be described in further detail with reference to specific embodiments in order to better understand the technical solutions of the present invention. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
A preferred embodiment is given below:
as shown in fig. 1, in the method for analyzing an anomaly of information-based asset data in this embodiment, different information-based systems are detected according to different detection dimensions to generate a detection report, and for past detection and retention, comparison can be performed to generate a comparison report. The method comprises the steps of firstly arranging asset information related to a system, wherein the asset information comprises a machine room, a network, a cloud platform, a virtual machine, a server, a field, a data table, a database, unstructured data, an application system, a project and the like. And cleaning the relation between each piece of information and the application system, and analyzing each detectable relevant dimension.
The method specifically comprises the following steps:
s1, detection by a suspected zombie system:
and selecting a detection dimension value on the html page, transmitting the selected latitude value to a java background by using a js technology, calling a mysql database by the java background to perform sql query, and querying a system which accords with the dimension as a suspected zombie system.
The detection dimension comprises the number of tables, the storage amount of table data, the monthly increment of data, the ratio of the monthly increment data to the total amount, the number of database instances, the number of system users, the online time of the system, the number of system servers, whether the service operation and maintenance time is finished, whether corresponding business events exist, whether an information resource catalog is generated and the like.
And generating a report of a suspected zombie system according to the detection dimension, wherein the report comprises a summary of detection results, the ratio of the detection system to the total system, the ratio of the suspected zombie system to the detection system, the ratio of the suspected zombie system to the total system, the number of the suspected zombie systems in the department, ranking and the like, and a list of information of the suspected zombie system.
S2, detecting by a high-input low-yield system:
and selecting a detection dimension value on the html page, transmitting the selected latitude value to a java background by using a js technology, calling a mysql database by the java background to perform sql query, and querying a system which accords with the dimension as a high-input low-yield system.
The detection dimension comprises system project funds, the number of information resource catalogs, the number of tables, the table data storage amount, the monthly data increase amount, the ratio of the monthly data increase amount to the total amount, the number of database instances and the number of system users.
And generating a high-input low-yield system report according to the detection dimension, wherein the report comprises a summary of detection results, statistics such as the proportion of the detection system in the total system, the proportion of the high-input low-yield system in the detection system, the proportion of the high-input low-yield system in the total system, the quantity of the department high-input low-yield system in the total system, ranking and the like, and a high-input low-.
S3, detecting system similarity:
and selecting a detection dimension value on the html page, transmitting the selected latitude value to a java background by using a js technology, calling a mysql database by the java background to perform sql query, and querying a system which accords with the dimension as a similar system.
The detection dimension comprises similar system names, similar system function descriptions, similar system shared databases, similar system resource catalogs and similar system support business items.
And generating a similar system report according to the detection dimension, wherein the report comprises a detection result summary, detection statistical analysis and a system information list meeting the dimension condition.
S4, self-defining detection:
and integrating all detection dimensions, freely selecting and detecting according to requirements, and generating a detection report.
The detection result generated by detection can be compared with the historical detection result to generate a comparison report, any historical detection retention can be selected for comparison, the report is divided into 3 parts, detection dimension comparison, detection result statistics comparison and detection system list comparison are carried out.
Wherein, the Mysql database stores a system table and a detection history table. The system table structure has fields of system attribute dimensions, and each piece of information system data has own attribute information. The detection history table stores the result information of each detection, so that history comparison is facilitated.
The above embodiments are only specific cases of the present invention, and the protection scope of the present invention includes but is not limited to the above embodiments, and any suitable changes or substitutions that are required by a person of ordinary skill in the art and are in accordance with the claims of an information asset data anomaly analysis method of the present invention shall fall within the protection scope of the present invention.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (8)

1. An informatization asset data anomaly analysis method is characterized in that different informatization systems are detected according to different detection dimensions to generate detection reports, and the detection reports can be compared and comparison reports can be generated aiming at past detection retention;
the method comprises the steps of firstly sorting asset information related to the application system, cleaning the relation between each information and the application system, and analyzing each detectable related dimension.
2. The method for analyzing the abnormality of the informationized asset data according to claim 1, specifically comprising the following steps:
s1, detecting by a suspected zombie system;
s2, detecting by a high-input low-yield system;
and S3, detecting the system similarity.
3. The method for analyzing the abnormality of the informationized asset data according to claim 2, wherein in step S1, a html page is used for selecting a detection dimension value, a js technology is used for transmitting the selected latitude value to a java background, the java background calls a mysql database to perform sql query, and a system conforming to the dimension is queried to be a suspected zombie system.
4. The method for analyzing the abnormality of the informationized asset data according to claim 3, wherein the detection dimensions in step S1 include table number, table data storage amount, monthly growth amount of data, monthly growth data amount to total amount ratio, database instance number, system user number, system on-line time, system server number, whether service operation and maintenance time has ended, whether corresponding service event exists, and whether information resource directory is generated.
5. The method for analyzing the abnormality of the informationized asset data according to claim 4, wherein in step S2, a html page is used for selecting a detection dimension value, a js technology is used for transmitting the selected latitude value to a java background, the java background calls a mysql database to perform sql query, and a system conforming to the dimension is queried to be a high-input low-yield system.
6. The method for analyzing the abnormality of the informative asset data according to claim 5, wherein the detection dimension in the step S2 includes system project capital, information resource catalog quantity, table data storage quantity, monthly data growth quantity to total quantity ratio, database instance quantity and system user quantity.
7. The method for analyzing the abnormality of the informationized asset data according to claim 6, wherein in step S3, the html page is subjected to detection dimension value selection, the selected latitude value is transmitted to a java background by using js technology, the java background calls a mysql database to perform sql query, and a system conforming to the dimension is queried to be a similar system.
8. The method for analyzing the abnormality of the informative asset data according to claim 7, wherein the detection dimension in the step S3 includes similarity of system name, similarity of system function description, similarity of system common database, similarity of system resource directory and similarity of system supporting business items.
CN202011415351.0A 2020-12-07 2020-12-07 Informatization asset data anomaly analysis method Pending CN112488895A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011415351.0A CN112488895A (en) 2020-12-07 2020-12-07 Informatization asset data anomaly analysis method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011415351.0A CN112488895A (en) 2020-12-07 2020-12-07 Informatization asset data anomaly analysis method

Publications (1)

Publication Number Publication Date
CN112488895A true CN112488895A (en) 2021-03-12

Family

ID=74940351

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011415351.0A Pending CN112488895A (en) 2020-12-07 2020-12-07 Informatization asset data anomaly analysis method

Country Status (1)

Country Link
CN (1) CN112488895A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104866489A (en) * 2014-02-24 2015-08-26 赵冰 System for extracting, storing and releasing selected website content
JP2017211858A (en) * 2016-05-26 2017-11-30 日本電信電話株式会社 Security administrative support system and security administrative support method
CN111858713A (en) * 2020-07-21 2020-10-30 浪潮云信息技术股份公司 Object-based government information asset management method and system
CN111970138A (en) * 2020-03-31 2020-11-20 贵州电网有限责任公司 Network resource management and control system and resource management method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104866489A (en) * 2014-02-24 2015-08-26 赵冰 System for extracting, storing and releasing selected website content
JP2017211858A (en) * 2016-05-26 2017-11-30 日本電信電話株式会社 Security administrative support system and security administrative support method
CN111970138A (en) * 2020-03-31 2020-11-20 贵州电网有限责任公司 Network resource management and control system and resource management method
CN111858713A (en) * 2020-07-21 2020-10-30 浪潮云信息技术股份公司 Object-based government information asset management method and system

Similar Documents

Publication Publication Date Title
US8285580B2 (en) System and method for filtering exceptions generated by forecasting and replenishment engine
US10216782B2 (en) Processing of updates in a database system using different scenarios
US7593957B2 (en) Hybrid data provider
CN109684369B (en) Information updating method and device
CN111339171B (en) Data query method, device and equipment
CN112236761B (en) Dynamic delta updating of data cubes
TW202001735A (en) Marketing information release platform construction method and apparatus
US10545957B1 (en) Method and system for implementing a batch stored procedure testing tool
EP3803625A1 (en) Frequent pattern analysis for distributed systems
AU2011204831A1 (en) Digital analytics platform
US20090037210A1 (en) System and method for real time monitoring of digital campaigns
US20040210454A1 (en) System and method for providing technology data integration services
CN112488895A (en) Informatization asset data anomaly analysis method
CN112258104A (en) Transfer information generation method, article transfer method, apparatus, device and medium
CN113986656B (en) Power grid data safety monitoring system based on data center platform
US10353886B2 (en) Big data computing architecture
CN114153860A (en) Business data management method and device, electronic equipment and storage medium
CN111459737B (en) Problem positioning method, device, computer equipment and storage medium
CN114020893A (en) Log retrieval method and device based on distributed storage and storage medium
CN111708808A (en) Distributed service system and service summarizing and inquiring method, device and equipment thereof
CN110851424A (en) Data service system
CN115658810A (en) Method, device, electronic equipment and computer readable medium for inquiring account data
US9727835B2 (en) Business systems management mobile administration
CN117575741A (en) Method, apparatus, device, medium and program product for processing second killing request
CN113468173A (en) Data storage method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210312

RJ01 Rejection of invention patent application after publication