CN113746950A - Method, system, computer device and storage medium for pre-detecting IP address conflict - Google Patents

Method, system, computer device and storage medium for pre-detecting IP address conflict Download PDF

Info

Publication number
CN113746950A
CN113746950A CN202111041810.8A CN202111041810A CN113746950A CN 113746950 A CN113746950 A CN 113746950A CN 202111041810 A CN202111041810 A CN 202111041810A CN 113746950 A CN113746950 A CN 113746950A
Authority
CN
China
Prior art keywords
address
network equipment
network
graph
configuration information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111041810.8A
Other languages
Chinese (zh)
Other versions
CN113746950B (en
Inventor
刘永生
廖军
刘畅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202111041810.8A priority Critical patent/CN113746950B/en
Publication of CN113746950A publication Critical patent/CN113746950A/en
Application granted granted Critical
Publication of CN113746950B publication Critical patent/CN113746950B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5046Resolving address allocation conflicts; Testing of addresses

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a method, a system, computer equipment and a storage medium for pre-detecting IP address conflict, wherein the method comprises the following steps: after the network equipment configuration is completed and before the network equipment is on line, acquiring configuration information of the network equipment; constructing a knowledge graph of an IP address based on configuration information of network equipment, wherein the knowledge graph of the IP address takes the configuration information of the network equipment as an entity and takes a network connection relationship between the network equipment as a relationship between the entities; and performing IP address conflict pre-detection in the knowledge graph. The technical scheme provided by the invention carries out the pre-detection of the IP address conflict before the network equipment is on line, and can effectively avoid the network operation risk caused by the error configuration of the IP address.

Description

Method, system, computer device and storage medium for pre-detecting IP address conflict
Technical Field
The present invention relates to the field of communications network technologies, and in particular, to a method and a system for pre-detecting an IP address conflict, a computer device, and a computer-readable storage medium.
Background
The IP Protocol is an abbreviation of Internet Protocol, is located in a network layer of an OSI Model (Open System Interconnection Reference Model), provides an end-to-end data Transmission service for an upper layer Protocol TCP (Transmission Control Protocol)/UDP (User Datagram Protocol), and encapsulates an IP data packet to a data link layer for Transmission. The IP address is a uniform address format provided by the IP protocol, and a unique identifier is defined for each host and other devices on the internet, so if different hosts in the same network configure the same IP address, routing confusion will be caused, and packets cannot be delivered, which is called IP address collision.
The current IP Address collision detection method mainly focuses on various Network types, such as IP Address collision detection using an ARP (Address Resolution Protocol) in a local area Network, IP Address collision detection used in a public Network and a VPN (Virtual Private Network), and IP Address collision detection in a cloud platform. However, the inventor finds that the existing IP address conflict detection methods are all performed after the device is online, and need ARP, SNMP (Simple Network Management Protocol), a Network Management system and the like for assistance, which belongs to the problem of positioning after a problem occurs, and this directly affects the normal operation of the Network.
Disclosure of Invention
The invention is completed in order to at least partially solve the technical problem that the normal operation of the network is influenced by the IP address conflict detection after the network equipment is on line in the prior art.
According to an aspect of the present invention, there is provided a method for pre-detecting an IP address collision, the method including:
after the network equipment configuration is completed and before the network equipment is on line, acquiring configuration information of the network equipment;
constructing a knowledge graph of an IP address based on configuration information of network equipment, wherein the knowledge graph of the IP address takes the configuration information of the network equipment as an entity and takes a network connection relationship between the network equipment as a relationship between the entities; and the number of the first and second groups,
and performing IP address conflict pre-detection in the knowledge graph.
Optionally, the configuration information of the network device includes: device ID, interface ID, and IP address.
Optionally, the pre-detecting of IP address collision in the knowledge-graph comprises:
traversing all IP address entities in the knowledge graph, searching whether a certain IP address entity is connected with two or more interface ID entities at the same time, and if so, judging that the IP address has conflict.
Optionally, after determining that there is a conflict in a certain IP address, the method further includes:
and detecting the ID of each interface simultaneously connected with the IP address, and modifying the IP address connected with the interface at the interface where the IP address needs to be modified.
Further, after detecting each interface ID simultaneously connected to the IP address, the method further includes:
and locating a router to which each interface ID connected to the IP address belongs.
Optionally, the configuration information of the network device further includes: the attributes of IP addresses are divided into public networks and virtual private networks VPN.
Optionally, the performing IP address collision pre-detection in the knowledge graph further includes:
when the IP address attribute of the network equipment is a public network, comparing the IP address with all public network IP addresses to determine whether IP address conflict exists;
when the IP address attribute of the network device is VPN, comparing the IP address with the IP address inside the VPN with the same ID to determine whether IP address conflict exists.
Optionally, the knowledge-graph is an undirected graph G ═ (V, E), where V is a set of entities and E is a set of relationships between entities; and the data contained in the knowledge graph is stored by adopting a graph database.
Optionally, the graph database employs Neo4J, ArangoDB or OrientDB.
According to another aspect of the present invention, there is provided an IP address collision pre-detection system, the system comprising:
the acquisition module is arranged for acquiring the configuration information of the network equipment after the configuration of the network equipment is finished and before the network equipment is on line;
the system comprises a construction module, a processing module and a display module, wherein the construction module is used for constructing a knowledge graph of an IP address based on configuration information of network equipment, the knowledge graph of the IP address takes the configuration information of the network equipment as an entity, and a network connection relationship between the network equipment as a relationship between the entities; and the number of the first and second groups,
a detection module configured to perform IP address collision pre-detection in the knowledge-graph.
According to still another aspect of the present invention, there is provided a computer apparatus comprising a memory and a processor, the memory having stored therein a computer program, the processor executing the foregoing IP address collision pre-detection method when the processor runs the computer program stored in the memory.
According to still another aspect of the present invention, there is provided a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, executes the aforementioned IP address collision pre-detection method.
The technical scheme provided by the invention can have the following beneficial effects:
according to the IP address conflict pre-detection method provided by the invention, the configuration information of the network equipment is collected firstly after the network equipment is configured and before the network equipment is on-line, then the knowledge graph of the IP address is constructed based on the collected information, and then the IP address conflict pre-detection is executed based on the knowledge graph, so that the problem of IP address conflict after the network equipment is on-line is avoided, the problem is solved before the problem occurs, and the risk brought to network operation by mistakenly configuring the IP address is effectively avoided.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the example serve to explain the principles of the invention and not to limit the invention.
Fig. 1 is a schematic flowchart of a pre-detection method for IP address conflict according to an embodiment of the present invention;
FIG. 2 is a diagram of an IP address knowledge graph according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an IP address conflict pre-detection system according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the following detailed description of the embodiments of the present invention is provided with reference to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present invention, are given by way of illustration and explanation only, not limitation.
It should be noted that in the following description, suffixes such as "module", "component", or "unit" used to indicate elements are used only for facilitating the description of the present invention, and have no specific meaning in themselves. Thus, "module", "component" or "unit" may be used mixedly.
Fig. 1 is a schematic flowchart of a pre-detection method for IP address collision according to an embodiment of the present invention. As shown in fig. 1, the method includes the following steps S101 to S103.
S101, after the configuration of the network equipment is completed and before the network equipment is on line, acquiring configuration information of the network equipment;
s102, constructing a knowledge graph of the IP address based on configuration information of network equipment, wherein the knowledge graph of the IP address takes the configuration information of the network equipment as an entity and takes a network connection relationship between the network equipment as a relationship between the entities;
and S103, performing IP address conflict pre-detection in the knowledge graph.
In this embodiment, after the network device is configured and before the network device is online, the configuration information of the network device is collected, a Knowledge Graph (Knowledge Graph) of the IP address is constructed based on the collected information, and then, the IP address conflict pre-detection is performed based on the Knowledge Graph, so as to avoid the problem of IP address conflict occurring after the network device is online.
In one embodiment, the configuration information of the network device includes: device ID, interface ID, and IP address.
In this embodiment, the network device mainly refers to a router, a computer host (e.g., a terminal and a server), and other devices that need to configure an IP address.
Taking a router as an example, since the router has a command for displaying all configuration information, the router can display all configuration information thereof, such as a router ID, a protocol, a parameter, an interface ID, an interface IP, and the like, through the command, and at this time, required configuration information, specifically, a router ID (i.e., an equipment ID), an interface ID, and an interface IP (i.e., an IP address), can be acquired.
Taking a computer host as an example, the host ID (i.e., device ID), the network card ID (i.e., interface ID), and the network card IP (i.e., IP address) need to be collected.
When the knowledge graph of the IP address is constructed subsequently, the router ID/host ID, the interface ID/network card ID and the interface IP/network card IP can be designated as entities of the knowledge graph, and the network connection relation of the network equipment is designated as the relation among the entities.
In one embodiment, step S103 includes:
traversing all IP address entities in the knowledge graph, searching whether a certain IP address entity is connected with two or more interface ID entities at the same time, and if so, judging that the IP address has conflict.
In this embodiment, when performing the IP address conflict pre-detection, all IP address entities in the knowledge graph need to be traversed, an IP address entity to which two or more interface ID entities are simultaneously connected is searched, and it is determined that a conflict exists in the IP address. Of course, in the constructed knowledge graph, there may be more than one IP address, and in the process of traversing the knowledge graph, each IP address with conflict needs to be found out, and then the interface ID and the device ID (such as a router ID or a host ID) connected with the IP address need to be checked and modified, so as to avoid the problem of IP address conflict after the network device comes online.
In a specific embodiment, the configuration information of the network device further includes: the IP address is classified into a public network and a VPN (virtual private network).
Specifically, if a VPN is configured in the network, the collected network device information may show VPN information. Accordingly, an attribute of an IP address may be designated as a VPN in the knowledge graph, otherwise an attribute of an IP address may be designated as a public network (an attribute of an IP address is not an entity in the knowledge graph) in the knowledge graph.
In this embodiment, in addition to marking entities such as the device ID, the interface ID, and the IP address in the knowledge graph spectrum of the IP address, attributes of the IP address may be marked, so as to distinguish which IP addresses belong to the public network and which IP addresses belong to the VPN, where the attributes indicate the range of IP address detection.
In one embodiment, step S103 further includes:
when the IP address attribute of the network equipment is a public network, comparing the IP address with all public network IP addresses to determine whether IP address conflict exists;
when the IP address attribute of the network device is VPN, comparing the IP address with the IP address inside the VPN with the same ID to determine whether IP address conflict exists.
In this embodiment, in the process of traversing all IP address entities in the knowledge graph, the range of IP address detection may be defined by the IP address attributes of the network device. Specifically, the public network indication is compared to all public network IPs and the VPN indication is compared to all IP addresses within the VPN of the same ID. And, IP addresses having different attributes belong to different entities.
In one embodiment, the knowledge-graph is an undirected graph G ═ V, E, where V is a set of entities and E is a set of relationships between entities; and the data contained in the knowledge graph is stored by adopting a graph database.
Graph databases, also known as graph databases, are a type of NoSQL databases (Not Only SQL, generally referred to as non-relational databases), which store relationship information between entities using graph theory and are very intuitive.
In one embodiment, the graph database is Neo4J, arango db, or OrientDB.
Among them, Neo4J is a database oriented to the network, and the network (called as a graph from the mathematical point of view) is a flexible data structure, which can apply a more agile and rapid development mode. Neo4J is an embedded, disk-based Java persistence engine with full transactional features that stores structured data on the network instead of in tables; neo4J can be viewed as a high performance graph engine with all the features of a full database.
ArangoDB is a native multi-model database, combining key/value pairs, graph graphs, and document data models, providing a unified database query language that encompasses three data models, and allowing mixed use of the three models in a single query. The ArangoDB adopts a unified kernel and a unified database query language which are tried in all data models, so that a user can use a plurality of models in a mixed manner in a single query process; and the ArangoDB does not need to mutually 'switch' between different data models and does not need to execute a data transmission process when executing the query process.
OrientDB is a deeply extensible document-graphic database management system that combines the flexibility of a document database with the ability to manage links to a graphic database. OrientDB can choose modeless, full-mode, or mixed-mode, supporting functions such as ACID transactions, fast indexing, native, and SQL queries.
All three of the above-described graph databases can be used to store data in the knowledge-graph of the present invention.
Further, the query language of the knowledge graph adopts SPARQL or Cypher.
The SPARQL is called SPARQL Protocol and RDF Query Language, and is a Query Language and data acquisition Protocol developed for RDF (Resource Description Framework). SPARQL allows a user to write queries against what may be referred to as "key-value" data, or more specifically, data that conforms to the RDF specification of W3C (World Wide Web Consortium).
Cypher is the declarative graphical query language of Neo4J, allowing users to efficiently query graphical data without having to write traversal code for the graph structure. Its capabilities include: create, update, delete nodes and relationships, query and modify nodes and relationships through pattern matching, manage indexes and constraints, and the like.
The two query languages can be used for traversing the knowledge map database to search the IP address entities simultaneously connected with two or more interface ID entities, and the detection of the conflict IP addresses can be conveniently realized.
Fig. 2 is a schematic diagram of an IP address knowledge graph provided in an embodiment of the present invention, where R denotes a router ID, P denotes an interface ID, and IP denotes an IP address. As can be seen from fig. 2, IP1 and IP6 both belong to one VPN, and are connected via R1, R2 and R3; IP2, IP3, IP4 and IP5 all belong to the public network.
When performing IP address collision pre-detection in the knowledge graph shown in fig. 2, all the IP address entities, specifically IP1 to IP6, need to be traversed to find whether there is an IP address entity that connects two or more interface ID entities at the same time. The inquiry shows that the IP3 is a public network address, is connected with the interfaces P1 and P4 at the same time, and indicates that the IP3 is the interface address of both P1 and P4, so that the IP3 is judged to be a conflicting address and needs to be modified on P1 or P4; meanwhile, the knowledge graph can see that the interface P1 belongs to the router R1 and the interface P4 belongs to the router R2, so that the specific router can be quickly and intuitively positioned when IP address conflict is detected, and the conflicting IP addresses can be timely modified conveniently.
Accordingly, after determining that there is a conflict in a certain IP address in step S103, the following step S104 is also included.
S104, detecting the ID of each interface simultaneously connected with the IP address, and modifying the IP address connected with the interface at the interface where the IP address needs to be modified.
In the step, the IP address is modified by modifying the interface of which the IP address needs to be modified, so that the condition that the same IP address is simultaneously connected with two or more interface IDs is avoided, and the normal operation of the network is ensured.
Further, after detecting each interface ID simultaneously connected to the IP address, step S104 further includes: and positioning the router to which each interface ID connected with the IP address simultaneously belongs in the knowledge graph.
In the step, the routers to which the IDs of the interfaces with the IP address conflict belong are positioned in the knowledge graph, so that the conflicting IP addresses can be modified in time conveniently.
It should be noted that the sequence of the above steps is only a specific example provided for illustrating the embodiment of the present invention, and the present invention does not limit the sequence of the above steps, and those skilled in the art can adjust it as required in practical application.
The IP address conflict pre-detection method provided by the embodiment of the invention introduces an artificial intelligence knowledge map technology into IP address conflict detection, and specifically, after the configuration of network equipment is completed and before the network equipment is online, the knowledge map of the IP address is constructed through the acquired network equipment configuration information, so that the position of the IP address in the network can be visually marked, the attribute of the IP address is marked, the IP address conflict pre-detection is finally carried out, and the IP address conflict pre-detection can be timely modified when the IP address conflict is found, so that the IP address conflict pre-detection is carried out before the network equipment is online, and the network operation risk caused by the wrong configuration of the IP address is effectively avoided.
Fig. 3 is a schematic structural diagram of an IP address conflict pre-detection system according to an embodiment of the present invention. As shown in fig. 3, the system 3 includes: an acquisition module 301, a construction module 302, and a detection module 303.
The acquisition module 301 is configured to acquire configuration information of the network device after the configuration of the network device is completed and before the network device is on-line; the construction module 302 is configured to construct a knowledge graph of an IP address based on configuration information of network devices, where the knowledge graph of the IP address takes the configuration information of the network devices as entities and takes a network connection relationship between the network devices as a relationship between the entities; the detection module 303 is arranged to perform an IP address collision pre-detection in the knowledge-graph.
In a specific embodiment, the configuration information of the network device collected by the collection module 301 includes: device ID, interface ID, and IP address.
In a specific embodiment, the detecting module 303 is specifically configured to traverse all IP address entities in the knowledge graph, find whether there is a certain IP address entity connected to two or more interface ID entities at the same time, and determine that there is a conflict in the IP address if there is a certain IP address entity connected to two or more interface ID entities.
In a specific embodiment, the configuration information of the network device collected by the collection module 301 further includes: the attributes of an IP address are divided into a public network and a VPN.
In a specific embodiment, the detecting module 303 is further configured to, when the IP address attribute of the network device is a public network, compare the IP address of the network device with all public network IP addresses to determine whether there is an IP address conflict; when the IP address attribute of the network device is VPN, comparing the IP address with the IP address inside the VPN with the same ID to determine whether IP address conflict exists.
In one embodiment, the knowledge-graph is an undirected graph G ═ V, E, where V is a set of entities and E is a set of relationships between entities; and the data contained in the knowledge graph is stored by adopting a graph database.
In one embodiment, the graph database is Neo4J, arango db, or OrientDB.
In one embodiment, the system 3 further comprises: and a modification module (not shown in the figure) configured to, after the detection module 303 determines that there is a conflict with a certain IP address, detect each interface ID simultaneously connected with the IP address, and modify the IP address connected to the interface at which the IP address needs to be modified.
In one embodiment, the system 3 further comprises: and the positioning module (not shown in the figure) is configured to position the router to which each interface ID connected with the IP address simultaneously belongs in the knowledge map after the modification module detects each interface ID connected with the IP address simultaneously, so that the modification module can modify the conflicted IP address in time.
The IP address conflict pre-detection system provided by the embodiment of the invention introduces an artificial intelligent knowledge map technology into IP address conflict detection, and specifically, after the configuration of network equipment is completed and before the network equipment is online, the knowledge map of the IP address is constructed through the acquired network equipment configuration information, so that the position of the IP address in the network can be visually marked, the attribute of the IP address is marked, the IP address conflict pre-detection is finally carried out, and the IP address conflict pre-detection can be timely modified when the IP address conflict is found, so that the IP address conflict pre-detection is carried out before the network equipment is online, and the network operation risk caused by the wrong configuration of the IP address is effectively avoided.
Based on the same technical concept, the embodiment of the present invention correspondingly provides a computer device, as shown in fig. 4, where the computer device 4 includes a memory 41 and a processor 42, the memory 41 stores a computer program, and when the processor 42 runs the computer program stored in the memory 41, the processor 42 executes the foregoing IP address collision pre-detection method.
Based on the same technical concept, embodiments of the present invention correspondingly provide a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the processor executes the foregoing IP address collision pre-detection method.
In summary, according to the IP address conflict pre-detection method, system, computer device, and storage medium provided in the embodiments of the present invention, the configuration information of the network device is collected first, then the knowledge graph of the IP address is constructed based on the collected information, and then the IP address conflict pre-detection is performed based on the knowledge graph.
It will be understood by those of ordinary skill in the art that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. In a hardware implementation, the division between functional modules/units mentioned in the above description does not necessarily correspond to the division of physical components; for example, one physical component may have multiple functions, or one function or step may be performed by several physical components in cooperation. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (12)

1. An IP address conflict pre-detection method is characterized by comprising the following steps:
after the network equipment configuration is completed and before the network equipment is on line, acquiring configuration information of the network equipment;
constructing a knowledge graph of an IP address based on configuration information of network equipment, wherein the knowledge graph of the IP address takes the configuration information of the network equipment as an entity and takes a network connection relationship between the network equipment as a relationship between the entities; and the number of the first and second groups,
and performing IP address conflict pre-detection in the knowledge graph.
2. The method of claim 1, wherein the configuration information of the network device comprises: device ID, interface ID, and IP address.
3. The method of claim 2, wherein performing pre-detection of IP address conflicts in the knowledge-graph comprises:
traversing all IP address entities in the knowledge graph, searching whether a certain IP address entity is connected with two or more interface ID entities at the same time, and if so, judging that the IP address has conflict.
4. The method of claim 3, further comprising, after determining that there is a conflict for an IP address:
and detecting the ID of each interface simultaneously connected with the IP address, and modifying the IP address connected with the interface at the interface where the IP address needs to be modified.
5. The method of claim 4, further comprising, after detecting each interface ID concurrently connected to the IP address:
and positioning the router to which each interface ID connected with the IP address simultaneously belongs in the knowledge graph.
6. The method of any of claims 3-5, wherein the configuration information of the network device further comprises: the attributes of IP addresses are divided into public networks and virtual private networks VPN.
7. The method of claim 6, wherein pre-detecting an IP address conflict in the knowledge-graph further comprises:
when the IP address attribute of the network equipment is a public network, comparing the IP address with all public network IP addresses to determine whether IP address conflict exists;
when the IP address attribute of the network device is VPN, comparing the IP address with the IP address inside the VPN with the same ID to determine whether IP address conflict exists.
8. The method of claim 1, wherein the knowledge-graph is an undirected graph G ═ (V, E), where V is a set of entities and E is a set of relationships between entities; and the data contained in the knowledge graph is stored by adopting a graph database.
9. The method according to claim 8, wherein said graph database is Neo4J, ArangoDB or OrientDB.
10. An IP address collision pre-detection system, comprising:
the acquisition module is arranged for acquiring the configuration information of the network equipment after the configuration of the network equipment is finished and before the network equipment is on line;
the system comprises a construction module, a processing module and a display module, wherein the construction module is used for constructing a knowledge graph of an IP address based on configuration information of network equipment, the knowledge graph of the IP address takes the configuration information of the network equipment as an entity, and a network connection relationship between the network equipment as a relationship between the entities; and the number of the first and second groups,
a detection module configured to perform IP address collision pre-detection in the knowledge-graph.
11. A computer device comprising a memory and a processor, the memory having stored therein a computer program, the processor executing the IP address collision pre-detection method according to any one of claims 1 to 9 when the processor executes the computer program stored in the memory.
12. A computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, performs the IP address collision pre-detection method according to any one of claims 1 to 9.
CN202111041810.8A 2021-09-07 2021-09-07 IP address conflict pre-detection method, system, computer equipment and storage medium Active CN113746950B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111041810.8A CN113746950B (en) 2021-09-07 2021-09-07 IP address conflict pre-detection method, system, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111041810.8A CN113746950B (en) 2021-09-07 2021-09-07 IP address conflict pre-detection method, system, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113746950A true CN113746950A (en) 2021-12-03
CN113746950B CN113746950B (en) 2023-11-21

Family

ID=78736356

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111041810.8A Active CN113746950B (en) 2021-09-07 2021-09-07 IP address conflict pre-detection method, system, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113746950B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114915539A (en) * 2022-05-20 2022-08-16 电子科技大学 SDN flow rule conflict fault detection method based on knowledge graph

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070097992A1 (en) * 2005-11-03 2007-05-03 Cisco Technology, Inc. System and method for resolving address conflicts in a network
WO2011153886A1 (en) * 2010-06-11 2011-12-15 中兴通讯股份有限公司 Method, system and dynamic host configuration protocol server, client terminal for avoiding internet protocol address conflict
US20120131197A1 (en) * 2010-11-23 2012-05-24 Sensormatic Electronics, LLC Method and apparatus for automatically resolving conflicting devices on a network
US20130286854A1 (en) * 2010-12-30 2013-10-31 Huawei Technologies Co., Ltd. Method and network device for detecting ip address conflict
CN105430114A (en) * 2015-11-13 2016-03-23 上海斐讯数据通信技术有限公司 Internet protocol (IP) address conflict detection method and system, and access stratum device
CN105530326A (en) * 2014-10-24 2016-04-27 中兴通讯股份有限公司 Method and device for detecting IP address conflict of three-layer interface
CN105939403A (en) * 2016-03-31 2016-09-14 杭州迪普科技有限公司 Address conflict detection method and device
CN107770294A (en) * 2016-08-18 2018-03-06 中兴通讯股份有限公司 The processing method and processing device of IP address conflicts in EVPN
EP3754950A1 (en) * 2019-06-20 2020-12-23 Nokia Solutions and Networks Oy Method, device, apparatus for mac address conflict detection and computer readable storage medium
CN112491636A (en) * 2019-09-11 2021-03-12 华为技术有限公司 Data processing method and device and computer storage medium
CN112565193A (en) * 2020-11-06 2021-03-26 西安电子科技大学 Network security policy conflict resolution method, system, storage medium and equipment
CN112818131A (en) * 2021-02-01 2021-05-18 亚信科技(成都)有限公司 Method, system and storage medium for constructing graph of threat information

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070097992A1 (en) * 2005-11-03 2007-05-03 Cisco Technology, Inc. System and method for resolving address conflicts in a network
WO2011153886A1 (en) * 2010-06-11 2011-12-15 中兴通讯股份有限公司 Method, system and dynamic host configuration protocol server, client terminal for avoiding internet protocol address conflict
US20120131197A1 (en) * 2010-11-23 2012-05-24 Sensormatic Electronics, LLC Method and apparatus for automatically resolving conflicting devices on a network
US20130286854A1 (en) * 2010-12-30 2013-10-31 Huawei Technologies Co., Ltd. Method and network device for detecting ip address conflict
WO2016061947A1 (en) * 2014-10-24 2016-04-28 中兴通讯股份有限公司 Method and apparatus for detecting three-layer interface ip address conflict
CN105530326A (en) * 2014-10-24 2016-04-27 中兴通讯股份有限公司 Method and device for detecting IP address conflict of three-layer interface
CN105430114A (en) * 2015-11-13 2016-03-23 上海斐讯数据通信技术有限公司 Internet protocol (IP) address conflict detection method and system, and access stratum device
CN105939403A (en) * 2016-03-31 2016-09-14 杭州迪普科技有限公司 Address conflict detection method and device
CN107770294A (en) * 2016-08-18 2018-03-06 中兴通讯股份有限公司 The processing method and processing device of IP address conflicts in EVPN
EP3754950A1 (en) * 2019-06-20 2020-12-23 Nokia Solutions and Networks Oy Method, device, apparatus for mac address conflict detection and computer readable storage medium
CN112491636A (en) * 2019-09-11 2021-03-12 华为技术有限公司 Data processing method and device and computer storage medium
CN112565193A (en) * 2020-11-06 2021-03-26 西安电子科技大学 Network security policy conflict resolution method, system, storage medium and equipment
CN112818131A (en) * 2021-02-01 2021-05-18 亚信科技(成都)有限公司 Method, system and storage medium for constructing graph of threat information

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
NIKHIL TRIPATHI, ET AL: ""Exploiting DHCP Server-side IP Address Conflict Detection: A DHCP Starvation Attack"", 《IEEE》 *
沈思;许晓光;: "校园网IP地址冲突的解决方法", 科技信息, no. 06 *
王元国;: "校园网IP地址冲突的分析及解决方案", 计算机时代, no. 03 *
许丽光;: "解决网络中IP地址冲突的途径综述", 电脑知识与技术(学术交流), no. 12 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114915539A (en) * 2022-05-20 2022-08-16 电子科技大学 SDN flow rule conflict fault detection method based on knowledge graph

Also Published As

Publication number Publication date
CN113746950B (en) 2023-11-21

Similar Documents

Publication Publication Date Title
US10402293B2 (en) System for virtual machine risk monitoring
US8583779B2 (en) Root cause analysis approach with candidate elimination using network virtualization
US7292541B1 (en) Methods and systems for unnumbered network link discovery
US7673031B1 (en) Resource mapping in a network environment
JP2019536331A (en) System and method for interactive network analysis platform
US11159390B2 (en) Systems and methods for service-aware mapping of a system infrastructure
US20060215564A1 (en) Root-cause analysis of network performance problems
CN108712286A (en) The determination method, apparatus and storage medium of network topology structure
CN107733713B (en) Method, system, device and storage medium for acquiring network topology in hybrid network
CN113452561B (en) Topology generation method, device, equipment and readable storage medium
US20210133260A1 (en) Systems and methods for discovering and monitoring devices using search patterns for object identifers and values
JP2002533017A (en) How to determine the topology of a computer network
US20160188609A1 (en) System and Method for Model-based Search and Retrieval of Networked Data
CN113542015B (en) Method for automatically drawing network physical link
AU2016306553B2 (en) Automated electronic computing and communication system event analysis and management
CN112822053A (en) SNMP-based link layer network topology structure discovery method and system
CN104579978A (en) Link-layer topology discovery method for dynamic network
CN113746950B (en) IP address conflict pre-detection method, system, computer equipment and storage medium
CN112751704B (en) Method, device and equipment for checking connectivity of heterogeneous network in network target range
US11962623B2 (en) Static analysis techniques for determining reachability properties of network and computing objects
CN112202593B (en) Data acquisition method, device, network management system and computer storage medium
CN116827801B (en) Network topology construction method, device, computer equipment and readable storage medium
CN110855803B (en) Data acquisition method and device
US20220345370A1 (en) Ordering possible device locations on the network by port-of-entry likelihood
CN113542127B (en) Single VXLAN topology searching method and device for non-role VTEP node

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant