CN115150307B - Method and device for collecting frequency safety detection, storage medium and electronic equipment - Google Patents

Method and device for collecting frequency safety detection, storage medium and electronic equipment Download PDF

Info

Publication number
CN115150307B
CN115150307B CN202210772632.4A CN202210772632A CN115150307B CN 115150307 B CN115150307 B CN 115150307B CN 202210772632 A CN202210772632 A CN 202210772632A CN 115150307 B CN115150307 B CN 115150307B
Authority
CN
China
Prior art keywords
data acquisition
data
frequency
flow
acquisition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210772632.4A
Other languages
Chinese (zh)
Other versions
CN115150307A (en
Inventor
刘丽
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Tianrongxin Network Security Technology Co ltd
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Original Assignee
Zhuhai Tianrongxin Network Security Technology Co ltd
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Tianrongxin Network Security Technology Co ltd, Beijing Topsec Technology Co Ltd, Beijing Topsec Network Security Technology Co Ltd, Beijing Topsec Software Co Ltd filed Critical Zhuhai Tianrongxin Network Security Technology Co ltd
Priority to CN202210772632.4A priority Critical patent/CN115150307B/en
Publication of CN115150307A publication Critical patent/CN115150307A/en
Application granted granted Critical
Publication of CN115150307B publication Critical patent/CN115150307B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/069Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements

Abstract

Some embodiments of the present application provide a method, an apparatus, a storage medium and an electronic device for collecting frequency security detection, where the method for collecting frequency security detection includes: acquiring interactive data flow between an acquisition end and an acquired end, wherein the interactive data flow comprises a first flow from the acquisition end to the acquired end and a second flow from the acquired end to the acquisition end; acquiring the data acquisition frequency and the data acquisition state of the interactive data flow; and confirming whether the data acquisition frequency is safe or not according to the data acquisition state. According to the method and the device, safety detection on the data acquisition frequency can be achieved, and equipment downtime and poor acquired data accuracy caused by too high acquisition frequency are avoided.

Description

Method and device for collecting frequency safety detection, storage medium and electronic equipment
Technical Field
The application relates to the technical field of data acquisition, in particular to a method and a device for acquiring frequency safety detection, a storage medium and electronic equipment.
Background
With the tremendous development of the internet, data collection gradually becomes the basic operation of the internet.
Currently, there is often a great potential safety hazard in data collection in related fields (such as industrial internet). Because the bearing capacity of the equipment to be collected is limited, when the data collection is carried out by adopting the too high data collection frequency, the equipment is easy to downtime, and the loss is caused by the stop of the equipment; and when the data acquisition frequency is too low, the error of the acquired data cannot be increased.
Therefore, how to provide a method for efficient frequency safety detection is a technical problem to be solved.
Disclosure of Invention
An object of some embodiments of the present application is to provide a method, an apparatus, a storage medium, and an electronic device for detecting the safety of a collection frequency, where the data collection frequency can be monitored in real time, quickly and efficiently in the process of data collection, and whether the collection frequency is safe and reasonable is confirmed, so that the collection frequency with a practical error is effectively avoided, and the occurrence of a situation that a collected data sample is wrong or a collected terminal is down is caused, thereby reducing the loss caused when the collected terminal performs data collection.
In a first aspect, some embodiments of the present application provide a method of acquisition frequency security detection, comprising: acquiring interactive data flow between an acquisition end and an acquired end, wherein the interactive data flow comprises a first flow from the acquisition end to the acquired end and a second flow from the acquired end to the acquisition end; acquiring the data acquisition frequency and the data acquisition state of the interactive data flow; and confirming whether the data acquisition frequency is safe or not according to the data acquisition state.
According to the method and the device, whether the data acquisition frequency is safe or not is confirmed through the data acquisition state of the interactive data flow of the acquisition end and the acquired end in real time, real-time, rapid and efficient monitoring of the data acquisition frequency is achieved, whether the acquisition frequency is safe and reasonable or not is confirmed, the acquisition frequency with practical errors is effectively avoided, the situation that the acquired data sample is wrong or the acquired end is down is caused, and therefore loss caused when the acquired end performs data acquisition is reduced.
In some embodiments, the determining whether the data acquisition frequency is safe according to the data acquisition status includes: if the data acquisition state is successful, judging whether the data acquisition frequency is safe or not according to the data acquisition frequency and a preset frequency threshold; if the data acquisition state is failed, the data acquisition frequency is unsafe.
According to the method and the device, the safety of the data acquisition frequency is confirmed by comparing the real-time data acquisition frequency with the preset frequency threshold under the condition that the data acquisition state is successful, the data acquisition frequency can be ensured to be safe and reasonable under the condition that the data acquisition is successful, and then the collected end can be ensured to work safely and normally.
In some embodiments, the preset frequency threshold includes an upper threshold and a lower threshold, wherein the determining, according to the data acquisition frequency and the preset frequency threshold, whether the data acquisition frequency is safe includes: if the data acquisition frequency is not greater than the upper threshold and not less than the lower threshold, confirming that the data acquisition frequency is safe; and if the data acquisition frequency is greater than the upper threshold or the data acquisition frequency is less than the lower threshold, confirming that the data acquisition frequency is unsafe.
According to the method and the device, whether the real-time data acquisition frequency is in the range of the upper limit threshold value and the lower limit threshold value or not is confirmed, whether the data acquisition frequency is safe or not is confirmed, data acquisition can be ensured to be carried out in the bearable range of the acquired end, and the situation that the acquired end is down and cannot work normally, and data acquisition is interrupted or abnormal is avoided.
In some embodiments, after said confirming that said data acquisition frequency is unsafe, said method further comprises: and generating a safety warning log corresponding to the data acquisition frequency, and displaying the safety warning log to a user so as to remind the user.
According to the method and the device, after the data acquisition frequency is confirmed to be unsafe, a safety warning log can be automatically generated for the user, so that on one hand, the user can be reminded of avoiding using the frequency when the user subsequently acquires the data, and on the other hand, the user can timely adjust the data acquisition frequency, and data acquisition errors or interruption are avoided.
In some embodiments, the acquiring the interactive data traffic between the collecting end and the collected end includes: receiving request data flow sent by the acquisition end, wherein the first flow is the request data flow for requesting data acquisition of the acquired end; and receiving a second flow sent by the acquired end aiming at the request data flow, wherein the second flow is the response data flow of the acquired end to the request.
According to the method and the device, the request data flow and the response data flow are obtained through receiving the data flow sent by the acquisition end and the acquired end in the process of interaction between the acquisition end and the acquired end, and then accurate data acquisition states and data acquisition frequencies can be obtained.
In some embodiments, the acquiring the data collection frequency and the data collection state of the interactive data traffic includes: analyzing the request data flow to obtain the data acquisition frequency; and analyzing the response data flow to obtain the data acquisition state.
According to the method and the device, the request data flow and the response data flow are analyzed, so that the data acquisition frequency and the data acquisition state with high accuracy can be obtained in real time.
In some embodiments, the analyzing the request data traffic to obtain the data collection frequency includes: acquiring the request data flow received in a preset time; and taking the ratio of the request data flow to the preset time as the data acquisition frequency.
Some embodiments of the present application obtain the data acquisition frequency by acquiring the data flow in the unit time in real time, which is convenient and accurate.
In some embodiments, the analyzing the response data traffic to obtain the data acquisition state includes: acquiring the numerical value of each sampling point in the data acquisition frequency; if the numerical value exists in all the sampling points, the data acquisition state is confirmed to be successful; and if any sampling point in the sampling points does not have the numerical value, confirming that the data acquisition state is failed.
According to the method and the device, whether the data acquisition state is successful or not is judged by confirming the numerical value of each sampling point in the data acquisition frequency, and accurate judgment of the data acquisition frequency can be achieved rapidly.
In some embodiments, the analyzing the response data traffic to obtain the data acquisition state includes: acquiring a return instruction of the acquired end in the response data flow; if the return instruction is successful, confirming that the data acquisition state is successful; and if the return instruction is failed, confirming that the data acquisition state is failed.
Some embodiments of the present application may further confirm the data acquisition status by the return instruction of the acquired end, so as to achieve fast and accurate determination of the data acquisition frequency.
In some embodiments, before the acquiring the interactive data traffic between the collecting end and the collected end, the method further includes: reading configuration parameters, wherein the configuration parameters comprise: the industrial control protocol type and the preset frequency threshold value, and the configuration parameters are obtained by receiving operation instructions of a user.
According to the method and the device, the data flow can be accurately analyzed later by configuring the corresponding industrial control protocol type and the preset frequency threshold which can be borne by the collected end, and meanwhile, the collected end is guaranteed to work normally.
In some embodiments, the acquiring the data collection frequency and the data collection state of the interactive data traffic includes: calling an analysis function of the industrial control protocol type; and analyzing the interactive data flow by utilizing the analysis function to obtain the data acquisition frequency and the data acquisition state.
According to the method and the device, the interactive data flow is analyzed through the analysis function corresponding to the industrial control protocol type, so that the correct analysis of the data flow can be realized, and the more accurate data acquisition frequency and data acquisition state can be obtained.
In a second aspect, some embodiments of the present application provide an apparatus for acquisition frequency security detection, comprising: the flow acquisition module is configured to acquire interactive data flow between an acquisition end and an acquired end, wherein the interactive data flow comprises a first flow from the acquisition end to the acquired end and a second flow from the acquired end to the acquisition end; the parameter acquisition module is configured to acquire the data acquisition frequency and the data acquisition state of the interactive data flow; and the safety detection module is configured to confirm whether the data acquisition frequency is safe according to the data acquisition state.
In a third aspect, some embodiments of the present application provide a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs a method according to any of the embodiments of the first aspect.
In a fourth aspect, some embodiments of the present application provide an electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor, when executing the program, can implement a method according to any of the embodiments of the first aspect.
In a fifth aspect, some embodiments of the present application provide a computer program product comprising a computer program, wherein the computer program, when executed by a processor, is adapted to carry out the method according to any of the embodiments of the first aspect.
Drawings
In order to more clearly illustrate the technical solutions of some embodiments of the present application, the drawings that are required to be used in some embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort to a person having ordinary skill in the art.
FIG. 1 is a system diagram of acquisition frequency security detection provided by some embodiments of the present application;
FIG. 2 is one of the flow charts of the method for acquisition frequency security detection provided in some embodiments of the present application;
FIG. 3 is a second flowchart of a method for acquisition frequency security detection according to some embodiments of the present application;
FIG. 4 is a block diagram of an apparatus for acquisition frequency security detection provided in some embodiments of the present application;
fig. 5 is a schematic diagram of an electronic device according to some embodiments of the present application.
Detailed Description
The technical solutions in some embodiments of the present application will be described below with reference to the drawings in some embodiments of the present application.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only to distinguish the description, and are not to be construed as indicating or implying relative importance.
In the related art, a stable value of data is set when the data is acquired, then the data is acquired at the set acquisition frequency, and then the acquisition frequency is adjusted according to the deviation degree of the acquired data and the stable value. However, the method does not consider the maximum bearing capacity of the collected device when adjusting the collection frequency, so that the obtained collection frequency cannot be ensured to be safe for the collected device, and the collected data at the higher collection frequency is abnormal, so that the finally adjusted collection frequency is wrong.
In view of this, some embodiments of the present application provide a method for detecting the safety of the acquisition frequency, which analyzes the interactive data traffic between the acquisition end and the acquired end to obtain the data acquisition frequency and the data acquisition state, and then determines whether the data acquisition frequency is safe according to the data acquisition state. According to the method and the device, in the process of data acquisition, the data acquisition frequency can be monitored in real time, quickly and efficiently, whether the acquisition frequency is safe and reasonable is confirmed, the acquisition frequency with practical errors is effectively avoided, the acquired data sample is wrong or the acquired data sample is down, and therefore loss caused when the acquired data sample is acquired is reduced.
As shown in fig. 1, some embodiments of the present application provide a system for collecting frequency security detection, which includes a collecting end 100, a collected end 200, and a security detection end 300, where the collecting end, the collected end 200, and the security detection end 300 are connected through a wired or wireless network to implement data communication. The collecting end 100 may send a first flow containing the collected data request information to the collected end 200, and after receiving the first flow, the collected end 200 sends a second flow to the collecting end 100 for the data request information. In the transmission process of the first flow and the second flow, the first flow and the second flow are both transmitted through the safety detection end, the safety detection end 300 receives the first flow and the second flow, so that analysis of the interactive data flow is achieved, a data acquisition state and a data acquisition frequency are obtained, whether the data acquisition frequency is safe or not is further confirmed according to the data acquisition state, a safety alarm log is generated under the unsafe condition, and the safety alarm log is displayed on a visual interface of the safety detection end 300 for a user to check in time.
In some embodiments of the present application, the collected terminal 100 may be a data collection device, where the data collection device may be a mobile terminal device, a non-portable computer terminal with a data collection function, or the like. The collected end 200 may be a server, a numerical control device, or other devices with a function of generating data, etc. The present application is not specifically limited herein.
The implementation of acquisition frequency security detection performed by the security detection end 300 provided in some embodiments of the present application is described below by way of example in conjunction with fig. 2.
Referring to fig. 2, fig. 2 is a flowchart of an acquisition frequency security detection according to some embodiments of the present application, where the method includes:
s210, acquiring interactive data flow between a collection end and a collected end, wherein the interactive data flow comprises a first flow from the collection end to the collected end and a second flow from the collected end to the collection end.
In some embodiments of the present application, S210 may include: receiving request data flow sent by the acquisition end, wherein the first flow is the request data flow for requesting data acquisition of the acquired end; and receiving a second flow sent by the acquired end aiming at the request data flow, wherein the second flow is the response data flow of the acquired end to the request.
For example, in some embodiments of the present application, the request data traffic generated by the acquisition device (as a specific example of the acquisition end) when sending a request to the field device (as a specific example of the acquired end, for example, the field device may be various types of servers, air conditioning systems, traffic track systems, power generation systems, etc.) may reach the field device through the security detection end 300, at which time the security detection end 300 may receive the request data traffic. Similarly, the field device will respond to the request and will generate a response data flow through the safety instrumented terminal 300 to the collection device, where the safety instrumented terminal 300 will receive the response data flow.
In order to achieve accurate analysis of the interactive data traffic and obtain relevant parameters, in some embodiments of the present application, before executing S210, the method for collecting frequency security detection further includes: reading configuration parameters, wherein the configuration parameters comprise: the industrial control protocol type and the preset frequency threshold value, and the configuration parameters are obtained by receiving operation instructions of a user.
For example, in some embodiments of the present application, a user may input an industrial control protocol type (e.g., modbus, serial communication protocol), a function code (e.g., 0x 01), and an upper threshold and a lower threshold of a preset frequency threshold of data to be collected in a visual interface of the security detection end 300. After the security detection end 300 reads the configuration information, it generates a corresponding unique protocol identifier (i.e., a unique protocol identifier corresponding to the industrial control protocol type), a function code structure body, and an acquisition frequency structure body. Wherein, the main variables of the function code structure body include: the function code, the description information, the request analysis function pointer and the response analysis function pointer, wherein the information corresponding to the description information, the request analysis function pointer and the response analysis function pointer is searched and filled by the industrial control protocol analysis plug-in according to the function code in the function code structure body. For example, a function code mechanism is a function code: 0x01, description information: reading a coil value, and requesting an analytic function pointer: a specific function that processes the request, a response resolution function pointer: a specific function of the response is processed. The main variables of the acquisition frequency structure include the minimum acquisition frequency (i.e., lower threshold) and the maximum acquisition frequency (i.e., upper threshold). And finally, transmitting the detection data structure to an industrial control protocol analysis plug-in. It should be noted that, the preset frequency threshold is set according to the actual bearing capacity of the field device, and the bearing capacity may be already tested by the manufacturer when the device leaves the factory.
S220, acquiring the data acquisition frequency and the data acquisition state of the interactive data flow.
In some embodiments of the present application, S220 may include: calling an analysis function of the industrial control protocol type; and analyzing the interactive data flow by utilizing the analysis function to obtain the data acquisition frequency and the data acquisition state. Analyzing the request data flow to obtain the data acquisition frequency; and analyzing the response data flow to obtain the data acquisition state.
For example, in some embodiments of the present application, since the industrial control protocol types of the field devices are different, it is necessary to parse the interactive data traffic using a parsing function corresponding to the industrial control protocol type. And analyzing by adopting different analysis functions according to the direction of the collected flow. For example, the request data flow is analyzed by using the processing request function to obtain the data acquisition frequency, and the response data flow is analyzed by using the processing response function to obtain the data acquisition state.
In some embodiments of the present application, the request data traffic received within a preset time is acquired; and taking the ratio of the request data flow to the preset time as the data acquisition frequency.
For example, in some embodiments of the present application, the preset time may be set to 1 second, 2 seconds, and so on. And obtaining the number of the acquisition points in the request data flow received within 1 second through the analysis function, and assigning the number of the acquisition points to the acquisition number variable in the analysis result structure body. The number of acquisition points in each second is the data acquisition frequency.
In some embodiments of the present application, the values of the sampling points in the data acquisition frequency are obtained; if the numerical value exists in all the sampling points, the data acquisition state is confirmed to be successful; and if any sampling point in the sampling points does not have the numerical value, confirming that the data acquisition state is failed.
For example, in some embodiments of the present application, whether each sampling point is successful or failed may be determined according to whether the content of each sampling point is a specific value. For example, there are 100 sampling points in the data acquisition frequency, the data acquisition state is successful if each sampling point has a specific value (e.g., 0,1, etc.), and the data acquisition state is failed if at least one sampling point of the 100 sampling points has no specific value. The data acquisition state is then assigned to a response state variable in the parse result structure, where the response state variable may be set to success or failure.
In other embodiments of the present application, a return instruction of the collected end in the response data flow is obtained; if the return instruction is successful, confirming that the data acquisition state is successful; and if the return instruction is failed, confirming that the data acquisition state is failed.
For example, in other embodiments of the present application, the data acquisition status may also be confirmed directly from the command returned by the field device.
And then, obtaining a complete analysis result structure body comprises the steps of collecting a number variable and a response state variable.
S230, confirming whether the data acquisition frequency is safe or not according to the data acquisition state.
For example, in some embodiments of the present application, the security detection end 300 may read the content in the analysis result structure body within a preset period (for example, 1 second), that is, read the number of acquisition points and the response status (that is, the data acquisition status) every 1 second.
In some embodiments of the present application, S230 may include: if the data acquisition state is successful, judging whether the data acquisition frequency is safe or not according to the data acquisition frequency and a preset frequency threshold; if the data acquisition state is failed, the data acquisition frequency is unsafe.
For example, in some embodiments of the present application, the security detection end 300 detects from the read content. When the data acquisition state fails, the fact that the current data acquisition frequency is adopted for data acquisition causes downtime or errors of the field equipment, a specific numerical value of a sampling point cannot be returned normally is indicated, and the current data acquisition frequency is unsafe.
To ensure accuracy of the collected data, in some embodiments of the present application, if the data collection frequency is not greater than the upper threshold and not less than the lower threshold, confirming that the data collection frequency is safe; and if the data acquisition frequency is greater than the upper threshold or the data acquisition frequency is less than the lower threshold, confirming that the data acquisition frequency is unsafe.
Since the accuracy of the acquired data decreases when the data acquisition frequency is high, in some embodiments of the present application, further determination of the data acquisition frequency is also required when the data acquisition state is normal. For example, the data acquisition frequency is 100, the preset frequency threshold is [70, 120], and the data acquisition frequency is within the preset frequency threshold, which indicates that the current data acquisition frequency is safe and reasonable.
In some embodiments of the present application, after said confirming that said data acquisition frequency is unsafe, said method further comprises: and generating a safety warning log corresponding to the data acquisition frequency, and displaying the safety warning log to a user so as to remind the user.
For example, in some embodiments of the present application, in order to inform the user that the collected data is inaccurate or the field device is down easily at the current data collection frequency, the safety detection end 300 may also automatically generate a safety warning log according to the above-mentioned determination request condition and display the safety warning log on the visual interface for the relevant user to view. Wherein the safety warning log comprises: alarm time, industrial control protocol type, function code description information and data acquisition frequency.
The following takes an acquisition frequency control device as an example of an acquisition end, and a specific process of acquisition frequency security detection provided in some embodiments of the present application is exemplarily described with reference to fig. 3.
Referring to fig. 3, fig. 3 is a flowchart of a method for acquisition frequency security detection according to some embodiments of the present application. Taking communication between the acquisition frequency control device and the server (as one example of the acquisition end) as an example, an implementation procedure of the method of the safety detection of the acquisition frequency by the safety detection device (as one specific example of the safety detection end) is exemplified.
S310, reading configuration parameters.
For example, as a specific example of the present application, an upper threshold and a lower threshold of an industrial control protocol type, an acquisition function code, and an acquisition frequency (i.e., a preset frequency threshold) are set on a visual interface of the acquisition frequency safety detection device, where the upper threshold is 60 and the lower threshold is 120.
S320, acquiring interactive data flow between the acquisition end and the acquired end.
For example, as a specific example of the present application, traffic data packets generated by the interaction of the acquisition frequency control device with the server (as a specific example of the interaction data traffic) are captured by the DPDK (Intel Data Plane Development Kit, network packet processing system) every one second with a period of 1 second. The traffic data messages include request data messages (as a specific example of request data traffic) and response data messages (as a specific example of response data traffic).
S330, acquiring the data acquisition frequency and the data acquisition state of the interactive data flow.
For example, as a specific example of the present application, a resolution function corresponding to an industrial control protocol type is selected, wherein the resolution function includes a process request resolution function and a response request resolution function. And analyzing the request data message by using the processing request analysis function to obtain the data acquisition frequency, and analyzing the response data message by using the response request analysis function to obtain the data acquisition state. The data acquisition status and the data acquisition frequency can be obtained by referring to the embodiment provided in fig. 2, and the description thereof will not be repeated here. For example, the data acquisition frequency is 100, and the data acquisition status is successful.
S340, judging whether the data acquisition state is successful, if so, executing S350, otherwise, confirming that the data acquisition frequency is unsafe, and executing S360.
For example, as a specific example of the present application, S330 may determine that the data acquisition status is successful, and S350 is performed.
S350, judging whether the data acquisition frequency is within a preset frequency threshold, if so, confirming that the data acquisition frequency is safe, and if not, executing S360.
In some embodiments of the present application, if the data acquisition frequency is within a preset frequency threshold, the data acquisition frequency is confirmed to be safe, otherwise, not safe.
For example, as a specific example of the present application, where the data acquisition frequency 100 is within the range of the preset frequency threshold [60, 120], it is safe and reasonable to characterize the current data acquisition frequency, and no treatment is currently required.
S360, generating a safety warning log corresponding to the data acquisition frequency, and displaying the safety warning log to a user.
For example, as a specific example of the present application, in the case where the data collection frequency is not secure, it is necessary to inform the relevant user, that is, to generate a form of a security warning log, to be displayed on the visual interface. Wherein the safety warning log comprises: warning time, industrial control protocol type, protocol acquisition function code and detailed information of the function code are already data acquisition frequency.
In addition, in other embodiments of the present application, the safety detection device may be applied to an industrial control safety audit product, so that the industrial control safety audit product may have a function of collecting frequency safety detection, and a specific implementation process of the method for collecting frequency safety detection is the same as the principle of the above method embodiment, so that repetition is avoided, and details are not repeated here.
Referring to fig. 4, fig. 4 is a block diagram illustrating an apparatus for acquiring frequency security detection according to some embodiments of the present application. It should be understood that the apparatus for collecting frequency security detection corresponds to the above method embodiments, and can perform the steps related to the above method embodiments, and specific functions of the apparatus for collecting frequency security detection may be referred to the above description, and detailed descriptions thereof are omitted herein as appropriate to avoid redundancy.
The apparatus of fig. 4 for acquisition frequency security detection includes at least one software functional module that can be stored in memory in the form of software or firmware or cured in the apparatus for acquisition frequency security detection, the apparatus for acquisition frequency security detection comprising: a flow acquisition module 410 configured to acquire an interaction data flow between an acquisition end and an acquired end, wherein the interaction data flow includes a first flow from the acquisition end to the acquired end and a second flow from the acquired end to the acquisition end; a parameter acquisition module 420 configured to acquire a data acquisition frequency and a data acquisition status of the interactive data traffic; a security detection module 430 configured to confirm whether the data acquisition frequency is secure based on the data acquisition status.
In some embodiments of the present application, the security detection module 430 is at least configured to determine whether the data acquisition frequency is secure according to the data acquisition frequency and a preset frequency threshold if the data acquisition state is successful; if the data acquisition state is failed, the data acquisition frequency is unsafe.
In some embodiments of the present application, the preset frequency threshold includes an upper threshold and a lower threshold, and the security detection module 430 is at least configured to confirm that the data acquisition frequency is secure if the data acquisition frequency is not greater than the upper threshold and not less than the lower threshold; and if the data acquisition frequency is greater than the upper threshold or the data acquisition frequency is less than the lower threshold, confirming that the data acquisition frequency is unsafe.
In some embodiments of the present application, after the security detection module 430, the apparatus for collecting frequency security detection further includes a warning module (not shown in the figure) configured to: and generating a safety warning log corresponding to the data acquisition frequency, and displaying the safety warning log to a user so as to remind the user.
In some embodiments of the present application, the traffic obtaining module 410 is at least configured to receive the requested data traffic sent by the collecting end, where the first traffic is the requested data traffic requesting data collection of the collected end; and receiving a second flow sent by the acquired end aiming at the request data flow, wherein the second flow is the response data flow of the acquired end to the request.
In some embodiments of the present application, the parameter acquisition module 420 is configured at least to acquire the data acquisition frequency and the data acquisition status of the interactive data traffic, and includes: analyzing the request data flow to obtain the data acquisition frequency; and analyzing the response data flow to obtain the data acquisition state.
In some embodiments of the present application, the parameter acquisition module 420 is at least configured to acquire the requested data traffic received within a preset time; and taking the ratio of the request data flow to the preset time as the data acquisition frequency.
In some embodiments of the present application, the parameter acquisition module 420 is at least configured to acquire values for each sampling point in the data acquisition frequency; if the numerical value exists in all the sampling points, the data acquisition state is confirmed to be successful; and if any sampling point in the sampling points does not have the numerical value, confirming that the data acquisition state is failed.
In some embodiments of the present application, the parameter acquisition module 420 is at least configured to acquire a return instruction of the acquired end in the response data traffic; if the return instruction is successful, confirming that the data acquisition state is successful; and if the return instruction is failed, confirming that the data acquisition state is failed.
In some embodiments of the present application, the apparatus for acquiring frequency security detection before the flow acquisition module 410 further includes a configuration module (not shown in the figure) configured at least to: reading configuration parameters, wherein the configuration parameters comprise: the industrial control protocol type and the preset frequency threshold value, and the configuration parameters are obtained by receiving operation instructions of a user.
In some embodiments of the present application, the parameter acquisition module 420 is configured to at least: calling an analysis function of the industrial control protocol type; and analyzing the interactive data flow by utilizing the analysis function to obtain the data acquisition frequency and the data acquisition state.
Some embodiments of the present application also provide a computer readable storage medium having stored thereon a computer program, which when executed by a processor, may implement operations of the method corresponding to any of the above-described methods provided by the above-described embodiments.
Some embodiments of the present application further provide a computer program product, where the computer program product includes a computer program, where the computer program when executed by a processor may implement operations of a method corresponding to any of the foregoing methods provided by the foregoing embodiments.
As shown in fig. 5, some embodiments of the present application provide an electronic device 500, the electronic device 500 comprising: memory 510, processor 520, and a computer program stored on memory 510 and executable on processor 520, wherein processor 520 may implement a method as in any of the embodiments described above when reading the program from memory 510 and executing the program via bus 530.
Processor 520 may process the digital signals and may include various computing structures. Such as a complex instruction set computer architecture, a reduced instruction set computer architecture, or an architecture that implements a combination of instruction sets. In some examples, processor 520 may be a microprocessor.
Memory 510 may be used for storing instructions to be executed by processor 520 or data related to execution of the instructions. Such instructions and/or data may include code to implement some or all of the functions of one or more modules described in embodiments of the present application. The processor 520 of the disclosed embodiments may be configured to execute instructions in the memory 510 to implement the methods shown above. Memory 510 includes dynamic random access memory, static random access memory, flash memory, optical memory, or other memory known to those skilled in the art.
The foregoing is merely exemplary embodiments of the present application and is not intended to limit the scope of the present application, and various modifications and variations may be suggested to one skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principles of the present application should be included in the protection scope of the present application. It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further definition or explanation thereof is necessary in the following figures.
The foregoing is merely specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes and substitutions are intended to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.

Claims (11)

1. A method of acquisition frequency security detection, comprising:
acquiring interactive data flow between an acquisition end and an acquired end, wherein the interactive data flow comprises a first flow from the acquisition end to the acquired end and a second flow from the acquired end to the acquisition end;
acquiring the data acquisition frequency and the data acquisition state of the interactive data flow;
confirming whether the data acquisition frequency is safe or not according to the data acquisition state;
the step of confirming whether the data acquisition frequency is safe according to the data acquisition state comprises the following steps:
if the data acquisition state is successful, judging whether the data acquisition frequency is safe or not according to the data acquisition frequency and a preset frequency threshold; if the data acquisition state is failed, the data acquisition frequency is unsafe;
the method for acquiring the interactive data flow between the acquisition end and the acquired end comprises the following steps: receiving request data flow sent by the acquisition end, wherein the first flow is the request data flow for requesting data acquisition of the acquired end; receiving a second flow sent by the acquired end aiming at the request data flow, wherein the second flow is the response data flow of the acquired end to the request;
the acquiring the data acquisition frequency and the data acquisition state of the interactive data flow comprises the following steps: analyzing the request data flow to obtain the data acquisition frequency; and analyzing the response data flow to obtain the data acquisition state.
2. The method of claim 1, wherein the predetermined frequency threshold comprises an upper threshold and a lower threshold, wherein the determining whether the data acquisition frequency is safe based on the data acquisition frequency and the predetermined frequency threshold comprises:
if the data acquisition frequency is not greater than the upper threshold and not less than the lower threshold, confirming that the data acquisition frequency is safe;
and if the data acquisition frequency is greater than the upper threshold or the data acquisition frequency is less than the lower threshold, confirming that the data acquisition frequency is unsafe.
3. The method of claim 1 or 2, wherein after said confirming that said data acquisition frequency is unsafe, the method further comprises:
and generating a safety warning log corresponding to the data acquisition frequency, and displaying the safety warning log to a user so as to remind the user.
4. The method of claim 1, wherein said parsing the requested data traffic to obtain the data collection frequency comprises:
acquiring the request data flow received in a preset time;
and taking the ratio of the request data flow to the preset time as the data acquisition frequency.
5. The method of claim 4, wherein said analyzing said response data traffic to obtain said data acquisition status comprises:
acquiring the numerical value of each sampling point in the data acquisition frequency;
if the numerical value exists in each sampling point, the data acquisition state is confirmed to be successful;
and if any sampling point in the sampling points does not have the numerical value, confirming that the data acquisition state is failed.
6. The method of claim 4, wherein said analyzing said response data traffic to obtain said data acquisition status comprises:
acquiring a return instruction of the acquired end in the response data flow;
if the return instruction is successful, confirming that the data acquisition state is successful;
and if the return instruction is failed, confirming that the data acquisition state is failed.
7. The method of claim 1 or 2, wherein prior to the acquiring of the interactive data traffic between the acquisition end and the acquired end, the method further comprises:
reading configuration parameters, wherein the configuration parameters comprise: the industrial control protocol type and the preset frequency threshold value, and the configuration parameters are obtained by receiving operation instructions of a user.
8. The method of claim 7, wherein the acquiring the data collection frequency and data collection status of the interactive data traffic comprises:
calling an analysis function of the industrial control protocol type;
and analyzing the interactive data flow by utilizing the analysis function to obtain the data acquisition frequency and the data acquisition state.
9. An apparatus for frequency acquisition security detection, comprising:
the flow acquisition module is configured to acquire interactive data flow between an acquisition end and an acquired end, wherein the interactive data flow comprises a first flow from the acquisition end to the acquired end and a second flow from the acquired end to the acquisition end;
the parameter acquisition module is configured to acquire the data acquisition frequency and the data acquisition state of the interactive data flow;
a security detection module configured to confirm whether the data acquisition frequency is secure according to the data acquisition status;
the security detection module is configured to:
if the data acquisition state is successful, judging whether the data acquisition frequency is safe or not according to the data acquisition frequency and a preset frequency threshold; if the data acquisition state is failed, the data acquisition frequency is unsafe;
the flow acquisition module is configured to: receiving request data flow sent by the acquisition end, wherein the first flow is the request data flow for requesting data acquisition of the acquired end; receiving a second flow sent by the acquired end aiming at the request data flow, wherein the second flow is the response data flow of the acquired end to the request;
the parameter acquisition module is configured to: analyzing the request data flow to obtain the data acquisition frequency; and analyzing the response data flow to obtain the data acquisition state.
10. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program, wherein the computer program when run by a processor performs the method according to any of claims 1-8.
11. An electronic device comprising a memory, a processor, and a computer program stored on the memory and running on the processor, wherein the computer program when run by the processor performs the method of any one of claims 1-8.
CN202210772632.4A 2022-06-30 2022-06-30 Method and device for collecting frequency safety detection, storage medium and electronic equipment Active CN115150307B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210772632.4A CN115150307B (en) 2022-06-30 2022-06-30 Method and device for collecting frequency safety detection, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210772632.4A CN115150307B (en) 2022-06-30 2022-06-30 Method and device for collecting frequency safety detection, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN115150307A CN115150307A (en) 2022-10-04
CN115150307B true CN115150307B (en) 2023-12-22

Family

ID=83410494

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210772632.4A Active CN115150307B (en) 2022-06-30 2022-06-30 Method and device for collecting frequency safety detection, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN115150307B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050000879A (en) * 2003-06-25 2005-01-06 주식회사 케이티 System and method for collecting equipment information in network management system
CN108810280A (en) * 2018-06-19 2018-11-13 Oppo广东移动通信有限公司 Processing method, device, storage medium and the electronic equipment of voice collecting frequency
CN109145575A (en) * 2017-06-19 2019-01-04 珠海格力电器股份有限公司 A kind of distribution method and device using permission
CN110381130A (en) * 2019-07-12 2019-10-25 湖南新云网科技有限公司 The long connection method of keep-alive, device, communication terminal and storage medium
CN111898121A (en) * 2020-07-09 2020-11-06 彩讯科技股份有限公司 Frequency limiting method and device based on mailbox, computer equipment and storage medium
CN112468367A (en) * 2020-11-27 2021-03-09 苏州浪潮智能科技有限公司 Data acquisition and interaction method, system, equipment and medium
CN112614002A (en) * 2019-11-29 2021-04-06 北京金风慧能技术有限公司 Data acquisition system, method, device, electronic equipment and computer storage medium
CN114218430A (en) * 2021-11-23 2022-03-22 广州明珞装备股份有限公司 Remote cooperative equipment operation and maintenance system, method and device
CN114545848A (en) * 2022-04-24 2022-05-27 中国电子产品可靠性与环境试验研究所((工业和信息化部电子第五研究所)(中国赛宝实验室)) Servo motor endurance test process monitoring method and device and computer equipment
CN114600089A (en) * 2019-11-28 2022-06-07 西门子股份公司 Method, device, computing equipment and storage medium for determining acquisition frequency

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105763474B (en) * 2014-12-19 2019-10-25 华为技术有限公司 Data transmission method and device
US10142335B2 (en) * 2015-12-18 2018-11-27 International Business Machines Corporation Dynamic intrinsic chip identification

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20050000879A (en) * 2003-06-25 2005-01-06 주식회사 케이티 System and method for collecting equipment information in network management system
CN109145575A (en) * 2017-06-19 2019-01-04 珠海格力电器股份有限公司 A kind of distribution method and device using permission
CN108810280A (en) * 2018-06-19 2018-11-13 Oppo广东移动通信有限公司 Processing method, device, storage medium and the electronic equipment of voice collecting frequency
CN110381130A (en) * 2019-07-12 2019-10-25 湖南新云网科技有限公司 The long connection method of keep-alive, device, communication terminal and storage medium
CN114600089A (en) * 2019-11-28 2022-06-07 西门子股份公司 Method, device, computing equipment and storage medium for determining acquisition frequency
CN112614002A (en) * 2019-11-29 2021-04-06 北京金风慧能技术有限公司 Data acquisition system, method, device, electronic equipment and computer storage medium
CN111898121A (en) * 2020-07-09 2020-11-06 彩讯科技股份有限公司 Frequency limiting method and device based on mailbox, computer equipment and storage medium
CN112468367A (en) * 2020-11-27 2021-03-09 苏州浪潮智能科技有限公司 Data acquisition and interaction method, system, equipment and medium
CN114218430A (en) * 2021-11-23 2022-03-22 广州明珞装备股份有限公司 Remote cooperative equipment operation and maintenance system, method and device
CN114545848A (en) * 2022-04-24 2022-05-27 中国电子产品可靠性与环境试验研究所((工业和信息化部电子第五研究所)(中国赛宝实验室)) Servo motor endurance test process monitoring method and device and computer equipment

Also Published As

Publication number Publication date
CN115150307A (en) 2022-10-04

Similar Documents

Publication Publication Date Title
CN107241229B (en) Service monitoring method and device based on interface testing tool
CN103034802A (en) Automatic routing inspection system and method based on intelligent rule matching
CN109273045B (en) Storage device online detection method, device, equipment and readable storage medium
CN113485281A (en) Method and system for generating measuring point alarm and reset information in background of distributed control system
CN111130867A (en) Intelligent household equipment alarm method and device based on Internet of things
CN115150307B (en) Method and device for collecting frequency safety detection, storage medium and electronic equipment
EP4096187A1 (en) Method and apparatus for managing internet of things device
CN111130944B (en) System monitoring method and system
CN112910733A (en) Full link monitoring system and method based on big data
CN112583617A (en) Fault determination method, server, control terminal and storage medium
CN115296979B (en) Fault processing method, device, equipment and storage medium
CN112054934A (en) Protocol detection method and device and electronic equipment
CN111026619A (en) Page monitoring method and device and storage medium
CN116010068A (en) Method and device for forwarding task abnormality self-diagnosis
CN108648298B (en) Message processing method and device, storage medium and electronic equipment
CN110362464B (en) Software analysis method and equipment
CN112414475A (en) Detection device and method for capacitance bottle of transformer substation, electronic equipment and medium
WO2022015313A1 (en) Generation of alerts of correlated time-series behavior of environments
CN114584607B (en) Communication connection establishing method and device, electronic equipment and readable storage medium
CN115016434B (en) Bench, whole vehicle data linkage method and electronic equipment
CN113920698B (en) Early warning method, device, equipment and medium for interface abnormal call
CN116909849A (en) Page monitoring method, device and storage medium
CN114430567B (en) Network detection model evaluation method, device and system and electronic equipment
CN116132097B (en) System login method and device, electronic equipment and storage medium
CN117312108A (en) Timing alarm method, device, equipment and medium for intelligent platform management interface

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20231130

Address after: Room 103-060, 1st Floor, Building 1, No. 18 Futian Road, Xiangzhou District, Zhuhai City, Guangdong Province, 519000 (centralized office area)

Applicant after: Zhuhai Tianrongxin Network Security Technology Co.,Ltd.

Applicant after: Beijing Topsec Network Security Technology Co.,Ltd.

Applicant after: Topsec Technologies Inc.

Applicant after: BEIJING TOPSEC SOFTWARE Co.,Ltd.

Address before: 100085 4th floor, building 3, yard 1, Shangdi East Road, Haidian District, Beijing

Applicant before: Beijing Topsec Network Security Technology Co.,Ltd.

Applicant before: Topsec Technologies Inc.

Applicant before: BEIJING TOPSEC SOFTWARE Co.,Ltd.

GR01 Patent grant
GR01 Patent grant