CN115269953A - Method for tracking link jump under IPv6 network and related equipment - Google Patents

Method for tracking link jump under IPv6 network and related equipment Download PDF

Info

Publication number
CN115269953A
CN115269953A CN202210917070.8A CN202210917070A CN115269953A CN 115269953 A CN115269953 A CN 115269953A CN 202210917070 A CN202210917070 A CN 202210917070A CN 115269953 A CN115269953 A CN 115269953A
Authority
CN
China
Prior art keywords
webpage
link
target
website
target webpage
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210917070.8A
Other languages
Chinese (zh)
Inventor
冯天阳
蒋驰
王旸
闫海伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mingyang Industrial Technology Research Institute Shenyang Co ltd
Original Assignee
Mingyang Industrial Technology Research Institute Shenyang Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mingyang Industrial Technology Research Institute Shenyang Co ltd filed Critical Mingyang Industrial Technology Research Institute Shenyang Co ltd
Priority to CN202210917070.8A priority Critical patent/CN115269953A/en
Publication of CN115269953A publication Critical patent/CN115269953A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

Abstract

The invention discloses a method for tracking link jump under an IPv6 network and related equipment, relates to the technical field of IPv6, and mainly solves the problem that the opening process of a problem webpage cannot be traced when the validity of the webpage of a website is detected. The method comprises the following steps: determining a target website to be tracked; traversing all the webpages governed by the target website to obtain the access state of each webpage and a link jump path for accessing each webpage; and under the condition that the access state of the target website is abnormal, determining the abnormal type of the webpage with the abnormal access state based on the access state of each webpage and the link jump path for accessing each webpage. The invention is used for the tracking process of the link jump under the IPv6 network.

Description

Method for tracking link jump under IPv6 network and related equipment
Technical Field
The invention relates to the technical field of IPv6, in particular to a method for tracking link jump in an IPv6 network and related equipment.
Background
IPv6 (Internet Protocol Version 6, version 6 of the Internet Protocol) is a next-generation IP Protocol used in place of IPv4, that is, a Protocol of the next-generation Internet. At present, many websites monitor whether a web page can be normally opened in an IPv6 network, so as to determine the web page suitability of the website in the IPv6 network, but in the prior art, only which web page has a problem can be detected, but it is difficult to determine the problem web page that arrives through which path, for example: the D webpage has a problem, workers can only know that the D webpage cannot be opened, but a plurality of paths such as A-B-C-D, A-B-D and A-C-D exist when the D webpage arrives, and the workers cannot determine which path arrives at the D webpage, so that the problem of the D webpage occurs, and therefore the difficulty of solving the problem is increased for the workers.
Disclosure of Invention
In view of the above problems, the present invention provides a method for tracking link jump in an IPv6 network and a related device, and mainly aims to solve the problem that the opening process of a problematic web page is not traced when detecting the validity of the web page of a website.
In order to solve at least one of the above technical problems, in a first aspect, the present invention provides a method for tracking a link jump in an IPv6 network, where the method includes:
determining a target website to be tracked;
traversing all the webpages governed by the target website to obtain the access state of each webpage and a link jump path for accessing each webpage;
and determining the abnormal type of the webpage with the abnormal access state based on the access state of each webpage and the link jump path for accessing each webpage when the access state of the target website is abnormal.
Optionally, the method further includes:
under the condition that a target webpage is accessed based on a first link jump path and the access state of the target webpage is inaccessible, continuing to access the target webpage through other link jump paths;
and when a second link jump path exists to access a target webpage and the access state of the target webpage is normal access, determining that the abnormal type is jump path abnormality and the target webpage is displayed normally.
Optionally, the method further includes:
acquiring a link type of a target webpage, wherein the link type comprises: website internal links, website external links and sub-domain name links;
and determining an access action to the target webpage based on the link type of the target webpage.
Optionally, the method further includes:
in the case that the link type of the first target webpage is the internal link of the website, traversing and accessing all the webpages under the first target webpage,
in case that the link type of the second target webpage is the external link of the website, only the second target webpage is accessed,
under the condition that the link type of a third target webpage is the sub domain name link, acquiring the record information of the third target webpage;
in case that the third target web page is recorded, only the third target web page is accessed,
and traversing and accessing all the web pages under the third target web page under the condition that the third target web page is not recorded.
Optionally, the method further includes:
and determining a link architecture diagram of the target website based on the link jump paths of all the webpages of the target website, wherein the link architecture diagram can reflect all the link jump paths which can access the target webpages.
Optionally, the method further includes:
detecting the legality of all link jump paths which can access the target webpage based on the link architecture diagram;
and under the condition that the illegal link jump path illegally entering the target webpage is detected, closing the illegal link jump path and sending alarm information to a user.
Optionally, the method further includes:
acquiring an access state of accessing a target webpage through all link jump paths capable of accessing the target webpage and a target webpage level corresponding to each link jump path;
and merging and displaying the link jump paths with the same access state of the target webpage and the same corresponding target webpage hierarchy.
In a second aspect, an embodiment of the present invention further provides a device for tracking a link jump in an IPv6 network, where the device includes:
the determining unit is used for determining a target website to be tracked;
the acquisition unit is used for traversing and accessing all the webpages governed by the target website to acquire the access state of each webpage and a link jump path for accessing each webpage;
and a second determining unit, configured to determine, when the access state of the target website is abnormal, an abnormal type of the webpage with the abnormal access state based on the access state of each webpage and a link jump path for accessing each webpage.
In order to achieve the above object, according to a third aspect of the present invention, there is provided a computer-readable storage medium including a stored program, wherein the steps of the above-mentioned tracking method for link jump under IPv6 network are implemented when the program is executed by a processor.
In order to achieve the above object, according to a fourth aspect of the present invention, there is provided an electronic device comprising at least one processor, and at least one memory connected to the processor; the processor is configured to call the program instruction in the memory, and execute the step of the tracking method for link jump in the IPv6 network.
By means of the technical scheme, the method and the related equipment for tracking the link jump in the IPv6 network provided by the invention have the advantages that for the problem that the opening process of a problem webpage cannot be traced when the webpage validity of the website is detected, the target website to be tracked is determined; traversing all the webpages governed by the target website to obtain the access state of each webpage and a link jump path for accessing each webpage; and determining the abnormal type of the webpage with the abnormal access state based on the access state of each webpage and the link jump path for accessing each webpage when the access state of the target website is abnormal. In the above solution, a website to be detected is determined first, and then all webpages under the website are traversed and accessed in a hierarchical order through a crawler technology, so as to determine whether all webpages under the website support the IPv6 technology, and an access process is recorded during access, for example: the webpage arriving at D can be through the link jump paths of A-B-C-D, A-B-D and A-C-D, but the fact that the webpage D cannot be opened under the link jump path of A-B-D can be determined through the link jump path based on the access state of each webpage and the link jump path for accessing each webpage, so that workers are helped, problems are quickly located, and the effect of tracing the opening process of the problem webpage is achieved.
Accordingly, the tracking apparatus, device and computer-readable storage medium for link jump in the IPv6 network provided by the embodiment of the present invention also have the above technical effects.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various additional advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 is a flowchart illustrating a method for tracking a link jump in an IPv6 network according to an embodiment of the present invention;
FIG. 2 is a block diagram illustrating a schematic composition of a tracking apparatus for link jump in an IPv6 network according to an embodiment of the present invention;
fig. 3 is a block diagram illustrating a schematic composition of an electronic device for tracking link jump in an IPv6 network according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the invention are shown in the drawings, it should be understood that the invention can be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
In order to solve the problem that the opening process of a problematic webpage cannot be traced when detecting the webpage validity of a website, the embodiment of the invention provides a method for tracing link jump in an IPv6 network, as shown in fig. 1, the method includes:
s101, determining a target website to be tracked;
illustratively, when detecting the IPv6 support degree of the website after the IPv6 upgrade and modification, first, the target website to be detected, that is, the target website to be tracked, needs to be determined.
S102, traversing and accessing all the webpages governed by the target website to acquire the access state of each webpage and a link jump path for accessing each webpage;
illustratively, the crawler tool can imitate the user operation to access the website, and the implementation of the method needs to write the crawler tool first. All the webpages governed by the target website are accessed through a web crawler technology, and the link jump path reaching each webpage is continuously recorded during the access, so that the effects of acquiring the access state of each webpage and accessing the link jump path of each webpage are realized.
From the angle of the link level, the web pages administered by the target website can be divided into: and by analogy, the first page, the second-level link, the third-level link and the like, except the first page, the second-level link, the third-level link and the like all need to record corresponding upper-level links during tracking, the links are accessed under the IPv6 network, and the return state is obtained, for example, if the access state is 200, the access is successful.
S103, under the condition that the access state of the target website is abnormal, determining the abnormal type of the webpage with the abnormal access state based on the access state of each webpage and the link jump path for accessing each webpage.
Illustratively, if the access state of the target website is abnormal, that is, the target website has a webpage which cannot be accessed, it needs to determine whether the abnormal type of the webpage which cannot be accessed is caused by the self reason of the webpage or the link jump path based on the access state of each webpage in the website and the corresponding link jump path, so that the problem can be quickly located by the staff, and the effect of tracing the opening process and the abnormal type of the problem webpage is achieved.
By means of the technical scheme, the method for tracking the link jump in the IPv6 network, provided by the invention, can not trace the problem of the opening process of the problem webpage when detecting the webpage validity of the website, and determines the target website to be tracked; traversing all the webpages governed by the target website to obtain the access state of each webpage and a link jump path for accessing each webpage; and under the condition that the access state of the target website is abnormal, determining the abnormal type of the webpage with the abnormal access state based on the access state of each webpage and the link jump path for accessing each webpage. In the above solution, a website to be detected is determined first, and then all webpages under the website are traversed and accessed in a hierarchical order through a crawler technology, so as to determine whether all webpages under the website support the IPv6 technology, and an access process is recorded during access, for example: the webpage reaching D can be opened through the link jump paths of A-B-C-D, A-B-D and A-C-D, but the condition that the webpage D cannot be opened under the link jump path of A-B-D can be determined through the access state of each webpage and the link jump path of accessing each webpage, so that the working personnel can be helped to quickly locate the problem, and the effect of tracing the opening process of the problem webpage is achieved.
In one embodiment, the method further comprises:
when a target webpage is accessed based on a first link jump path and the access state of the target webpage is inaccessible, continuing to access the target webpage through other link jump paths;
and when a second link jump path exists to access a target webpage and the access state of the target webpage is normal access, determining that the abnormal type is jump path abnormality and the target webpage is displayed normally.
Illustratively, a first link jump path for accessing the D webpage is a-B-C-D, but the returned access state is that the D webpage cannot be accessed, and at this time, other link jump paths for accessing the D webpage are obtained, for example, paths such as a-B-D, a-C-D, and the like are passed through, if the target webpage can be normally accessed through other link jump paths, it is proved that the target webpage can be normally opened under other paths, and the problem is not the target webpage itself, and if the target webpage cannot be opened through other paths, it is proved that the reason why the target webpage cannot be opened is the reason of the webpage itself, so as to help a worker to definitely perform maintenance on the target webpage or perform maintenance on the link jump path reaching the target webpage, and the problem can be quickly located.
In one embodiment, the method further comprises:
acquiring a link type of a target webpage, wherein the link type comprises the following steps: website internal links, website external links and sub-domain name links;
and determining an access action to the target webpage based on the link type of the target webpage.
Illustratively, links in a website are generally divided into links inside the website, links outside the website and sub-domain links, wherein the links inside the website may be referred to as inner links for short, the links outside the website may be referred to as outer links for short, and the sub-domain links may be referred to as sub-chains for short. Interlinkage between content pages of an internal link under the same website domain name (the content of the website is linked to the internal page of the website, also called as an in-site link). The external link is an off-site link, namely, the link of the external website points to the your website, and all links which are linked to the your website from the outside of the website are called as the external link. The child chain is the next level of the top level domain name (first level domain name or parent domain name). For example: a, a home page in a shopping website comprises a plurality of links, wherein the links of ornaments, clothes, food and the like are internal links; wherein, the shopping website A also comprises a link for jumping to the recharging website B, and the website B is an external link. And C municipal administration network under administration in the B province government network can be regarded as the sub-chain. Determining different access actions for different link types may allow for a more efficient traversal of all web pages under the visited web site.
In one embodiment, the method further comprises:
in the case that the link type of the first target webpage is the internal link of the website, traversing and accessing all the webpages under the first target webpage,
in case that the link type of the second target webpage is the external link of the website, only the second target webpage is accessed,
under the condition that the link type of a third target webpage is the sub-domain name link, acquiring the record information of the third target webpage;
in case that the third target web page is recorded, only the third target web page is accessed,
and traversing and accessing all the web pages under the third target web page under the condition that the third target web page is not recorded.
Illustratively, if the link type of the target website is an internal link, normal traversal access needs to be performed on the internal link and other links under the internal link;
if the link type is an external link, only accessing the link and determining whether the external link can be normally opened, wherein other links under the jurisdiction of the external link belong to links of other websites and do not belong to the range of a target website, so that the other links under the jurisdiction of the external link are not accessed, and only the external link can be normally opened by detecting;
if the link type is a sub-chain, the record condition of the sub-chain needs to be acquired, if the record exists, the sub-chain is proved to be detected as an independent website, traversing access to other links under the sub-chain is not needed, only whether the sub-chain can be normally opened is accessed, but if the sub-chain is not recorded, the sub-chain is proved not to be traversed and accessed as an independent website, and traversing access to the sub-chain and all other links under the sub-chain is needed.
It should be noted that a website corresponds to a link, so the traversing web page and the traversing link have the same meaning.
In one embodiment, the method further comprises:
and determining a link architecture diagram of the target website based on link jump paths of all the webpages of the target website, wherein the link architecture diagram can reflect all the link jump paths which can access the target webpage.
Illustratively, while continuously traversing all the web pages of the target web site through the crawler technology, a link architecture diagram may be constructed by recording all the link jump paths, and the link architecture diagram may reflect all possible paths to a web page, for example: the link jump paths to the D webpage can be determined to be A-B-C-D, A-B-C, A-B-D and A-D through the link architecture diagram, so that the architecture of a target website can be clearly known by workers.
In one embodiment, the method further comprises:
detecting the legality of all link jump paths which can access the target webpage based on the link architecture diagram;
and under the condition that the illegal link jump path illegally entering the target webpage is detected, closing the illegal link jump path and sending alarm information to a user.
For example, based on the above link architecture diagram, it can be determined which paths should not access the target web page but successfully access the target web page, for example: the webpage D can be accessed only by the paths of A-B-C-D, A-B-C and A-B-D according to the regulations, but the webpage D can also be accessed by the link jump path of A-D found by the link architecture diagram crawled by the crawler, the link jump path of A-D is an illegal link jump path, the illegal link jump path is automatically closed at the moment, and the alarm information is sent to the staff, so that the illegal link jump path is quickly positioned, and the condition that the webpage is accessed by a user through a wrong entrance to cause disorder is prevented.
In one embodiment, the method further comprises:
acquiring an access state of accessing a target webpage through all link jump paths capable of accessing the target webpage and a target webpage level corresponding to each link jump path;
and merging and displaying the link jump paths with the same access state of the target webpage and the same corresponding target webpage hierarchy.
For example, if the access states of all the link jump paths for accessing the target web page are the same and the hierarchies are the same when the target web page is accessed, only the target web page is displayed to the staff to be normally accessed, for example: and D, accessing the target webpage by the link jump paths of the A-B-D and the A-C-D, wherein the target webpage can be accessed, combining and displaying the link jump paths of the A-B-D and the A-C-D, only displaying the successful access to a user, and checking the detailed condition by expanding buttons and the like when the user needs to clarify all the link jump paths. But if the access states are not the same, the display may not be merged, for example: in the link jump paths of the A-B-D and the A-C-D, the A-B-D accessing the D target webpage can be accessed, but the A-C-D accessing the D target webpage cannot be accessed, and the A-B-D accessing the D target webpage and the D target webpage cannot be merged and displayed at the moment. If the corresponding target web page hierarchies are different, the target web pages cannot be merged and displayed, for example: in the link jump paths of A-B-C-D, A-B-D and A-C-D, if the access states are all accessible, only A-B-D and A-C-D can be combined and displayed. The same applies in the case of no access. It should be noted that all data information is recorded, and only the data is de-duplicated in the statistical display, so that the data is convenient for the user to view without losing data.
Further, as an implementation of the method shown in fig. 1, an embodiment of the present invention further provides a device for tracking a link jump in an IPv6 network, which is used to implement the method shown in fig. 1. The embodiment of the apparatus corresponds to the embodiment of the method, and for convenience of reading, details in the embodiment of the apparatus are not described again one by one, but it should be clear that the apparatus in the embodiment can correspondingly implement all the contents in the embodiment of the method. As shown in fig. 2, the apparatus includes: a determination unit 21, an acquisition unit 22 and a second determination unit 23, wherein
A determining unit 21, configured to determine a target website to be tracked;
an obtaining unit 22, configured to traverse all web pages governed by the access target website to obtain an access state of each web page and a link jump path for accessing each web page;
a second determining unit 23, configured to determine, when the access state of the target website is abnormal, an abnormal type of the webpage with the abnormal access state based on the access state of each webpage and a link jump path for accessing each webpage.
Illustratively, the above units are also used for
Under the condition that a target webpage is accessed based on a first link jump path and the access state of the target webpage is inaccessible, continuing to access the target webpage through other link jump paths;
and when a second link jump path exists to access a target webpage and the access state of the target webpage is normal access, determining that the abnormal type is jump path abnormality and the target webpage is displayed normally.
Illustratively, the above units are also used for
Acquiring a link type of a target webpage, wherein the link type comprises: website internal links, website external links and sub-domain name links;
and determining an access action to the target webpage based on the link type of the target webpage.
Illustratively, the above units are also used for
In the case that the link type of the first target webpage is the internal link of the website, traversing and accessing all the webpages under the first target webpage,
in case that the link type of the second target webpage is the external link of the website, only the second target webpage is accessed,
under the condition that the link type of a third target webpage is the sub-domain name link, acquiring the record information of the third target webpage;
if the third target web page is recorded, only the third target web page is accessed,
and traversing and accessing all the web pages under the third target web page under the condition that the third target web page is not recorded.
Exemplarily, the above unit is also used for
And determining a link architecture diagram of the target website based on the link jump paths of all the webpages of the target website, wherein the link architecture diagram can reflect all the link jump paths which can access the target webpages.
Illustratively, the above units are also used for
Detecting the legality of all link jump paths which can access the target webpage based on the link architecture diagram;
and under the condition that the illegal link jump path illegally entering the target webpage is detected, closing the illegal link jump path and sending alarm information to a user.
Illustratively, the above units are also used for
Acquiring an access state of accessing a target webpage through all link jump paths capable of accessing the target webpage and a target webpage level corresponding to each link jump path;
and merging and displaying the link jump paths with the same access state of the target webpage and the same corresponding target webpage hierarchy.
By means of the technical scheme, the tracking device for link skipping under the IPv6 network provided by the invention can not trace the problem of the opening process of the problem webpage when detecting the webpage effectiveness of the website, and the target website to be tracked is determined; traversing all the webpages governed by the target website to obtain the access state of each webpage and a link jump path for accessing each webpage; and determining the abnormal type of the webpage with the abnormal access state based on the access state of each webpage and the link jump path for accessing each webpage when the access state of the target website is abnormal. In the above scheme, firstly, a website to be detected is determined, and then all webpages under the website are traversed and accessed in a hierarchical order by using a crawler technology, so as to determine whether all webpages under the website support the IPv6 technology, and an access process is recorded during access, for example: the webpage arriving at D can be through the link jump paths of A-B-C-D, A-B-D and A-C-D, but the fact that the webpage D cannot be opened under the link jump path of A-B-D can be determined through the link jump path based on the access state of each webpage and the link jump path for accessing each webpage, so that workers are helped, problems are quickly located, and the effect of tracing the opening process of the problem webpage is achieved.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more than one, the tracking method for link skip under the IPv6 network is realized by adjusting kernel parameters, and the problem that the opening process of a problem webpage cannot be traced when the webpage effectiveness of a website is detected can be solved.
An embodiment of the present invention provides a computer-readable storage medium, where the computer-readable storage medium includes a stored program, and the program, when executed by a processor, implements the method for tracking link hopping in an IPv6 network.
The embodiment of the invention provides a processor, wherein the processor is used for running a program, and the program executes the tracing method of the link jump under the IPv6 network when running.
The embodiment of the invention provides electronic equipment, which comprises at least one processor and at least one memory connected with the processor; the processor is used for calling the program instruction in the memory and executing the tracing method of the link jump under the IPv6 network
An embodiment of the present invention provides an electronic device 30, as shown in fig. 3, the electronic device includes at least one processor 301, at least one memory 302 connected to the processor, and a bus 303; wherein, the processor 301 and the memory 302 complete the communication with each other through the bus 303; the processor 301 is configured to call program instructions in the memory to execute the above-mentioned tracking method of link jump in the IPv6 network.
The intelligent electronic device herein may be a PC, PAD, mobile phone, etc.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a flow management electronic device:
determining a target website to be tracked;
traversing all the webpages governed by the target website to obtain the access state of each webpage and a link jump path for accessing each webpage;
and under the condition that the access state of the target website is abnormal, determining the abnormal type of the webpage with the abnormal access state based on the access state of each webpage and the link jump path for accessing each webpage.
Further, the method further comprises:
under the condition that a target webpage is accessed based on a first link jump path and the access state of the target webpage is inaccessible, continuing to access the target webpage through other link jump paths;
and determining that the exception type is the jump path exception and the target webpage is normally displayed under the condition that the target webpage is accessed by a second link jump path and the access state of the target webpage is normal access.
Further, the method further comprises:
acquiring a link type of a target webpage, wherein the link type comprises: website internal links, website external links and sub-domain name links;
and determining an access action to the target webpage based on the link type of the target webpage.
Further, the method further comprises:
in the case that the link type of the first target webpage is the internal link of the website, traversing and accessing all webpages under the first target webpage,
in case that the link type of the second target webpage is the external link of the website, only the second target webpage is accessed,
under the condition that the link type of a third target webpage is the sub domain name link, acquiring the record information of the third target webpage;
in case that the third target web page is recorded, only the third target web page is accessed,
and traversing and accessing all the web pages under the third target web page under the condition that the third target web page is not recorded.
Further, the method further comprises:
and determining a link architecture diagram of the target website based on the link jump paths of all the webpages of the target website, wherein the link architecture diagram can reflect all the link jump paths which can access the target webpages.
Further, the method further comprises:
detecting the legality of all link jump paths which can access the target webpage based on the link architecture diagram;
and under the condition that the illegal link jump path illegally entering the target webpage is detected, closing the illegal link jump path and sending alarm information to a user.
Further, the method further comprises:
acquiring an access state of accessing a target webpage through all link jump paths capable of accessing the target webpage and a target webpage hierarchy corresponding to each link jump path;
and merging and displaying the link jump paths with the same access state of the target webpage and the same corresponding target webpage hierarchy.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, electronic devices (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor or other programmable flow management electronic device to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable flow management electronic device, create means for implementing the functions specified in the flow diagram flow or flows and/or block diagram block or blocks.
In a typical configuration, an electronic device includes one or more processors (CPUs), memory, and a bus. The electronic device may also include input/output interfaces, network interfaces, and the like.
The memory may include volatile memory in a computer readable medium, random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip. The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer-readable storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage electronic devices, or any other non-transmission medium, that can be used to store information that can be accessed by computing electronic devices. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or electronic device that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or electronic device. Without further limitation, the element defined by the phrases "comprising one of 8230 \8230;" does not exclude the presence of additional like elements in the process, method, article, or electronic device in which the element is comprised.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable computer-readable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art to which the present application pertains. Any modification, equivalent replacement, improvement or the like made within the spirit and principle of the present application shall be included in the scope of the claims of the present application.

Claims (10)

1. A method for tracking link jump under an IPv6 network is characterized by comprising the following steps:
determining a target website to be tracked;
traversing all the webpages governed by the target website to obtain the access state of each webpage and a link jump path for accessing each webpage;
and under the condition that the access state of the target website is abnormal, determining the abnormal type of the webpage with the abnormal access state based on the access state of each webpage and the link jump path for accessing each webpage.
2. The method of claim 1, further comprising:
under the condition that a target webpage is accessed based on a first link jump path and the access state of the target webpage is inaccessible, continuing to access the target webpage through other link jump paths;
and when a second link jump path exists to access a target webpage and the access state of the target webpage is normal access, determining that the abnormal type is the jump path abnormality and the target webpage is displayed normally.
3. The method of claim 1, further comprising:
acquiring a link type of a target webpage, wherein the link type comprises: website internal links, website external links and sub-domain name links;
determining an access action to the target web page based on the link type of the target web page.
4. The method of claim 3, wherein the determining an access action for the target web page based on the link type of the target web page comprises:
in the case that the link type of the first target webpage is the internal link of the website, traversing and accessing all the webpages under the first target webpage,
accessing only the second target webpage in case that the link type of the second target webpage is a link external to the website,
under the condition that the link type of a third target webpage is the sub-domain name link, acquiring the record information of the third target webpage;
in the case that the third target webpage is filed, only the third target webpage is accessed,
and traversing and accessing all the webpages under the third target webpage under the condition that the third target webpage is not recorded.
5. The method of claim 1, further comprising:
determining a link architecture diagram of the target website based on link jump paths of all webpages of the target website, wherein the link architecture diagram can reflect all link jump paths which can access the target webpage.
6. The method of claim 5, further comprising:
detecting the legality of all link jump paths which can access the target webpage based on the link architecture diagram;
and under the condition that the illegal link jump path illegally entering the target webpage is detected, closing the illegal link jump path and sending alarm information to a user.
7. The method of claim 1, further comprising:
acquiring an access state of accessing a target webpage through all link jump paths capable of accessing the target webpage and a target webpage hierarchy corresponding to each link jump path;
and merging and displaying the link jump paths with the same access state of the target webpage and the same corresponding target webpage hierarchy.
8. A tracking device for link jump under IPv6 network is characterized in that,
the determining unit is used for determining a target website to be tracked;
the acquisition unit is used for traversing and accessing all the webpages governed by the target website to acquire the access state of each webpage and a link jump path for accessing each webpage;
and the second determining unit is used for determining the abnormal type of the webpage with the abnormal access state based on the access state of each webpage and the link jump path for accessing each webpage when the access state of the target website is abnormal.
9. A computer-readable storage medium, characterized in that the computer-readable storage medium comprises a stored program, wherein the program, when executed by a processor, implements the steps of the method for tracing link down jump in an IPv6 network according to any one of claims 1 to 7.
10. An electronic device, comprising at least one processor, and at least one memory coupled to the processor; wherein the processor is configured to call program instructions in the memory to perform the steps of the tracking method for link jump under IPv6 network according to any one of claims 1 to 7.
CN202210917070.8A 2022-08-01 2022-08-01 Method for tracking link jump under IPv6 network and related equipment Pending CN115269953A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210917070.8A CN115269953A (en) 2022-08-01 2022-08-01 Method for tracking link jump under IPv6 network and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210917070.8A CN115269953A (en) 2022-08-01 2022-08-01 Method for tracking link jump under IPv6 network and related equipment

Publications (1)

Publication Number Publication Date
CN115269953A true CN115269953A (en) 2022-11-01

Family

ID=83746774

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210917070.8A Pending CN115269953A (en) 2022-08-01 2022-08-01 Method for tracking link jump under IPv6 network and related equipment

Country Status (1)

Country Link
CN (1) CN115269953A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160234330A1 (en) * 2015-02-11 2016-08-11 Go Daddy Operating Company, LLC System and method for mobile application deep linking
CN107423329A (en) * 2017-04-14 2017-12-01 百度在线网络技术(北京)有限公司 Information acquisition method and device
CN109040073A (en) * 2018-08-07 2018-12-18 北京神州绿盟信息安全科技股份有限公司 A kind of detection method, device, medium and the equipment of the access of WWW abnormal behaviour
CN109495325A (en) * 2018-12-26 2019-03-19 睿哲科技股份有限公司 Website IPv6 support appraisal procedure, device and equipment
CN109510738A (en) * 2018-12-14 2019-03-22 平安壹钱包电子商务有限公司 A kind of test method and equipment of communication link
CN110752952A (en) * 2019-10-25 2020-02-04 腾讯科技(深圳)有限公司 Network fault positioning method and device, network equipment and computer storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160234330A1 (en) * 2015-02-11 2016-08-11 Go Daddy Operating Company, LLC System and method for mobile application deep linking
CN107423329A (en) * 2017-04-14 2017-12-01 百度在线网络技术(北京)有限公司 Information acquisition method and device
CN109040073A (en) * 2018-08-07 2018-12-18 北京神州绿盟信息安全科技股份有限公司 A kind of detection method, device, medium and the equipment of the access of WWW abnormal behaviour
CN109510738A (en) * 2018-12-14 2019-03-22 平安壹钱包电子商务有限公司 A kind of test method and equipment of communication link
CN109495325A (en) * 2018-12-26 2019-03-19 睿哲科技股份有限公司 Website IPv6 support appraisal procedure, device and equipment
CN110752952A (en) * 2019-10-25 2020-02-04 腾讯科技(深圳)有限公司 Network fault positioning method and device, network equipment and computer storage medium

Similar Documents

Publication Publication Date Title
CN105550184B (en) A kind of information acquisition method and device
CN105184166A (en) Kernel-based Android application real-time behavior analysis method and system
CN109040073A (en) A kind of detection method, device, medium and the equipment of the access of WWW abnormal behaviour
CN110020339B (en) Webpage data acquisition method and device based on non-buried point
CN108363657A (en) Monitoring APP clients bury method, equipment and the medium of point data acquisition integrality
CN108134812B (en) Data processing method and device
CN105589805A (en) Method and device for generating code coverage rate report
CN111898059A (en) Website page quality evaluation and monitoring method and system
CN104572431A (en) Test method and test device
CN110955846A (en) Propagation path diagram generation method and device
CN109600272A (en) The method and device of crawler detection
CN105227532B (en) A kind of blocking-up method and device of malicious act
CN103618761B (en) Method and browser for processing cookie information
CN117234916A (en) Workflow application testing method and device, electronic equipment and storage medium
CN115269953A (en) Method for tracking link jump under IPv6 network and related equipment
CN111241547B (en) Method, device and system for detecting override vulnerability
US20180137275A1 (en) Malware collusion detection
CN105701124A (en) Method and apparatus for providing prompt information
US20190251130A1 (en) Method and apparatus for detecting page redirection circulation
US9442823B2 (en) Memory error tracking in a multiple-user development environment
CN110708270B (en) Abnormal link detection method and device
CN108108258B (en) Memory leak repairing method and device
CN114443337A (en) JS-based log analysis method and device, electronic equipment and media
CN115361178A (en) Privacy authority management method and device based on IOS (input/output system)
CN106610833B (en) Method and device for triggering overlapped HTML element mouse event

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination