Distributed supervision method and system for user behavior log forecasting network
A predictive network and distributed technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve problems such as poor scalability, performance bottlenecks in system storage space, scale and functions that cannot meet efficient, fast, and accurate network supervision, etc. problems, to achieve the effect of accurate network supervision and disposal
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] Such as figure 1 As shown, the flow chart of the distributed user behavior log prediction network supervision method provided by the embodiment of the present invention is as follows:
[0053] In step 10, the PCPP captures the network access request data packet initiated by the network user, extracts the access log, and uploads it to the LCA.
[0054] When a network user initiates a network access request, the data packet collection and policy prefetching server (PCPP) captures the data packet and extracts the access log according to a given rule. When the access log is extracted, PCPP will perform two tasks: 1) query the IP address rule base (IPRD) according to the source (user) IP address in the access log and obtain the access network ID (CNID) used by the user; 2) Upload the access log to the log collection and analysis server (LCA) connected to it. Further, according to the key information (such as URL) in the access log, request the access popularity of the netw...
Embodiment 2
[0096] Such as image 3 As shown, an embodiment of the present invention provides a distributed user behavior log prediction network monitoring system, including PCPP and LCA, wherein,
[0097] PCPP is used to capture network access request packets initiated by network users, extract access logs, and upload them to LCA; obtain network service popularity, and obtain network supervision policies according to a preset policy library, and supervise network user network access requests disposal;
[0098] LCA is used to distribute and store access logs, calculate network service popularity based on access logs and send them to PCPP.
[0099] Specifically, the system includes several LCAs, which form a distributed hash table DHT network;
[0100] The LCA performs hash calculation on the received access log through the distributed hash algorithm to obtain the key value. According to the key value, the LCA obtains the successor node LCA where the access log is stored, and distributes...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 