Unlock instant, AI-driven research and patent intelligence for your innovation.

Network monitoring method and device, electronic equipment and storage medium

A network monitoring and information storage technology, applied in the field of network security, can solve problems such as failure to realize automatic monitoring, danger of industrial field equipment, abnormal server return, etc.

Active Publication Date: 2022-01-21
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In today's industrial field, the upper computer system is usually used to manage the remote lower computer system based on Ethernet. However, this interactive access behavior may cause serious dangerous events to industrial field devices, such as: Sending a fatal modification command or sending a command that causes the server to return an exception may cause a large area of ​​equipment in the industrial site to be paralyzed. Therefore, it is particularly important to conduct safety supervision on such interactive operation behaviors to prevent large-scale damage to field equipment.
In the existing network monitoring methods, human intervention is required, and automatic monitoring cannot be realized

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network monitoring method and device, electronic equipment and storage medium
  • Network monitoring method and device, electronic equipment and storage medium
  • Network monitoring method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] The embodiment of the present application provides a network monitoring method, such as figure 1 As shown, the method includes:

[0054] S1: get the message;

[0055] S2: If the message is a request message, store the information of the request message in the pre-initialized protocol request table, and match the request message with the known hazard level table to obtain the first matching result, according to the first matching As a result, the information of the request message is stored in the monitoring risk level table;

[0056] S3: If the message is a response message, match the response message with the request message in the protocol request table to obtain the second matching result, and store the information of the request message in the protocol request table according to the second matching result In the monitoring hazard level table.

[0057] In the foregoing embodiment, the request message is stored in the protocol request table, and the request message...

Embodiment 2

[0105] The embodiment of this application provides a device for network monitoring, such as figure 2 As shown, the device includes:

[0106] Obtaining module 1, used to obtain the message;

[0107] The matching module 2 is used to store the information of the request message in the pre-initialized protocol request table if the message is a request message, and match the request message with the known risk level table to obtain the first matching result, According to the first matching result, the information of the request message is stored in the monitoring risk level table; if the message is a response message, the response message is matched with the request message in the protocol request table to obtain the second matching result, The information of the request message in the protocol request table is stored in the monitoring risk level table according to the second matching result.

[0108] In a possible implementation manner, the information of the request message in...

Embodiment 3

[0115] like image 3 As shown, the embodiment of the present application also provides an electronic device, which may include a processor 31 , a communication interface 32 , a memory 3 and at least one communication bus 34 . Wherein, the communication bus 34 is used to realize the direct connection and communication of these components. Wherein, the communication interface 32 of the device in the embodiment of the present application is used for signaling or data communication with other node devices. The processor 31 may be an integrated circuit chip, which has a signal processing capability.

[0116] Above-mentioned processor 31 can be general-purpose processor, comprises central processing unit (Central Processing Unit, CPU), network processor (Network Processor, NP) etc.; Can also be digital signal processor (DSP), application-specific integrated circuit (ASIC) , off-the-shelf programmable gate array (FPGA) or other programmable logic devices, discrete gate or transisto...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a network monitoring method, electronic equipment and a storage medium. The method comprises the following steps: acquiring a message; if the message is a request message, storing information of the request message in a pre-initialized protocol request table, matching the request message with a known danger level table to obtain a first matching result, and storing the information of the request message in a monitoring danger level table according to the first matching result; and if the message is a response message, matching the response message with the request message in the protocol request table to obtain a second matching result, and storing the information of the request message in the protocol request table in the monitoring danger level table according to the second matching result. According to the embodiment of the invention, automatic monitoring of the network based on the upper computer system and the lower computer system is realized.

Description

technical field [0001] The present application relates to the technical field of network security, in particular, to a network monitoring method, device, electronic equipment and computer-readable storage medium. Background technique [0002] In today's industrial field, the upper computer system is usually used to manage the remote lower computer system based on Ethernet. However, this interactive access behavior may cause serious dangerous events to industrial field devices, such as: Sending a fatal modification command or sending a command that causes the server to return an exception may cause a large area of ​​equipment in the industrial site to be paralyzed. Therefore, it is particularly important to conduct safety supervision on such interactive operation behaviors to prevent large-scale damage to field equipment. . In the existing network monitoring method, human intervention is required, and automatic monitoring cannot be realized. Contents of the invention [0...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L69/22G06F16/901G06F16/903
CPCH04L63/1408H04L69/22G06F16/90335G06F16/901H04L63/16
Inventor 刘丽
Owner BEIJING TOPSEC NETWORK SECURITY TECH