CN114116373A - Network request monitoring method and device, electronic equipment and storage medium - Google Patents

Network request monitoring method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114116373A
CN114116373A CN202111224479.3A CN202111224479A CN114116373A CN 114116373 A CN114116373 A CN 114116373A CN 202111224479 A CN202111224479 A CN 202111224479A CN 114116373 A CN114116373 A CN 114116373A
Authority
CN
China
Prior art keywords
monitoring
plug
sent
network request
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111224479.3A
Other languages
Chinese (zh)
Inventor
宋泽阳
郭彪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Original Assignee
Baidu Online Network Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Baidu Online Network Technology Beijing Co Ltd filed Critical Baidu Online Network Technology Beijing Co Ltd
Priority to CN202111224479.3A priority Critical patent/CN114116373A/en
Publication of CN114116373A publication Critical patent/CN114116373A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3058Monitoring arrangements for monitoring environmental properties or parameters of the computing system or of the computing system component, e.g. monitoring of power, currents, temperature, humidity, position, vibrations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3013Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is an embedded system, i.e. a combination of hardware and software dedicated to perform a certain function in mobile devices, printers, automotive or aircraft systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Quality & Reliability (AREA)
  • Mathematical Physics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The present disclosure provides a network request monitoring method, device, electronic device and storage medium, which relate to the technical field of data processing, in particular to the technical field of cloud computing, and include: receiving equipment parameters sent by a monitoring plug-in; if the equipment represented by the equipment parameters is in the white list, receiving network request data sent by the monitoring plug-in, wherein the network request data is call data and plug-in party identification which are determined by the monitoring plug-in for intercepting network requests sent by other third party plug-ins in the application program according to the network requests; and writing the network request data into the network request log.

Description

Network request monitoring method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to the field of cloud computing technologies.
Background
The related methods for monitoring the network request in the application program include two methods, one is to detect the network request in the application program by using a sandboxing detection technology, and the other is to scan the static code of the application program to scan whether a code for calling the private data exists.
Disclosure of Invention
The disclosure provides a network request monitoring method, a network request monitoring device, electronic equipment and a storage medium.
According to an aspect of the present disclosure, there is provided a network request monitoring method, including:
receiving equipment parameters sent by a monitoring plug-in;
if the equipment characterized by the equipment parameters is in a white list, receiving network request data sent by a monitoring plug-in, wherein the network request data is call data and plug-in party identifiers determined according to network requests, and the network requests are network requests sent by other third-party plug-ins in an intercepted application program by the monitoring plug-in;
and writing the network request data into a network request log.
According to another aspect of the present disclosure, there is provided a network request monitoring apparatus, including:
the receiving module is used for receiving the equipment parameters sent by the monitoring plug-in;
the judging module is used for receiving network request data sent by a monitoring plug-in if the equipment represented by the equipment parameters is in a white list, wherein the network request data is call data and plug-in party identifiers determined according to the network request, and the network request data is network requests sent by other third party plug-ins in an intercepted application program of the monitoring plug-in;
and the storage module is used for writing the network request data into a network request log.
According to another aspect of the present disclosure, there is provided an electronic device including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform any of the methods described above.
According to another aspect of the present disclosure, there is provided a non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any of the above.
According to another aspect of the disclosure, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the method of any of the above.
It should be understood that the statements in this section do not necessarily identify key or critical features of the embodiments of the present disclosure, nor do they limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The drawings are included to provide a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
fig. 1 is a schematic flow chart diagram of a network request monitoring method provided according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a network request monitoring apparatus provided according to an embodiment of the present disclosure;
fig. 3 is a block diagram of an electronic device for implementing a network request monitoring method according to an embodiment of the disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below with reference to the accompanying drawings, in which various details of the embodiments of the disclosure are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
In order to monitor a network request of a third-party plug-in an application and ensure stability of the application on the premise of realizing monitoring, as shown in fig. 1, an embodiment of the present disclosure provides a network request monitoring method applied to an application having access to a monitoring plug-in, the method including:
step 101, receiving a device parameter sent by a monitoring plug-in.
When the application program is installed on a certain device to run, the monitoring plug-in acquires device parameters of the device and then sends the device parameters to the server, wherein the device parameters comprise data such as device model, device manufacturer, ROM (read only memory) information and the like.
And 102, if the equipment characterized by the equipment parameters is in a white list, receiving network request data sent by a monitoring plug-in, wherein the network request data is call data and plug-in party identifiers determined according to network requests, and the network requests are network requests sent by other third-party plug-ins in an intercepted application program by the monitoring plug-in.
Before online use, various devices are tested, devices capable of normally operating are divided into a white list, devices with abnormal operation are divided into a black list, whether the devices characterized by the device parameters are in the white list or the black list is judged according to the device parameters sent by a monitoring plugin, if the devices characterized by the device parameters sent by the monitoring plugin are in the white list, the monitoring plugin monitors network requests sent by other third-party plugins in an application program, network requests sent by other third-party plugins are intercepted, data called by the network requests and plugin party identifiers are determined according to the network requests, then the data called by the network requests and the plugin party identifiers form network request data and are sent to a server, after the calling data called by the network requests and the plugin party identifiers are determined, the calling data also needs to be analyzed to judge whether the calling data are private data or not, if the data is the privacy data, the network request can be selected to be organized to be executed continuously, if the data is not the privacy data, the network request is executed continuously, when the equipment represented by the equipment parameter is judged to be in a white list, the monitoring plug-in monitors the third-party plug-in the application program, the equipment in the white list has certain compatibility with the monitoring plug-in after being tested, the maximum program ensures the stability of the application program, and the load of collapse or abnormity of the application program is not increased.
And 103, writing the network request data into a network request log.
The network request data is written into the network request log, the network request log is subsequently sent to the application program side, the application program side can determine which third-party plug-ins call the privacy data according to the call data in the network request log, and determine the plug-in sides corresponding to the third-party plug-ins according to the corresponding plug-in side identifications, so that monitoring of the third-party plug-ins is achieved.
In the method provided by the embodiment, when the application program is formally used, the network requests of other third-party plug-ins accessed in the application program are monitored, so that the risk that the third-party plug-ins avoid code detection or operation detection by modifying cloud codes before the application program is online and recover the cloud codes to acquire the private data of the user after the application program is online can be prevented, the monitoring plug-ins need to judge the equipment before monitoring the third-party plug-ins in the application program, the monitoring of the third-party plug-ins in the application program can be formally started if the equipment is in a white list, the application program is prevented from being crashed or abnormally operated due to the compatibility problem of the equipment and the monitoring plug-ins, and the stability of the monitoring plug-ins and the application program is improved.
In step 101, before receiving device parameters sent by a monitoring plug-in, in an embodiment, accessing the monitoring plug-in to a plurality of devices;
receiving operation data sent by a monitoring plug-in;
and dividing each device into a white list or a black list according to the operation data.
Before the monitoring plug-in is accessed into the application program for formal use, the monitoring plug-in is required to be packaged into the application program and then accessed into various devices for operation, the monitoring plug-in sends operation data to the server, the server judges the operation conditions of the monitoring plug-in on different devices according to the operation data, the devices capable of normally operating are divided into a white list, the devices which are crashed or abnormally operated are divided into a black list, and the monitoring plug-in can be adjusted subsequently according to the operation data, so that the expandability of the monitoring plug-in is improved, the black and white list division can prevent the application program from being crashed or abnormally operated due to the compatibility problem of the devices and the monitoring plug-in, and the stability of the monitoring plug-in and the application program is improved.
In an implementation manner, if the device characterized by the device parameter is in a blacklist, a monitoring stopping request is sent to the monitoring plug-in, so that the monitoring plug-in stops intercepting network requests sent by other third party plug-ins of the application program.
If the device characterized by the device parameters is in the blacklist, the compatibility between the device and the monitoring plug-in is poor, the monitoring stopping request is sent to the monitoring plug-in, the monitoring plug-in stops intercepting network requests sent by other third party plug-ins of the application program after receiving the monitoring stopping request, the monitoring stopping request is sent to the monitoring plug-in on the device in the blacklist, the application program can be further prevented from being crashed or abnormally operated due to the compatibility problem between the device and the monitoring plug-in, and the stability of the monitoring plug-in and the application program is improved.
Before receiving the network request data sent by the monitoring plugin in step 102, in an implementation manner, receiving test operation data sent by the monitoring plugin;
judging whether the test operation data is normal or not;
and if the trial operation data is normal, sending a monitoring request to the monitoring plug-in so that the monitoring plug-in can start to intercept network requests sent by other third-party plug-ins in the application program.
Before the monitoring plug-in intercepts the network requests of other third-party plug-ins in the application program, the monitoring plug-in can perform trial operation firstly, the trial operation data generated by the trial operation is sent to the server, the server judges whether the monitoring plug-in operates normally according to the trial operation data, if the monitoring plug-in operates normally, the monitoring plug-in sends a monitoring request to the monitoring plug-in, the monitoring plug-in formally starts to monitor other third-party plug-ins in the application program, and starts to intercept the network requests sent by other third-party plug-ins in the application program, because the environments are different when the monitoring plug-in is formally used even if the equipment of the same model or manufacturer, the monitoring plug-in can perform trial operation firstly before the formal use, if the trial operation is normal, the monitoring is formally started, if the monitoring plug-in is sent abnormally, the breakdown or the abnormal operation of the application program caused by the environmental problems of the equipment is further prevented, the stability of monitoring plug-ins and applications is improved.
In an implementation manner, if the device characterized by the device parameter is not in the white list and the black list, receiving test operation data sent by the monitoring plug-in;
judging whether the test operation data is normal or not;
if the trial operation data is normal, dividing the equipment represented by the equipment parameter into a white list;
and if the trial operation data is abnormal, dividing the equipment represented by the equipment parameter into a blacklist.
Because testing before formal use can only be guaranteed to be performed on most common devices, devices which do not participate in testing may be encountered during formal use, if the devices characterized by device parameters are not in a white list and also in a black list, the monitoring plug-in needs to perform trial operation, then trial operation data generated by the trial operation is sent to the server, the server judges whether the monitoring plug-in operates normally according to the trial operation data, if the monitoring plug-in operates normally, the device is classified into the white list, if the monitoring plug-in operates abnormally, the device is classified into the black list, application program breakdown or abnormal operation caused by low compatibility due to the fact that some devices are not tested is prevented, and stability of the monitoring plug-in and the application program is further improved.
An embodiment of the present disclosure provides a network request monitoring apparatus, as shown in fig. 2, the apparatus includes:
the receiving module 10 is used for receiving the device parameters sent by the monitoring plug-in;
a determining module 20, configured to receive network request data sent by a monitoring plugin if the device characterized by the device parameter is in a white list, where the network request data is call data and plugin party identifiers determined according to a network request and network requests intercepted by the monitoring plugin and sent by other third-party plugins in an application program by the monitoring plugin;
the storage module 30 is configured to write the network request data into a network request log.
Wherein, the device still includes:
the processing module 40 is used for connecting the monitoring plug-in unit into various devices;
the receiving module 10 is further configured to receive operation data sent by the monitoring plug-in;
the storage module 30 is further configured to divide each device into a white list or a black list according to the operation data.
The processing module 40 is further configured to send a monitoring stop request to the monitoring plug-in if the device characterized by the device parameter is in the blacklist, so that the monitoring plug-in stops intercepting network requests sent by other third-party plug-ins of the application program.
The receiving module 10 is further configured to receive test operation data sent by the monitoring plug-in;
the judging module 20 is further configured to judge whether the test running data is normal;
the processing module 40 is further configured to send a monitoring request to the monitoring plug-in if the commissioning data is normal, so that the monitoring plug-in starts to intercept network requests sent by other third party plug-ins in the application program.
The receiving module 10 is further configured to receive test operation data sent by a monitoring plug-in if the device characterized by the device parameter is not in a white list or a black list;
the judging module 20 is further configured to judge whether the test running data is normal;
the storage module 30 is further configured to, if the commissioning data is normal, divide the device characterized by the device parameter into a white list;
the storage module 30 is further configured to, if the commissioning data is abnormal, partition the device characterized by the device parameter into a blacklist.
In the technical scheme of the disclosure, the acquisition, storage, application and the like of the personal information of the related user all accord with the regulations of related laws and regulations, and do not violate the good customs of the public order.
The present disclosure also provides an electronic device, a readable storage medium, and a computer program product according to embodiments of the present disclosure.
FIG. 3 illustrates a schematic block diagram of an example electronic device 300 that can be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 3, the apparatus 300 includes a computing unit 301 that can perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM)302 or a computer program loaded from a storage unit 308 into a Random Access Memory (RAM) 303. In the RAM303, various programs and data required for the operation of the device 300 can also be stored. The calculation unit 301, the ROM302, and the RAM303 are connected to each other via a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
Various components in device 300 are connected to I/O interface 305, including: an input unit 306 such as a keyboard, a mouse, or the like; an output unit 307 such as various types of displays, speakers, and the like; a storage unit 308 such as a magnetic disk, optical disk, or the like; and a communication unit 309 such as a network card, modem, wireless communication transceiver, etc. The communication unit 309 allows the device 300 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The computing unit 301 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of the computing unit 301 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, and so forth. The computing unit 301 performs the various methods and processes described above, such as the network request monitoring method. For example, in some embodiments, the network request monitoring method may be implemented as a computer software program tangibly embodied in a machine-readable medium, such as storage unit 308. In some embodiments, part or all of the computer program may be loaded and/or installed onto device 300 via ROM302 and/or communication unit 309. When the computer program is loaded into RAM303 and executed by the computing unit 301, one or more steps of the network request monitoring method described above may be performed. Alternatively, in other embodiments, the computing unit 301 may be configured to perform the network request monitoring method by any other suitable means (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, Field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), and the Internet.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server with a combined blockchain.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present disclosure may be executed in parallel, sequentially, or in different orders, as long as the desired results of the technical solutions disclosed in the present disclosure can be achieved, and the present disclosure is not limited herein.
The above detailed description should not be construed as limiting the scope of the disclosure. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present disclosure should be included in the scope of protection of the present disclosure.

Claims (13)

1. A network request monitoring method is applied to an application program accessed with a monitoring plug-in, and comprises the following steps:
receiving equipment parameters sent by a monitoring plug-in;
if the equipment characterized by the equipment parameters is in a white list, receiving network request data sent by a monitoring plug-in, wherein the network request data is call data and plug-in party identifiers determined according to network requests, and the network requests are network requests sent by other third-party plug-ins in an intercepted application program by the monitoring plug-in;
and writing the network request data into a network request log.
2. The method of claim 1, prior to receiving the device parameter sent by the monitoring plugin, further comprising:
accessing the monitoring plug-in to a plurality of devices;
receiving operation data sent by a monitoring plug-in;
and dividing each device into a white list or a black list according to the operation data.
3. The method of claim 1, further comprising:
and if the equipment represented by the equipment parameters is in the blacklist, sending a monitoring stopping request to the monitoring plug-in so as to stop the monitoring plug-in from intercepting network requests sent by other third party plug-ins of the application program.
4. The method of claim 1, prior to receiving the network request data sent by the monitoring plugin, further comprising:
receiving test operation data sent by a monitoring plug-in;
judging whether the test operation data is normal or not;
and if the trial operation data is normal, sending a monitoring request to the monitoring plug-in so that the monitoring plug-in can start to intercept network requests sent by other third-party plug-ins in the application program.
5. The method of claim 1, further comprising:
if the equipment represented by the equipment parameters is not in the white list and the black list, receiving test operation data sent by the monitoring plug-in;
judging whether the test operation data is normal or not;
if the trial operation data is normal, dividing the equipment represented by the equipment parameter into a white list;
and if the trial operation data is abnormal, dividing the equipment represented by the equipment parameter into a blacklist.
6. A network request monitoring apparatus, comprising:
the receiving module is used for receiving the equipment parameters sent by the monitoring plug-in;
the judging module is used for judging whether the equipment represented by the equipment parameters is in a white list or a black list;
the receiving module is further configured to receive network request data sent by a monitoring plugin if the device characterized by the device parameter is in a white list, where the network request data is call data and plugin party identifiers determined according to a network request and network requests intercepted by the monitoring plugin and sent by other third party plugins in an application program;
and the storage module is used for writing the network request data into a network request log.
7. The apparatus of claim 6, further comprising:
the processing module is used for connecting the monitoring plug-in unit into various devices;
the receiving module is also used for receiving the operation data sent by the monitoring plug-in;
the storage module is further configured to divide each device into a white list or a black list according to the operation data.
8. The apparatus of claim 6, comprising:
and the processing module is further configured to send a monitoring stopping request to the monitoring plug-in if the device characterized by the device parameter is in the blacklist, so that the monitoring plug-in stops intercepting network requests sent by other third-party plug-ins of the application program.
9. The apparatus of claim 6, comprising:
the receiving module is also used for receiving the test operation data sent by the monitoring plug-in;
the judging module is also used for judging whether the test operation data is normal;
and the processing module is further used for sending a monitoring request to the monitoring plug-in if the commissioning data is normal, so that the monitoring plug-in can start to intercept network requests sent by other third-party plug-ins in the application program.
10. The apparatus of claim 6, comprising:
the receiving module is further configured to receive test operation data sent by a monitoring plug-in if the device characterized by the device parameter is not in a white list or a black list;
the judging module is also used for judging whether the test operation data is normal;
the storage module is further configured to, if the commissioning data is normal, divide the device characterized by the device parameter into a white list;
and the storage module is further used for dividing the equipment represented by the equipment parameter into a blacklist if the commissioning data is abnormal.
11. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-5.
12. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-5.
13. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1-5.
CN202111224479.3A 2021-10-20 2021-10-20 Network request monitoring method and device, electronic equipment and storage medium Pending CN114116373A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111224479.3A CN114116373A (en) 2021-10-20 2021-10-20 Network request monitoring method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111224479.3A CN114116373A (en) 2021-10-20 2021-10-20 Network request monitoring method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114116373A true CN114116373A (en) 2022-03-01

Family

ID=80376072

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111224479.3A Pending CN114116373A (en) 2021-10-20 2021-10-20 Network request monitoring method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114116373A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115002180A (en) * 2022-05-26 2022-09-02 上海商米科技集团股份有限公司 Network request operation monitoring method and device and computer readable medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115002180A (en) * 2022-05-26 2022-09-02 上海商米科技集团股份有限公司 Network request operation monitoring method and device and computer readable medium
CN115002180B (en) * 2022-05-26 2024-05-14 上海商米科技集团股份有限公司 Network request operation monitoring method, device and computer readable medium

Similar Documents

Publication Publication Date Title
CN113900834B (en) Data processing method, device, equipment and storage medium based on Internet of things technology
CN114884796B (en) Fault processing method and device, electronic equipment and storage medium
CN114024884B (en) Test method, test device, electronic equipment and storage medium
CN110896362B (en) Fault detection method and device
CN114389969A (en) Client test method and device, electronic equipment and storage medium
CN114116373A (en) Network request monitoring method and device, electronic equipment and storage medium
US20150067139A1 (en) Agentless monitoring of computer systems
CN113795039A (en) Operator network switching method, device, equipment and computer readable storage medium
CN117272369A (en) Privacy compliance detection method and device, electronic equipment and storage medium
CN113609027A (en) ARM cloud server testing method and device, electronic equipment and storage medium
CN114003497A (en) Method, device and equipment for testing service system and storage medium
CN114138358A (en) Application program starting optimization method, device, equipment and storage medium
CN111737129A (en) Service control method, service control device, computer readable medium and electronic equipment
CN113326513B (en) Application testing method and device, system, electronic equipment and computer readable medium
CN105320853B (en) Information monitoring method and device and terminal
CN115422555B (en) Back door program detection method and device, electronic equipment and storage medium
CN115190008B (en) Fault processing method, fault processing device, electronic equipment and storage medium
CN114138397B (en) Page display method and device, electronic equipment and storage medium
CN115529346A (en) Service changing method, device, equipment and storage medium
CN114238075A (en) Method, device, equipment, medium and product for testing program component
CN115603956A (en) Network protection method and device and electronic equipment
CN113961263A (en) Applet distribution method, device, equipment and storage medium
CN114090073A (en) Interface information extraction method and device, electronic equipment and storage medium
CN115309717A (en) Database loading method, device, equipment, medium and computer program product
CN117076168A (en) SDK processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination