CN112632362A - Automatic patrol method and patrol platform for state network information management system - Google Patents
Automatic patrol method and patrol platform for state network information management system Download PDFInfo
- Publication number
- CN112632362A CN112632362A CN202110090539.0A CN202110090539A CN112632362A CN 112632362 A CN112632362 A CN 112632362A CN 202110090539 A CN202110090539 A CN 202110090539A CN 112632362 A CN112632362 A CN 112632362A
- Authority
- CN
- China
- Prior art keywords
- management system
- patrol
- information
- automatic
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000004458 analytical method Methods 0.000 claims abstract description 45
- 238000007689 inspection Methods 0.000 claims abstract description 28
- 235000019892 Stellar Nutrition 0.000 claims abstract description 11
- 230000002159 abnormal effect Effects 0.000 claims description 12
- 238000012545 processing Methods 0.000 claims description 6
- VYZAMTAEIAYCRO-UHFFFAOYSA-N Chromium Chemical compound [Cr] VYZAMTAEIAYCRO-UHFFFAOYSA-N 0.000 claims description 5
- 230000005540 biological transmission Effects 0.000 claims description 5
- BUGBHKTXTAQXES-UHFFFAOYSA-N Selenium Chemical compound [Se] BUGBHKTXTAQXES-UHFFFAOYSA-N 0.000 claims description 4
- 235000014510 cooky Nutrition 0.000 claims description 4
- 229910052711 selenium Inorganic materials 0.000 claims description 4
- 239000011669 selenium Substances 0.000 claims description 4
- 238000012423 maintenance Methods 0.000 abstract description 14
- 230000015572 biosynthetic process Effects 0.000 abstract description 4
- 238000007726 management method Methods 0.000 description 58
- 238000005516 engineering process Methods 0.000 description 12
- 238000010586 diagram Methods 0.000 description 7
- 238000006243 chemical reaction Methods 0.000 description 4
- 230000002354 daily effect Effects 0.000 description 4
- 238000007667 floating Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 241000700605 Viruses Species 0.000 description 3
- 230000002155 anti-virotic effect Effects 0.000 description 3
- 238000013461 design Methods 0.000 description 3
- 238000009434 installation Methods 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 230000000007 visual effect Effects 0.000 description 3
- 238000013075 data extraction Methods 0.000 description 2
- 238000002474 experimental method Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000011160 research Methods 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- 238000012546 transfer Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000003086 colorant Substances 0.000 description 1
- 230000000295 complement effect Effects 0.000 description 1
- 239000012141 concentrate Substances 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 230000010354 integration Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000005457 optimization Methods 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 238000013112 stability test Methods 0.000 description 1
- 238000012430 stability testing Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/951—Indexing; Web crawling techniques
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/958—Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0639—Performance analysis of employees; Performance analysis of enterprise or organisation operations
- G06Q10/06393—Score-carding, benchmarking or key performance indicator [KPI] analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/06—Electricity, gas or water supply
Abstract
The invention discloses an automatic patrol method and a patrol platform for a state network information management system, and belongs to the technical field of power grid information patrol. Which comprises the following steps: s1: selecting automatic inspection objects, wherein the automatic inspection objects comprise a city department stellar system, a county department stellar system, a sky inquiry system, a city department table management system, a county department table management system and an I6000 system; s2: automatically logging in the automatic inspection object by an encryption and decryption method; s3: capturing webpage information of the automatic inspection object by using a web crawler tool; s4: performing key information capture, comparison analysis and display on the webpage information; s5: and automatically generating a patrol report. The invention can automatically realize the grabbing, judging, displaying, storing and automatic formation of the patrol index of the multi-system, and can improve the operation and maintenance efficiency.
Description
Technical Field
The invention relates to the technical field of power grid information inspection, in particular to an automatic inspection method and an inspection platform for a state grid information management system.
Background
In a national network system, for city and county information operation and inspection personnel, background management systems needing two rounds a day include city department Switzerland, county department Switzerland, daily round, city desk management, county desk management, I6000, content management, oa and Huasan network management and the like, different indexes such as weak passwords, hosts corresponding to viruses, system installation rates, antivirus software installation rates, registration rates and the like need to be concerned when different systems finish rounds, and evidences need to be rapidly intercepted and reserved for abnormal indexes to form corresponding reports. By combining the actual operation and maintenance requirements and the advanced automation technology, if a platform capable of automatically realizing the automatic formation of inspection index grabbing, distinguishing, displaying, storing and inspection reports is developed, the operation and maintenance time is greatly shortened, and the operation and maintenance efficiency is improved. At present, all background management systems need manual inspection, and have the following problems: (1) according to the security requirement of a national network system, passwords need to be changed frequently, and manual input needs to be repeated every time login is performed; (2) after the system is successfully logged in, for each background management system, the webpage elements such as a fixed floating menu, a button, a drop-down box, a form and the like are clicked for many times to be positioned; (3) after successful positioning, data required by tour inspection is located in a plurality of information, positions and indexes of important elements need to be manually memorized, important index information cannot be quickly positioned, and the display colors of key indexes in a webpage are all black, so that manual screening and judgment are required; (4) some Table tables have a large number of pieces of information and need to be displayed by changing pages. Generally speaking, the artificial process of patrolling of traditional information management system is too complicated, take time, the problem that the system exists is tourd in order to solve above-mentioned this research is the target, combine relevant leading edge information automation technology, replace artifical tours with automatic tours, the automatic generation simultaneously contains the tour report of key index data and evidence, the reducible basic level data statistics burden of reality lightens, improve information operation and maintenance personnel's work efficiency, accelerate to promote basic level to subtract burden, practice thrift the operation and maintenance time so that concentrate on and study core business, helping hand enterprise management level improves.
Patent document CN 101290675 a discloses a power grid information management system, which is composed of a power grid service database, a data conversion module and a client. Meanwhile, a display method of the power grid information management system is provided, and the display method comprises three steps of data extraction, data conversion and data display. The power grid information management system and the visual display method thereof have the advantages of low cost, open system, small maintenance workload, convenience in operation and high management efficiency. However, the present invention does not realize the capture, determination, display, storage of patrol indexes and automatic formation of patrol reports of a plurality of information management systems, and cannot solve the above technical problems.
The patent document with publication number CN 106503808A discloses an intelligent inspection system for a three-dimensional digital power grid, which comprises a remote data platform, a client, a control end and an inspection end, wherein the remote data platform stores a three-dimensional digital power grid map and a power equipment parameter library; the client side views a three-dimensional digital power grid map updated in real time according to the authority by accessing the remote data platform, and/or downloads various power grid operation data in the three-dimensional digital power grid map, and/or downloads data information in a power equipment parameter library; the control end realizes the adjustment of drawing parameters of the three-dimensional digital power grid map and/or the downloading of various power grid operation data in the three-dimensional digital power grid map by accessing the remote data platform, screens various power grid operation data in the three-dimensional digital power grid map, analyzes data information in a power equipment parameter base, and forwards a power grid control or maintenance instruction to the client end through the remote data platform; the patrol terminal is a mobile terminal provided with patrol equipment, collects all-round high-definition video images of a power grid and infrared remote sensing information in real time and packages and uploads the power grid video images to the remote data platform in combination with GPS geographic data, and the power grid video images are associated to the three-dimensional digital power grid map through the GPS geographic data to form video image data in power grid operation data. The method updates the three-dimensional digital power grid map to the remote data platform in real time by utilizing the 4D display technology, has strong intuition and rich and comprehensive information quantity, and obtains real, accurate, visual and intuitive power grid operation and maintenance data. However, the present invention has not yet solved the above-mentioned problems.
Disclosure of Invention
In view of the above, the present invention provides an automatic patrol method and a patrol platform for a national network information management system, which can automatically capture, discriminate, display, store and automatically form patrol reports of multiple systems, and can improve operation and maintenance efficiency, aiming at the defects of the prior art.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows: an automatic patrol method of a national network information management system comprises the following steps:
s1: selecting automatic inspection objects, wherein the automatic inspection objects comprise a city department stellar system, a county department stellar system, a sky inquiry system, a city department table management system, a county department table management system and an I6000 system;
s2: automatically logging in the automatic inspection object by an encryption and decryption method;
s3: capturing webpage information of the automatic inspection object by using a web crawler tool;
s4: performing key information capture, comparison analysis and display on the webpage information;
s5: and automatically generating a patrol report.
Further, in S2, the encryption and decryption are performed by a method of combining the RSA algorithm and the AES algorithm, the AES symmetric cryptosystem is used to encrypt the transmission data, and the RSA asymmetric cryptosystem is used to transmit the key of the AES.
Further, in S3, the captured web page information includes a URL requesting access to the web page, a request mode, a content type, a cookie, a location and an attribute of a text box, a password box, a button, a floating menu, an iFrame, a drop-down box, a link, a check box, and a form.
Further, in S4, the method for capturing key information includes a source code analysis method and a capture package analysis method, when the source code analysis method cannot quickly or completely obtain the required element information, the key Data information is captured by means of a json and binary file analysis method, after capturing the key index information, the key index information is firstly compared with a normal standard value, an abnormal value is marked with red, and the abnormal value is returned to a foreground text box for display, and for the condition that the Data is displayed by a chart on a dashboard or a histogram, a capture package analysis method and a screenshot are adopted to return to the foreground for display.
Further, in S5, the patrol report is composed of three parts: title, key indicator value, and screenshot.
An automatic patrol platform of a state network information management system comprises an encryption and decryption module for automatically logging in a city district Switzerland system, a county district Switzerland system, a sky inquiry system, a city district table management system, a county district table management system and an I6000 system, a network crawler module for capturing information of the city district Switzerland system, the county district Switzerland system, the sky inquiry system, the city district table management system, the county district table management system and the I6000 system, and a webpage element analysis module, a key information capture module, a comparison analysis display module and a patrol report automatic generation module for processing information of the city district Switzerland system, the county district Switzerland system, the sky inquiry system, the county district table management system and the I6000 system.
Furthermore, the encryption and decryption module comprises an RSA and an AES encryption and decryption module.
Further, the web crawler module comprises a selenium module.
Further, the webpage element analysis module comprises a webDriver module supporting a headless Chrome browser.
Furthermore, the comparison analysis display module comprises a docx module and a Pt module which support reading and writing of word files, and an xlrd module which supports reading operation of excel files.
In a national grid power system, in order to count and display power grid information, a plurality of information management systems are generally needed, the information management systems are independent from each other and have different functions, different systems need to pay attention to different indexes such as weak passwords, hosts corresponding to viruses, system installation rate, antivirus software installation rate, registration rate and the like when patrolling is finished, and optimization and upgrading of a single system are generally easy to think when the prior art uses each management system, for example, a patent document with publication number CN 101290675A discloses a power grid information management system which comprises a power grid service database, a data conversion module and a client, and a display method of the power grid information management system is provided at the same time and is divided into three steps such as data extraction, data conversion and data display The power grid information management system and the visual display method thereof have the advantages of small maintenance workload, convenient operation and high management efficiency; in addition, daily patrol of each information management system is the job of the current operation and inspection personnel, and based on the job, the method and the platform for automatically realizing patrol index capture, judgment, display, storage and automatic formation of patrol reports are not easy to think by the technical personnel in the field.
In addition, on the basis of safety consideration, each information management system is a closed independent system, an encrypted login mode is adopted, and if the indexes of the information management systems such as a weak password, a host corresponding to virus occurrence, a system installation rate, an antivirus software installation rate, a registration rate and the like are integrated to perform automatic patrol, and an evidence is rapidly intercepted and reserved for an abnormal index to form a corresponding report, technical problems of multi-system data encryption and decryption, information system webpage element analysis, key information capture, comparison analysis and display, automatic patrol report generation and the like need to be overcome, which is difficult for technical personnel in the field to realize.
Compared with the prior art, the invention has the following beneficial effects:
the invention relates to an automatic patrol method of a national network information management system, which adopts a method of encrypting and decrypting to automatically log in a city department Switzerland system, a county department Switzerland system, a daily inquiry system, a city department table management system, a county department table management system and an I6000 system, uses a network crawler tool to grab the webpage information of an automatic patrol object, grabs, compares, analyzes and displays the key information of the webpage information, and automatically generates a patrol report, thereby solving the problems of complexity and time consumption in the manual patrol process of the traditional information management system. The operation and maintenance time is saved so as to be convenient for focusing on researching the core business, and the management level of the assisted enterprise is improved.
In addition, the encryption and decryption are carried out by a method of combining an RSA algorithm and an AES algorithm, the AES symmetric cryptosystem is used for encrypting transmission data, and the RSA asymmetric cryptosystem is used for transmitting a key of the AES, the advantages of the two encryption methods are complementary, the encryption and decryption speed is improved, so that account passwords seen by a database administrator or other users are encrypted, and decryption value transfer operation is automatically completed in a background before login so as to avoid the risk of leakage of the account passwords; after the key index information is captured, the key index information is firstly compared with a normal standard value, the abnormal numerical value is marked with red and is returned to a foreground text box for displaying, and secondly, for the condition that data are displayed by a chart such as a dashboard, a histogram and the like, a double-guarantee method of capturing a packet and returning a screenshot to the foreground for displaying is adopted to ensure the correctness of a patrol result.
The automatic patrol platform of the national network information management system is combined with operation and maintenance practice, encrypted decryption, automatic patrol and Python automatic application are researched and developed, an information operation and maintenance mode is optimized, the patrol efficiency of the Ten surplus information management system of the department of Internet of city and county is improved, automatic generation of patrol reports is realized, the burden reduction of basic teams and groups is promoted, and the management level of an assisting enterprise is improved. Meanwhile, by reasonably applying the thought and the technology, the automatic processing of other daily works can be completed, such as automatic downloading of line loss data of a control room, batch processing of excel data and the like.
Drawings
FIG. 1 is a schematic diagram of a web page acquisition in the second embodiment of the present invention;
FIG. 2 is a diagram of a platform architecture according to a second embodiment of the present invention;
FIG. 3 is a functional block diagram of a platform according to a second embodiment of the present invention;
FIG. 4 is a schematic diagram of encryption and decryption in a second embodiment of the present invention;
FIG. 5 is a schematic illustration of an XHR capture analysis in a second embodiment of the present invention;
FIG. 6 is a schematic diagram of HTML capture analysis according to a second embodiment of the present invention;
FIG. 7 is a diagram illustrating packet analysis according to a second embodiment of the present invention;
fig. 8 is a schematic diagram of a patrol report according to a second embodiment of the present invention.
Detailed Description
In order to better understand the present invention, the following examples are further provided to clearly illustrate the contents of the present invention, but the contents of the present invention are not limited to the following examples. In the following description, numerous specific details are set forth in order to provide a more thorough understanding of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without one or more of these specific details.
Example one
An automatic patrol method of a national network information management system comprises the following steps:
s1: selecting automatic inspection objects, wherein the automatic inspection objects comprise a city department stellar system, a county department stellar system, a sky inquiry system, a city department table management system, a county department table management system and an I6000 system;
s2: automatically logging in the automatic inspection object by an encryption and decryption method;
s3: capturing webpage information of the automatic inspection object by using a web crawler tool;
s4: performing key information capture, comparison analysis and display on the webpage information;
s5: and automatically generating a patrol report.
Specifically, in S2, encryption and decryption are performed by a method of combining the RSA algorithm and the AES algorithm, the AES symmetric cryptosystem is used to encrypt transmission data, and the RSA asymmetric cryptosystem is used to transmit a key of the AES.
In S3, the captured web page information includes the URL of the requested access page, the request mode, the content type, the cookie, and the location and attributes of the text box, the password box, the button, the hover menu, the iFrame, the drop-down box, the link, the check box, and the form.
In S4, the method for grabbing key information includes a source code analysis method and a packet grabbing analysis method, when the source code analysis method cannot quickly or completely obtain the required element information, the key Data information is grabbed by means of a json and binary file analysis method, after the key index information is grabbed, the key Data information is firstly compared with a normal standard value, an abnormal value is marked with red and returned to a foreground text box for display, and for the condition that Data are displayed by a dashboard and a histogram in a graph, the packet grabbing analysis method and a screenshot are returned to the foreground for display.
In S5, the patrol report is composed of three parts: title, key indicator value, and screenshot.
Example two
An automatic patrol platform of a state network information management system comprises an encryption and decryption module for automatically logging in a city district Switzerland system, a county district Switzerland system, a sky inquiry system, a city district table management system, a county district table management system and an I6000 system, a network crawler module for capturing information of the city district Switzerland system, the county district Switzerland system, the sky inquiry system, the city district table management system, the county district table management system and the I6000 system, and a webpage element analysis module, a key information capture module, a comparison analysis display module and a patrol report automatic generation module for processing information of the city district Switzerland system, the county district Switzerland system, the sky inquiry system, the county district table management system and the I6000 system.
Specifically, the encryption and decryption module comprises an RSA and AES encryption and decryption module.
The web crawler module comprises a selenium module.
The web page element analysis module comprises a webDriver module supporting a headless Chrome browser.
The comparison analysis display module comprises a docx module and a Pt module which support reading and writing of word files and an xlrd module which supports reading operation of excel files.
The automatic patrol platform of the state network information management system in the embodiment of the invention utilizes the network crawler and Python automation technology to develop the core function of the platform. The web crawler automatically captures information on the network according to a certain rule (simulating a mode of manually logging in and operating web page elements). By using the webpage acquisition principle shown in fig. 1 (a personal computer sends a Request to a server, and the server returns webpage information to a personal computer Response), the construction process of the platform comprises seven steps of data encryption and decryption, information system webpage element analysis, key information capture, comparison analysis and display, automatic tour report generation, abnormal alarm, system operation test, system release and reverse compilation.
The system architecture of the automatic patrol platform of the national network information management system of the embodiment of the invention is shown in fig. 2; functional module design of the platform, as shown in FIG. 3; the design emphasizes openness, secondary development capability and application support capability, and supports the application integration of two modes of C/S and B/S. The programming language used is python, and the main used technologies comprise an RSA and AES encryption and decryption module, a selenium module of a web crawler, modules such as docx, Pt and the like supporting reading and writing of a word file, an xlrd module supporting reading operation of an excel file, a webDriver module supporting a headless Chrome browser and the like.
Data encryption and decryption
With the wide application of Internet network technology, the information security problem is increasingly prominent, and the information security technology using data encryption and decryption technology as the core is also greatly developed. Current data encryption technologies are classified into a private key encryption system and a public key encryption system according to the type of encryption key.
In order to ensure the safety of a developed platform, the encryption and decryption operations of the passwords need to be completed by combining a mainstream encryption technology, namely, the account passwords seen by a database administrator or other users are all encrypted, and the decryption value transfer operation is automatically completed in the background before login so as to avoid the risk of leakage of the account passwords. The representative algorithm pairs of the two mainstream encryption and decryption systems are shown in table 1.
According to comparison, the two algorithms have advantages and disadvantages respectively. Therefore, the platform adopts the RSA + AES solution scheme to realize encryption and decryption operation. The AES symmetric cryptosystem is used to encrypt the transmission data, and the RSA asymmetric cryptosystem is used to transmit the key of the AES, so that the advantages of the AES and the RSA can be comprehensively exerted while the disadvantages of the AES and the RSA are avoided, and a new data encryption scheme is implemented, as shown in fig. 4.
Information system web page element analysis
In combination with the Chrome browser, as shown in fig. 5-7, the URL of the requested access page, the Request Method (get or post), the content type (content type), the cookie, and the positions and attributes of common web page elements such as text boxes, password boxes, buttons, floating menus, iframes, drop-down boxes, links, check boxes, and tables need to be analyzed, so as to provide a basis for obtaining and displaying the key indicators in the next step.
Key information capturing, comparing, analyzing and displaying
The main capturing active code analysis method and the packet capturing analysis method for the key information indexes need to capture key Data information by means of json and binary file analysis methods when a predecessor cannot rapidly or completely obtain required element information, as shown in fig. 7.
(1) Web page source code analysis
As shown in fig. 6, the source code of the web page includes a plurality of elements, such as text boxes, buttons, floating menus, iframes, drop-down boxes, links, check boxes, tables, pictures, and the like. Common operations include positioning, selecting, inputting, clicking, transferring values through a URL and the like. The accurate positioning of elements is a key step, and the following eight methods are commonly used: id positioning, name positioning, class positioning, tag positioning, link positioning, partial _ link positioning, xpath positioning and css positioning.
(2) Packet capture and parsing
A network packet capture (packet capture) is an operation of intercepting, retransmitting, editing, unloading and the like of a data packet transmitted and received by a network, and is often used for data interception. Packet capture is particularly important in websites where the response to data is json. When the element positioning value taking method of 1.3.3 (1) is adopted, the required key information cannot be quickly obtained or completely obtained, the capture of the key form information can be completed by capturing a packet and analyzing a json file, such as the conditions of CPU memory utilization rate of other switches in the visited city 70 and the like.
(3) Key information comparison and display
After capturing the key index information, firstly, comparing the key index information with a normal standard value, marking an abnormal numerical value with red, and returning the abnormal numerical value to a foreground text box for displaying; secondly, for the condition that data are displayed in a graph such as an instrument panel, a histogram and the like, a double-guarantee method of packet capture analysis and screenshot returning to the foreground display is adopted to ensure the correctness of the patrol result.
Automatic generation of patrol report
The patrol report consists of three parts: title, key indicator value and screenshot, as shown in fig. 8.
Abnormity alarm
When some information system index is abnormal, an alarm triggering mechanism is adopted to complete the pushing of corresponding abnormal information by combining alarm equipment, such as instant messaging notification, oa mailbox sending and external equipment alarm prompting.
System operation and testing
This result is packaged into an executable program (. exe) using the python-pyinstteller module, which is then added to the task fixed point self-start column in the following manner, setting the self-start time to 8:00 am every day, 9: 30, 11: 00 and 14:00, 15: 30, 17: 00.
control panel → management tool → task planning program → operation → creation task → conventional → trigger new → operation program new.
(1) Time efficiency testing
Taking the sum of the patrol time and the report making time of the nine information management systems as one-time experiment time, taking 60 experiments as an example, calculating the total time length and the average time length, and comparing and analyzing the time efficiency of the three methods, as shown in table 2.
The common method refers to a method for manually logging in, clicking, screenshot and making a report at present; the semi-automatic method is a graphical operation interface related to a platform, each button corresponds to automatic inspection of a single information management system, the buttons need to be manually clicked, and the rest operations are automatic operations; the full-automatic method is to add the platform into the fixed-point self-starting task of the computer, and the whole process is automatically started and patrolled at fixed points.
(2) System stability testing
The system stability test is mainly considered from the three aspects of error rate, index value accuracy rate and system safety in the table 3. The system security is ensured by adopting a method of 'information system IP access login limitation + password encryption and decryption + anti-decompilation'.
System publishing and decompilation prevention
In order to improve the convenience of software use and deployment, a Python pylnstar technology is adopted to release a system in an executable file (. exe) mode.
The exe published above can be migrated to other computers for use, and if the use is convenient for other computers, the step is finished. But to improve the generalizability, the platform may be popularized to other units for use, and in order to prevent the program from being cracked by an open source or others, it is not enough to go to this step, because exe going to this step can be inversely compiled by others to obtain the source code.
Reverse engineering of computer software (also called computer software recovery engineering) refers to performing "Reverse analysis and research" on target programs (such as executable programs) of other software to derive design elements such as ideas, principles, structures, algorithms, processing procedures, operation methods and the like used by software products of other people, and source codes may be derived under certain specific conditions. Therefore, after the system is released as exe, the anti-reverse compiling operation of the exe file and the related library file pyc is completed by adopting a Python pyinstxtractor and Easy Python Decompiler module, so that the safety and the generalization performance of the system are improved.
Finally, the above embodiments are only used for illustrating the technical solutions of the present invention and not for limiting, and other modifications or equivalent substitutions made by the technical solutions of the present invention by those of ordinary skill in the art should be covered within the scope of the claims of the present invention as long as they do not depart from the spirit and scope of the technical solutions of the present invention.
Claims (10)
1. An automatic patrol method for a state network information management system is characterized by comprising the following steps:
s1: selecting automatic inspection objects, wherein the automatic inspection objects comprise a city department stellar system, a county department stellar system, a sky inquiry system, a city department table management system, a county department table management system and an I6000 system;
s2: automatically logging in the automatic inspection object by an encryption and decryption method;
s3: capturing webpage information of the automatic inspection object by using a web crawler tool;
s4: performing key information capture, comparison analysis and display on the webpage information;
s5: and automatically generating a patrol report.
2. The automatic patrol method of the national network information management system according to claim 1, wherein: in S2, the encryption and decryption are performed by a method of combining the RSA algorithm and the AES algorithm, the AES symmetric cryptosystem is used to encrypt the transmission data, and the RSA asymmetric cryptosystem is used to transmit the key of the AES.
3. The automatic patrol method of the national network information management system according to claim 2, wherein: in S3, the captured web page information includes the URL of the requested access page, the request mode, the content type, the cookie, and the location and attributes of the text box, the password box, the button, the hover menu, the iFrame, the drop-down box, the link, the check box, and the form.
4. The automatic patrol method of the national network information management system according to claim 3, wherein: in S4, the method for grabbing key information includes a source code analysis method and a packet grabbing analysis method, when the source code analysis method cannot quickly or completely obtain the required element information, the key Data information is grabbed by means of a json and binary file analysis method, after the key index information is grabbed, the key Data information is firstly compared with a normal standard value, an abnormal value is marked with red and returned to a foreground text box for display, and for the condition that Data are displayed by a dashboard and a histogram in a graph, the packet grabbing analysis method and a screenshot are returned to the foreground for display.
5. The automatic patrol method of the national network information management system according to claim 4, wherein: in S5, the patrol report is composed of three parts: title, key indicator value, and screenshot.
6. The utility model provides an automatic platform of patrolling of country network information management system which characterized in that: the system comprises an encryption and decryption module for automatically logging in a city district stellar system, a county inquiry system, a city district table management system, a county district table management system and an I6000 system, a network crawler module for capturing information of the city district stellar system, the county inquiry system, the city district table management system, the county district table management system and the I6000 system, and a webpage element analysis module, a key information capture module, a comparison analysis display module and a tour report automatic generation module for processing information of the city district stellar system, the county inquiry system, the city district table management system, the county district table management system and the I6000 system.
7. The automatic patrol platform of the national network information management system according to claim 6, wherein: the encryption and decryption module comprises an RSA encryption and decryption module and an AES encryption and decryption module.
8. The automatic patrol platform of the national network information management system according to claim 7, wherein: the web crawler module comprises a selenium module.
9. The automatic patrol platform of the national network information management system according to claim 8, wherein: the web page element analysis module comprises a webDriver module supporting a headless Chrome browser.
10. The automatic patrol platform of the internet information management system according to claim 9, wherein: the comparison analysis display module comprises a docx module and a Pt module which support reading and writing of word files and an xlrd module which supports reading operation of excel files.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110090539.0A CN112632362A (en) | 2021-01-22 | 2021-01-22 | Automatic patrol method and patrol platform for state network information management system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110090539.0A CN112632362A (en) | 2021-01-22 | 2021-01-22 | Automatic patrol method and patrol platform for state network information management system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112632362A true CN112632362A (en) | 2021-04-09 |
Family
ID=75295292
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110090539.0A Pending CN112632362A (en) | 2021-01-22 | 2021-01-22 | Automatic patrol method and patrol platform for state network information management system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112632362A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113469555A (en) * | 2021-07-19 | 2021-10-01 | 国网冀北电力有限公司唐山供电公司 | AI technology-based power production management method |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120246139A1 (en) * | 2010-10-21 | 2012-09-27 | Bindu Rama Rao | System and method for resume, yearbook and report generation based on webcrawling and specialized data collection |
CN106503808A (en) * | 2016-09-28 | 2017-03-15 | 国家电网公司 | A kind of three-dimensional digital electrical network intelligent patrol system |
CN107680194A (en) * | 2017-09-22 | 2018-02-09 | 国网天津市电力公司 | A kind of information system for power enterprise automates cruising inspection system |
CN107832197A (en) * | 2017-11-28 | 2018-03-23 | 江苏方天电力技术有限公司 | The cruising inspection system and method for inspecting of a kind of business application system |
CN111191097A (en) * | 2019-12-20 | 2020-05-22 | 天阳宏业科技股份有限公司 | Method, device and system for automatically acquiring webpage information by web crawler |
-
2021
- 2021-01-22 CN CN202110090539.0A patent/CN112632362A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120246139A1 (en) * | 2010-10-21 | 2012-09-27 | Bindu Rama Rao | System and method for resume, yearbook and report generation based on webcrawling and specialized data collection |
CN106503808A (en) * | 2016-09-28 | 2017-03-15 | 国家电网公司 | A kind of three-dimensional digital electrical network intelligent patrol system |
CN107680194A (en) * | 2017-09-22 | 2018-02-09 | 国网天津市电力公司 | A kind of information system for power enterprise automates cruising inspection system |
CN107832197A (en) * | 2017-11-28 | 2018-03-23 | 江苏方天电力技术有限公司 | The cruising inspection system and method for inspecting of a kind of business application system |
CN111191097A (en) * | 2019-12-20 | 2020-05-22 | 天阳宏业科技股份有限公司 | Method, device and system for automatically acquiring webpage information by web crawler |
Non-Patent Citations (1)
Title |
---|
承春明等: "信息管理系统自动巡检平台设计与实现", 《电力信息与通信技术》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113469555A (en) * | 2021-07-19 | 2021-10-01 | 国网冀北电力有限公司唐山供电公司 | AI technology-based power production management method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11711374B2 (en) | Systems and methods for understanding identity and organizational access to applications within an enterprise environment | |
CN107409126B (en) | System and method for securing an enterprise computing environment | |
AU2014201599A1 (en) | Mobile reports | |
US20110307454A1 (en) | System And Method For Independent Verification And Validation | |
WO2016007178A1 (en) | System and method for providing contextual analytics data | |
CN109255093A (en) | Behavioral data processing method, device, electronic equipment and computer-readable medium | |
CN109582405A (en) | Use the safety survey of tabulating equipment frame | |
CN112632362A (en) | Automatic patrol method and patrol platform for state network information management system | |
US20160314103A1 (en) | Computer System for Generation of Electronic Checklists | |
Qureshi | Improving outcomes from information and communication technology for development (ICT4D) studies | |
Khairunisa et al. | Virtual Job Fair Information System Design Based on Augmented Reality/Virtual Reality | |
Johari et al. | SEVA: Secure E-Voting Application in Cyber Physical System | |
EP4040723A1 (en) | Systems and methods for understanding identity and organizational access to applications within an enterprise environment | |
Azarmi | Learning Kibana 5.0 | |
Jun et al. | E-health web application framework and platform based on the cloud technology | |
Ferrigno et al. | 3D Real Time Digital Twin | |
Mathijssen et al. | source data for the focus area maturity model for API management | |
Dubey et al. | A Beginners Guide to Amazon Web Services | |
Bello et al. | Implementation of Mobile Phone Data Collection in the Conduct EPI Comprehensive Review in East and Southern African Countries | |
KR20210051817A (en) | System and method for providing an authentication information service based an open api | |
Khan | A distributed computing architecture to enable advances in field operations and management of distributed infrastructure | |
US9940311B2 (en) | Optimized read/write access to a document object model | |
Yu | Development of Entering and Reporting Registration System Platform of the CAU Library in COVID-19 Epidemic Period | |
US9727844B2 (en) | Online documentation review | |
Raja | New Zealand Wide Internet Scanning Data Analysis for Interesting Trends |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210409 |
|
RJ01 | Rejection of invention patent application after publication |