CN112804241A - Intelligent monitoring method and system for computer room network - Google Patents

Intelligent monitoring method and system for computer room network Download PDF

Info

Publication number
CN112804241A
CN112804241A CN202110095063.XA CN202110095063A CN112804241A CN 112804241 A CN112804241 A CN 112804241A CN 202110095063 A CN202110095063 A CN 202110095063A CN 112804241 A CN112804241 A CN 112804241A
Authority
CN
China
Prior art keywords
acquisition result
data
module
machine room
alarm
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110095063.XA
Other languages
Chinese (zh)
Inventor
汪兆伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haoyue Technology Co ltd
Original Assignee
Haoyue Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haoyue Technology Co ltd filed Critical Haoyue Technology Co ltd
Priority to CN202110095063.XA priority Critical patent/CN112804241A/en
Publication of CN112804241A publication Critical patent/CN112804241A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method and a system for intelligently supervising a machine room network, wherein the method comprises the following steps: step S1: adding necessary data of environment nodes; step S2: after reading the necessary data of the environment nodes stored in the step S1, starting to scan each software and hardware node in the discovery environment range, and forming a discovery result for storage; step S3: judging whether a target node needing to be processed exists in the discovery result stored in the step S2, if so, executing a step S4; otherwise, go to step S2; step S4: data acquisition is carried out on the target node, intrusion behavior characteristics of an acquisition result are judged, and if the acquisition result conforms to the intrusion behavior characteristics, an object to which the data in the acquisition result belongs, an intrusion event and an intrusion belonging type are stored so as to be read and displayed; otherwise, storing the acquisition result for reading and displaying. The technical scheme provided by the invention realizes the increase of intrusion monitoring and helps to ensure the safety of the machine room environment to a certain extent.

Description

Intelligent monitoring method and system for computer room network
Technical Field
The invention belongs to the technical field of computer software programs, and particularly relates to a method and a system for intelligently supervising a computer room network.
Background
The 21 st century is an explosive growth era of a digital system, an information system, the internet and an internet of things system, the operation of the systems is generally based on a centralized machine room environment, the explosive growth of a new system is realized, the machine room environment is also larger and more complex in scale, and the operation and maintenance work of the machine room also faces a plurality of challenges. The existing open source monitoring tool can not meet the complex operation and maintenance requirements of large-scale machine rooms, and the following problems which are not well solved by the existing open source monitoring tool are listed:
1. the number of monitoring nodes is large, the workload of manual addition is large, errors are prone to occurring, and when the nodes are subjected to attribute change, workers cannot find the nodes in time and follow up maintenance.
2. The network topology relation is complex, and the topology graphic display needs to be intuitively carried out as a monitoring system.
3. Monitoring points and monitoring types are variable, and an open source platform is inconvenient for special customization of monitoring requirements.
4. The alarm rule mechanism is simple, and unnecessary alarms can be easily calculated.
5. And some early warning mechanisms are lacked, operation and maintenance workers are assisted, and some hidden problems are discovered.
6. And a network environment security analysis mechanism is lacked, so that operation and maintenance personnel can be assisted to discover network attack behaviors.
7. And a fault automatic handling mechanism is lacked, operation and maintenance workers are assisted, and node faults are handled timely and quickly.
Disclosure of Invention
The invention aims to provide a machine room network intelligent supervision method and system, and the technical scheme can help ensure the safety of a machine room environment to a certain extent.
The invention provides a machine room network intelligent supervision method which comprises the following steps:
step S1: adding necessary data of environment nodes;
step S2: after reading the necessary data of the environment nodes stored in the step S1, starting to scan each software and hardware node in the discovery environment range, and forming a discovery result for storage;
step S3: judging whether a target node needing to be processed exists in the discovery result stored in the step S2, if so, executing a step S4; otherwise, go to step S2;
step S4: data acquisition is carried out on the target node, intrusion behavior characteristics of an acquisition result are judged, and if the acquisition result conforms to the intrusion behavior characteristics, an object to which the data in the acquisition result belongs, an intrusion event and an intrusion belonging type are stored so as to be read and displayed; otherwise, storing the acquisition result for reading and displaying.
The invention provides a machine room network intelligent supervision system, which comprises:
the human-computer interaction interface is used for node maintenance, basic configuration, data viewing and monitoring signboards;
the automatic discovery module is used for scanning and discovering each software and hardware node in the environment according to the node data configured by the human-computer interaction interface and forming a discovery result;
the acquisition engine is used for reading the discovery result formed by the automatic discovery module, discovering whether a target node exists or not, acquiring data of the target node when the target node exists, and processing the acquired data of various different formats into available data formats to form an acquisition result;
the intrusion detection module is used for judging the intrusion behavior characteristics of the acquisition result;
and the storage module is used for storing data for reading.
Further, on the basis of the above supervision method, one or all of the following processes are also performed on the acquisition result formed in the step S4:
1) storing the acquisition result for reading and displaying;
2) and judging the alarm condition of the acquisition result, and if the acquisition result meets the alarm condition, storing the object of the data in the acquisition result and the alarm information so as to read and display the object.
Further, on the basis of the monitoring method, when the acquisition result meets the alarm condition, whether a fault processing strategy corresponding to the acquisition result exists is judged according to the object to which the data in the acquisition result belongs and the alarm information, if so, a processing script in the processing strategy is executed to repair or recover the fault in the acquisition result, otherwise, the processing task is not executed.
Further, on the basis of the supervision method, after the disposal script in the execution disposal policy repairs or recovers the fault in the acquisition result, the disposal information and the disposal result are sent to be notified.
Further, on the basis of the supervision method, when the acquisition result meets the alarm condition, whether a notification needs to be sent is judged, and if yes, the notification is sent; otherwise, the transmission is not carried out.
Further, on the basis of the above supervision method, an intra-environment network topology map generation step is further included, which specifically generates an intra-environment network topology map according to each software and hardware node in the environment range scanned and found in the step S2, and stores the intra-environment network topology map, so as to facilitate editing and maintenance of network node information.
Further, on the basis of the monitoring method, when the acquisition result meets the intrusion behavior characteristics, the object to which the data in the acquisition result belongs, the intrusion event and the type to which the intrusion belongs are sent to be notified.
Further, on the basis of the supervision method, before the notification is sent, data is filtered, de-duplicated, merged at the same source, merged at the same type and merged at the same service, so that the times of the alarm notification are reduced, and the alarm storm is avoided.
Further, on the basis of the monitoring system, the system further comprises an alarm judgment module for judging alarm conditions of the acquisition result according to a preset rule.
Further, on the basis of the monitoring system, the method further comprises the following steps:
the knowledge base is used for storing fault handling strategies and handling scripts;
a fault processing module for receiving the collection result judged by the alarm judging module to be in accordance with the alarm condition, reading the fault disposal strategy and the disposal script stored in the knowledge base, judging whether the knowledge base has the disposal strategy set by the alarm in the collection result in accordance with the alarm condition, if so, executing the disposal strategy to finish the automatic fault repairing or restoring function
Further, on the basis of the monitoring system, the system further comprises an event notification module for sending a notification to be sent according to a preset notification sending mode.
Further, on the basis of the monitoring system, the system further comprises an alarm compression module, wherein the alarm compression module is used for filtering, removing duplicates and combining data needing to be sent with a notification to form event data to be sent, and sending the event data to be sent to the event notification module.
The technical scheme provided by the invention has the following beneficial effects:
1. the intrusion monitoring is increased, external network attack behaviors can be found, and the safety of the machine room environment is assisted and guaranteed to a certain extent;
2. the automatic discovery of environment nodes and node information can be carried out;
3. alarm rules can be freely configured;
4. some disposal strategies can be set according to the alarm problem so as to timely and rapidly process general software and hardware faults;
5. the notification step can send the related data to notify the related personnel, so that the maintenance of the operation and maintenance personnel is assisted;
6. new monitoring requirements can be rapidly configured to meet the changeable monitoring requirements of the complex machine room environment;
7. the method has the steps of alarm condition judgment and intrusion behavior characteristic judgment, and the results are stored so as to be read and displayed, so that the aims of assisting operation and maintenance workers to find some hidden problems and some network attack behaviors are fulfilled to a certain extent; the method has the fault processing steps, can set some disposal strategies according to the alarm rules, assists operation and maintenance workers, and realizes timely and rapid processing of common software and hardware faults;
8. the technical scheme provided by the invention can be suitable for a larger-scale machine room, the labor cost is reduced, and the maintenance and repair work can be automatically completed or manually completed in a centralized manner;
9. the efficient and flexible acquisition engine can adapt to various monitoring tasks.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention. It is obvious that the drawings in the following description are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort. In the drawings:
fig. 1 is a logic relationship diagram of the intelligent monitoring system of the computer room network provided by the invention.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. Some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
Referring to fig. 1, the system provided by the present invention includes the following sub-modules: the system comprises a human-computer interaction interface, an automatic discovery module, an acquisition engine, an alarm judgment module, an intrusion detection module, a knowledge base, a fault handling module, a storage module, an alarm compression module and an event notification module, wherein the main functions of the above functional modules are as follows:
a human-computer interaction interface: the functions of system management, node maintenance, data viewing and monitoring billboard are provided, and the functions of maintenance, reading and display can be realized by adopting a web module, namely a web service layer.
The automatic discovery module is used for scanning and detecting each software and hardware node in a discovery environment according to node data configured by the human-computer interaction interface and forming a discovery result; in this embodiment, the auto discovery module may adopt any scanning technology, for example, utilize technical means such as snmp, ping, tcp, arp, etc. to scan each node (including software and hardware) in the discovery environment, ascertain information such as node type, IP, configuration, attribute, link relationship, etc., and may generate a network topology according to the scanning result; and storing the scanning result and the generated network topological graph into a storage module so as to facilitate a human-computer interaction interface (web module) to read and display.
The acquisition engine is responsible for executing an environment data acquisition task, is used for acquiring target node data, processing the acquired data in various formats into data formats available in the system to form an acquisition result, and then sending the acquisition result to the storage module, the alarm judgment module and the intrusion detection module;
and the alarm judgment module is used for carrying out alarm judgment on the acquisition result sent by the acquisition engine according to a preset rule by using threshold judgment, baseline judgment and homonymy calculation means, and sending the data reaching the alarm condition to the alarm compression module and the fault handling module.
And the intrusion detection module is used for receiving the acquisition result sent by the acquisition engine, analyzing and calculating data in the acquisition result by using an intrusion detection algorithm such as a host analysis algorithm, a clustering algorithm, a Bayesian algorithm and the like, sending one or a group of data which accord with the intrusion characteristics to the alarm compression module, and sending the data to the storage module for storage so as to facilitate the reading and displaying of the human-computer interaction interface.
The knowledge base is used for storing fault handling strategies and handling scripts, can add fault handling experiences, provides problem analysis and handling methods, can add handling scripts for faults, provides the handling scripts for a handling module, assists the handling module to perform fault automatic recovery,
the fault processing module is used for receiving the acquisition result which is judged to be in accordance with the alarm condition by the alarm judging module, reading a fault handling strategy and a handling script stored in the knowledge base, judging whether the knowledge base has a handling strategy which is set by the alarm in the acquisition result in accordance with the alarm condition, and if so, executing the handling strategy to finish the automatic fault repairing or recovering function; after executing the disposal strategy, processing an execution process into a disposal event, and sending the disposal event to an event notification module; if the corresponding disposal policy is not set, the disposal task of the alarm is not executed.
The storage module is used for storing data for reading, and can adopt middleware and a database.
The alarm compression module is used for filtering, removing duplicate and combining the data needing to be sent with the notification to form event data to be sent and sending the event data to be sent to the event notification module; specifically, alarm data sent by an alarm judgment module is received, and alarm compression is performed according to the methods of homologous combination, similar combination, same service combination and priority filtering, so that the alarm notification times are reduced, and the alarm storm is avoided; and processing the compressed alarm information into event data to be sent, and sending the event data to an event notification module.
The event notification module is used for sending data needing to send a notification according to a preset notification sending mode; specifically, the module receives event data of the alarm determination module and the fault handling module, and sends a notification to related personnel according to a preset notification mode (such as short message, mail and WeChat) and a contact mode (such as mobile phone number, mailbox and micro signal).
The working flow of the system is as follows, as shown in fig. 1:
1. a user logs in a human-computer interaction interface (web module), basic setting is carried out on a system, necessary data (key switches and SNMP (simple network management protocol) community names of nodes in a network) of an environment node are added, an alarm rule is configured, an event notifier and a notification mode are configured, a fault handling strategy and a handling script are configured, and the above operations are written into a database;
2. the automatic discovery module starts to scan and discover each software and hardware node in the environment range after reading necessary data of the environment node from the database, forms a discovery result after discovery is completed, and automatically generates a network topological graph in the environment according to the discovery result; the automatic discovery module writes the discovery result and the generated topological graph into a database for storage;
3. the acquisition engine module pays attention to whether a target node (new node) appears in the database in real time, and automatically starts data acquisition work of the target node (new node) after reading the target network node to form an acquisition result; in the embodiment, the acquisition engine acquires data through orientation node objects in modes of SNMP, PING, TCP, HTTP, IPMI and the like; of course, other collection methods may be used;
4. after processing the acquisition result, the acquisition engine carries out the following three processes:
1) writing the data into the middleware for storage, and reading and displaying the data by a human-computer interaction interface (web module);
2) sending the data to an alarm judging module to judge whether the node data is abnormal or not;
3) sending the intrusion detection event to an intrusion detection module to detect the intrusion event in the network;
5. the alarm judging module receives the latest receipt sent by the acquisition engine, judges the alarm condition, and sends the object to which the data belongs and the alarm information to the middleware for storage if the latest receipt meets the alarm condition so that a human-computer interaction module (web module) can display the alarm information in time;
6. the intrusion detection module receives the latest data sent by the acquisition engine, calculates through an intrusion detection algorithm, and sends an object to which the data belongs, an intrusion event and an intrusion belonging type to the middleware for storage if the data accords with the intrusion behavior characteristics, so that a human-computer interaction module (web module) can display the intrusion event in time;
7. the alarm information generated by the alarm judgment module is written into the middleware for storage and also can be sent to the alarm compression module and the fault handling module;
8. after the alarm compression module receives the alarm information, the alarm information is filtered, deduplicated and combined, and if the notification still needs to be sent, the alarm notification is sent to the event notification module;
9. after receiving the alarm information, the fault handling module searches the knowledge base to determine whether a handling strategy corresponding to the alarm exists, and if so, executes a handling script in the handling strategy so as to repair or recover the node fault; if the corresponding disposal strategy is not set, the disposal task of the alarm is not executed;
10. if the fault handling module has a handling action, the handling information and a handling result are sent to the alarm compression module so as to inform the handling condition to the contact;
11. if the intrusion detection module finds an intrusion event, the intrusion detection module also sends event information to an alarm compression module so as to send the intrusion information to a tie person;
12. the human-computer interaction interface (web module) can read various data and events of the database and the middleware in real time and display the data and the events on a page.
The supervision system provided by the embodiment has the functions of automatic discovery, automatic topology, intrusion detection, intelligent alarm, fault recovery and the like, and is complete in function.
The middleware in this embodiment is a type of software between the application system and the system software, and it uses the basic service (function) provided by the system software to connect each part of the application system or different applications on the network, so as to achieve the purpose of resource sharing and function sharing. Currently, it is not strictly defined, but the definition of IDC is generally accepted: middleware is a separate system software service by which distributed application software shares resources between different technologies, resides on the operating system of the client server, manages computing resources and network communications. In this sense, middleware can be represented by an equation: middleware is platform + communication, which defines that middleware can only be called in a distributed system, and also distinguishes the middleware from supporting software and utility software.
It will be understood that the invention is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the invention is limited only by the appended claims.

Claims (13)

1. An intelligent supervision method for a machine room network is characterized by comprising the following steps:
step S1: adding necessary data of environment nodes;
step S2: after reading the necessary data of the environment nodes stored in the step S1, starting to scan each software and hardware node in the discovery environment range, and forming a discovery result for storage;
step S3: judging whether a target node needing to be processed exists in the discovery result stored in the step S2, if so, executing a step S4; otherwise, go to step S2;
step S4: data acquisition is carried out on the target node, intrusion behavior characteristics of an acquisition result are judged, and if the acquisition result conforms to the intrusion behavior characteristics, an object to which the data in the acquisition result belongs, an intrusion event and an intrusion belonging type are stored so as to be read and displayed; otherwise, storing the acquisition result for reading and displaying.
2. The machine room network intelligent supervision method according to claim 1, characterized in that: and performing one or all of the following processes on the acquisition result formed in the step S4:
1) storing the acquisition result for reading and displaying;
2) and judging the alarm condition of the acquisition result, and if the acquisition result meets the alarm condition, storing the object of the data in the acquisition result and the alarm information so as to read and display the object.
3. The machine room network intelligent supervision method according to claim 2, characterized in that: and when the acquisition result meets the alarm condition, judging whether a fault processing strategy corresponding to the acquisition result exists according to the object of the data in the acquisition result and the alarm information, if so, executing a processing script in the processing strategy to repair or recover the fault in the acquisition result, otherwise, not executing the processing task.
4. The machine room network intelligent supervision method according to claim 3, characterized in that: and when the disposal script in the disposal strategy is executed to repair or recover the fault in the acquisition result, sending a notice of the disposal information and the disposal result.
5. The machine room network intelligent supervision method according to claim 2, characterized in that: when the acquisition result meets the alarm condition, judging whether a notice needs to be sent, and if so, sending the notice; otherwise, the transmission is not carried out.
6. The machine room network intelligent supervision method according to claim 1, characterized in that: and further comprising an intra-environment network topology map generation step, specifically, generating an intra-environment network topology map according to each software and hardware node in the environment range scanned and found in the step S2, and storing the intra-environment network topology map.
7. The machine room network intelligent supervision method according to claim 1, characterized in that: and when the acquisition result accords with the intrusion behavior characteristics, sending a notice of the object to which the data in the acquisition result belongs, the intrusion event and the type to which the intrusion belongs.
8. The machine room network intelligent supervision method according to claim 4, 5 or 7, characterized in that: before sending the notification, the data is filtered, deduplicated, homologously merged, congenerically merged, and homotopically merged.
9. A machine room network intelligent supervision system, characterized in that, the system includes:
the human-computer interaction interface is used for node maintenance, basic configuration, data viewing and monitoring signboards;
the automatic discovery module is used for scanning and discovering each software and hardware node in the environment according to the node data configured by the human-computer interaction interface and forming a discovery result;
the acquisition engine is used for reading the discovery result formed by the automatic discovery module, discovering whether a target node exists or not, acquiring data of the target node when the target node exists, and processing the acquired data of various different formats into available data formats to form an acquisition result;
the intrusion detection module is used for judging the intrusion behavior characteristics of the acquisition result;
and the storage module is used for storing data for reading.
10. The machine room network intelligent supervision system according to claim 9, characterized in that: the alarm judgment module is used for judging the alarm condition of the acquisition result according to a preset rule.
11. The machine room network intelligent supervision system according to claim 10, further comprising:
the knowledge base is used for storing fault handling strategies and handling scripts;
and the fault processing module is used for receiving the acquisition result which is judged to be in accordance with the alarm condition by the alarm judging module, reading the fault handling strategy and the handling script stored in the knowledge base, judging whether the knowledge base has the handling strategy which is set by the alarm in the acquisition result in accordance with the alarm condition, and executing the handling strategy if the knowledge base has the handling strategy to finish the automatic fault repairing or recovering function.
12. The machine room network intelligent supervision system according to claim 9, 10 or 11, characterized in that: the system also comprises an event notification module used for sending the notification to be sent according to a preset notification sending mode.
13. The machine room network intelligent supervision system according to claim 12, characterized in that: the system comprises an event notification module, an alarm compression module and an event notification module, wherein the event notification module is used for sending an event notification message to the event notification module, and the event notification module is used for sending the event notification message to the event notification module.
CN202110095063.XA 2021-01-25 2021-01-25 Intelligent monitoring method and system for computer room network Pending CN112804241A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110095063.XA CN112804241A (en) 2021-01-25 2021-01-25 Intelligent monitoring method and system for computer room network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110095063.XA CN112804241A (en) 2021-01-25 2021-01-25 Intelligent monitoring method and system for computer room network

Publications (1)

Publication Number Publication Date
CN112804241A true CN112804241A (en) 2021-05-14

Family

ID=75811546

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110095063.XA Pending CN112804241A (en) 2021-01-25 2021-01-25 Intelligent monitoring method and system for computer room network

Country Status (1)

Country Link
CN (1) CN112804241A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114157496A (en) * 2021-12-06 2022-03-08 国网江苏省电力有限公司扬州供电分公司 Intelligent machine room equipment management platform

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104378365A (en) * 2014-10-30 2015-02-25 广东电子工业研究院有限公司 Safety management center capable of conducting collaborative analysis
CN105227383A (en) * 2015-11-06 2016-01-06 广东电网有限责任公司电力科学研究院 A kind of device of network topology investigation
CN107046481A (en) * 2017-04-18 2017-08-15 国网福建省电力有限公司 A kind of information system integrated network management system comprehensive analysis platform
CN108011893A (en) * 2017-12-26 2018-05-08 广东电网有限责任公司信息中心 A kind of asset management system based on networked asset information gathering
CN108712396A (en) * 2018-04-27 2018-10-26 广东省信息安全测评中心 Networked asset management and loophole governing system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104378365A (en) * 2014-10-30 2015-02-25 广东电子工业研究院有限公司 Safety management center capable of conducting collaborative analysis
CN105227383A (en) * 2015-11-06 2016-01-06 广东电网有限责任公司电力科学研究院 A kind of device of network topology investigation
CN107046481A (en) * 2017-04-18 2017-08-15 国网福建省电力有限公司 A kind of information system integrated network management system comprehensive analysis platform
CN108011893A (en) * 2017-12-26 2018-05-08 广东电网有限责任公司信息中心 A kind of asset management system based on networked asset information gathering
CN108712396A (en) * 2018-04-27 2018-10-26 广东省信息安全测评中心 Networked asset management and loophole governing system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114157496A (en) * 2021-12-06 2022-03-08 国网江苏省电力有限公司扬州供电分公司 Intelligent machine room equipment management platform
CN114157496B (en) * 2021-12-06 2023-06-02 国网江苏省电力有限公司扬州供电分公司 Intelligent machine room equipment management platform

Similar Documents

Publication Publication Date Title
CN102447570B (en) Monitoring device and method based on health degree analysis
CN108964995B (en) Log correlation analysis method based on time axis event
CN110278097B (en) Server operation and maintenance system and method based on Android system
CN106371986A (en) Log treatment operation and maintenance monitoring system
CN107958337A (en) A kind of information resources visualize mobile management system
CN108833137A (en) A kind of flexibility micro services Monitoring framework framework
CN102546274A (en) Alarm monitoring method and alarm monitoring equipment in communication service
CN107612779B (en) Secondary safety protection network equipment of dispatching data network and service operation monitoring system
CN115809183A (en) Method for discovering and disposing information-creating terminal fault based on knowledge graph
CN102014020A (en) Equipment for performing network monitoring on network equipment and method thereof
CN112769605B (en) Heterogeneous multi-cloud operation and maintenance management method and hybrid cloud platform
CN114070742A (en) Network topology identification method and platform for electric power monitoring system
CN109164720A (en) Injection molding machine group of planes remote monitoring system and method based on IIoT
CN112529223A (en) Equipment fault repair method and device, server and storage medium
CN112463892A (en) Early warning method and system based on risk situation
CN110752959A (en) Intelligent substation process layer physical link fault positioning system
CN101710863B (en) Method and system for restoring single board alarm
CN114020581A (en) Alarm correlation method based on topological optimization FP-Growth algorithm
CN112804241A (en) Intelligent monitoring method and system for computer room network
CN113592210A (en) Internet of things integrated management platform for water supply non-negative-pressure secondary water supply facility
CN117220917A (en) Network real-time monitoring method based on cloud computing
NL2030719B1 (en) Microservice application observability system
CN113765717A (en) Operation and maintenance management system based on secret-related special computing platform
CN113821412A (en) Equipment operation and maintenance management method and device
CN114257414A (en) Intelligent network security duty method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210514

RJ01 Rejection of invention patent application after publication