CN112632362A - Automatic patrol method and patrol platform for state network information management system - Google Patents

Automatic patrol method and patrol platform for state network information management system Download PDF

Info

Publication number
CN112632362A
CN112632362A CN202110090539.0A CN202110090539A CN112632362A CN 112632362 A CN112632362 A CN 112632362A CN 202110090539 A CN202110090539 A CN 202110090539A CN 112632362 A CN112632362 A CN 112632362A
Authority
CN
China
Prior art keywords
management system
patrol
information
automatic
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110090539.0A
Other languages
Chinese (zh)
Inventor
承春明
王洪
赵东坡
王永翔
宋耀宇
胡丹
刘思远
陈恩权
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Luohe Power Supply Company State Grid Henan Electric Power Co
Original Assignee
Luohe Power Supply Company State Grid Henan Electric Power Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Luohe Power Supply Company State Grid Henan Electric Power Co filed Critical Luohe Power Supply Company State Grid Henan Electric Power Co
Priority to CN202110090539.0A priority Critical patent/CN112632362A/en
Publication of CN112632362A publication Critical patent/CN112632362A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/06Electricity, gas or water supply

Abstract

The invention discloses an automatic patrol method and a patrol platform for a state network information management system, and belongs to the technical field of power grid information patrol. Which comprises the following steps: s1: selecting automatic inspection objects, wherein the automatic inspection objects comprise a city department stellar system, a county department stellar system, a sky inquiry system, a city department table management system, a county department table management system and an I6000 system; s2: automatically logging in the automatic inspection object by an encryption and decryption method; s3: capturing webpage information of the automatic inspection object by using a web crawler tool; s4: performing key information capture, comparison analysis and display on the webpage information; s5: and automatically generating a patrol report. The invention can automatically realize the grabbing, judging, displaying, storing and automatic formation of the patrol index of the multi-system, and can improve the operation and maintenance efficiency.

Description

Automatic patrol method and patrol platform for state network information management system
Technical Field
The invention relates to the technical field of power grid information inspection, in particular to an automatic inspection method and an inspection platform for a state grid information management system.
Background
In a national network system, for city and county information operation and inspection personnel, background management systems needing two rounds a day include city department Switzerland, county department Switzerland, daily round, city desk management, county desk management, I6000, content management, oa and Huasan network management and the like, different indexes such as weak passwords, hosts corresponding to viruses, system installation rates, antivirus software installation rates, registration rates and the like need to be concerned when different systems finish rounds, and evidences need to be rapidly intercepted and reserved for abnormal indexes to form corresponding reports. By combining the actual operation and maintenance requirements and the advanced automation technology, if a platform capable of automatically realizing the automatic formation of inspection index grabbing, distinguishing, displaying, storing and inspection reports is developed, the operation and maintenance time is greatly shortened, and the operation and maintenance efficiency is improved. At present, all background management systems need manual inspection, and have the following problems: (1) according to the security requirement of a national network system, passwords need to be changed frequently, and manual input needs to be repeated every time login is performed; (2) after the system is successfully logged in, for each background management system, the webpage elements such as a fixed floating menu, a button, a drop-down box, a form and the like are clicked for many times to be positioned; (3) after successful positioning, data required by tour inspection is located in a plurality of information, positions and indexes of important elements need to be manually memorized, important index information cannot be quickly positioned, and the display colors of key indexes in a webpage are all black, so that manual screening and judgment are required; (4) some Table tables have a large number of pieces of information and need to be displayed by changing pages. Generally speaking, the artificial process of patrolling of traditional information management system is too complicated, take time, the problem that the system exists is tourd in order to solve above-mentioned this research is the target, combine relevant leading edge information automation technology, replace artifical tours with automatic tours, the automatic generation simultaneously contains the tour report of key index data and evidence, the reducible basic level data statistics burden of reality lightens, improve information operation and maintenance personnel's work efficiency, accelerate to promote basic level to subtract burden, practice thrift the operation and maintenance time so that concentrate on and study core business, helping hand enterprise management level improves.
Patent document CN 101290675 a discloses a power grid information management system, which is composed of a power grid service database, a data conversion module and a client. Meanwhile, a display method of the power grid information management system is provided, and the display method comprises three steps of data extraction, data conversion and data display. The power grid information management system and the visual display method thereof have the advantages of low cost, open system, small maintenance workload, convenience in operation and high management efficiency. However, the present invention does not realize the capture, determination, display, storage of patrol indexes and automatic formation of patrol reports of a plurality of information management systems, and cannot solve the above technical problems.
The patent document with publication number CN 106503808A discloses an intelligent inspection system for a three-dimensional digital power grid, which comprises a remote data platform, a client, a control end and an inspection end, wherein the remote data platform stores a three-dimensional digital power grid map and a power equipment parameter library; the client side views a three-dimensional digital power grid map updated in real time according to the authority by accessing the remote data platform, and/or downloads various power grid operation data in the three-dimensional digital power grid map, and/or downloads data information in a power equipment parameter library; the control end realizes the adjustment of drawing parameters of the three-dimensional digital power grid map and/or the downloading of various power grid operation data in the three-dimensional digital power grid map by accessing the remote data platform, screens various power grid operation data in the three-dimensional digital power grid map, analyzes data information in a power equipment parameter base, and forwards a power grid control or maintenance instruction to the client end through the remote data platform; the patrol terminal is a mobile terminal provided with patrol equipment, collects all-round high-definition video images of a power grid and infrared remote sensing information in real time and packages and uploads the power grid video images to the remote data platform in combination with GPS geographic data, and the power grid video images are associated to the three-dimensional digital power grid map through the GPS geographic data to form video image data in power grid operation data. The method updates the three-dimensional digital power grid map to the remote data platform in real time by utilizing the 4D display technology, has strong intuition and rich and comprehensive information quantity, and obtains real, accurate, visual and intuitive power grid operation and maintenance data. However, the present invention has not yet solved the above-mentioned problems.
Disclosure of Invention
In view of the above, the present invention provides an automatic patrol method and a patrol platform for a national network information management system, which can automatically capture, discriminate, display, store and automatically form patrol reports of multiple systems, and can improve operation and maintenance efficiency, aiming at the defects of the prior art.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows: an automatic patrol method of a national network information management system comprises the following steps:
s1: selecting automatic inspection objects, wherein the automatic inspection objects comprise a city department stellar system, a county department stellar system, a sky inquiry system, a city department table management system, a county department table management system and an I6000 system;
s2: automatically logging in the automatic inspection object by an encryption and decryption method;
s3: capturing webpage information of the automatic inspection object by using a web crawler tool;
s4: performing key information capture, comparison analysis and display on the webpage information;
s5: and automatically generating a patrol report.
Further, in S2, the encryption and decryption are performed by a method of combining the RSA algorithm and the AES algorithm, the AES symmetric cryptosystem is used to encrypt the transmission data, and the RSA asymmetric cryptosystem is used to transmit the key of the AES.
Further, in S3, the captured web page information includes a URL requesting access to the web page, a request mode, a content type, a cookie, a location and an attribute of a text box, a password box, a button, a floating menu, an iFrame, a drop-down box, a link, a check box, and a form.
Further, in S4, the method for capturing key information includes a source code analysis method and a capture package analysis method, when the source code analysis method cannot quickly or completely obtain the required element information, the key Data information is captured by means of a json and binary file analysis method, after capturing the key index information, the key index information is firstly compared with a normal standard value, an abnormal value is marked with red, and the abnormal value is returned to a foreground text box for display, and for the condition that the Data is displayed by a chart on a dashboard or a histogram, a capture package analysis method and a screenshot are adopted to return to the foreground for display.
Further, in S5, the patrol report is composed of three parts: title, key indicator value, and screenshot.
An automatic patrol platform of a state network information management system comprises an encryption and decryption module for automatically logging in a city district Switzerland system, a county district Switzerland system, a sky inquiry system, a city district table management system, a county district table management system and an I6000 system, a network crawler module for capturing information of the city district Switzerland system, the county district Switzerland system, the sky inquiry system, the city district table management system, the county district table management system and the I6000 system, and a webpage element analysis module, a key information capture module, a comparison analysis display module and a patrol report automatic generation module for processing information of the city district Switzerland system, the county district Switzerland system, the sky inquiry system, the county district table management system and the I6000 system.
Furthermore, the encryption and decryption module comprises an RSA and an AES encryption and decryption module.
Further, the web crawler module comprises a selenium module.
Further, the webpage element analysis module comprises a webDriver module supporting a headless Chrome browser.
Furthermore, the comparison analysis display module comprises a docx module and a Pt module which support reading and writing of word files, and an xlrd module which supports reading operation of excel files.
In a national grid power system, in order to count and display power grid information, a plurality of information management systems are generally needed, the information management systems are independent from each other and have different functions, different systems need to pay attention to different indexes such as weak passwords, hosts corresponding to viruses, system installation rate, antivirus software installation rate, registration rate and the like when patrolling is finished, and optimization and upgrading of a single system are generally easy to think when the prior art uses each management system, for example, a patent document with publication number CN 101290675A discloses a power grid information management system which comprises a power grid service database, a data conversion module and a client, and a display method of the power grid information management system is provided at the same time and is divided into three steps such as data extraction, data conversion and data display The power grid information management system and the visual display method thereof have the advantages of small maintenance workload, convenient operation and high management efficiency; in addition, daily patrol of each information management system is the job of the current operation and inspection personnel, and based on the job, the method and the platform for automatically realizing patrol index capture, judgment, display, storage and automatic formation of patrol reports are not easy to think by the technical personnel in the field.
In addition, on the basis of safety consideration, each information management system is a closed independent system, an encrypted login mode is adopted, and if the indexes of the information management systems such as a weak password, a host corresponding to virus occurrence, a system installation rate, an antivirus software installation rate, a registration rate and the like are integrated to perform automatic patrol, and an evidence is rapidly intercepted and reserved for an abnormal index to form a corresponding report, technical problems of multi-system data encryption and decryption, information system webpage element analysis, key information capture, comparison analysis and display, automatic patrol report generation and the like need to be overcome, which is difficult for technical personnel in the field to realize.
Compared with the prior art, the invention has the following beneficial effects:
the invention relates to an automatic patrol method of a national network information management system, which adopts a method of encrypting and decrypting to automatically log in a city department Switzerland system, a county department Switzerland system, a daily inquiry system, a city department table management system, a county department table management system and an I6000 system, uses a network crawler tool to grab the webpage information of an automatic patrol object, grabs, compares, analyzes and displays the key information of the webpage information, and automatically generates a patrol report, thereby solving the problems of complexity and time consumption in the manual patrol process of the traditional information management system. The operation and maintenance time is saved so as to be convenient for focusing on researching the core business, and the management level of the assisted enterprise is improved.
In addition, the encryption and decryption are carried out by a method of combining an RSA algorithm and an AES algorithm, the AES symmetric cryptosystem is used for encrypting transmission data, and the RSA asymmetric cryptosystem is used for transmitting a key of the AES, the advantages of the two encryption methods are complementary, the encryption and decryption speed is improved, so that account passwords seen by a database administrator or other users are encrypted, and decryption value transfer operation is automatically completed in a background before login so as to avoid the risk of leakage of the account passwords; after the key index information is captured, the key index information is firstly compared with a normal standard value, the abnormal numerical value is marked with red and is returned to a foreground text box for displaying, and secondly, for the condition that data are displayed by a chart such as a dashboard, a histogram and the like, a double-guarantee method of capturing a packet and returning a screenshot to the foreground for displaying is adopted to ensure the correctness of a patrol result.
The automatic patrol platform of the national network information management system is combined with operation and maintenance practice, encrypted decryption, automatic patrol and Python automatic application are researched and developed, an information operation and maintenance mode is optimized, the patrol efficiency of the Ten surplus information management system of the department of Internet of city and county is improved, automatic generation of patrol reports is realized, the burden reduction of basic teams and groups is promoted, and the management level of an assisting enterprise is improved. Meanwhile, by reasonably applying the thought and the technology, the automatic processing of other daily works can be completed, such as automatic downloading of line loss data of a control room, batch processing of excel data and the like.
Drawings
FIG. 1 is a schematic diagram of a web page acquisition in the second embodiment of the present invention;
FIG. 2 is a diagram of a platform architecture according to a second embodiment of the present invention;
FIG. 3 is a functional block diagram of a platform according to a second embodiment of the present invention;
FIG. 4 is a schematic diagram of encryption and decryption in a second embodiment of the present invention;
FIG. 5 is a schematic illustration of an XHR capture analysis in a second embodiment of the present invention;
FIG. 6 is a schematic diagram of HTML capture analysis according to a second embodiment of the present invention;
FIG. 7 is a diagram illustrating packet analysis according to a second embodiment of the present invention;
fig. 8 is a schematic diagram of a patrol report according to a second embodiment of the present invention.
Detailed Description
In order to better understand the present invention, the following examples are further provided to clearly illustrate the contents of the present invention, but the contents of the present invention are not limited to the following examples. In the following description, numerous specific details are set forth in order to provide a more thorough understanding of the present invention. It will be apparent, however, to one skilled in the art, that the present invention may be practiced without one or more of these specific details.
Example one
An automatic patrol method of a national network information management system comprises the following steps:
s1: selecting automatic inspection objects, wherein the automatic inspection objects comprise a city department stellar system, a county department stellar system, a sky inquiry system, a city department table management system, a county department table management system and an I6000 system;
s2: automatically logging in the automatic inspection object by an encryption and decryption method;
s3: capturing webpage information of the automatic inspection object by using a web crawler tool;
s4: performing key information capture, comparison analysis and display on the webpage information;
s5: and automatically generating a patrol report.
Specifically, in S2, encryption and decryption are performed by a method of combining the RSA algorithm and the AES algorithm, the AES symmetric cryptosystem is used to encrypt transmission data, and the RSA asymmetric cryptosystem is used to transmit a key of the AES.
In S3, the captured web page information includes the URL of the requested access page, the request mode, the content type, the cookie, and the location and attributes of the text box, the password box, the button, the hover menu, the iFrame, the drop-down box, the link, the check box, and the form.
In S4, the method for grabbing key information includes a source code analysis method and a packet grabbing analysis method, when the source code analysis method cannot quickly or completely obtain the required element information, the key Data information is grabbed by means of a json and binary file analysis method, after the key index information is grabbed, the key Data information is firstly compared with a normal standard value, an abnormal value is marked with red and returned to a foreground text box for display, and for the condition that Data are displayed by a dashboard and a histogram in a graph, the packet grabbing analysis method and a screenshot are returned to the foreground for display.
In S5, the patrol report is composed of three parts: title, key indicator value, and screenshot.
Example two
An automatic patrol platform of a state network information management system comprises an encryption and decryption module for automatically logging in a city district Switzerland system, a county district Switzerland system, a sky inquiry system, a city district table management system, a county district table management system and an I6000 system, a network crawler module for capturing information of the city district Switzerland system, the county district Switzerland system, the sky inquiry system, the city district table management system, the county district table management system and the I6000 system, and a webpage element analysis module, a key information capture module, a comparison analysis display module and a patrol report automatic generation module for processing information of the city district Switzerland system, the county district Switzerland system, the sky inquiry system, the county district table management system and the I6000 system.
Specifically, the encryption and decryption module comprises an RSA and AES encryption and decryption module.
The web crawler module comprises a selenium module.
The web page element analysis module comprises a webDriver module supporting a headless Chrome browser.
The comparison analysis display module comprises a docx module and a Pt module which support reading and writing of word files and an xlrd module which supports reading operation of excel files.
The automatic patrol platform of the state network information management system in the embodiment of the invention utilizes the network crawler and Python automation technology to develop the core function of the platform. The web crawler automatically captures information on the network according to a certain rule (simulating a mode of manually logging in and operating web page elements). By using the webpage acquisition principle shown in fig. 1 (a personal computer sends a Request to a server, and the server returns webpage information to a personal computer Response), the construction process of the platform comprises seven steps of data encryption and decryption, information system webpage element analysis, key information capture, comparison analysis and display, automatic tour report generation, abnormal alarm, system operation test, system release and reverse compilation.
The system architecture of the automatic patrol platform of the national network information management system of the embodiment of the invention is shown in fig. 2; functional module design of the platform, as shown in FIG. 3; the design emphasizes openness, secondary development capability and application support capability, and supports the application integration of two modes of C/S and B/S. The programming language used is python, and the main used technologies comprise an RSA and AES encryption and decryption module, a selenium module of a web crawler, modules such as docx, Pt and the like supporting reading and writing of a word file, an xlrd module supporting reading operation of an excel file, a webDriver module supporting a headless Chrome browser and the like.
Data encryption and decryption
With the wide application of Internet network technology, the information security problem is increasingly prominent, and the information security technology using data encryption and decryption technology as the core is also greatly developed. Current data encryption technologies are classified into a private key encryption system and a public key encryption system according to the type of encryption key.
In order to ensure the safety of a developed platform, the encryption and decryption operations of the passwords need to be completed by combining a mainstream encryption technology, namely, the account passwords seen by a database administrator or other users are all encrypted, and the decryption value transfer operation is automatically completed in the background before login so as to avoid the risk of leakage of the account passwords. The representative algorithm pairs of the two mainstream encryption and decryption systems are shown in table 1.
Figure 385357DEST_PATH_IMAGE002
According to comparison, the two algorithms have advantages and disadvantages respectively. Therefore, the platform adopts the RSA + AES solution scheme to realize encryption and decryption operation. The AES symmetric cryptosystem is used to encrypt the transmission data, and the RSA asymmetric cryptosystem is used to transmit the key of the AES, so that the advantages of the AES and the RSA can be comprehensively exerted while the disadvantages of the AES and the RSA are avoided, and a new data encryption scheme is implemented, as shown in fig. 4.
Information system web page element analysis
In combination with the Chrome browser, as shown in fig. 5-7, the URL of the requested access page, the Request Method (get or post), the content type (content type), the cookie, and the positions and attributes of common web page elements such as text boxes, password boxes, buttons, floating menus, iframes, drop-down boxes, links, check boxes, and tables need to be analyzed, so as to provide a basis for obtaining and displaying the key indicators in the next step.
Key information capturing, comparing, analyzing and displaying
The main capturing active code analysis method and the packet capturing analysis method for the key information indexes need to capture key Data information by means of json and binary file analysis methods when a predecessor cannot rapidly or completely obtain required element information, as shown in fig. 7.
(1) Web page source code analysis
As shown in fig. 6, the source code of the web page includes a plurality of elements, such as text boxes, buttons, floating menus, iframes, drop-down boxes, links, check boxes, tables, pictures, and the like. Common operations include positioning, selecting, inputting, clicking, transferring values through a URL and the like. The accurate positioning of elements is a key step, and the following eight methods are commonly used: id positioning, name positioning, class positioning, tag positioning, link positioning, partial _ link positioning, xpath positioning and css positioning.
(2) Packet capture and parsing
A network packet capture (packet capture) is an operation of intercepting, retransmitting, editing, unloading and the like of a data packet transmitted and received by a network, and is often used for data interception. Packet capture is particularly important in websites where the response to data is json. When the element positioning value taking method of 1.3.3 (1) is adopted, the required key information cannot be quickly obtained or completely obtained, the capture of the key form information can be completed by capturing a packet and analyzing a json file, such as the conditions of CPU memory utilization rate of other switches in the visited city 70 and the like.
(3) Key information comparison and display
After capturing the key index information, firstly, comparing the key index information with a normal standard value, marking an abnormal numerical value with red, and returning the abnormal numerical value to a foreground text box for displaying; secondly, for the condition that data are displayed in a graph such as an instrument panel, a histogram and the like, a double-guarantee method of packet capture analysis and screenshot returning to the foreground display is adopted to ensure the correctness of the patrol result.
Automatic generation of patrol report
The patrol report consists of three parts: title, key indicator value and screenshot, as shown in fig. 8.
Abnormity alarm
When some information system index is abnormal, an alarm triggering mechanism is adopted to complete the pushing of corresponding abnormal information by combining alarm equipment, such as instant messaging notification, oa mailbox sending and external equipment alarm prompting.
System operation and testing
This result is packaged into an executable program (. exe) using the python-pyinstteller module, which is then added to the task fixed point self-start column in the following manner, setting the self-start time to 8:00 am every day, 9: 30, 11: 00 and 14:00, 15: 30, 17: 00.
control panel → management tool → task planning program → operation → creation task → conventional → trigger new → operation program new.
(1) Time efficiency testing
Taking the sum of the patrol time and the report making time of the nine information management systems as one-time experiment time, taking 60 experiments as an example, calculating the total time length and the average time length, and comparing and analyzing the time efficiency of the three methods, as shown in table 2.
Figure 771339DEST_PATH_IMAGE004
The common method refers to a method for manually logging in, clicking, screenshot and making a report at present; the semi-automatic method is a graphical operation interface related to a platform, each button corresponds to automatic inspection of a single information management system, the buttons need to be manually clicked, and the rest operations are automatic operations; the full-automatic method is to add the platform into the fixed-point self-starting task of the computer, and the whole process is automatically started and patrolled at fixed points.
(2) System stability testing
The system stability test is mainly considered from the three aspects of error rate, index value accuracy rate and system safety in the table 3. The system security is ensured by adopting a method of 'information system IP access login limitation + password encryption and decryption + anti-decompilation'.
Figure DEST_PATH_IMAGE006
System publishing and decompilation prevention
In order to improve the convenience of software use and deployment, a Python pylnstar technology is adopted to release a system in an executable file (. exe) mode.
The exe published above can be migrated to other computers for use, and if the use is convenient for other computers, the step is finished. But to improve the generalizability, the platform may be popularized to other units for use, and in order to prevent the program from being cracked by an open source or others, it is not enough to go to this step, because exe going to this step can be inversely compiled by others to obtain the source code.
Reverse engineering of computer software (also called computer software recovery engineering) refers to performing "Reverse analysis and research" on target programs (such as executable programs) of other software to derive design elements such as ideas, principles, structures, algorithms, processing procedures, operation methods and the like used by software products of other people, and source codes may be derived under certain specific conditions. Therefore, after the system is released as exe, the anti-reverse compiling operation of the exe file and the related library file pyc is completed by adopting a Python pyinstxtractor and Easy Python Decompiler module, so that the safety and the generalization performance of the system are improved.
Finally, the above embodiments are only used for illustrating the technical solutions of the present invention and not for limiting, and other modifications or equivalent substitutions made by the technical solutions of the present invention by those of ordinary skill in the art should be covered within the scope of the claims of the present invention as long as they do not depart from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. An automatic patrol method for a state network information management system is characterized by comprising the following steps:
s1: selecting automatic inspection objects, wherein the automatic inspection objects comprise a city department stellar system, a county department stellar system, a sky inquiry system, a city department table management system, a county department table management system and an I6000 system;
s2: automatically logging in the automatic inspection object by an encryption and decryption method;
s3: capturing webpage information of the automatic inspection object by using a web crawler tool;
s4: performing key information capture, comparison analysis and display on the webpage information;
s5: and automatically generating a patrol report.
2. The automatic patrol method of the national network information management system according to claim 1, wherein: in S2, the encryption and decryption are performed by a method of combining the RSA algorithm and the AES algorithm, the AES symmetric cryptosystem is used to encrypt the transmission data, and the RSA asymmetric cryptosystem is used to transmit the key of the AES.
3. The automatic patrol method of the national network information management system according to claim 2, wherein: in S3, the captured web page information includes the URL of the requested access page, the request mode, the content type, the cookie, and the location and attributes of the text box, the password box, the button, the hover menu, the iFrame, the drop-down box, the link, the check box, and the form.
4. The automatic patrol method of the national network information management system according to claim 3, wherein: in S4, the method for grabbing key information includes a source code analysis method and a packet grabbing analysis method, when the source code analysis method cannot quickly or completely obtain the required element information, the key Data information is grabbed by means of a json and binary file analysis method, after the key index information is grabbed, the key Data information is firstly compared with a normal standard value, an abnormal value is marked with red and returned to a foreground text box for display, and for the condition that Data are displayed by a dashboard and a histogram in a graph, the packet grabbing analysis method and a screenshot are returned to the foreground for display.
5. The automatic patrol method of the national network information management system according to claim 4, wherein: in S5, the patrol report is composed of three parts: title, key indicator value, and screenshot.
6. The utility model provides an automatic platform of patrolling of country network information management system which characterized in that: the system comprises an encryption and decryption module for automatically logging in a city district stellar system, a county inquiry system, a city district table management system, a county district table management system and an I6000 system, a network crawler module for capturing information of the city district stellar system, the county inquiry system, the city district table management system, the county district table management system and the I6000 system, and a webpage element analysis module, a key information capture module, a comparison analysis display module and a tour report automatic generation module for processing information of the city district stellar system, the county inquiry system, the city district table management system, the county district table management system and the I6000 system.
7. The automatic patrol platform of the national network information management system according to claim 6, wherein: the encryption and decryption module comprises an RSA encryption and decryption module and an AES encryption and decryption module.
8. The automatic patrol platform of the national network information management system according to claim 7, wherein: the web crawler module comprises a selenium module.
9. The automatic patrol platform of the national network information management system according to claim 8, wherein: the web page element analysis module comprises a webDriver module supporting a headless Chrome browser.
10. The automatic patrol platform of the internet information management system according to claim 9, wherein: the comparison analysis display module comprises a docx module and a Pt module which support reading and writing of word files and an xlrd module which supports reading operation of excel files.
CN202110090539.0A 2021-01-22 2021-01-22 Automatic patrol method and patrol platform for state network information management system Pending CN112632362A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110090539.0A CN112632362A (en) 2021-01-22 2021-01-22 Automatic patrol method and patrol platform for state network information management system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110090539.0A CN112632362A (en) 2021-01-22 2021-01-22 Automatic patrol method and patrol platform for state network information management system

Publications (1)

Publication Number Publication Date
CN112632362A true CN112632362A (en) 2021-04-09

Family

ID=75295292

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110090539.0A Pending CN112632362A (en) 2021-01-22 2021-01-22 Automatic patrol method and patrol platform for state network information management system

Country Status (1)

Country Link
CN (1) CN112632362A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113469555A (en) * 2021-07-19 2021-10-01 国网冀北电力有限公司唐山供电公司 AI technology-based power production management method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120246139A1 (en) * 2010-10-21 2012-09-27 Bindu Rama Rao System and method for resume, yearbook and report generation based on webcrawling and specialized data collection
CN106503808A (en) * 2016-09-28 2017-03-15 国家电网公司 A kind of three-dimensional digital electrical network intelligent patrol system
CN107680194A (en) * 2017-09-22 2018-02-09 国网天津市电力公司 A kind of information system for power enterprise automates cruising inspection system
CN107832197A (en) * 2017-11-28 2018-03-23 江苏方天电力技术有限公司 The cruising inspection system and method for inspecting of a kind of business application system
CN111191097A (en) * 2019-12-20 2020-05-22 天阳宏业科技股份有限公司 Method, device and system for automatically acquiring webpage information by web crawler

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120246139A1 (en) * 2010-10-21 2012-09-27 Bindu Rama Rao System and method for resume, yearbook and report generation based on webcrawling and specialized data collection
CN106503808A (en) * 2016-09-28 2017-03-15 国家电网公司 A kind of three-dimensional digital electrical network intelligent patrol system
CN107680194A (en) * 2017-09-22 2018-02-09 国网天津市电力公司 A kind of information system for power enterprise automates cruising inspection system
CN107832197A (en) * 2017-11-28 2018-03-23 江苏方天电力技术有限公司 The cruising inspection system and method for inspecting of a kind of business application system
CN111191097A (en) * 2019-12-20 2020-05-22 天阳宏业科技股份有限公司 Method, device and system for automatically acquiring webpage information by web crawler

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
承春明等: "信息管理系统自动巡检平台设计与实现", 《电力信息与通信技术》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113469555A (en) * 2021-07-19 2021-10-01 国网冀北电力有限公司唐山供电公司 AI technology-based power production management method

Similar Documents

Publication Publication Date Title
US11711374B2 (en) Systems and methods for understanding identity and organizational access to applications within an enterprise environment
CN107409126B (en) System and method for securing an enterprise computing environment
AU2014201599A1 (en) Mobile reports
US20110307454A1 (en) System And Method For Independent Verification And Validation
WO2016007178A1 (en) System and method for providing contextual analytics data
CN109255093A (en) Behavioral data processing method, device, electronic equipment and computer-readable medium
CN109582405A (en) Use the safety survey of tabulating equipment frame
CN112632362A (en) Automatic patrol method and patrol platform for state network information management system
US20160314103A1 (en) Computer System for Generation of Electronic Checklists
Qureshi Improving outcomes from information and communication technology for development (ICT4D) studies
Khairunisa et al. Virtual Job Fair Information System Design Based on Augmented Reality/Virtual Reality
Johari et al. SEVA: Secure E-Voting Application in Cyber Physical System
EP4040723A1 (en) Systems and methods for understanding identity and organizational access to applications within an enterprise environment
Azarmi Learning Kibana 5.0
Jun et al. E-health web application framework and platform based on the cloud technology
Ferrigno et al. 3D Real Time Digital Twin
Mathijssen et al. source data for the focus area maturity model for API management
Dubey et al. A Beginners Guide to Amazon Web Services
Bello et al. Implementation of Mobile Phone Data Collection in the Conduct EPI Comprehensive Review in East and Southern African Countries
KR20210051817A (en) System and method for providing an authentication information service based an open api
Khan A distributed computing architecture to enable advances in field operations and management of distributed infrastructure
US9940311B2 (en) Optimized read/write access to a document object model
Yu Development of Entering and Reporting Registration System Platform of the CAU Library in COVID-19 Epidemic Period
US9727844B2 (en) Online documentation review
Raja New Zealand Wide Internet Scanning Data Analysis for Interesting Trends

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210409

RJ01 Rejection of invention patent application after publication