Priority-based baseline detection method

A detection method and priority technology, applied in the field of network security, can solve the problems of cumbersome inspection, prone to misoperation, and huge workload, so as to ensure the quality of detection, reduce costs, and improve detection efficiency.

Inactive Publication Date: 2021-12-31
湖北省农村信用社联合社网络信息中心
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Checking various basic software on hundreds of servers generally relies on manual inspection, which is cumbersome, heavy workload, and prone to misoperation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Priority-based baseline detection method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The principles and features of the present invention are described below in conjunction with the accompanying drawings, and the examples given are only used to explain the present invention, and are not intended to limit the scope of the present invention. In the following paragraphs the invention is described more specifically by way of example with reference to the accompanying drawings. Advantages and features of the present invention will be apparent from the following description and claims. It should be noted that all the drawings are in a very simplified form and use imprecise scales, and are only used to facilitate and clearly assist the purpose of illustrating the embodiments of the present invention.

[0022] It should be noted that when a component is said to be "fixed" to another component, it can be directly on the other component or there can also be an intervening component. When a component is said to be "connected" to another component, it may be direc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network security, in particular to a priority-based baseline detection method, which comprises the following steps: S1, acquiring the number of synchronously processed requests of all load balancing nodes in a time period and the time required for processing each request by an inspection server, and obtaining the CPU utilization rate, the IO occupancy rate and the memory utilization rate of all detected servers corresponding to the load balancing node; formulating sequence data of processing the service request by each detected server, and matching all the detected servers correspondingly with priorities from high to low according to the sequence data; and S2, sequentially carrying out baseline detection on the detected servers according to a high-low sequence of the priorities. Through rule setting, reasonable scheduling of resources and demands and priority arrangement of baseline detection on a detected server, important resources or systems are detected in sequence according to priorities, so that limited resources meet response demands to the maximum extent. The detection efficiency is improved, and the detection quality is ensured.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a priority-based baseline detection method. Background technique [0002] A baseline is a basic reference in measurement, calculation or positioning. The security baseline is the minimum security requirement in the system. Baseline management is the most basic work in security operation and maintenance. The main management requirements come from three aspects: (1) compliance requirements raised by policy supervision, such as network information level protection, supervision by the China Banking Regulatory Commission, etc.; (2) due to security configuration (3) The security management needs of the enterprise itself. [0003] The current method for baseline detection is usually to detect all servers indiscriminately or to conduct random inspections. As a result, the information of important systems cannot be well reflected in the numerous aggregated information. At the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06G06F9/48G06F9/50
CPCH04L63/1408H04L67/1095G06F9/4881G06F9/5038G06F9/505G06F2209/5021H04L67/1001H04L67/63
Inventor 荣容容雷智胡昌松王荣聪杨欣袁野牛波周新熊俊彭霄张琳肖迁
Owner 湖北省农村信用社联合社网络信息中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products