CN113497743A - Network application monitoring and analyzing system and method - Google Patents

Network application monitoring and analyzing system and method Download PDF

Info

Publication number
CN113497743A
CN113497743A CN202010262569.0A CN202010262569A CN113497743A CN 113497743 A CN113497743 A CN 113497743A CN 202010262569 A CN202010262569 A CN 202010262569A CN 113497743 A CN113497743 A CN 113497743A
Authority
CN
China
Prior art keywords
application
terminal
detection
analysis
analyzing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010262569.0A
Other languages
Chinese (zh)
Inventor
陈美章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010262569.0A priority Critical patent/CN113497743A/en
Publication of CN113497743A publication Critical patent/CN113497743A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Abstract

The invention provides a network application monitoring and analyzing system and a network application monitoring and analyzing method. The network application monitoring and analyzing system and method comprise the following steps: an identity authentication end; and the application lead-in end is connected with the output end of the identity verification end. The invention provides a network application monitoring and analyzing system and a method, wherein the application detection and analyzing system is arranged, the whole system mainly comprises five module ends, the traditional complex and tedious internal flow is greatly simplified, and the five module ends comprise functions of identity verification, application detection and analysis, risk assessment and the like, under the condition of ensuring the complete function, an abnormal problem processing end is also added, the abnormal problem application is processed in time, the normal use of the application is ensured, the trouble of a user caused by problems during use is avoided, the time consumption is greatly reduced during detection by simplifying the system, the use is more convenient, the uniformity of the system is realized, and the wide popularization of the system is facilitated.

Description

Network application monitoring and analyzing system and method
Technical Field
The invention relates to the field of network application monitoring, in particular to a network application monitoring and analyzing system and a network application monitoring and analyzing method.
Background
The network application program is application software which is operated on the internet or an intranet by using a web browser, is an application program written in a web language, needs to be operated by the browser, and is one of the reasons for the popularity of the network application program because the network application program can be directly operated on various computer platforms and does not need programs such as pre-installation or periodic upgrading and the like.
With continuous progress of network technology, people use network applications more and more frequently, and when using the network applications, a plurality of problems are brought, in order to ensure that users can use the network applications normally, some network manufacturers provide an application detection analysis system to carry out effective detection analysis on the applications, and the existing network application detection analysis system has a complex and complicated internal framework, needs to spend a long time when in use, and is lack of certain uniformity, so that the system cannot be effectively popularized.
Therefore, it is desirable to provide a system and a method for monitoring and analyzing network applications to solve the above problems.
Disclosure of Invention
The invention provides a network application monitoring and analyzing system and a network application monitoring and analyzing method, which solve the problems that an internal framework of an existing network application detecting system is complicated and long in using time.
In order to solve the above technical problems, the present invention provides a system and a method for monitoring and analyzing a network application, comprising:
an identity authentication end;
the application lead-in terminal is connected with the output terminal of the identity verification terminal, and the output terminal of the application lead-in terminal is connected with an application detection analysis terminal;
the risk evaluation end is connected to the output end of the application detection and analysis end, the output end of the risk evaluation end is connected with a result display end, and the input end of the identity verification end is respectively connected with a mobile phone end and a computer end;
and the abnormal problem processing end is connected to the output end of the risk assessment end.
Through setting up this application detection and analysis system, and entire system mainly comprises five module ends, traditional complicated loaded down with trivial details inside flow has been simplified greatly, and five module ends contain authentication, application detection and analysis, functions such as risk assessment, under the circumstances that guarantee the function is complete, still increase unusual problem processing end, in time handle unusual problem application, ensure to use and can normal use, avoid the user to be puzzled by the problem when using, through simplifying the system, the time consumption has been shortened greatly when detecting, it is also more convenient to use, the uniformity of system has been realized, do benefit to the extensive popularization of system.
Preferably, the output end of the identity verification end is connected with an abnormal identity alarm end, and the output end of the application detection and analysis end is connected with a data storage end.
Preferably, the output end of the result display end is connected with an application export end, and the output end of the application export end is respectively connected with the input ends of the mobile phone end and the computer end.
Preferably, the application detection and analysis end comprises a virus detection unit, a malicious advertisement detection unit and an operating environment detection unit.
Preferably, the abnormal problem processing end comprises a large database unit, and an output end of the large database unit is connected with an execution unit.
Preferably, the input end of the identity verification end is connected with an identity information input end, and the output end of the abnormal problem processing end is connected with the input end of the application export end.
Preferably, the risk assessment terminal is used for assessing the risk level of application assessment, and the result display terminal is connected with the display.
A method for monitoring an analysis system for network applications, comprising the steps of:
s1, firstly, connecting an external device such as a mobile phone or a computer with a corresponding mobile phone end and a corresponding computer end, after the external device is connected, detecting that the device is connected with the identity verification end, starting to verify identity information, inputting information by a user through an information input end, if the identity information is verified to be in accordance, allowing the next operation, if the identity information is not in accordance, outputting a signal to an identity alarm end by the identity verification end, sending an alarm, and not allowing the operation to continue;
s2, importing the application to be detected from the application import end to the application detection analysis end, analyzing and detecting the imported application through the application detection analysis end, wherein the internal virus detection unit, the malicious advertisement detection unit and the operation environment detection unit respectively perform relevant detection on the application, and respectively transmit the detected data to the data storage end and the risk assessment end;
and S3, the risk assessment end carries out risk assessment according to the detection result of the application detection analysis end, if the application risk assessment score is low, the application is directly led into the abnormal problem processing end to be processed, the abnormal problem is processed in time, if the assessment score meets the standard, the application risk assessment score is led into the result display end to display the assessment result, and finally the assessment result is output to the mobile phone end or the computer end through the application export end, and at this moment, the whole system finishes the detection operation.
Compared with the related technology, the network application monitoring and analyzing system and the method provided by the invention have the following beneficial effects:
the invention provides a network application monitoring and analyzing system and a method, wherein the application detection and analyzing system is arranged, the whole system mainly comprises five module ends, the traditional complex and tedious internal flow is greatly simplified, and the five module ends comprise functions of identity verification, application detection and analysis, risk assessment and the like, under the condition of ensuring the complete function, an abnormal problem processing end is also added, the abnormal problem application is processed in time, the normal use of the application is ensured, the trouble of a user caused by problems during use is avoided, the time consumption is greatly reduced during detection by simplifying the system, the use is more convenient, the uniformity of the system is realized, and the wide popularization of the system is facilitated.
Drawings
FIG. 1 is a block diagram of a network application monitoring and analyzing system and method according to the present invention;
FIG. 2 is a block diagram of the internal structure of the application detection and analysis terminal shown in FIG. 1;
fig. 3 is a block diagram of the internal structure of the abnormal problem processing terminal shown in fig. 1.
Reference numbers in the figures: 1. identity verification end, 2, application introduction end, 3, application detection analysis end, 31, virus detection unit, 32, malicious advertisement detection unit, 33, operation environment detection unit, 4, risk assessment end, 5, result display end, 6, mobile phone end, 7, computer end, 8, abnormal problem processing end, 81 big database unit, 82, execution unit, 9, abnormal identity alarm end, 10, data storage end, 11, application export end, 12, identity information input end.
Detailed Description
The invention is further described with reference to the following figures and embodiments.
Please refer to fig. 1, fig. 2 and fig. 3 in combination, wherein fig. 1 is a block diagram illustrating a monitoring and analyzing system and method for network application according to the present invention; FIG. 2 is a block diagram of the internal structure of the application detection and analysis terminal shown in FIG. 1; fig. 3 is a block diagram of the internal structure of the abnormal problem processing terminal shown in fig. 1. A network application monitoring and analyzing system and method includes:
an identity authentication terminal 1;
the application lead-in end 2 is connected with the output end of the identity authentication end 1, and the output end of the application lead-in end 2 is connected with an application detection analysis end 3;
the risk evaluation terminal 4 is connected to the output end of the application detection and analysis terminal 3, the output end of the risk evaluation terminal 4 is connected to the result display terminal 5, and the input end of the identity verification terminal 1 is respectively connected to the mobile phone terminal 6 and the computer terminal 7;
and the abnormal problem processing end 8 is connected to the output end of the risk assessment end 4, and the abnormal problem processing end 8 is connected to the output end of the risk assessment end 4.
The identity authentication terminal 1 is used for authenticating the information of a user, is a safety protection measure of the system, and avoids the damage to the internal environment caused by the entry of extraneous personnel into the system;
the application lead-in end 2 can lead in the application and data to be detected to the application detection analysis end 3, and is used as a data entry to mainly play a role in guiding, and the application detection analysis end 3 mainly performs various detection processes on the application and is a core part of the whole system;
the risk evaluation terminal 4 is used for performing related evaluation on the data obtained by the application detection analysis terminal 3, the evaluation standard is obtained by analysis based on big data, if the evaluation of the application is lower than the normal standard, the application is automatically regarded as problem application and is directly sent to the abnormal problem processing terminal 8 for problem processing;
the result display end 5 is connected with an external display to display real-time data and other operation contents of the application, so that a user can manually operate the result display end through the display, and the mobile phone end 6 and the computer end 7 are respectively used for connecting a mobile phone and computer equipment and conveying the data in the equipment to the interior of the system for processing;
through setting up this application detection and analysis system, and entire system mainly comprises five module ends, traditional complicated loaded down with trivial details inside flow has been simplified greatly, and five module ends contain authentication, application detection and analysis, functions such as risk assessment, under the circumstances that guarantee the function is complete, still increase unusual problem processing end 8, in time handle unusual problem application, ensure to use and can normal use, avoid the user to be puzzled by the problem when using, through simplifying the system, the time consumption has been shortened greatly when detecting, it is also more convenient to use, the uniformity of system has been realized, do benefit to the extensive popularization of system.
The output end of the identity verification end 1 is connected with an abnormal identity alarm end 9, and the output end of the application detection and analysis end 3 is connected with a data storage end 10.
The protection measures of the 9-bit system at the abnormal alarm end timely give an alarm for the operation which is not in accordance with the use authority, so as to prompt an administrator to timely react and play a certain protection role on the system, and the data storage end 10 is used for storing the related data of the application detection.
The output end of the result display end 5 is connected with an application export end 11, and the output end of the application export end 11 is respectively connected with the input ends of the mobile phone end 6 and the computer end 7.
The application export end 11 exports the application qualified for detection to the external device, and the result display end 5 imports the application qualified for detection to the application export end 11.
The application detection and analysis terminal 3 includes a virus detection unit 31, a malicious advertisement detection unit 32 and a running environment detection unit 33.
By arranging the virus detection unit 31, the malicious advertisement detection unit 32 and the running environment detection unit 33 to perform related detection operations respectively, relatively comprehensive detection on the application is ensured.
The abnormal problem processing terminal 8 comprises a big database unit 81, and an output end of the big database unit 81 is connected with an execution unit 82.
The problem of the application is solved by the big database unit 81, and the timely processing operation is performed by the execution unit 82.
The input end of the identity authentication end 1 is connected with an identity information input end 12, and the output end of the abnormal problem processing end 8 is connected with the input end of the application export end 11.
The identity information input end 12 is used for inputting user information and performing identity verification, and after the abnormal problem processing end 8 solves the abnormal problem of the application, the application data is led into the application export end 11.
The risk evaluation terminal 4 is used for evaluating the risk level of application evaluation, and the result display terminal 5 is connected with the display.
A method for monitoring an analysis system for network applications, comprising the steps of:
s1, firstly, connecting an external device such as a mobile phone or a computer with the corresponding mobile phone end 6 and the computer end 7, after the access, the identity information is verified by the identity verification end 1, the user can input information through the identity information input end 12, if the identity information is verified to be in accordance, the next operation is allowed, if the identity information is not in accordance, the identity verification end 1 outputs a signal to the identity alarm end 9, an alarm is given, and the operation is not allowed to continue;
s2, importing the application to be detected from the application import end 2 to the application detection analysis end 3, analyzing and detecting the imported application through the application detection analysis end 3, wherein the internal virus detection unit 31, the malicious advertisement detection unit 32 and the operation environment detection unit 33 respectively perform relevant detection on the application, and respectively transmit the detected data to the data storage end 10 and the risk assessment end 4;
s3, the risk assessment end 4 carries out risk assessment according to the result detected by the application detection and analysis end 3, if the application risk assessment score is low, the application is directly led into the abnormal problem processing end 8 to be processed, the abnormal problem is processed in time, if the assessment score meets the standard, the application risk assessment score is led into the result display end 5 to display the assessment result, and finally the assessment result is output to the mobile phone end 6 or the computer end 7 through the application export end 11, and the whole system completes detection operation.
The working principle of the network application monitoring and analyzing system and method provided by the invention is as follows:
s1, firstly, connecting an external device such as a mobile phone or a computer with the corresponding mobile phone end 6 and the computer end 7, after the access, the identity information is verified by the identity verification end 1, the user can input information through the information input end 12, if the identity information is verified to be in accordance, the next operation is allowed, if the identity information is not in accordance, the identity verification end 1 outputs a signal to the identity alarm end 9, an alarm is given, and the operation is not allowed to continue;
s2, importing the application to be detected from the application import end 2 to the application detection analysis end 3, analyzing and detecting the imported application through the application detection analysis end 3, wherein the internal virus detection unit 31, the malicious advertisement detection unit 32 and the operation environment detection unit 33 respectively perform relevant detection on the application, and respectively transmit the detected data to the data storage end 10 and the risk assessment end 4;
s3, the risk assessment end 4 carries out risk assessment according to the result detected by the application detection and analysis end 3, if the application risk assessment score is low, the application is directly led into the abnormal problem processing end 8 to be processed, the abnormal problem is processed in time, if the assessment score meets the standard, the application risk assessment score is led into the result display end 5 to display the assessment result, and finally the assessment result is output to the mobile phone end 6 or the computer end 7 through the application export end 11, and the whole system completes detection operation.
Compared with the related technology, the network application monitoring and analyzing system and the method provided by the invention have the following beneficial effects:
the invention provides a network application monitoring and analyzing system and a method, wherein the application detection and analyzing system is arranged, the whole system mainly comprises five module ends, the traditional complicated and fussy internal flow is greatly simplified, the five module ends comprise functions of identity verification, application detection and analysis, risk assessment and the like, under the condition of ensuring the complete function, an abnormal problem processing end 8 is also added, the abnormal problem application is processed in time, the normal use of the application is ensured, the trouble of a user caused by problems during use is avoided, the time consumption is greatly reduced during detection by simplifying the system, the use is more convenient, the uniformity of the system is realized, and the wide popularization of the system is facilitated.
The above description is only an embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (8)

1. A network application monitoring analysis system, comprising:
an identity authentication end;
the application lead-in terminal is connected with the output terminal of the identity verification terminal, and the output terminal of the application lead-in terminal is connected with an application detection analysis terminal;
the risk evaluation end is connected to the output end of the application detection and analysis end, the output end of the risk evaluation end is connected with a result display end, and the input end of the identity verification end is respectively connected with a mobile phone end and a computer end;
and the abnormal problem processing end is connected to the output end of the risk assessment end.
2. The system according to claim 1, wherein the output terminal of the authentication terminal is connected to an abnormal identity alarm terminal, and the output terminal of the application detection and analysis terminal is connected to a data storage terminal.
3. The system according to claim 1, wherein an output end of the result display end is connected to an application export end, and an output end of the application export end is connected to the input ends of the mobile phone end and the computer end respectively.
4. The system for monitoring and analyzing network applications of claim 1, wherein the application detection and analysis end comprises a virus detection unit, a malicious advertisement detection unit and a running environment detection unit.
5. The system for monitoring and analyzing network applications according to claim 1, wherein the abnormal problem handling end comprises a big database unit, and an output end of the big database unit is connected with an execution unit.
6. The network application monitoring and analyzing system of claim 1, wherein an input terminal of the authentication terminal is connected to an identity information input terminal, and an output terminal of the abnormal problem handling terminal is connected to an input terminal of the application export terminal.
7. The system for monitoring and analyzing network application of claim 1, wherein the risk assessment terminal is used for assessing risk level of application assessment, and the result display terminal is connected with the display.
8. A method for monitoring and analyzing a system by network application is characterized by comprising the following steps:
s1, firstly, connecting an external device such as a mobile phone or a computer with a corresponding mobile phone end and a corresponding computer end, after the external device is connected, detecting that the device is connected with the identity verification end, starting to verify identity information, inputting information by a user through an information input end, if the identity information is verified to be in accordance, allowing the next operation, if the identity information is not in accordance, outputting a signal to an identity alarm end by the identity verification end, sending an alarm, and not allowing the operation to continue;
s2, importing the application to be detected from the application import end to the application detection analysis end, analyzing and detecting the imported application through the application detection analysis end, wherein the internal virus detection unit, the malicious advertisement detection unit and the operation environment detection unit respectively perform relevant detection on the application, and respectively transmit the detected data to the data storage end and the risk assessment end;
and S3, the risk assessment end carries out risk assessment according to the detection result of the application detection analysis end, if the application risk assessment score is low, the application is directly led into the abnormal problem processing end to be processed, the abnormal problem is processed in time, if the assessment score meets the standard, the application risk assessment score is led into the result display end to display the assessment result, and finally the assessment result is output to the mobile phone end or the computer end through the application export end, and at this moment, the whole system finishes the detection operation.
CN202010262569.0A 2020-04-07 2020-04-07 Network application monitoring and analyzing system and method Pending CN113497743A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010262569.0A CN113497743A (en) 2020-04-07 2020-04-07 Network application monitoring and analyzing system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010262569.0A CN113497743A (en) 2020-04-07 2020-04-07 Network application monitoring and analyzing system and method

Publications (1)

Publication Number Publication Date
CN113497743A true CN113497743A (en) 2021-10-12

Family

ID=77995381

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010262569.0A Pending CN113497743A (en) 2020-04-07 2020-04-07 Network application monitoring and analyzing system and method

Country Status (1)

Country Link
CN (1) CN113497743A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100100963A1 (en) * 2008-10-21 2010-04-22 Flexilis, Inc. System and method for attack and malware prevention
CN106209817A (en) * 2016-07-01 2016-12-07 何钟柱 Information network security based on big data and trust computing is from system of defense
CN108289073A (en) * 2017-01-07 2018-07-17 长沙湘佩网络技术有限公司 APP safety detecting systems based on Android
CN108920960A (en) * 2018-07-26 2018-11-30 北京盘石信用管理有限公司 A kind of APP safe verification method and system
CN109361646A (en) * 2018-08-23 2019-02-19 广东电网有限责任公司信息中心 Network security monitoring and cognitive method in a kind of application of mobile interchange
CN110197315A (en) * 2018-04-08 2019-09-03 腾讯科技(深圳)有限公司 Methods of risk assessment, device and its storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100100963A1 (en) * 2008-10-21 2010-04-22 Flexilis, Inc. System and method for attack and malware prevention
CN106209817A (en) * 2016-07-01 2016-12-07 何钟柱 Information network security based on big data and trust computing is from system of defense
CN108289073A (en) * 2017-01-07 2018-07-17 长沙湘佩网络技术有限公司 APP safety detecting systems based on Android
CN110197315A (en) * 2018-04-08 2019-09-03 腾讯科技(深圳)有限公司 Methods of risk assessment, device and its storage medium
CN108920960A (en) * 2018-07-26 2018-11-30 北京盘石信用管理有限公司 A kind of APP safe verification method and system
CN109361646A (en) * 2018-08-23 2019-02-19 广东电网有限责任公司信息中心 Network security monitoring and cognitive method in a kind of application of mobile interchange

Similar Documents

Publication Publication Date Title
CN108090567B (en) Fault diagnosis method and device for power communication system
CN105989268A (en) Safety access method and system for human-computer identification
CN108090351A (en) For handling the method and apparatus of request message
CN111427803A (en) Automated random test method, apparatus, computer device and medium
CN110895509B (en) Test processing method and device, electronic equipment and storage medium
CN111783132A (en) SQL sentence security detection method, device, equipment and medium based on machine learning
CN113596844A (en) Early warning method, device, medium and electronic equipment based on data information
CN109543409B (en) Method, device and equipment for detecting malicious application and training detection model
CN111243580B (en) Voice control method, device and computer readable storage medium
CN107392033B (en) Android device penetration test system and automatic penetration test method thereof
CN113869789A (en) Risk monitoring method and device, computer equipment and storage medium
CN106445787A (en) Method and device for monitoring server core dump file and electronic equipment
CN113434400A (en) Test case execution method and device, computer equipment and storage medium
CN112650673A (en) Method and device for creating test case in transaction tracking system and electronic equipment
CN113497743A (en) Network application monitoring and analyzing system and method
CN114387775B (en) Pressure measurement method and device for simulating remote controller
CN110209572A (en) Ui testing method, ui testing system and terminal
CN115600213A (en) Vulnerability management method, device, medium and equipment based on application program
CN113835987B (en) Chaotic experiment execution file generation method and device, electronic equipment and storage medium
CN114693116A (en) Method and device for detecting code review validity and electronic equipment
CN115525499A (en) Data analysis method and device for hard disk, electronic equipment and storage medium
CN108959646B (en) Method, system, device and storage medium for automatically verifying communication number
CN115170355A (en) Evidence obtaining data credibility verification method and device, computer equipment and storage medium
CN113935847A (en) Online process risk processing method, device, server and medium
CN112632174A (en) Data inspection method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20211012

RJ01 Rejection of invention patent application after publication