Network monitoring method and device, electronic equipment and storage medium
A network monitoring and information storage technology, applied in the field of network security, can solve problems such as failure to realize automatic monitoring, danger of industrial field equipment, abnormal server return, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0053] The embodiment of the present application provides a network monitoring method, such as figure 1 As shown, the method includes:
[0054] S1: get the message;
[0055] S2: If the message is a request message, store the information of the request message in the pre-initialized protocol request table, and match the request message with the known hazard level table to obtain the first matching result, according to the first matching As a result, the information of the request message is stored in the monitoring risk level table;
[0056] S3: If the message is a response message, match the response message with the request message in the protocol request table to obtain the second matching result, and store the information of the request message in the protocol request table according to the second matching result In the monitoring hazard level table.
[0057] In the foregoing embodiment, the request message is stored in the protocol request table, and the request message...
Embodiment 2
[0105] The embodiment of this application provides a device for network monitoring, such as figure 2 As shown, the device includes:
[0106] Obtaining module 1, used to obtain the message;
[0107] The matching module 2 is used to store the information of the request message in the pre-initialized protocol request table if the message is a request message, and match the request message with the known risk level table to obtain the first matching result, According to the first matching result, the information of the request message is stored in the monitoring risk level table; if the message is a response message, the response message is matched with the request message in the protocol request table to obtain the second matching result, The information of the request message in the protocol request table is stored in the monitoring risk level table according to the second matching result.
[0108] In a possible implementation manner, the information of the request message in...
Embodiment 3
[0115] like image 3 As shown, the embodiment of the present application also provides an electronic device, which may include a processor 31 , a communication interface 32 , a memory 3 and at least one communication bus 34 . Wherein, the communication bus 34 is used to realize the direct connection and communication of these components. Wherein, the communication interface 32 of the device in the embodiment of the present application is used for signaling or data communication with other node devices. The processor 31 may be an integrated circuit chip, which has a signal processing capability.
[0116] Above-mentioned processor 31 can be general-purpose processor, comprises central processing unit (Central Processing Unit, CPU), network processor (Network Processor, NP) etc.; Can also be digital signal processor (DSP), application-specific integrated circuit (ASIC) , off-the-shelf programmable gate array (FPGA) or other programmable logic devices, discrete gate or transisto...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


