Method and device for monitoring network
A network monitoring and monitoring unit technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve the problems of high false alarm rate, inaccurate security accident positioning, affecting network connection and traffic monitoring, etc., to achieve accurate positioning. Simple, provide network security, and reduce the difficulty of fault location and troubleshooting
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0056] Such as figure 1 As shown, this embodiment provides a network monitoring method, the method comprising:
[0057] Step S110: extracting the source address in the data packet;
[0058] Step S120: query the source address in the pre-generated trusted list;
[0059] Step S130: When the trusted list does not include the source address, stop the transmission of the data packet and send first warning information.
[0060] A data packet usually includes two parts, a header and a text, and the header usually includes an IP address and a sending port of the device sending the data packet. A device usually corresponds to only one IP address corresponding to multiple ports.
[0061] The source address is the address of the device sending the data packet, specifically an IP address or an IP address and a sending port. When the source address is an IP address, according to the sending of the alarm information, it is possible to specifically track and locate which physical device ...
example 1
[0123] Such as image 3 As shown, this example includes:
[0124] Step S310: Extract the IP address or IP address and port in the data packet; in this example, the IP address and port are used as a variable / field, and the IP address is used to indicate the device where the port is located.
[0125] Step S320: Compare the IP address or the IP address and port with the records in the trusted list.
[0126] Step S331: Directly release the data packet for the IP address or IP address and port number with high support and medium support.
[0127] Step S332: For the IP address or IP address and port number with low support degree, directly release the data packet and give an alarm, and proceed to step S341 or S342.
[0128] Step S333: For the IP address or the IP address and the port not in the trusted list, the transmission of the data packet is blocked and an alarm is issued, and the process proceeds to step S343.
[0129] Step S341: Increase the degree of support for a truly cre...
example 2
[0135] Such as Figure 4 As shown, this example includes:
[0136] Step S410: Obtain the data traffic of this transmission, and the specific acquisition method may be to extract the data traffic directly from the packet header of the data packet.
[0137] Step S420: Determine whether the current data flow is within a normal interval.
[0138] Step S431: Directly release the data packets whose data traffic is within the normal range.
[0139] Step S432: Release and give an alarm for data traffic exceeding the normal range, and enter step S441 or step S442.
[0140] Step S433: The data flow rate is lower than the normal interval and the alarm is released, and the process goes to step S443.
[0141] Step S441: For those that really need to add data traffic, adjust the upper limit of the normal interval.
[0142] Step S442: For abnormal data flow, find out the reason for the abnormality.
[0143] Step S443: If the data flow rate is too low due to equipment failure, repair it ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


