CN113783714A - Data abnormity positioning method, system, computer storage medium and electronic equipment - Google Patents

Data abnormity positioning method, system, computer storage medium and electronic equipment Download PDF

Info

Publication number
CN113783714A
CN113783714A CN202110744057.2A CN202110744057A CN113783714A CN 113783714 A CN113783714 A CN 113783714A CN 202110744057 A CN202110744057 A CN 202110744057A CN 113783714 A CN113783714 A CN 113783714A
Authority
CN
China
Prior art keywords
data
alarm information
module
network
data bus
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110744057.2A
Other languages
Chinese (zh)
Inventor
陈利军
徐洪孟
厉剑
刘双广
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gosuncn Technology Group Co Ltd
Original Assignee
Gosuncn Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gosuncn Technology Group Co Ltd filed Critical Gosuncn Technology Group Co Ltd
Priority to CN202110744057.2A priority Critical patent/CN113783714A/en
Publication of CN113783714A publication Critical patent/CN113783714A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a data anomaly positioning method, a system, a computer storage medium and an electronic device, wherein the data anomaly positioning method comprises the following steps: s1, setting a plurality of access modules, and respectively endowing each access module with a corresponding unique identifier; s2, each access module respectively counts the data to be transmitted according to the corresponding identification; s3, packaging the statistical data and writing the statistical data into a data bus of a video network; s4, analyzing data of a data bus of the video network, judging whether data are abnormal or not, and sending alarm information when the data are abnormal; s5, ferrying data of a data bus of the video network and the alarm information to a special network; s6, the special network enters the data bus of the special network after receiving the alarm information and sends the alarm information to the data bus of the special network; and S7, analyzing the alarm information, positioning the data with abnormal data through the statistical information when the abnormal data is determined, and alarming.

Description

Data abnormity positioning method, system, computer storage medium and electronic equipment
Technical Field
The invention relates to the technical field of data processing, in particular to a data anomaly positioning method, a data anomaly positioning system, a computer storage medium and electronic equipment.
Background
The method for finding data exception in the prior art is generally as follows: the data of each system is collected, the data is subjected to timing statistics and sent to a data bus, and the data of the data bus is consumed to perform further statistical analysis, so that the data abnormity is discovered.
The above scheme has the following defects:
the prior art must ensure that the interfaced data system is able to communicate with the data bus. In the technical field of public security video image information application, the method relates to a link of transmitting data from a video private network to a private network. In order to ensure the safety of information, the mode of directly accessing data is limited, and the data of a video network can be unidirectionally ferred to a special network only by a mode of ferrying the data, so that the cross-network abnormal analysis cannot be realized;
in the prior art, an accurate positioning system is not available, and abnormal data is difficult to position.
Disclosure of Invention
An object of the present application is to provide a data anomaly positioning method, a data anomaly positioning system, a computer storage medium and an electronic device, which can transmit alarm information across networks, and realize monitoring and alarm of networks at two ends.
The data anomaly positioning method according to the embodiment of the first aspect of the invention comprises the following steps: s1, setting a plurality of access modules, and respectively endowing each access module with a corresponding unique identifier; s2, each access module respectively counts the data to be transmitted according to the corresponding identification; s3, packaging the statistical data and writing the statistical data into a data bus of a video network; s4, analyzing the data of the data bus of the video network, judging whether data abnormity occurs, and sending out alarm information when the data abnormity occurs; s5, ferrying the data of the data bus of the video network and the alarm information to a special network; s6, the private network enters the data bus of the private network after receiving the alarm information and sends the alarm information to the data bus of the private network; and S7, analyzing the alarm information, positioning the abnormal data through statistical information when the abnormal data is determined, and alarming.
According to the data anomaly positioning method provided by the embodiment of the invention, statistical data are packaged and written into a data bus of a video network, alarm information is sent out after data anomaly is found, the alarm information is ferried from the video network to a special network together, cross-network transmission of the alarm information is realized, the special network is enabled to monitor the data of the video network, and thus, cross-network data anomaly positioning is realized.
According to one embodiment of the invention, the access module comprises: FTP inserts module, Http and third party platform and inserts the module.
According to one embodiment of the invention, the number of the FTP access modules is multiple, the FTP access modules have corresponding unique total identifiers, and the FTP access modules have different unique sub identifiers.
According to one embodiment of the invention, in step S2, timing statistics are performed on the data to be transmitted.
According to one embodiment of the present invention, in step S5, the alarm information is counted, organized and encrypted, and then ferred to the private network.
According to one embodiment of the invention, the alarm information is subjected to periodic statistics and specific-date statistics.
According to one embodiment of the invention, the data of the data bus of the video network and the alarm information are ferred to a private network by means of ftp ferry.
A data anomaly locating system according to an embodiment of a second aspect of the present invention comprises: the system comprises a plurality of access modules, a plurality of service modules and a plurality of service modules, wherein each access module is provided with a corresponding unique identifier; the statistical module is used for carrying out statistics on data to be transmitted according to the corresponding identification; the data bus of the video network receives the data written by the statistical module; the first alarm module analyzes data of a data bus of the video network, judges whether data abnormity occurs or not and sends alarm information when the data abnormity occurs; the ferrying module ferries data of a data bus of the video network and the alarm information to a special network; the ferry receiving module receives ferry data and the warning information of the ferry module; the data bus of the special network receives the alarm information; and the second alarm module analyzes the alarm information, positions the data with abnormal data through the statistical information when the abnormal data is determined, and sends out the alarm information.
In a third aspect, an embodiment of the present invention provides a computer storage medium including one or more computer instructions, which when executed implement the method according to the above embodiment.
An electronic device according to a fourth aspect of the present invention comprises a memory for storing one or more computer instructions and a processor; the processor is configured to invoke and execute the one or more computer instructions to implement the method according to any of the embodiments described above.
Further features of the present application and advantages thereof will become apparent from the following detailed description of exemplary embodiments thereof, which is to be read in connection with the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the application and together with the description, serve to explain the principles of the application.
FIG. 1 is a flow chart of a method of data anomaly location according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of the operation of a data anomaly locating method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a data anomaly locating system according to an embodiment of the present invention;
fig. 4 is an operational schematic diagram of an electronic device according to an embodiment of the present invention.
Reference numerals:
an access module 10; a statistics module 20; a data bus 30 of the video network; a first alarm module 40; a ferry module 50; ferry receiving module 60; a data bus 70 of the private network; a second alarm module 80;
an electronic device 100;
a memory 110; an operating system 111; an application 112;
a processor 120; a network interface 130; an input device 140; a hard disk 150; a display device 160.
Detailed Description
Various exemplary embodiments of the present application will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, the numerical expressions, and numerical values set forth in these embodiments do not limit the scope of the present application unless specifically stated otherwise.
The following description of at least one exemplary embodiment is merely illustrative in nature and is in no way intended to limit the application, its application, or uses.
Techniques, methods, and apparatus known to those of ordinary skill in the relevant art may not be discussed in detail but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any particular value should be construed as merely illustrative, and not limiting. Thus, other examples of the exemplary embodiments may have different values.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, further discussion thereof is not required in subsequent figures.
First, a data anomaly locating method according to an embodiment of the present invention will be described in detail with reference to the accompanying drawings.
As shown in fig. 1 to fig. 2, the data anomaly positioning method according to the embodiment of the present invention includes the following steps:
and S1, setting a plurality of access modules, and respectively endowing each access module with a corresponding unique identifier.
And S2, each access module respectively counts the data to be transmitted according to the corresponding identification.
And S3, packaging the statistical data and writing the statistical data into a data bus of the video network.
S4, analyzing the data of the data bus of the video network, judging whether data abnormity occurs, and sending out alarm information when the data abnormity occurs.
And S5, ferrying the data of the data bus of the video network and the alarm information to a special network.
And S6, the private network enters the data bus of the private network after receiving the alarm information and sends the alarm information to the data bus of the private network.
And S7, analyzing the alarm information, positioning the abnormal data through statistical information when the abnormal data is determined, and alarming.
It should be noted that, the data anomaly positioning method according to the embodiment of the present invention involves two networks, namely, a video network and a private network, and for data security, the two networks can only perform data transmission in a ferry manner, and are unidirectional, and data can only be transmitted to the private network through the video network.
When the data anomaly positioning method is used, a plurality of access modules are set, and each access module is respectively endowed with a unique identifier, for example, a fixed code is pre-allocated, wherein the code is a unique identifier of a system and is in a character string format. Each access module respectively counts the data to be transmitted, and during counting, each access module respectively counts according to the respective identifier.
The statistical data is then packetized and then written to the data bus of the video network. After the data bus of the video network is written in, the alarm system consumes the data from the data bus, analyzes the written data, judges whether the data is abnormal, continues to perform the next step when the data is not abnormal, and sends out alarm information when the data is abnormal.
Because the data of the video network can only be transmitted to the special network in a ferrying mode, in the data ferrying process, if data in a data bus of the video network is abnormal, the sent alarm information is also ferred to the special network at the same time. After receiving the alarm information, the special network sends the alarm information to the data bus of the special network, then the unified alarm module consumes the data of the data bus of the special network, and after determining that the data are abnormal, the special network positions the data with the abnormal data and sends the alarm information.
Therefore, according to the data anomaly positioning method provided by the embodiment of the invention, statistical data are packaged and written into a data bus of a video network, alarm information is sent out after data anomaly is found, and the alarm information is ferried from the video network to a special network together, so that cross-network transmission of the alarm information is realized, the special network is enabled to monitor the data of the video network, and thus, cross-network data anomaly positioning is realized.
According to one embodiment of the invention, the access module comprises: FTP inserts module, Http and third party platform and inserts the module.
Optionally, the number of the FTP access modules is multiple, the FTP access modules have corresponding unique total identifiers, and the multiple FTP access modules have different unique sub identifiers.
In other words, the data anomaly positioning method according to the embodiment of the invention adopts a plurality of access modules, specifically including an FTP access module, an HTTP access module and a third-party platform access module. For each module, a fixed code is pre-assigned, which is a unique identifier in the system, and is in the form of a character string, such as: the code number of the FTP access module is as follows: "FTP _ ACCESS", if there are multiple FTP ACCESS modules, a further subdivision is performed. For example, the FTP access module 1 has the code number: "FTP _ ACCESS _ 01". Other access modules may employ similar identification methods.
In some embodiments of the present invention, in step S2, timing statistics are performed on the data to be transmitted.
In particular, the access module may have a module with complex data timing statistics. The statistical time interval may be adjusted as desired, such as 1 minute or other time, for example. The statistical module can be used for periodically counting the data quantity and writing the data quantity into the data bus. The alarm system consumes data from the data bus, analyzes the data and gives an alarm if data abnormality occurs.
Optionally, according to an embodiment of the present invention, in step S5, the alarm information is counted, organized and encrypted, and then ferred to the private network. And further, ferrying the data of the data bus of the video network and the alarm information to a special network in an ftp ferrying mode.
That is, the ferry module also has the alarm statistical data of the consumption bus, and can be organized and encrypted in a specific organization mode. The data of the video network can be ferred to the private network in an ftp ferrying mode.
In some embodiments of the present invention, the alarm information is subjected to periodic statistics and specific-date statistics.
Specifically, the alarm information may perform distribution statistics on a daily basis, a weekly period statistics, or a data distribution statistics on holidays by means of statistical learning, so as to set a threshold and determine a range of the threshold. The threshold value can be continuously improved along with the continuous accumulation of the data, so that the positioning accuracy of abnormal data and the accuracy of alarm information are improved.
In summary, according to the data anomaly positioning method of the embodiment of the invention, the alarm statistical data is transmitted across the networks, so that the monitoring and the alarm of the networks at two ends are realized, and along with the continuous accumulation of the data, the alarm information is accumulated through an algorithm, and the longer the alarm information is, the more perfect the alarm information is.
As shown in fig. 3, the data anomaly locating system according to the embodiment of the present invention includes: the system comprises a plurality of access modules 10, a statistical module 20, a data bus 30 of a video network, a first alarm module 40, a ferry module 50, a ferry receiving module 60, a data bus 70 of a private network and a second alarm module 80.
Specifically, each access module 10 has a corresponding unique identifier, the statistics module 20 performs statistics on data to be transmitted according to the corresponding identifier, the data bus 30 of the video network receives the data written by the statistics module 20, the first alarm module 40 analyzes the data of the data bus 30 of the video network to determine whether data abnormality occurs, and when data abnormality occurs, an alarm message is sent, the ferry module 50 ferries the data of the data bus 40 of the video network and the alarm message to a private network, the ferry receiving module 60 receives the ferry data and the alarm message of the ferry module 50, the data bus 70 of the private network receives the alarm message, the second alarm module 80 analyzes the alarm message, and when the data are determined to be abnormal, positioning the data with the abnormal data through the statistical information, and sending out alarm information.
That is to say, the data anomaly positioning system according to the embodiment of the present invention mainly includes a plurality of access modules 10, a statistics module 20, a data bus 30 of a video network, a first alarm module 40, a ferry module 50, a ferry receiving module 60, a data bus 70 of a private network, and a second alarm module 80, wherein each access module 10 is respectively assigned with a unique identifier, for example, a fixed code is pre-assigned, and the code is a unique identifier of the system and has a format of a character string.
Each access module 10 has a statistical module 20 for timing statistics of complex data, the statistical module 20 performs statistics on data to be transmitted, and during the statistics, each access module 10 performs statistics according to its identifier.
The statistical data is packed and then written to the data bus 30 of the video network. After the data bus 30 of the video network is written with data, the first warning module 40 consumes the data from the data bus 30 of the video network, analyzes the written data, judges whether the data is abnormal, continues to perform the next step when the data is not abnormal, and sends warning information when the data is abnormal.
Since the data of the video network can only be transmitted to the private network in a ferrying manner, the ferrying module 50 and the ferrying receiving module 60 are required to ferry the data, and in the process of ferrying the data, if data in the data bus of the video network is abnormal, the sent warning information is also ferred to the private network at the same time. After receiving the alarm information, the private network sends the alarm information to the data bus 70 of the private network, and then the unified second alarm module 80 consumes the data of the data bus 70 of the private network, and after determining that the data is abnormal, the data with the abnormal data is positioned, and the alarm information is sent.
Therefore, according to the data anomaly positioning system provided by the embodiment of the invention, statistical data are packaged and written into a data bus of a video network, alarm information is sent out after data anomaly is found, and the alarm information is ferried from the video network to a special network together, so that cross-network transmission of the alarm information is realized, the special network is enabled to monitor the data of the video network, and thus, cross-network data anomaly positioning is realized.
In addition, an embodiment of the present invention further provides a computer storage medium, where the computer storage medium includes one or more computer instructions, and when executed, the one or more computer instructions implement any one of the methods described above.
That is, the computer storage medium stores a computer program that, when executed by a processor, causes the processor to perform any of the methods described above.
As shown in fig. 4, an embodiment of the present invention provides an electronic device 100, which includes a memory 110 and a processor 120, where the memory 110 is configured to store one or more computer instructions, and the processor 120 is configured to call and execute the one or more computer instructions, so as to implement any one of the methods described above.
That is, the electronic apparatus 100 includes: a processor 120 and a memory 110, in which memory 110 computer program instructions are stored, wherein the computer program instructions, when executed by the processor, cause the processor 120 to perform any of the methods described above.
Further, as shown in fig. 4, the electronic device 100 further includes a network interface 130, an input device 140, a hard disk 150, and a display device 160.
The various interfaces and devices described above may be interconnected by a bus architecture. A bus architecture may be any architecture that may include any number of interconnected buses and bridges. One or more Central Processing Units (CPUs), represented in particular by processor 120, and one or more memories, represented by memory 110, are coupled together. The bus architecture may also connect various other circuits such as peripherals, voltage regulators, power management circuits, and the like. It will be appreciated that a bus architecture is used to enable communications among the components. The bus architecture includes a power bus, a control bus, and a status signal bus, in addition to a data bus, all of which are well known in the art and therefore will not be described in detail herein.
The network interface 130 may be connected to a network (e.g., the internet, a local area network, etc.), and may obtain relevant data from the network and store the relevant data in the hard disk 150.
The input device 140 may receive various commands input by the operator and send the commands to the processor 120 for execution. The input device 140 may include a keyboard or a pointing device (e.g., a mouse, a trackball, a touch pad, a touch screen, or the like).
The display device 160 may display the result obtained by the processor 120 executing the instructions.
The memory 310 is used for storing programs and data necessary for operating the operating system, and data such as intermediate results in the calculation process of the processor 120.
It will be appreciated that memory 110 in embodiments of the invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The nonvolatile memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read Only Memory (EPROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), or a flash memory. Volatile memory can be Random Access Memory (RAM), which acts as external cache memory. The memory 110 of the apparatus and methods described herein is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 110 stores the following elements, executable modules or data structures, or a subset thereof, or an expanded set thereof: an operating system 111 and application programs 112.
The operating system 111 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application 112 includes various applications, such as a Browser (Browser), and the like, for implementing various application services. A program implementing methods of embodiments of the present invention may be included in application 112.
The processor 120, when invoking and executing the application program and data stored in the memory 110, specifically, the application program or the instructions stored in the application program 112, dispersedly sends one of the first set and the second set to the node distributed by the other one of the first set and the second set, where the other one is dispersedly stored in at least two nodes; and performing intersection processing in a node-by-node manner according to the node distribution of the first set and the node distribution of the second set.
The method disclosed by the above embodiment of the present invention can be applied to the processor 120, or implemented by the processor 120. The processor 120 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware or instructions in the form of software in the processor 120. The processor 120 may be a general purpose processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof, and may implement or perform the methods, steps, and logic blocks disclosed in the embodiments of the present invention. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in the memory 110, and the processor 120 reads the information in the memory 110 and completes the steps of the method in combination with the hardware thereof.
It is to be understood that the embodiments described herein may be implemented in hardware, software, firmware, middleware, microcode, or any combination thereof. For a hardware implementation, the processing units may be implemented within one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, micro-controllers, microprocessors, other electronic units designed to perform the functions described herein, or a combination thereof.
For a software implementation, the techniques described herein may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The software codes may be stored in a memory and executed by a processor. The memory may be implemented within the processor or external to the processor.
In particular, the processor 120 is further configured to read the computer program and execute any of the methods described above.
In the several embodiments provided in the present application, it should be understood that the disclosed method and apparatus may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may be physically included alone, or two or more units may be integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) to execute some steps of the transceiving method according to various embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (10)

1. A data anomaly positioning method is characterized by comprising the following steps:
s1, setting a plurality of access modules, and respectively endowing each access module with a corresponding unique identifier;
s2, each access module respectively counts the data to be transmitted according to the corresponding identification;
s3, packaging the statistical data and writing the statistical data into a data bus of a video network;
s4, analyzing the data of the data bus of the video network, judging whether data abnormity occurs, and sending out alarm information when the data abnormity occurs;
s5, ferrying the data of the data bus of the video network and the alarm information to a special network;
s6, the private network enters the data bus of the private network after receiving the alarm information and sends the alarm information to the data bus of the private network;
and S7, analyzing the alarm information, positioning the abnormal data through statistical information when the abnormal data is determined, and alarming.
2. The method of claim 1, wherein the access module comprises: FTP inserts module, Http and third party platform and inserts the module.
3. The method according to claim 2, characterized in that the FTP access modules are plural, the FTP access modules have corresponding unique total identifiers, and the plurality of FTP access modules have different unique sub-identifiers.
4. The method according to claim 1, wherein in step S2, the data to be transmitted is subjected to timing statistics.
5. The method according to claim 1, wherein in step S5, the alarm information is counted and organized and encrypted for ferrying to the private network.
6. The method of claim 5, wherein the alarm information is subjected to periodic statistics and date-specific statistics.
7. The method of claim 5, wherein the data of the data bus of the video network and the alert information are ferred to a private network by means of ftp ferry.
8. A system for locating data anomalies, comprising:
the system comprises a plurality of access modules, a plurality of service modules and a plurality of service modules, wherein each access module is provided with a corresponding unique identifier;
the statistical module is used for carrying out statistics on data to be transmitted according to the corresponding identification;
the data bus of the video network receives the data written by the statistical module;
the first alarm module analyzes data of a data bus of the video network, judges whether data abnormity occurs or not and sends alarm information when the data abnormity occurs;
the ferrying module ferries data of a data bus of the video network and the alarm information to a special network;
the ferry receiving module receives ferry data and the warning information of the ferry module;
the data bus of the special network receives the alarm information;
and the second alarm module analyzes the alarm information, positions the data with abnormal data through the statistical information when the abnormal data is determined, and sends out the alarm information.
9. A computer storage medium comprising one or more computer instructions which, when executed, implement the method of any one of claims 1-8.
10. An electronic device comprising a memory and a processor, wherein,
the memory is to store one or more computer instructions;
the processor is configured to invoke and execute the one or more computer instructions to implement the method of any one of claims 1-8.
CN202110744057.2A 2021-06-30 2021-06-30 Data abnormity positioning method, system, computer storage medium and electronic equipment Pending CN113783714A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110744057.2A CN113783714A (en) 2021-06-30 2021-06-30 Data abnormity positioning method, system, computer storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110744057.2A CN113783714A (en) 2021-06-30 2021-06-30 Data abnormity positioning method, system, computer storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN113783714A true CN113783714A (en) 2021-12-10

Family

ID=78836107

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110744057.2A Pending CN113783714A (en) 2021-06-30 2021-06-30 Data abnormity positioning method, system, computer storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN113783714A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060179349A1 (en) * 2005-02-09 2006-08-10 Preemptive Solutions, Llc System and method for tracking exceptional states
CN107800722A (en) * 2017-12-05 2018-03-13 英赛克科技(北京)有限公司 Isolate the method and device of industrial control equipment and external network server
CN108540304A (en) * 2018-02-12 2018-09-14 中国神华能源股份有限公司 Remote collection monitoring system and method based on industrial big data
CN110365527A (en) * 2019-07-09 2019-10-22 北京锐安科技有限公司 O&M monitoring method and system
CN110943913A (en) * 2019-07-31 2020-03-31 广东互动电子网络媒体有限公司 Industrial safety isolation gateway

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20060179349A1 (en) * 2005-02-09 2006-08-10 Preemptive Solutions, Llc System and method for tracking exceptional states
CN107800722A (en) * 2017-12-05 2018-03-13 英赛克科技(北京)有限公司 Isolate the method and device of industrial control equipment and external network server
CN108540304A (en) * 2018-02-12 2018-09-14 中国神华能源股份有限公司 Remote collection monitoring system and method based on industrial big data
CN110365527A (en) * 2019-07-09 2019-10-22 北京锐安科技有限公司 O&M monitoring method and system
CN110943913A (en) * 2019-07-31 2020-03-31 广东互动电子网络媒体有限公司 Industrial safety isolation gateway

Similar Documents

Publication Publication Date Title
CN110263585B (en) Test supervision method, device, equipment and storage medium
KR100843495B1 (en) A method for sending service data to an rfid tag while an attached computer system is powered off and a computer system therefor
KR100982145B1 (en) A method for configurable address mapping
CN108900353B (en) Fault warning method and terminal equipment
CN113312241A (en) Abnormal alarm method, access log generation method and operation and maintenance system
US20190089725A1 (en) Deep Architecture for Learning Threat Characterization
EP3488346B1 (en) Anomaly detection using sequences of system calls
US10289522B2 (en) Autonomous information technology diagnostic checks
CN114328102A (en) Equipment state monitoring method, device, equipment and computer readable storage medium
CN111726358A (en) Attack path analysis method and device, computer equipment and storage medium
CN110245052B (en) Method and device for determining hot spot component of data system, electronic equipment and storage medium
US20180262407A1 (en) Telemetry Architecture for Integrated Circuits and Cloud Infrastructure
CN116739618A (en) Variable code tracing system based on block chain and data processing method
CN101639816B (en) Real-time tracking system of bus and corresponding tracking and debugging method
CN114401187A (en) Gray scale distribution method and device, computer equipment and storage medium
CN108248641A (en) A kind of urban track traffic data processing method and device
CN102986151A (en) Monitoring system and data transfer device and method thereof
CN113783714A (en) Data abnormity positioning method, system, computer storage medium and electronic equipment
WO2023205349A1 (en) Method, apparatus, system, and non-transitory computer readable medium for identifying and prioritizing network security events
CN113835961B (en) Alarm information monitoring method, device, server and storage medium
KR101925237B1 (en) Esd detection apparatus and method applied to digital integrated circuit, and integrated circuit
US20230061280A1 (en) Root cause analysis for deterministic machine learning model
CN111193617B (en) Webpage tampering identification method and device, electronic equipment and storage medium
CN115733733B (en) Monitoring alarm method, device, computer equipment and storage medium
CN110955546B (en) Memory address monitoring method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination