CN117098130A - Base station security management method, base station security management device, electronic equipment and computer program product - Google Patents

Base station security management method, base station security management device, electronic equipment and computer program product Download PDF

Info

Publication number
CN117098130A
CN117098130A CN202210533399.4A CN202210533399A CN117098130A CN 117098130 A CN117098130 A CN 117098130A CN 202210533399 A CN202210533399 A CN 202210533399A CN 117098130 A CN117098130 A CN 117098130A
Authority
CN
China
Prior art keywords
base station
data
alarm
item
early warning
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210533399.4A
Other languages
Chinese (zh)
Inventor
吴育晟
苏轶群
文涛
郭靖
李景枫
王宝莹
王冬虎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Communications Group Co Ltd
China Mobile Group Guangdong Co Ltd
Original Assignee
China Mobile Communications Group Co Ltd
China Mobile Group Guangdong Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Communications Group Co Ltd, China Mobile Group Guangdong Co Ltd filed Critical China Mobile Communications Group Co Ltd
Priority to CN202210533399.4A priority Critical patent/CN117098130A/en
Publication of CN117098130A publication Critical patent/CN117098130A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/08Access security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0631Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/147Network analysis or design for predicting network behaviour

Abstract

The application relates to the field of wireless communication security, and provides a base station security management method, a base station security management device, electronic equipment and a computer program product. The method comprises the following steps: based on the base station historical data, constructing a tree structure, and acquiring the association relation between the base station historical data and an event item or an alarm item; based on the historical data of the base station, at least one pre-warning rule is constructed by utilizing at least one prediction model, and the at least one prediction model corresponds to the at least one pre-warning rule one by one; under the condition of base station data ordering based on matrix acquisition, after matching the incidence relation between the base station acquisition data and the event item or the alarm item, outputting the matched event item or the alarm item; under the condition of sequencing based on the base station data collected in a collecting mode, after the early warning rule is matched, the matched early warning items are output. The application can solve the technical problems of slow time efficiency of data acquisition and positioning and incapability of alarming and early warning in time in the prior art, and realize automatic judgment and automatic confirmation prediction without manual intervention.

Description

Base station security management method, base station security management device, electronic equipment and computer program product
Technical Field
The present application relates to the field of wireless communication security technologies, and in particular, to a base station security management method, apparatus, electronic device, and computer program product.
Background
At present, in base station safety control, various data are mainly collected by using a sensor in a collection module, based on the collected data, the state of a signal line from the scene to the module is detected by a safety module, whether short circuit or short circuit exists is detected, fingerprint data and face data are stored by a control system, finally a model is formed, the data input to the model is determined, if the model is incorrect, unlocking cannot be performed until a certain correct standard is reached, for example, fingerprint identification meets at least ninety percent of standards of a fingerprint database, or face identification exceeds a certain characteristic set value of a face database.
In the prior art, a specific library cannot be quickly and accurately positioned when data are acquired, and the problems of delay and low efficiency exist; meanwhile, once the alarm is triggered, the security module can not timely obtain evidence, record and alarm, and the security of the subsequent base station is evaluated by using the existing effective information.
Disclosure of Invention
The embodiment of the application provides a base station safety management method, a base station safety management device, electronic equipment and a computer program product, which are used for solving the technical problems that the time of data acquisition and positioning is slow, and the alarm and early warning cannot be timely performed in the prior art, and realizing automatic judgment and automatic confirmation prediction without manual intervention.
In a first aspect, an embodiment of the present application provides a base station security management method, including:
based on the base station historical data, constructing a tree structure, and acquiring the association relation between the base station historical data and an event item or an alarm item;
constructing at least one early warning rule by utilizing at least one prediction model based on base station historical data, wherein the at least one prediction model corresponds to the at least one early warning rule one by one;
under the condition of sequencing base station data based on matrix acquisition, after matching the association relation between the base station acquisition data and event items or alarm items, outputting the matched event items or alarm items;
under the condition of sequencing based on the base station data collected in a collecting mode, after the early warning rule is matched, the matched early warning items are output.
In one embodiment, according to the base station security management method provided by the present application, the building a tree structure based on base station history data and using the base station history data to obtain an association relationship between the base station acquisition data and an event item or an alarm item includes:
sequencing according to the occurrence times of the historical data of each base station;
and constructing an FP-tree structure according to the ordering of the base station historical data, and utilizing the output frequent items to realize the association relation between each frequent item and the event item or the alarm item.
In one embodiment, according to the base station security management method provided by the present application, in the case of ordering base station data based on matrix acquisition, after matching the association relationship between the base station acquisition data and an event item or an alarm item, outputting the matched event item or alarm item, including:
collecting the base station data, and constructing an event matrix or an alarm matrix according to the occurrence times of the base station data, wherein the event matrix comprises the corresponding relation among the event data, the event time and the occurrence times of the event items, and the alarm matrix comprises the corresponding relation among the alarm data, the alarm time and the occurrence times of the alarm items;
performing bubbling sequencing according to the occurrence times of the data of each base station, and matching the incidence relation between the data collected by the base station and the event item or the alarm item;
and outputting the association relation between the matched base station acquisition data and the event item or the alarm item.
In an embodiment, according to the base station security management method provided by the present application, in the case of sorting based on the collected base station data, after matching the early warning rule, outputting a matched early warning item includes:
acquiring data of each sensor in a base station, and constructing a data set, wherein the data of each sensor in the base station comprises level signals of each sensor;
counting the hit times of the pre-warning rules corresponding to each piece of data in the data set;
if the hit number of each early warning rule is equal to the data quantity in each early warning rule, the corresponding early warning rule is hit completely;
based on the completely hit early warning rule, outputting an early warning item by using a prediction model corresponding to the completely hit early warning rule.
In one embodiment, according to the base station security management method provided by the present application, the early warning rule includes at least one of the following: the health degree of the battery, the health degree of the equipment, the health degree of the door lock and the health degree of the air conditioner.
In one embodiment, according to the base station security management method provided by the application, the prediction model comprises at least one of the following: a multiple linear regression model, an anti-cotangent function model, and a logistic model.
In a second aspect, an embodiment of the present application provides a base station security management apparatus, including:
the acquisition module is used for: collecting base station data;
a scheduling analysis module for: building a tree structure based on base station historical data, acquiring an association relation between the base station acquisition data and an event item or an alarm item, and building at least one early warning rule based on the base station historical data by utilizing at least one prediction model, wherein the at least one prediction model corresponds to the at least one early warning rule one by one;
an event module for: under the condition of sequencing base station data based on matrix acquisition, after matching the association relation between the base station acquisition data and event items, outputting the matched event items;
an alarm module for: under the condition of sequencing based on the base station data collected by the matrix, after matching the association relation between the base station collected data and the alarm items, outputting the matched alarm items;
the early warning module is used for: under the condition of sequencing based on the base station data collected in a collecting mode, after the early warning rule is matched, the matched early warning items are output.
In one embodiment, the base station security management apparatus provided in the present application further includes:
a security module for: detecting the running states of a plurality of modules in the base station, judging whether the operation is internal authorization, if yes, no safety alarm exists, if no, triggering the safety alarm based on the alarm module, and refusing access;
a control module for: and controlling the normal operation of a plurality of devices in the base station.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor and a memory storing a computer program, where the processor implements the steps of the base station security management method according to the first aspect when executing the program.
In a fourth aspect, an embodiment of the present application provides a computer program product, comprising a computer program, which when executed by a processor implements the steps of the base station security management method according to the first aspect.
According to the base station security management method, the base station security management device, the electronic equipment and the computer program product, the association relation between the base station historical data and the event item or the alarm item is constructed, the acquired base station data is matched with the corresponding association relation, the matched event item or the alarm item is output, the base station data is rapidly and accurately positioned, rapid response and processing can be ensured when the alarm occurs, the time delay is reduced, and the purposes of automatically judging the event and monitoring the alarm without manual intervention are achieved; meanwhile, an early warning rule is constructed through a prediction model, after base station data is collected, the base station data is matched with the early warning rule, early warning items are output, possible problem points are automatically and timely early warned, intelligent disarming and arming are conducted in all directions from three monitoring levels of event, warning and early warning, and the safety of the base station is improved.
Drawings
In order to more clearly illustrate the application or the technical solutions of the prior art, the following description will briefly explain the drawings used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are some embodiments of the application, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a base station security management method according to an embodiment of the present application;
fig. 2 is a second flowchart of a base station security management method according to an embodiment of the present application;
fig. 3 is a third schematic structural diagram of a base station security management method according to an embodiment of the present application;
FIG. 4 is a schematic diagram of an event matrix according to an embodiment of the present application;
FIG. 5 is a schematic diagram of an alarm matrix according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a base station security management apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Fig. 1 is a schematic flow chart of a base station security management method according to an embodiment of the present application. Referring to fig. 1, an embodiment of the present application provides a base station security management method, which may include:
step 110, building a tree structure based on the base station history data, and acquiring the association relation between the base station history data and the event item or the alarm item.
Optionally, the method comprises:
sequencing according to the occurrence times of the historical data of each base station;
and constructing an FP-tree structure according to the ordering of the base station historical data, and realizing the association relation between each frequent item and the event item or the alarm item by utilizing the output frequent items.
Optionally, the data correlation is performed by FP-Growth algorithm and the result analysis is performed by pearson coefficient algorithm. In the FP-Growth algorithm, the input data includes, but is not limited to: various sensor electrical signals, temperature, charge and discharge times, capacity and service life of the battery; output events include, but are not limited to: door lock abnormality, air conditioner abnormality, equipment temperature abnormality, battery operation (charge, discharge, idle); output alarms include, but are not limited to: door lock abnormality warning, air conditioner abnormality warning, equipment temperature abnormality warning, and battery fault warning.
Optionally, the method for constructing the association relationship through the FP-Growth algorithm comprises the following steps:
scanning the extracted historical data of the base station, generating various sensor electric signals and temperature primary frequent item sets, and sequencing the various sensor electric signals and the temperature primary frequent item sets according to the occurrence times from more to less;
based on the sorting, scanning the historical data of the base station again, and processing the output event or alarm to generate a sorted data set;
and constructing an FP-tree based on the data set, sequentially finding out a condition mode base corresponding to the head items from the bottom items of the head items, recursively mining the condition mode base to obtain a frequent item set of the head items, outputting the frequent item set, defining each frequent item in the frequent item set as an event or an alarm, and realizing the association of the event and the alarm.
Table 1 event association relationship
TABLE 2 alarm association relationship
Optionally, the event association relationship output by the FP-Growth algorithm is shown in table 1, and the alarm association relationship is shown in table 2.
And 120, constructing at least one early warning rule by utilizing at least one prediction model based on the base station historical data, wherein the at least one prediction model corresponds to the at least one early warning rule one by one.
Optionally, the collected base station history data includes, but is not limited to: the system comprises a battery circuit sensor, an external sensor, a sensor between equipment and a battery, an equipment temperature sensor, a machine room infrared sensor, an air conditioner temperature sensor, a door lock sensor and data of a door lock circuit level, wherein the data are divided into sets, and level signals of each time are used as sequential data to be imported into the sets.
Optionally, the pre-warning rule includes at least one of: the health degree of the battery, the health degree of the equipment, the health degree of the door lock and the health degree of the air conditioner.
Optionally, in the battery health degree early warning rule, a multiple linear regression model is used for prediction, and the multiple linear regression model is shown as a formula (1):
Y1=β 01 X 12 X 23 X 3 (1),
wherein Y1 represents a predicted value of the degree of health of the battery, beta 0 As a coefficient of deviation, which allows for an additional degree of freedom, beta 1 、β 2 And beta 3 Are all proportional factors, X 1 Indicating annual health, X 1 The calculation formula of (2) is shown as the formula:
X 1 =10-kt 1 (2),
wherein t is 1 For years, k is different brand constants;
X 2 indicating the degree of capacity health, X 2 The calculation formula of (2) is shown as formula (3):
wherein t is 2 For years, a is different brand constants, x 2 The charging time is the charging time;
X 3 indicating the degree of health of the charge and discharge times, X 2 The calculation formula of (2) is shown as formula (4):
X 3 =-(bx 3 -t 3 ) 2 (4),
wherein t is 3 For years, b is different brand constants, x 3 The number of charge and discharge times.
Optionally, in the health degree early warning rule of the device, an anti-cotangent function model is adopted for prediction, and the anti-cotangent function model is shown as a formula (5):
Y2=arcctgx 4 (5),
wherein Y2 represents the predicted value of the health degree of the equipment, and predicts within the range of interval (0, pi), x 4 Representing a characteristic health of the device, x, for example 4 =y 1 +y 2 ,y 1 Representing run time health (units: years), y 2 Indicating the health of the traffic, y 2 The calculation formula of (2) is shown as formula (6):
wherein a > 1, x 5 Accumulating traffic for the device operation.
Optionally, in the health degree early warning rule of the door lock, a logistic model is adopted for prediction, and the logistic model is shown as a formula (7):
wherein Y3 represents a predicted value of the degree of health of the door lock and is predicted between intervals (0, 1), q represents a characteristic degree of health of the door lock, and q=q, for example 1 +q 2 Wherein q 1 Indicates the health degree of service life, q 1 The calculation formula of (2) is shown as formula (8):
q 1 =n 1 -k 1 t 4 (8),
wherein t is 4 For the years, n 1 、k 1 Representing different brand constants;
q 2 indicates the health degree of the opening times, q 2 The calculation formula of (2) is shown as formula (9):
q 2 =n 2 -k 2 t 5 (9),
wherein t is 5 For the number of times of opening, n 2 、k 2 Representing different brand constants.
Optionally, in the health degree early warning rule of the air conditioner, a multiple linear regression prediction model is adopted for prediction, and the multiple linear regression prediction model is shown as a formula (10):
Y4=α 01 Z 12 Z 2 (10),
wherein Y4 represents the predicted value of the health degree of the air conditioner, alpha 0 As a deviation factor, the factor allowing the provision of the amountDegree of freedom of outside, alpha 1 And alpha 2 Are all proportional factors, Z 1 Z represents the annual health degree of the air conditioner 1 The calculation formula of (2) is shown as formula (11):
Z 1 =10-k 3 t 6 (11),
wherein t is 6 For the age, k 3 Is a different brand constant;
Z 2 z represents the annual health degree of the air conditioner 2 The calculation formula of (2) is shown as formula (12):
Z 2 =(t 7 -k 4 ) 2 (12),
wherein t is 7 Is the temperature, k 4 Is the most suitable temperature for different brands.
And 130, under the condition of sequencing based on the matrix-type acquired base station data, after the association relation between the base station acquired data and the event item or the alarm item is matched, outputting the matched event item or alarm item.
Optionally, fig. 2 is a second flowchart of a base station security management method according to an embodiment of the present application, and referring to fig. 2, the method includes:
collecting base station data, and constructing an event matrix or an alarm matrix according to the occurrence times of the base station data, wherein the event matrix comprises the corresponding relation of the event data, the event time and the occurrence times of event items, and the alarm matrix comprises the corresponding relation of the alarm data, the alarm time and the occurrence times of alarm items;
performing bubbling sequencing according to the occurrence times of the data of each base station, and matching the incidence relation between the data collected by the base station and the event item or the alarm item;
and outputting the association relation between the matched base station acquisition data and the event item or the alarm item.
Optionally, the collected base station data includes, but is not limited to: battery circuit sensor, external sensor, sensor between equipment and battery, equipment temperature sensor, machine room infrared sensor, air conditioner temperature sensor, door lock sensor, and door lock circuit level data.
Optionally, fig. 4 is a schematic structural diagram of an event matrix provided in an embodiment of the present application, referring to fig. 4, in the event matrix, T represents time of event data collection, T1, T2, T3, T4 represent different time windows, a represents a certain data, A1, A2, A3, A4 represent different data types, taking data A1, A2 as an example, T1A1 represents that data A1 occurs 1 time in time window T1, and T2A2 represents that data A2 occurs 4 times in time window T2.
Optionally, fig. 5 is a schematic structural diagram of an alarm matrix provided in an embodiment of the present application, referring to fig. 5, in the alarm matrix, P represents time of alarm data collection, P1, P2, P3, and P4 represent different time windows, a represents a certain data, A1, A2, A3, and A4 represent different data types, taking data A1 and A2 as an example, P1A1 represents that data A1 occurs 1 time in the time window P1, and P2A2 represents that data A2 occurs 4 times in the time window P2.
And 140, under the condition of sequencing based on the base station data collected in a set mode, after the early warning rule is matched, outputting a matched early warning item.
Optionally, fig. 3 is a third schematic structural diagram of a base station security management method according to an embodiment of the present application, and referring to fig. 3, the method includes:
acquiring data of each sensor in a base station, and constructing a data set, wherein the data of each sensor in the base station comprises level signals of each sensor;
counting the hit times of the early warning rules corresponding to each piece of data in the data set;
if the hit number of each early warning rule is equal to the data quantity in each early warning rule, the corresponding early warning rule is hit completely;
based on the completely hit early warning rule, outputting an early warning item by using a prediction model corresponding to the completely hit early warning rule.
According to the base station security management method provided by the embodiment of the application, the association relation between the base station historical data and the event item or the alarm item is constructed, the acquired base station data is matched with the corresponding association relation, the matched event item or the alarm item is output, the rapid and accurate positioning of the base station data is realized, the rapid response and processing of the alarm can be ensured when the alarm occurs, the time delay is reduced, and the purposes of automatically judging the event and monitoring the alarm without manual intervention are achieved; meanwhile, an early warning rule is constructed through a prediction model, after base station data is collected, the base station data is matched with the early warning rule, early warning items are output, possible problem points are automatically and timely early warned, intelligent disarming and arming are conducted in all directions from three monitoring levels of event, warning and early warning, and the safety of the base station is improved.
The base station security management apparatus provided in the embodiment of the present application is described below, and the base station security management apparatus described below and the base station security management method described above may be referred to correspondingly.
Fig. 6 is a schematic structural diagram of a base station security management apparatus according to an embodiment of the present application, and referring to fig. 6, a base station security management apparatus 200 includes:
an acquisition module 201 for: collecting base station data;
the schedule analysis module 203 is configured to: building a tree structure based on base station historical data, acquiring the association relation between base station acquisition data and event items or alarm items, and building at least one early warning rule based on the base station historical data by utilizing at least one prediction model, wherein the at least one prediction model corresponds to the at least one early warning rule one by one;
event module 204 for: under the condition of base station data ordering based on matrix acquisition, after matching the incidence relation between the base station acquisition data and the event items, outputting the matched event items;
an alarm module 207 for: under the condition of sequencing based on the base station data collected by the matrix, after matching the association relation between the base station collected data and the alarm items, outputting the matched alarm items;
an early warning module 206 for: under the condition of sequencing based on the base station data collected in a set mode, after the early warning rule is matched, the matched early warning items are output.
According to the base station security management device provided by the embodiment of the application, the association relation between the base station historical data and the event item or the alarm item is constructed, the acquired base station data is matched with the corresponding association relation, the matched event item or the alarm item is output, the rapid and accurate positioning of the base station data is realized, the rapid response and processing of the alarm can be ensured when the alarm occurs, the time delay is reduced, and the purposes of automatically judging the event and monitoring the alarm without manual intervention are achieved; meanwhile, an early warning rule is constructed through a prediction model, after base station data is collected, the base station data is matched with the early warning rule, early warning items are output, possible problem points are automatically and timely early warned, intelligent disarming and arming are conducted in all directions from three monitoring levels of event, warning and early warning, and the safety of the base station is improved.
Optionally, referring to fig. 6, the base station security management apparatus 200 further includes:
a security module 202 for: detecting the running states of a plurality of modules in the base station, judging whether the operation is internal authorization, if yes, no security alarm is given, and if no, the security alarm is triggered based on the alarm module 207, and access is refused;
a control module 205 for: and controlling the normal operation of a plurality of devices in the base station.
Optionally, the security module 202 is specifically configured to:
judging whether the operation is internal authorization, if so, no safety alarm is given, if not, access is refused, and safety alarm is triggered, namely, the internal authorization is mainly the entrance and exit of the machine room, as long as the entrance of a door card, fingerprint, face and the like of a recording system is met, any alarm in the machine room is not triggered by a sensor, monitoring and the like touching the machine room, and damaged components can be replaced in the machine room at any time;
because the information output by the event module 204, the alarm module 207, the control module 205 and the early warning module 206 in the base station is required to be fed back to the safety module 202, the safety module 202 is used for ensuring that each module in the base station is normally operated, and once an abnormality occurs in a certain module, the safety is triggered in time, and the alarm is self-locked;
when the base station suffers external factors such as external force and system intrusion, the abnormal control of the whole system in the base station is realized.
Optionally, the scheduling analysis module 203 is specifically configured to:
sequencing according to the occurrence times of the historical data of each base station;
and constructing an FP-tree structure according to the ordering of the base station historical data, and realizing the association relation between each frequent item and the event item or the alarm item by utilizing the output frequent items.
Optionally, the event module 204 is specifically configured to:
collecting base station data, and constructing an event matrix according to the occurrence times of the base station data, wherein the event matrix comprises the corresponding relation of event data, event time and occurrence times of event items;
performing bubbling sequencing according to the occurrence times of the data of each base station, and matching the incidence relation between the data collected by the base station and the event item;
and outputting the association relation between the matched base station acquisition data and the event item.
Optionally, the alarm module 207 is specifically configured to:
collecting base station data, and constructing an alarm matrix according to the occurrence times of the base station data, wherein the alarm matrix comprises the corresponding relation of alarm data, alarm time and the occurrence times of alarm items;
performing bubbling sequencing according to the occurrence times of the data of each base station, and matching with the association relation between the data collected by the base station and the alarm item;
and outputting the association relation between the matched base station acquisition data and the alarm item.
Optionally, the early warning module 206 is specifically configured to:
acquiring data of each sensor in a base station, and constructing a data set, wherein the data of each sensor in the base station comprises level signals of each sensor;
counting the hit times of the early warning rules corresponding to each piece of data in the data set;
if the hit number of each early warning rule is equal to the data quantity in each early warning rule, the corresponding early warning rule is hit completely;
based on the completely hit early warning rule, outputting an early warning item by using a prediction model corresponding to the completely hit early warning rule.
Fig. 7 illustrates a physical schematic diagram of an electronic device, as shown in fig. 7, which may include: processor 310, communication interface (Communication Interface) 320, memory 330 and communication bus 340, wherein processor 310, communication interface 320, memory 330 accomplish communication with each other through communication bus 340. Processor 310 may invoke computer programs in memory 330 to perform the steps of the base station security management method, including:
based on the base station historical data, constructing a tree structure, and acquiring the association relation between the base station historical data and an event item or an alarm item;
based on the historical data of the base station, at least one pre-warning rule is constructed by utilizing at least one prediction model, and the at least one prediction model corresponds to the at least one pre-warning rule one by one;
under the condition of base station data ordering based on matrix acquisition, after matching the incidence relation between the base station acquisition data and the event item or the alarm item, outputting the matched event item or the alarm item;
under the condition of sequencing based on the base station data collected in a set mode, after the early warning rule is matched, the matched early warning items are output.
Further, the logic instructions in the memory 330 described above may be implemented in the form of software functional units and may be stored in a computer-readable storage medium when sold or used as a stand-alone product. Based on this understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method of the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
In another aspect, an embodiment of the present application further provides a computer program product, where the computer program product includes a computer program, where the computer program may be stored on a non-transitory computer readable storage medium, and when the computer program is executed by a processor, the computer is capable of executing the steps of the base station security management method provided in the foregoing embodiments, for example, including:
based on the base station historical data, constructing a tree structure, and acquiring the association relation between the base station historical data and an event item or an alarm item;
based on the historical data of the base station, at least one pre-warning rule is constructed by utilizing at least one prediction model, and the at least one prediction model corresponds to the at least one pre-warning rule one by one;
under the condition of base station data ordering based on matrix acquisition, after matching the incidence relation between the base station acquisition data and the event item or the alarm item, outputting the matched event item or the alarm item;
under the condition of sequencing based on the base station data collected in a set mode, after the early warning rule is matched, the matched early warning items are output.
In another aspect, an embodiment of the present application further provides a processor readable storage medium, where a computer program is stored, where the computer program is configured to cause a processor to execute the steps of the base station security management method provided in the foregoing embodiments, for example, including:
based on the base station historical data, constructing a tree structure, and acquiring the association relation between the base station historical data and an event item or an alarm item;
based on the historical data of the base station, at least one pre-warning rule is constructed by utilizing at least one prediction model, and the at least one prediction model corresponds to the at least one pre-warning rule one by one;
under the condition of base station data ordering based on matrix acquisition, after matching the incidence relation between the base station acquisition data and the event item or the alarm item, outputting the matched event item or the alarm item;
under the condition of sequencing based on the base station data collected in a set mode, after the early warning rule is matched, the matched early warning items are output.
The processor-readable storage medium may be any available medium or data storage device that can be accessed by a processor including, but not limited to, magnetic memory (e.g., floppy disk, hard disk, tape, magneto-optical disk (MO), etc.), optical memory (e.g., CD, DVD, BD, HVD, etc.), and semiconductor memory (e.g., ROM, EPROM, EEPROM, nonvolatile memory (NAND FLASH), solid State Disk (SSD)), etc.
The apparatus embodiments described above are merely illustrative, wherein elements illustrated as separate elements may or may not be physically separate, and elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present application without undue burden.
From the above description of the embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus necessary general hardware platforms, or of course may be implemented by means of hardware. Based on such understanding, the foregoing technical solutions may be embodied essentially or in part in the form of a software product, which may be stored in a computer-readable storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform the various embodiments or methods of some parts of the embodiments.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and are not limiting; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application.

Claims (10)

1. A base station security management method, comprising:
based on the base station historical data, constructing a tree structure, and acquiring the association relation between the base station historical data and an event item or an alarm item;
constructing at least one early warning rule by utilizing at least one prediction model based on base station historical data, wherein the at least one prediction model corresponds to the at least one early warning rule one by one;
under the condition of sequencing base station data based on matrix acquisition, after matching the association relation between the base station acquisition data and event items or alarm items, outputting the matched event items or alarm items;
under the condition of sequencing based on the base station data collected in a collecting mode, after the early warning rule is matched, the matched early warning items are output.
2. The base station security management method according to claim 1, wherein the constructing a tree structure based on the base station history data, obtaining the association relationship between the base station acquisition data and the event item or the alarm item, comprises:
sequencing according to the occurrence times of the historical data of each base station;
and constructing an FP-tree structure according to the ordering of the base station historical data, and utilizing the output frequent items to realize the association relation between each frequent item and the event item or the alarm item.
3. The base station security management method according to claim 1, wherein in the case of base station data sorting based on matrix acquisition, after matching the association relationship between the base station acquisition data and an event item or an alarm item, outputting the matched event item or alarm item comprises:
collecting the base station data, and constructing an event matrix or an alarm matrix according to the occurrence times of the base station data, wherein the event matrix comprises the corresponding relation among the event data, the event time and the occurrence times of the event items, and the alarm matrix comprises the corresponding relation among the alarm data, the alarm time and the occurrence times of the alarm items;
performing bubbling sequencing according to the occurrence times of the data of each base station, and matching the incidence relation between the data collected by the base station and the event item or the alarm item;
and outputting the association relation between the matched base station acquisition data and the event item or the alarm item.
4. The base station security management method according to claim 1, wherein in the case of sorting based on collected base station data, after matching the early warning rule, outputting a matched early warning item includes:
acquiring data of each sensor in a base station, and constructing a data set, wherein the data of each sensor in the base station comprises level signals of each sensor;
counting the hit times of the pre-warning rules corresponding to each piece of data in the data set;
if the hit number of each early warning rule is equal to the data quantity in each early warning rule, the corresponding early warning rule is hit completely;
based on the completely hit early warning rule, outputting an early warning item by using a prediction model corresponding to the completely hit early warning rule.
5. The base station security management method according to claim 1 or 4, wherein the pre-warning rule includes at least one of: the health degree of the battery, the health degree of the equipment, the health degree of the door lock and the health degree of the air conditioner.
6. The base station security management method according to claim 1 or 4, wherein the predictive model comprises at least one of: a multiple linear regression model, an anti-cotangent function model, and a logistic model.
7. A base station security management apparatus, comprising:
the acquisition module is used for: collecting base station data;
a scheduling analysis module for: building a tree structure based on base station historical data, acquiring an association relation between the base station acquisition data and an event item or an alarm item, and building at least one early warning rule based on the base station historical data by utilizing at least one prediction model, wherein the at least one prediction model corresponds to the at least one early warning rule one by one;
an event module for: under the condition of sequencing base station data based on matrix acquisition, after matching the association relation between the base station acquisition data and event items, outputting the matched event items;
an alarm module for: under the condition of sequencing based on the base station data collected by the matrix, after matching the association relation between the base station collected data and the alarm items, outputting the matched alarm items;
the early warning module is used for: under the condition of sequencing based on the base station data collected in a collecting mode, after the early warning rule is matched, the matched early warning items are output.
8. The base station security management apparatus according to claim 7, further comprising:
a security module for: detecting the running states of a plurality of modules in the base station, judging whether the operation is internal authorization, if yes, no safety alarm exists, if no, triggering the safety alarm based on the alarm module, and refusing access;
a control module for: and controlling the normal operation of a plurality of devices in the base station.
9. An electronic device comprising a processor and a memory storing a computer program, characterized in that the processor implements the steps of the base station security management method of any of claims 1 to 6 when executing the computer program.
10. A computer program product comprising a computer program, characterized in that the computer program, when executed by a processor, implements the steps of the base station security management method of any of claims 1 to 6.
CN202210533399.4A 2022-05-13 2022-05-13 Base station security management method, base station security management device, electronic equipment and computer program product Pending CN117098130A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210533399.4A CN117098130A (en) 2022-05-13 2022-05-13 Base station security management method, base station security management device, electronic equipment and computer program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210533399.4A CN117098130A (en) 2022-05-13 2022-05-13 Base station security management method, base station security management device, electronic equipment and computer program product

Publications (1)

Publication Number Publication Date
CN117098130A true CN117098130A (en) 2023-11-21

Family

ID=88770478

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210533399.4A Pending CN117098130A (en) 2022-05-13 2022-05-13 Base station security management method, base station security management device, electronic equipment and computer program product

Country Status (1)

Country Link
CN (1) CN117098130A (en)

Similar Documents

Publication Publication Date Title
US8009041B2 (en) Access monitoring and control system and method
WO2018191698A1 (en) Method for predicting defects in assembly units
CN110164501B (en) Hard disk detection method, device, storage medium and equipment
JP2007316821A (en) Security monitoring device, security monitoring system, and security monitoring method
JP2008107930A (en) Risk monitoring apparatus, risk monitoring system, risk monitoring method
US11313894B2 (en) Automobile battery failure prediction method and system
EP2963552B1 (en) System analysis device and system analysis method
CN113438114B (en) Method, device, equipment and storage medium for monitoring running state of Internet system
WO2009111130A1 (en) System and method for detection of anomalous access events
CN110119758A (en) A kind of electricity consumption data abnormality detection and model training method, device
JP6844686B2 (en) Management equipment, management methods and programs
US20210099423A1 (en) System for securing a cyber-physical method
CN113743238A (en) Abnormal behavior detection method and device, electronic device and storage medium
CN114064427A (en) Method, device and equipment for processing operation and maintenance monitoring data of machine room
CN111367906A (en) Abnormal vehicle identification method, device, equipment and computer readable storage medium
CN117098130A (en) Base station security management method, base station security management device, electronic equipment and computer program product
CN113256925A (en) Intelligent building intrusion alarm method, system and storage medium thereof
CN116736166A (en) Battery cell abnormality detection method and device of battery pack and battery pack
CN114492636B (en) Transformer winding state signal acquisition system
JP5274503B2 (en) Electric lock management system and management device
US20230297095A1 (en) Monitoring device and method for detecting anomalies
CN115508713A (en) Battery system safety early warning method and device, storage medium and equipment
US11875278B2 (en) Door lock fault detection
CN114553474A (en) Access control permission control method and device based on Internet of things
CN111103003A (en) Method, device and equipment for discriminating monitoring data of experimental instrument and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination