CN115879103A - Host file filtering method and system for sensitive scanning - Google Patents

Host file filtering method and system for sensitive scanning Download PDF

Info

Publication number
CN115879103A
CN115879103A CN202211548793.1A CN202211548793A CN115879103A CN 115879103 A CN115879103 A CN 115879103A CN 202211548793 A CN202211548793 A CN 202211548793A CN 115879103 A CN115879103 A CN 115879103A
Authority
CN
China
Prior art keywords
host file
file
host
information
identification table
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211548793.1A
Other languages
Chinese (zh)
Inventor
刁培金
王湛
赵宾
周佟
赵翠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Citic Bank Corp Ltd
Original Assignee
China Citic Bank Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Citic Bank Corp Ltd filed Critical China Citic Bank Corp Ltd
Priority to CN202211548793.1A priority Critical patent/CN115879103A/en
Publication of CN115879103A publication Critical patent/CN115879103A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention relates to a host file filtering method and a host file filtering system for sensitive scanning, which are characterized in that a package manager is used for obtaining host file information to generate a corresponding first identification table, matching meta information is used for scanning all files in a preset range, all file information conforming to the matching meta information is gathered to generate a corresponding second identification table, a system file is accurately obtained through a package manager, other files are analyzed and matched based on a file attribute analysis model, program files which are not installed through the package manager are identified, the accuracy of system file filtering is greatly improved, and the efficiency of file sensitive scanning is correspondingly improved.

Description

Host file filtering method and system for sensitive scanning
Technical Field
The invention relates to the technical field of data identification and data security, in particular to a host file filtering method and system for sensitive scanning.
Background
The data identification and the data combing are used as the basis of data security and are the precondition for data security protection, data use guarantee and data sharing security. Files, a common data carrying medium, have a great weight in data storage, and for management, the files are usually stored centrally on a file host. In the face of huge file data, how to carry out efficient scanning identification is a technical key. Analysis reveals that there are a significant number of system files in the file host that are not business related and typically do not contain sensitive data. Therefore, if the system file can be filtered before the scanning and identification of the file host are carried out, a large amount of identification capacity resources can be released, and the scanning and identification efficiency of the file host is greatly improved.
Currently, there are two main common schemes for filtering system files:
1. based on the file type filtering, the determination is made primarily by identifying the file suffix format. For example, in the Linux operating system, the file of the conf suffix usually represents the configuration file, the file of the o suffix usually represents the program file, etc., which are all system files that need to be filtered;
2. and filtering through the directory where the file is located. Usually, system files all exist under some specific directories. For example, the "/bin" directory primarily stores "binary executables" necessary for the user and system, the "/lib" directory primarily stores a dynamic library of binary executables, the "/etc" directory primarily stores system configuration files, and so on. Files under these directories can be filtered out as system files in general.
In the prior art, the methods for filtering the system files belong to a method for judging by means of common sense and experience in fact, the judgment accuracy is low, and the system files are easy to cheat. For example, with respect to the above common method 1, a user file with a suffix name cannot be identified, which may cause service data to be filtered, and system files of different software have different standards, and the suffix name identification library of a system file is difficult to maintain, which may cause incomplete filtering of the system file, thereby failing to achieve an expected target. For the common method 2, the user files stored in the system folder cannot be avoided, and the directory library of the system folder is difficult to maintain.
Disclosure of Invention
In order to overcome the defects of the prior art, the invention provides a host file filtering method and system for sensitive scanning.
In order to achieve the above purpose, the technical scheme adopted by the invention comprises the following steps:
a host file filtering method for sensitive scanning is characterized by comprising the following steps:
s1, obtaining host file information by using a packet manager command, and generating a corresponding first identification table;
s2, extracting matching meta-information by using the acquired host file information;
s3, scanning all files in a preset range by using the matching meta information, summarizing all file information conforming to the matching meta information, and generating a corresponding second identification table;
and S4, filtering the file to be scanned by using the first identification table and the second identification table when sensitive scanning is executed.
Further, the step S1 includes the sub-steps of:
s11, executing a packet manager command to inquire all directories and files corresponding to the host operating system program;
s12, filtering all directories corresponding to the host operating system program to acquire host file information;
and S13, extracting absolute paths corresponding to the host files contained in the host file information, and generating a corresponding first identification table.
Further, the host file information at least includes an absolute path, an owner, a group to which the host file belongs, and a latest modification timestamp corresponding to each host file.
Further, the step S2 includes the sub-steps of:
s21, obtaining an approximate time threshold value of the host file by using cluster analysis of the latest modified timestamp corresponding to each host file;
s22, counting owners corresponding to the host files to obtain a host file owner list;
s23, counting the corresponding group of each host file to obtain a group list of the host file;
and S24, generating matching meta information by using the host file approximate time threshold, the host file owner list and the host file group list, wherein the matching condition of the matching meta information comprises that the file modification time is not greater than the host file approximate time threshold, and the file owner and the belonging group respectively meet the host file owner list and the host file belonging group.
Further, the substep S21 comprises the substeps of:
s211, setting a positive integer K by taking the latest modification timestamp corresponding to each host file as a sample, and randomly selecting K samples as cluster centers;
s212, respectively calculating the Euclidean distance from each sample to the center of each cluster, and classifying the samples into the cluster represented by the center of the cluster with the shortest Euclidean distance;
s213, calculating the average value of each cluster as a new cluster center;
s214, repeatedly executing the substeps S212 and S213 until the center of the cluster is unchanged or the repeated execution times reach a preset upper limit;
s215, setting the cluster center of the cluster containing the most samples as the approximate time threshold value of the host file.
Further, all files in the preset range include files corresponding to the acquired host file information, or all files in the preset range do not include files corresponding to the acquired host file information.
The invention also relates to a host file filtering system for sensitive scanning, which is characterized by comprising:
the first identification module is used for acquiring host file information by using a packet manager command and generating a corresponding first identification table;
the matching module is used for extracting matching meta-information by using the acquired host file information;
the second identification module is used for scanning all files in a preset range by using the matching meta information, summarizing all file information conforming to the matching meta information and generating a corresponding second identification table;
and the sensitive scanning unit is used for filtering the file to be scanned by using the first identification table and the second identification table.
The invention also relates to a computer-readable storage medium, characterized in that a computer program is stored on the storage medium, which computer program, when executed by a processor, implements the method described above.
The invention also relates to an electronic device, which is characterized by comprising a processor and a memory;
the memory is used for storing a first identification table and a second identification table;
the processor is used for executing the method by calling the first identification table and the second identification table.
The invention also relates to a computer program product comprising a computer program and/or instructions, characterized in that the computer program and/or instructions, when executed by a processor, implement the steps of the above-mentioned method.
The beneficial effects of the invention are as follows:
by adopting the host file filtering method and the host file filtering system for sensitive scanning, a system file list is obtained by executing commands such as a program package manager and the like; the method is simple, efficient and high in flexibility, the obtained system file list is very accurate compared with artificial judgment, and the system files installed through the package manager can be effectively identified; the metadata of the known system files is inquired through an ls or stat command and the like, the system files are judged by using the three attributes of the latest modification time, the owner and the affiliated group in the metadata, the system files which are not installed by the package manager can be identified, and the identification result is accurate based on a statistical analysis algorithm. The method depends on the execution of the command of the program package manager and the command of viewing the file meta-information, but not on common knowledge or experience, and has the characteristics of accurate, efficient and wide applicability of filtering system files, so that the file sensitive scanning efficiency is greatly improved.
Drawings
FIG. 1 is a flowchart illustrating a host file filtering method for sensitive scanning according to the present invention.
FIG. 2 is a schematic diagram of a host file filtering system for sensitive scanning according to the present invention.
Detailed Description
For a clearer understanding of the contents of the present invention, reference will be made to the accompanying drawings and examples.
The first aspect of the present invention relates to a host file filtering method for sensitive scanning, which has the steps of flow chart shown in fig. 1, and comprises the following steps:
s1, obtaining host file information by using a package manager command, and generating a corresponding first identification table. The host file information at least comprises an absolute path, an owner, a group to which the host file belongs and a latest modification timestamp corresponding to each host file.
Specifically, the sub-step S11 may be preferably executed, and the packet manager executes the command to query all directories and files corresponding to the host operating system program; s12, filtering all directories corresponding to the host operating system program to acquire host file information; and S13, extracting absolute paths corresponding to the host files contained in the host file information, and generating a corresponding first identification table.
In the Linux system, a package manager is responsible for program management, such as query, installation, uninstallation, and the like, and no matter the system is initially installed or the application program is installed in a subsequent use process, corresponding records are necessarily left for system host files operated by the package manager. Although the packet managers used by Linux systems of different pedigree versions may be different (e.g., debian uses dpkg, redbatch uses rpm, and Arch uses pacman), these basic packet managers provide the functions of listing installed packages and listing files contained in specified packages (e.g., dpkg can use dpkg-L to query installed packages, and dpkg-L [ package ] can query files in specified packages). The two commands are combined with a sensitive scanning unit, so that the host file can be accurately identified
For some common Linux operating systems, similar to a common file command of vim, many system files, such as/usr/share/vim/vim 80/syntax/yacc.vim,/usr/share/vim/vim 80/syntax/yaml.vim, are generated after installation, and are neither in a common system file directory nor in a common system file suffix, which is not easily perceived by human judgment. The method of the invention can simply and conveniently identify the host files accurately through the package manager.
And S2, extracting matching meta information by using the acquired host file information.
Specifically, the sub-step S21 may be preferentially executed, and the host file approximate time threshold is obtained by using the latest modification timestamp cluster analysis corresponding to each host file; s22, counting owners corresponding to the host files to obtain a host file owner list; s23, counting the corresponding group of each host file to obtain a group list of the host file; and S24, generating matching meta information by using the host file approximate time threshold, the host file owner list and the host file group list, wherein the matching condition of the matching meta information comprises that the file modification time is not greater than the host file approximate time threshold, and the file owner and the belonging group respectively meet the host file owner list and the host file belonging group.
The cluster analysis of the latest modification timestamp may specifically perform substep S211, using the latest modification timestamp corresponding to each host file as a sample, setting a positive integer K, and randomly selecting K samples as cluster centers; s212, respectively calculating the Euclidean distance from each sample to the center of each cluster, and classifying the samples into the cluster represented by the center of the cluster with the shortest Euclidean distance; s213, calculating the average value of each cluster as a new cluster center; s214, repeatedly executing the substeps S212 and S213 until the center of the cluster is unchanged or the repeated execution times reach a preset upper limit; s215, setting the cluster center of the cluster containing the most samples as the approximate time threshold of the host file.
In the Linux system, the ls or stat command can be used to view the meta information of the file, including the name, size, owner, belonging group, read-write execution authority, timestamp (atime, mtime, ctime) and other attributes of the file. (where three timestamps atime is the latest access time, mtime is the latest content modification time, and ctime is the latest attribute modification time.) of these attributes, the three attribute information of the owner, the group to which the file belongs, and the latest modification timestamp (mtime) can be used to determine whether the host file exists.
And S3, scanning all files in a preset range by using the matching meta information, summarizing all file information conforming to the matching meta information, and generating a corresponding second identification table.
Preferably, all files in the preset range may or may not include files corresponding to the acquired host file information. When the file corresponding to the acquired host file information is selected, the theoretically generated content of the second identification table should completely contain the first identification table, so that the second identification table can be selected to be adopted for file filtering according to actual scanning requirements, and the second identification table and the first identification table can also be selected to be respectively used for filtering to ensure the screening accuracy. When the file corresponding to the acquired host file information is not included in the selection, the workload of scanning the matching meta information can be reduced, the generation efficiency of the second identification table is improved, and the first identification table and the second identification table are used at the same time when the file to be scanned is filtered to ensure the screening integrity.
In the Linux system, there are some software programs that can be directly used without being installed through a package manager, such as a zip decompression program, and such programs are usually already present in the system at the initial stage of system installation, and can be generally determined as system host files by comparing and analyzing information such as the latest access time of the program files. Therefore, by adopting the method of the invention, the host file is judged by utilizing the three attributes of the latest modification time, the owner and the group to which the owner belongs in the meta-information; and performing cluster analysis on the latest modification time to obtain an approximate time threshold generated by the host file, collecting meta information of the file to be scanned, and judging the file to be scanned, of which the latest modification time is less than the time threshold and the owner and the group of which are the same as the known host file, as the host file.
And S4, filtering the file to be scanned by using the first identification table and the second identification table when sensitive scanning is executed.
The steps of the method can be packaged into an independent software module through a program, and the method is equivalent to a single filtering unit in the application scene of sensitive scanning. Preferably, a plurality of different commands can be connected together to be executed by using a Linux pipeline, the method is simple, efficient and high in flexibility, and the obtained system host file list is more accurate than artificial judgment.
Another aspect of the present invention relates to a host file filtering system for sensitive scanning, which has a structure as shown in fig. 2, and includes:
the first identification module is used for acquiring host file information by using a packet manager command and generating a corresponding first identification table;
the matching module is used for extracting matching meta information by using the acquired host file information;
the second identification module is used for scanning all files in a preset range by using the matching meta information, summarizing all file information conforming to the matching meta information and generating a corresponding second identification table;
and the sensitive scanning unit is used for filtering the file to be scanned by using the first identification table and the second identification table.
By using this system, the above-described arithmetic processing method can be executed, and a corresponding technical effect can be achieved.
Embodiments of the present invention also provide a computer-readable storage medium capable of implementing all the steps of the method in the above embodiments, the computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements all the steps of the method in the above embodiments.
Embodiments of the present invention also provide an electronic device for executing the method, as an implementation apparatus of the method, the electronic device at least includes a processor and a memory, in particular, the memory stores data required for executing the method and related computer programs, such as a first identification table and a second identification table, and the processor calls the data in the memory and the programs to execute all steps of implementing the method, and obtains corresponding technical effects.
Preferably, the electronic device may comprise a bus architecture, which may include any number of interconnected buses and bridges that link together various circuits, including one or more processors and memory. The bus may also link various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the receiver and transmitter. The receiver and transmitter may be the same element, i.e., a transceiver, providing a means for communicating with various other systems over a transmission medium. The processor is responsible for managing the bus and general processing, while the memory may be used for storing data used by the processor in performing operations.
Additionally, the electronic device may further include a communication module, an input unit, an audio processor, a display, a power source, and the like. The processor (or controller, operational controls) employed may include a microprocessor or other processor device and/or logic device that receives input and controls the operation of various components of the electronic device; the memory may be one or more of a buffer, a flash memory, a hard drive, a removable medium, a volatile memory, a non-volatile memory or other suitable devices, and may store the above related data information, and may further store a program for executing the related information, and the processor may execute the program stored in the memory to realize information storage or processing, etc.; the input unit is used for providing input to the processor, and can be a key or a touch input device; the power supply is used for supplying power to the electronic equipment; the display is used for displaying display objects such as images and characters, and may be an LCD display, for example. The communication module is a transmitter/receiver that transmits and receives signals via an antenna. The communication module (transmitter/receiver) is coupled to the processor to provide an input signal and receive an output signal, which may be the same as in the case of a conventional mobile communication terminal. Based on different communication technologies, a plurality of communication modules, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be disposed in the same electronic device. The communication module (transmitter/receiver) is also coupled to a speaker and a microphone via an audio processor to provide audio output via the speaker and receive audio input from the microphone to implement the usual telecommunication functions. The audio processor may include any suitable buffers, decoders, amplifiers and so forth. In addition, the audio processor is also coupled to the central processor, so that recording on the local machine can be performed through the microphone, and sound stored on the local machine can be played through the loudspeaker.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create a system for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including an instruction system which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are also within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. A host file filtering method for sensitive scanning is characterized by comprising the following steps:
s1, obtaining host file information by using a package manager command, and generating a corresponding first identification table;
s2, extracting matching meta-information by using the acquired host file information;
s3, scanning all files in a preset range by using the matching meta information, summarizing all file information conforming to the matching meta information, and generating a corresponding second identification table;
and S4, filtering the file to be scanned by using the first identification table and the second identification table when sensitive scanning is executed.
2. The method according to claim 1, characterized in that said step S1 comprises the sub-steps of:
s11, executing a packet manager command to inquire all directories and files corresponding to the host operating system program;
s12, filtering all directories corresponding to the host operating system program to acquire host file information;
and S13, extracting the absolute path corresponding to each host file contained in the host file information, and generating a corresponding first identification table.
3. The method of claim 1, wherein the host file information includes at least an absolute path, owner, group, and last modified timestamp for each host file.
4. A method according to claim 3, characterised in that said step S2 comprises the sub-steps of:
s21, obtaining an approximate time threshold of the host file by using cluster analysis of the latest modification timestamp corresponding to each host file;
s22, counting owners corresponding to the host files to obtain a host file owner list;
s23, counting the corresponding group of each host file to obtain a group list of the host file;
and S24, generating matching meta information by using the host file approximate time threshold, the host file owner list and the host file belonging group list, wherein the matching condition of the matching meta information comprises that the file modification time is not more than the host file approximate time threshold, and the file owner and the belonging group respectively meet the host file owner list and the host file belonging group.
5. The method according to claim 4, characterized in that said substep S21 comprises the substeps of:
s211, setting a positive integer K by taking the latest modification timestamp corresponding to each host file as a sample, and randomly selecting K samples as cluster centers;
s212, respectively calculating the Euclidean distance from each sample to the center of each cluster, and classifying the samples into the cluster represented by the center of the cluster with the shortest Euclidean distance;
s213, calculating the average value of each cluster as a new cluster center;
s214, repeatedly executing the substeps S212 and S213 until the cluster center is unchanged or the repeated execution times reach a preset upper limit;
s215, setting the cluster center of the cluster containing the most samples as the approximate time threshold of the host file.
6. The method according to claim 1, wherein all files in the preset range include files corresponding to the acquired host file information, or all files in the preset range do not include files corresponding to the acquired host file information.
7. A host file filtering system for sensitive scanning, comprising:
the first identification module is used for acquiring host file information by using a packet manager command and generating a corresponding first identification table;
the matching module is used for extracting matching meta-information by using the acquired host file information;
the second identification module is used for scanning all files in a preset range by using the matching meta information, summarizing all file information conforming to the matching meta information and generating a corresponding second identification table;
and the sensitive scanning unit is used for filtering the file to be scanned by using the first identification table and the second identification table.
8. A computer-readable storage medium, characterized in that a computer program is stored on the storage medium, which computer program, when being executed by a processor, carries out the method of any one of claims 1 to 6.
9. An electronic device comprising a processor and a memory;
the memory is used for storing a first identification table and a second identification table;
the processor, configured to execute the method of any one of claims 1 to 6 by calling the first identification table and the second identification table.
10. A computer program product comprising a computer program and/or instructions, characterized in that the computer program and/or instructions, when executed by a processor, implement the steps of the method of any one of claims 1 to 6.
CN202211548793.1A 2022-12-05 2022-12-05 Host file filtering method and system for sensitive scanning Pending CN115879103A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211548793.1A CN115879103A (en) 2022-12-05 2022-12-05 Host file filtering method and system for sensitive scanning

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211548793.1A CN115879103A (en) 2022-12-05 2022-12-05 Host file filtering method and system for sensitive scanning

Publications (1)

Publication Number Publication Date
CN115879103A true CN115879103A (en) 2023-03-31

Family

ID=85765871

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211548793.1A Pending CN115879103A (en) 2022-12-05 2022-12-05 Host file filtering method and system for sensitive scanning

Country Status (1)

Country Link
CN (1) CN115879103A (en)

Similar Documents

Publication Publication Date Title
US7415489B2 (en) Managing an archived file system
CN110162345B (en) Application program access method and device and storage medium
US8949799B2 (en) Program log record optimization
CN110569298B (en) Data docking and visualization method and system
CN105763602A (en) Data request processing method, server and cloud interactive system
CN112799925A (en) Data acquisition method and device, electronic equipment and readable storage medium
CN110825694A (en) Data processing method, device, equipment and storage medium
CN111190962A (en) File synchronization method and device and local terminal
CN113485999A (en) Data cleaning method and device and server
CN113282555A (en) Data processing method, device, equipment and storage medium
CN113190401A (en) Fast game abnormity monitoring method, electronic equipment, mobile terminal and storage medium
CN114021176B (en) SELinux dynamic authorization method and system
CN115981563A (en) Method and system for storing traffic image information
CN115391356A (en) Data processing method, device, equipment, medium and computer program product
WO2021226822A1 (en) Log write method and apparatus, electronic device, and storage medium
CN107544894B (en) Log processing method and device and server
CN115098297B (en) Consistent snapshot generation method and system for cloud primary storage data volume
CN108616603B (en) Method and system for synchronizing internal and external network data
CN115879103A (en) Host file filtering method and system for sensitive scanning
CN113709059B (en) Link traffic recording method and node
CN112783789B (en) Adaptation test method, device and computer readable storage medium
CN115171633A (en) Mixing processing method, computer device and computer program product
CN114996134A (en) Containerized deployment method, electronic equipment and storage medium
CN113505076A (en) File coverage detection method and device
CN113721940A (en) Software deployment method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination