CN114710420A - Hybrid network monitoring system based on active network technology - Google Patents
Hybrid network monitoring system based on active network technology Download PDFInfo
- Publication number
- CN114710420A CN114710420A CN202210392965.4A CN202210392965A CN114710420A CN 114710420 A CN114710420 A CN 114710420A CN 202210392965 A CN202210392965 A CN 202210392965A CN 114710420 A CN114710420 A CN 114710420A
- Authority
- CN
- China
- Prior art keywords
- monitoring
- instruction
- monitoring system
- function module
- monitored
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012544 monitoring process Methods 0.000 title claims abstract description 229
- 238000005516 engineering process Methods 0.000 title claims abstract description 32
- 230000006870 function Effects 0.000 claims abstract description 93
- 238000000034 method Methods 0.000 claims abstract description 30
- 230000008569 process Effects 0.000 claims abstract description 28
- 230000005540 biological transmission Effects 0.000 claims abstract description 19
- 238000013461 design Methods 0.000 claims abstract description 16
- 230000006854 communication Effects 0.000 claims description 37
- 238000004891 communication Methods 0.000 claims description 33
- 238000007906 compression Methods 0.000 claims description 33
- 230000006835 compression Effects 0.000 claims description 33
- 230000009471 action Effects 0.000 claims description 21
- 238000013144 data compression Methods 0.000 claims description 11
- 238000004458 analytical method Methods 0.000 claims description 8
- 238000006243 chemical reaction Methods 0.000 claims description 5
- 230000002155 anti-virotic effect Effects 0.000 claims description 4
- 230000001427 coherent effect Effects 0.000 claims description 4
- 238000001914 filtration Methods 0.000 claims description 4
- 230000002123 temporal effect Effects 0.000 claims description 3
- 241000282414 Homo sapiens Species 0.000 claims description 2
- 230000000694 effects Effects 0.000 abstract description 7
- 230000003993 interaction Effects 0.000 abstract description 4
- 238000012217 deletion Methods 0.000 description 3
- 230000037430 deletion Effects 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000000007 visual effect Effects 0.000 description 3
- 206010063385 Intellectualisation Diseases 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 230000002159 abnormal effect Effects 0.000 description 1
- 230000004075 alteration Effects 0.000 description 1
- 239000008358 core component Substances 0.000 description 1
- 238000012937 correction Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000007704 transition Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
- H04L43/045—Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/06—Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Environmental & Geological Engineering (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention relates to the technical field of monitoring systems, in particular to a hybrid network monitoring system based on an active network technology, which comprises a monitoring system, wherein the monitoring system comprises a display remote screen function module, a screen real-time monitoring function module, a connection display function module, a file transmission function module, a remote process monitoring function module and an operation recording function module, the comprehensive monitoring of all computer resources in a computer local area network in colleges and universities is realized through the design of the monitoring system of the networks of a monitoring end and a monitored end, a user can conveniently monitor a remote computer, the information interaction between teachers and students is greatly facilitated, the teaching efficiency is improved, the teaching effect is enhanced, various functions of the system are conveniently realized through the monitoring system, the reusability and maintainability of the system are enhanced, and the system is independently designed with an information structure and an instruction structure, meanwhile, an interface program is designed to improve the stability of system functions.
Description
Technical Field
The invention relates to the technical field of monitoring systems, in particular to a hybrid network monitoring system based on an active network technology.
Background
At present, along with the global wave of informatization, it can be said that information technology has become an indispensable tool for human beings to transform nature. The monitoring system based on the computer network is used as a core component in the network monitoring system, thereby greatly facilitating resource sharing and communication among networked computer users in colleges and universities and providing the functions of remote assistance, remote management, remote teaching teleworking and the like for the users. Aiming at the application of a monitoring system in colleges and universities, a hybrid network monitoring system based on an active network technology is designed by applying a client/server (C/S) system mode on the basis of a Windows socket network programming technology.
Disclosure of Invention
The present invention is directed to a hybrid network monitoring system based on active network technology to solve the problems set forth in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
a hybrid network monitoring system based on an active network technology comprises a monitoring system, wherein the monitoring system comprises a display remote screen function module, a screen real-time monitoring function module, a connection display function module, a file transmission function module, a remote process monitoring function module and an operation recording function module.
As a preferred aspect of the present invention, the display remote screen function module: sending a command of intercepting a remote computer screen by using a monitoring end, receiving the command by the monitored end, judging the command, intercepting a screen of a local computer, sending a screen picture to the monitoring end, and displaying the sent screen picture on a picture display control of the monitoring end;
the screen real-time monitoring function module: the real-time monitoring function of the screen is established on the basis of the function of monitoring the screen, and is realized at a monitoring end by adding a clock control when the real-time monitoring function of the screen is specifically realized, and a screen capturing request is automatically sent to a monitored end at intervals, so that a coherent remote computer screen picture is obtained;
the connection display function module: the monitoring end connects the monitored computer through the host name or IP address of the remote computer; after receiving the connection request, the monitored end establishes connection and sends information of successful connection and the host name or the IP address of the computer to the monitoring end, and the monitoring end displays the information in a Tree-view control mode;
the file transmission function module: the module mainly realizes the functions of two aspects, namely, common operations such as deletion and renaming aiming at remote and local files; the mutual transmission of the folders and the files between the monitoring end and the monitored end;
the remote process monitoring function module: the module has the functions of performing shutdown and other operations on the remote computer, such as restarting, closing, logout and other operations of the remote computer; in the implementation process, the implementation is realized by sending a specific command to the monitored computer through the control end, namely, the closing operation of the computer is realized through a shutdown.
The operation recording function module: when the monitored end receives all the instructions, the content and time of the received instructions and the IP address of the monitoring end are stored in the system in a fixed file format and displayed in a control form.
As a preferable scheme of the invention, the monitoring system is provided with a data compression technology, data compression coding can be generally divided into lossless compression and lossy compression coding, the lossless compression can completely recover source information, no distortion is generated, the lossless compression coding is information-retaining coding, and a lossy compression coding algorithm utilizes the spatial and temporal correlation of data and the auditory sense and visual sense of people to eliminate the objective and subjective redundancy of the data and improve the compression ratio.
As a preferred scheme of the present invention, the network security of the monitoring system: in order to ensure that the on-site monitoring information and the remote monitoring information are protected by confidentiality, integrity and authenticity when transmitted on the network, certain safety precautionary measures must be taken:
a. anti-virus software;
b. firewall: packet filtering firewalls and proxy server firewalls;
c. identity authentication;
d. data encryption: the method mainly comprises a private key algorithm and a public key algorithm, wherein the same key is used by both communication parties of the private key algorithm, but the decryption steps are just opposite to those of the public key algorithm, and different keys are used for encryption and decryption, wherein the encrypted key is public, and the decrypted key is secret;
e. digital signature: the cipher text is transmitted with the key, which is itself encrypted and needs another key to decrypt.
As a preferred scheme of the present invention, the implementation of the monitoring end in the monitoring system: according to the design of the monitoring part, after the monitoring end is started, a thread is firstly created, the thread can try to connect with the monitored end, if the connection fails, after a period of time, the connection is carried out again: if the connection is successful, sending a related instruction to the monitored end according to the operation of the monitoring end user, analyzing the received instruction by the monitored end, then implementing corresponding operation according to the instruction, and if the connection with the monitored end is disconnected in the communication implementation process, disconnecting the communication connection, closing the thread and releasing all resources.
As a preferred scheme of the present invention, the implementation of the monitored end in the monitoring system: once the monitored end is started, the system can immediately establish a thread to carry out network communication, the thread establishes a socket and simultaneously monitors a corresponding port, connection of a client program is waited, if an external connection request exists, communication connection is established with the connection of the monitoring end, the connection is in a data communication state, after the monitored end receives an instruction, specific analysis is carried out on the received instruction, and after the analysis instruction is completed, corresponding operation is carried out according to system rules: if the received instruction is a program exit instruction, the communication connection with the monitoring terminal is disconnected, the thread is closed, all resources are released, and the whole communication process is finished.
As a preferred scheme of the present invention, the design of the monitoring instruction in the monitoring system is as follows: in order to achieve all monitoring purposes of the system, the monitoring end and the monitored end need to be agreed with each other so as to realize smooth communication, firstly, a basic instruction structure (Code) needs to be designed, instruction types are specified through an instruction head in the instruction structure, the system can make corresponding reaction actions according to the instruction head, then, the specific instruction types can inherit the structure, and the own due instruction contents are added, so that the system is greatly convenient to expand in the future through an inheritance technology.
As the preferred scheme of the invention, the overall design of the monitoring system is based on the remote monitoring system of the computer network, it is a set of intelligent, scalability, integrated high-efficiency and effective monitoring system, the system adopts the framework of customer end/service end (C/S), divide the system into two parts of monitoring end and monitored end, the main function of the monitoring end is to send the control command, receive the information that the monitored end returns; the monitored end receives the instruction sent by the monitoring end, executes the instruction and feeds back the execution result to the monitoring end; and an information structure and an instruction structure are independently designed, and an interface program is simultaneously designed.
Compared with the prior art, the invention has the beneficial effects that:
1. in the invention, voice and image data are compressed in a lossy mode in a remote monitoring system through a data compression technology, character files are compressed in a lossless mode, multi-channel load compression in a protocol is a better compression scheme, and the compression scheme has better compression ratio for various different data streams, particularly when the data streams are mixed, confidentiality, integrity and authenticity of on-site monitoring information and remote monitoring information can be protected when the on-site monitoring information and the remote monitoring information are transmitted on the network through the network security of the monitoring system, so that the network security in the monitoring system is high, the data transmission effect of the monitoring system is good, all-around monitoring of all computer resources in a local area network of a computer in high school is realized through the design of the monitoring system of the network of a monitoring end and a monitored end, a user can conveniently monitor the remote computer, and the information interaction between teachers and students is greatly facilitated, the teaching efficiency is improved, and the teaching effect is enhanced.
2. In the invention, the instruction type is specified through the instruction head in the instruction structure, the system can make corresponding reaction action according to the instruction head, then the specific instruction type can inherit the structure and add the own due instruction content into the structure, the future expansion of the system is greatly facilitated through the inheritance technology, various functions of the system are conveniently realized through the monitoring system, the reusability and the maintainability of the system are enhanced, the information structure and the instruction structure are independently designed by the system, and meanwhile, the interface program is designed, so that the stability of the system function is improved.
3. In the invention, the flow is determined through the trigger event, the related modules are further determined, the comprehensive execution capacity of the modules is further determined, the execution capacity of all the modules is further obtained, whether the target flow is qualified or not is determined, and the mutual effectiveness of the flow and the modules is ensured to be qualified.
Drawings
FIG. 1 is a schematic block diagram of a system of the present invention;
FIG. 2 is a system architecture diagram of the present invention;
fig. 3 is a network security architecture diagram of the monitoring system of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments, and all other embodiments obtained by a person of ordinary skill in the art without creative efforts based on the embodiments of the present invention belong to the protection scope of the present invention.
In order to facilitate an understanding of the invention, the invention will now be described more fully hereinafter with reference to the accompanying drawings, in which several embodiments of the invention are shown, but which can be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
Example (b): please refer to fig. 1-3, which illustrate a hybrid network monitoring system based on active network technology, comprising a monitoring system, wherein the monitoring system comprises a display remote screen function module, a screen real-time monitoring function module, a connection display function module, a file transmission function module, a remote process monitoring function module, and an operation recording function module; display remote screen function module: sending a command of intercepting a remote computer screen by using a monitoring end, receiving the command by the monitored end, judging the command, intercepting a screen of a local computer, sending a screen picture to the monitoring end, and displaying the sent screen picture on a picture display control of the monitoring end;
the screen real-time monitoring function module: the real-time monitoring function of the screen is established on the basis of the function of monitoring the screen, and is realized at a monitoring end by adding a clock control when the real-time monitoring function of the screen is specifically realized, and a screen capturing request is automatically sent to a monitored end at intervals, so that a coherent remote computer screen picture is obtained;
connecting a display function module: the monitoring end connects the monitored computer through the host name or IP address of the remote computer; after receiving the connection request, the monitored end establishes connection and sends information of successful connection and the host name or the IP address of the computer to the monitoring end, and the monitoring end displays the information in a Tree-view control mode;
the file transmission function module: the module mainly realizes the functions of two aspects, namely, common operations such as deletion and renaming aiming at remote and local files; the mutual transmission of the folders and the files between the monitoring end and the monitored end;
remote process monitoring function module: the module has the functions of performing shutdown and other operations on the remote computer, such as restarting, closing, logout and other operations of the remote computer; in the implementation process, the implementation is realized by sending a specific command to the monitored computer through the control end, namely, the closing operation of the computer is realized through a shutdown.
The operation recording function module: when the monitored end receives all the instructions, the content and time of the received instructions and the IP address of the monitoring end are stored in the system in a fixed file format and displayed in a control form.
In the embodiment, the monitoring system is provided with a data compression technology, data compression coding can be generally divided into lossless compression and lossy compression coding, the lossless compression can completely recover source information, the lossless compression coding is information-retaining coding without any distortion, a lossy compression coding algorithm utilizes the spatial and temporal correlation of data and the auditory sense and visual sense of people to eliminate the objective and subjective redundancy of the data and improve the compression ratio, voice and image data in a remote monitoring system are compressed in a lossy mode through the data compression technology, a character file is compressed in a lossless mode, multi-channel load compression in a protocol is a better compression scheme, and the monitoring system has a better compression ratio for various different data streams, particularly when the data streams are mixed.
In this embodiment, the network security of the monitoring system: in order to ensure that the on-site monitoring information and the remote monitoring information are protected by confidentiality, integrity and authenticity when transmitted on the network, certain safety precautionary measures must be taken:
a. anti-virus software;
b. firewall: packet filtering firewalls and proxy server firewalls;
c. identity authentication;
d. data encryption: the private key algorithm communication parties use the same key, but the decryption steps are just opposite to those of the public key algorithm, the public key algorithm encrypts and decrypts by using different keys, wherein the encrypted key is public, and the decrypted key is secret;
e. digital signature: the cipher text and the key are sent together, the key is encrypted, and another key is needed for decryption;
the network security of the monitoring system can protect the confidentiality, integrity and authenticity of the on-site monitoring information and the remote monitoring information during network transmission, so that the network security in the monitoring system is high, and the data transmission effect of the monitoring system is good.
In this embodiment, the implementation of the monitoring end in the monitoring system is as follows: according to the design of the monitoring part, after the monitoring end is started, a thread is firstly created, the thread can try to connect with the monitored end, if the connection fails, after a period of time, the connection is carried out again: if the connection is successful, sending a related instruction to the monitored end according to the operation of the monitoring end user, analyzing the received instruction by the monitored end, then implementing corresponding operation according to the instruction, and in the communication implementation process, if the connection with the monitored end is disconnected, disconnecting the communication connection, closing the thread, releasing all resources, and implementing the monitored end in the monitoring system: once the monitored end is started, the system can immediately establish a thread to carry out network communication, the thread establishes a socket and simultaneously monitors a corresponding port, connection of a client program is waited, if an external connection request exists, communication connection is established with the connection of the monitoring end, the connection is in a data communication state, after the monitored end receives an instruction, specific analysis is carried out on the received instruction, and after the analysis instruction is completed, corresponding operation is carried out according to system rules: if the received instruction is a program exit instruction, the communication connection with the monitoring terminal is disconnected, the thread is closed, all resources are released, the whole communication process is finished, all computer resources in a computer local area network in colleges and universities are monitored comprehensively through the design of the monitoring system of the network of the monitoring terminal and the monitored terminal, a user can conveniently monitor a remote computer, information interaction between teachers and students is greatly facilitated, teaching efficiency is improved, and the teaching effect is enhanced.
In this embodiment, the design of the monitoring instructions in the monitoring system: in order to achieve all monitoring purposes of the system, the monitoring end and the monitored end need to be agreed with each other so as to realize smooth communication, firstly, a basic instruction structure (Code) needs to be designed, instruction types are specified through an instruction head in the instruction structure, the system can make corresponding reaction actions according to the instruction head, then, the specific instruction types can inherit the structure, the own due instruction content is added, and the future expansion of the system is greatly facilitated through an inheritance technology.
In the embodiment, the overall design of the monitoring system is a remote monitoring system based on a computer network, which is a set of monitoring system with intellectualization, expandability, high integration efficiency and effectiveness, the system adopts a client/server (C/S) framework, the system is divided into a monitoring end and a monitored end, and the main function of the monitoring end is to send a control instruction and receive information returned by the monitored end; the monitored end receives the instruction sent by the monitoring end, executes the instruction and feeds back the execution result to the monitoring end; and the information structure and the instruction structure are independently designed, the interface program is simultaneously designed, the monitoring system is used for conveniently realizing various functions of the system, the reusability and the maintainability of the system are enhanced, the information structure and the instruction structure are independently designed, and the interface program is simultaneously designed, so that the stability of the system function is improved.
The working principle is as follows: when in use, the overall design of the monitoring system is a remote monitoring system based on a computer network, and the system is a set of monitoring system with intellectualization, expandability, high integration efficiency and effectiveness, the system adopts a client/server (C/S) framework, the system is divided into a monitoring end and a monitored end, and the main function of the monitoring end is to send a control instruction and receive information returned by the monitored end; the monitored end receives the instruction sent by the monitoring end, executes the instruction and feeds back the execution result to the monitoring end; and designed information structure and instruction structure alone, designed interface program simultaneously, through monitored control system for each item function of convenient realization system, strengthen the reusability and the maintainability of system, the system has designed information structure and instruction structure alone, has designed interface program simultaneously to improve system function's stability, show remote screen functional module: sending a command of intercepting a remote computer screen by using a monitoring end, receiving the command by the monitored end, judging the command, intercepting a screen of a local computer, sending a screen picture to the monitoring end, and displaying the sent screen picture on a picture display control of the monitoring end;
the screen real-time monitoring function module: the real-time monitoring function of the screen is established on the basis of the function of monitoring the screen, and when the real-time monitoring function of the screen is realized specifically, a clock control is added to a monitoring end to automatically send a screen capturing request to a monitored end at intervals, so that a coherent remote computer screen picture is obtained;
connecting a display function module: the monitoring end connects the monitored computer through the host name or IP address of the remote computer; after receiving the connection request, the monitored end establishes connection and sends information of successful connection and the host name or the IP address of the computer to the monitoring end, and the monitoring end displays the information in a Tree-view control mode;
the file transmission function module: the module mainly realizes the functions of two aspects, namely, common operations such as deletion and renaming aiming at remote and local files; the mutual transmission of the folders and the files between the monitoring end and the monitored end;
remote process monitoring function module: the module has the functions of performing shutdown and other operations on the remote computer, such as restarting, closing, logout and other operations of the remote computer; in the implementation process, the implementation is realized by sending a specific command to the monitored computer through the control end, namely, the closing operation of the computer is realized through a shutdown.
The operation recording function module: when the monitored end receives all the instructions, the content and time of the received instructions and the IP address of the monitoring end are stored in the system in a fixed file format and displayed in a control form;
the monitoring system is provided with a data compression technology, the data compression coding can be generally divided into lossless compression and lossy compression coding, the lossless compression can completely recover source information, the lossless compression coding does not generate any distortion and is an information-retaining coding, the lossy compression coding algorithm eliminates objective and subjective redundancy of data by utilizing the spatial and time correlation of the data and the auditory and visual properties of people and improves the compression ratio, voice and image data in the remote monitoring system are compressed in a lossy mode through the data compression technology, while character files are compressed in a lossless mode, and multi-channel load compression in a protocol is a better compression scheme and has a better compression ratio for a plurality of different data streams, particularly when the data streams are mixed;
network security of the monitoring system: in order to ensure that the on-site monitoring information and the remote monitoring information are protected by confidentiality, integrity and authenticity when transmitted on the network, certain safety precautionary measures must be taken:
a. anti-virus software;
b. firewall: packet filtering firewalls and proxy server firewalls;
c. identity authentication;
d. data encryption: the private key algorithm communication parties use the same key, but the decryption steps are just opposite to those of the public key algorithm, the public key algorithm encrypts and decrypts by using different keys, wherein the encrypted key is public, and the decrypted key is secret;
e. digital signature: the cipher text and the key are transmitted together, and the key is encrypted and needs another key for decryption;
the confidentiality, integrity and authenticity protection of the on-site monitoring information and the remote monitoring information during network transmission can be realized through the network security of the monitoring system, so that the network security in the monitoring system is high, and the data transmission effect of the monitoring system is good;
the realization of a monitoring end in the monitoring system: according to the design of the monitoring part, after the monitoring end is started, a thread is firstly created, the thread can try to connect with the monitored end, if the connection fails, after a period of time, the connection is carried out again: if the connection is successful, sending a related instruction to the monitored end according to the operation of the monitoring end user, analyzing the received instruction by the monitored end, then implementing corresponding operation according to the instruction, and in the communication implementation process, if the connection with the monitored end is disconnected, disconnecting the communication connection, closing the thread, releasing all resources, and implementing the monitored end in the monitoring system: once the monitored end is started, the system can immediately establish a thread to carry out network communication, the thread establishes a socket and simultaneously monitors a corresponding port, connection of a client program is waited, if an external connection request exists, communication connection is established with the connection of the monitoring end, the connection is in a data communication state, after the monitored end receives an instruction, specific analysis is carried out on the received instruction, and after the analysis instruction is completed, corresponding operation is carried out according to system rules: if the received instruction is a program exit instruction, the communication connection with the monitoring terminal is disconnected, the thread is closed, all resources are released, the whole communication process is finished, and the design of the monitoring system of the network of the monitoring terminal and the monitored terminal is used for realizing the all-round monitoring of all computer resources in the computer local area network in colleges and universities, so that a user can conveniently monitor a remote computer, the information interaction between teachers and students is greatly facilitated, the teaching efficiency is improved, and the teaching effect is enhanced;
designing a monitoring instruction in the monitoring system: in order to achieve all monitoring purposes of the system, the monitoring end and the monitored end need to be agreed with each other so as to realize smooth communication, firstly, a basic instruction structure (Code) needs to be designed, instruction types are specified through an instruction head in the instruction structure, the system can make corresponding reaction actions according to the instruction head, then, the specific instruction types can inherit the structure, the own due instruction contents are added, and the system is greatly convenient for future expansion through an inheritance technology.
In one embodiment, the operation recording function module is further configured to obtain a trigger event, and determine, based on the trigger event, a target process involved and a target module involved in each item in the target process;
recording an initial execution action, an intermediate execution action and a termination execution action of a corresponding target module under each project, determining a first execution capacity of the corresponding module based on the initial execution action and the intermediate execution action, and determining a second execution capacity of the corresponding module based on the intermediate execution action and the termination execution action;
determining an execution process of each target module based on a target process, and determining the execution capacity of the corresponding target module based on the target process based on a plurality of first execution capacities and a plurality of second execution capacities in the execution process;
wherein n isi1Representing the number of items involved in the target module i 1; n isi2The execution capacity number of the i2 th project related to the target module i1 is represented, and the value is 2; a. thei1,i2Representing the execution capacity of the i2 th item referred to by the target module i 1; is at a position ofi1,i2The execution correction factor of the i2 th item related to the target module i1 is represented, and the value range is [0.8, 1 ]];Bi1,i2,2Represents the duration of the intermediate execution action of the i2 th item referred by the target module i 1; b isi1,i2,1Represents the duration of the initial execution action of the i2 th item referred to by the target module i 1; b isi1,i2,3Represents the duration of the termination execution action of the i2 th item referred to by the target module i1, and Bi1,i2,2>Bi1,i2,3>Bi1,i2,1;An operation scale index representing the middle execution action of the i2 th project related to the target module i 1; e represents the operation scale, and the value is 0.3; si1,i2A hinting function representing the i2 th item to which the goal module i1 relates;
determining whether the target process is qualified or not based on the execution capacity of each target module;
if the trigger event is qualified, reserving the trigger event and the execution content after corresponding trigger, and storing the trigger event and the execution content to a normal standard unit;
otherwise, storing the unqualified flow items and the corresponding trigger events in an unqualified standard unit, and establishing a corresponding index, wherein the index comprises: and unqualified execution information.
In this embodiment, the target module may include: any one or combination of a plurality of display remote screen function modules, screen real-time monitoring function modules, connection display function modules, file transmission function modules and remote process monitoring function modules.
Such as: in the triggering event, the number of the related screen real-time monitoring function module, the connection display function module and the file transmission function module is 3, and the number of the corresponding target modules is 3, because the operations executed by each module based on each item in the flow are different, for example, the screen real-time monitoring function module is executed in item 1, and the connection display function module is executed in items 2 and 3, the number of the items related to each module may be different.
In this embodiment, for example, in item 1, the initial execution action of the connected display function module is to display a first frame image, the intermediate execution action is to display a second frame image, a third frame image, and a fourth frame image, and the termination execution action is to display a fifth frame image, so as to determine the execution time corresponding to each execution action, and the execution capability between adjacent execution actions, such as: the first frame image, the second frame image, the third frame image and the fourth frame image can be displayed normally, and the transition from the fourth frame image to the fifth frame image is abnormal, so that the execution capacity is poor.
In this embodiment, the comprehensive execution capacity is obtained by multiplying the current execution capacity of each target module by the execution weight of the target module in the process, and finally accumulating.
In this embodiment, the normal specification unit and the unqualified specification unit are pre-established storage units, which facilitates storage of qualified information and unqualified information and facilitates subsequent retrieval and checking of unqualified information.
The beneficial effects of the above technical scheme are: the process is determined through the trigger event, the related modules are further determined, the comprehensive execution capacity of the modules is further determined, the execution capacity of all the modules is further obtained, whether the target process is qualified or not is determined, and the mutual effectiveness of the process and the modules is guaranteed to be qualified.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.
Claims (10)
1. A hybrid network monitoring system based on active network technology comprises a monitoring system and is characterized in that: the monitoring system comprises a display remote screen function module, a screen real-time monitoring function module, a connection display function module, a file transmission function module, a remote process monitoring function module and an operation recording function module.
2. A hybrid network monitoring system based on active network technology according to claim 1, characterized in that: the display remote screen function module: sending a command of intercepting a remote computer screen by using a monitoring end, receiving the command by the monitored end, judging the command, intercepting a screen of a local computer, sending a screen picture to the monitoring end, and displaying the sent screen picture on a picture display control of the monitoring end;
the screen real-time monitoring function module: the real-time monitoring function of the screen is established on the basis of the function of monitoring the screen, and when the real-time monitoring function of the screen is realized specifically, a clock control is added to a monitoring end to automatically send a screen capturing request to a monitored end at intervals, so that a coherent remote computer screen picture is obtained;
the connection display function module: the monitoring end connects the monitored computer through the host name or IP address of the remote computer; after receiving the connection request, the monitored end establishes connection and sends information of successful connection and the host name or the IP address of the computer to the monitoring end, and the monitoring end displays the information in a Tree-view control mode;
the file transmission function module: the module mainly realizes the functions of two aspects, namely, the common operation aiming at remote and local files; the mutual transmission of the folders and the files between the monitoring end and the monitored end;
the remote process monitoring function module: the function of the module is to perform behavior operations on a remote computer; in the implementation process, the implementation is realized by sending a specific command to the monitored computer through the control end, namely, the closing operation of the computer is realized through a shutdown.
The operation recording function module: when the monitored end receives all the instructions, the content and time of the received instructions and the IP address of the monitoring end are stored in the system in a fixed file format and displayed in a control form.
3. A hybrid network monitoring system based on active network technology according to claim 1, characterized in that: the monitoring system is provided with a data compression technology, data compression coding can be generally divided into lossless compression and lossy compression coding, source information can be completely restored through lossless compression, no distortion is generated, the monitoring system is information-retaining coding, objective and subjective redundancy of data is eliminated through a lossy compression coding algorithm by means of spatial and temporal correlation of the data and human hearing and vision, and the compression ratio is improved.
4. A hybrid network monitoring system based on active network technology according to claim 1, characterized in that: network security of the monitoring system: in order to ensure that the on-site monitoring information and the remote monitoring information are protected by confidentiality, integrity and authenticity when transmitted on the network, certain safety precautionary measures must be taken:
a. anti-virus software;
b. firewall: packet filtering firewalls and proxy server firewalls;
c. identity authentication;
d. data encryption: the method mainly comprises a private key algorithm and a public key algorithm, wherein the same key is used by both communication parties of the private key algorithm, but the decryption steps are just opposite to those of the public key algorithm, and different keys are used for encryption and decryption, wherein the encrypted key is public, and the decrypted key is secret;
e. digital signature: the cipher text is transmitted with the key, which is itself encrypted and needs another key to decrypt.
5. A hybrid network monitoring system based on active network technology according to claim 1, characterized in that: the monitoring end in the monitoring system is realized as follows: according to the design of the monitoring part, after the monitoring end is started, a thread is firstly created, the thread can try to connect with the monitored end, if the connection fails, after a period of time, the connection is carried out again: if the connection is successful, sending a related instruction to the monitored end according to the operation of the monitoring end user, analyzing the received instruction by the monitored end, then implementing corresponding operation according to the instruction, and if the connection with the monitored end is disconnected in the communication implementation process, disconnecting the communication connection, closing the thread and releasing all resources.
6. A hybrid network monitoring system based on active network technology according to claim 1, characterized in that: the implementation of the monitored end in the monitoring system is as follows: once the monitored end is started, the system can immediately establish a thread to carry out network communication, the thread establishes a socket and simultaneously monitors a corresponding port, connection of a client program is waited, if an external connection request exists, communication connection is established with the connection of the monitoring end, the connection is in a data communication state, after the monitored end receives an instruction, specific analysis is carried out on the received instruction, and after the analysis instruction is completed, corresponding operation is carried out according to system rules: if the received instruction is a program exit instruction, the communication connection with the monitoring end is disconnected, the thread is closed, all resources are released, and the whole communication process is finished.
7. A hybrid network monitoring system based on active network technology according to claim 1, characterized in that: designing a monitoring instruction in the monitoring system: in order to achieve all monitoring purposes of the system, the monitoring end and the monitored end need to be agreed with each other so as to realize smooth communication, firstly, a basic instruction structure (Code) needs to be designed, instruction types are specified through an instruction head in the instruction structure, the system can make corresponding reaction actions according to the instruction head, then, the specific instruction types can inherit the structure, and the own due instruction contents are added, so that the system is greatly convenient to expand in the future through an inheritance technology.
8. A hybrid network monitoring system based on active network technology according to claim 1, characterized in that: the overall design of the monitoring system is based on the remote monitoring system of the computer network, it is a set of intelligent, scalability, integrated high-efficiency and effective monitoring system, the system adopts the framework of customer end/service end (C/S), divide the system into two parts of monitoring end and monitored end, the main function of the monitoring end is to send the control command, receive the information that the monitored end returns; the monitored end receives the instruction sent by the monitoring end, executes the instruction and feeds back the execution result to the monitoring end.
9. A hybrid network monitoring system based on active network technology according to claim 2, characterized in that:
the common operations include: delete and rename;
the behavior operation comprises: and restarting, shutting down and logging off the remote computer.
10. A hybrid network monitoring system based on active network technology according to claim 1, characterized in that:
the monitoring system designs an information structure and an instruction structure independently and also designs an interface program simultaneously.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210392965.4A CN114710420A (en) | 2022-04-14 | 2022-04-14 | Hybrid network monitoring system based on active network technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210392965.4A CN114710420A (en) | 2022-04-14 | 2022-04-14 | Hybrid network monitoring system based on active network technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114710420A true CN114710420A (en) | 2022-07-05 |
Family
ID=82174765
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210392965.4A Pending CN114710420A (en) | 2022-04-14 | 2022-04-14 | Hybrid network monitoring system based on active network technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114710420A (en) |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6405250B1 (en) * | 1999-01-25 | 2002-06-11 | Lucent Technologies Inc. | Network management system based on passive monitoring and proactive management for formulation behavior state transition models |
CN1725703A (en) * | 2005-06-03 | 2006-01-25 | 南京才华信息技术有限公司 | Network behaviour management method and system |
CN103281594A (en) * | 2012-01-12 | 2013-09-04 | 特克特朗尼克公司 | Monitoring over-the-top adaptive video streaming in a network |
CN103631692A (en) * | 2013-12-09 | 2014-03-12 | 中山大学深圳研究院 | Computer screen monitoring system and realization method based on intelligent box |
CN108093068A (en) * | 2017-12-27 | 2018-05-29 | 浪潮金融信息技术有限公司 | Terminal monitoring method and device, computer storage media, terminal |
CN108833425A (en) * | 2018-06-26 | 2018-11-16 | 九江职业技术学院 | A kind of network safety system and method based on big data |
CN108965217A (en) * | 2017-05-17 | 2018-12-07 | 中国科学院软件研究所 | A kind of multi-screen digital video interactive based on C/S framework |
CN109831681A (en) * | 2019-03-12 | 2019-05-31 | 杭州联驱科技有限公司 | Display screen monitoring system and monitoring method |
CN110315799A (en) * | 2019-06-27 | 2019-10-11 | 济宁科力光电产业有限责任公司 | A kind of remote monitoring system and method for servo-pressing machine production scene |
CN111274578A (en) * | 2018-11-20 | 2020-06-12 | 慧盾信息安全科技(苏州)股份有限公司 | Data safety protection system and method for video monitoring system |
-
2022
- 2022-04-14 CN CN202210392965.4A patent/CN114710420A/en active Pending
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6405250B1 (en) * | 1999-01-25 | 2002-06-11 | Lucent Technologies Inc. | Network management system based on passive monitoring and proactive management for formulation behavior state transition models |
CN1725703A (en) * | 2005-06-03 | 2006-01-25 | 南京才华信息技术有限公司 | Network behaviour management method and system |
CN103281594A (en) * | 2012-01-12 | 2013-09-04 | 特克特朗尼克公司 | Monitoring over-the-top adaptive video streaming in a network |
CN103631692A (en) * | 2013-12-09 | 2014-03-12 | 中山大学深圳研究院 | Computer screen monitoring system and realization method based on intelligent box |
CN108965217A (en) * | 2017-05-17 | 2018-12-07 | 中国科学院软件研究所 | A kind of multi-screen digital video interactive based on C/S framework |
CN108093068A (en) * | 2017-12-27 | 2018-05-29 | 浪潮金融信息技术有限公司 | Terminal monitoring method and device, computer storage media, terminal |
CN108833425A (en) * | 2018-06-26 | 2018-11-16 | 九江职业技术学院 | A kind of network safety system and method based on big data |
CN111274578A (en) * | 2018-11-20 | 2020-06-12 | 慧盾信息安全科技(苏州)股份有限公司 | Data safety protection system and method for video monitoring system |
CN109831681A (en) * | 2019-03-12 | 2019-05-31 | 杭州联驱科技有限公司 | Display screen monitoring system and monitoring method |
CN110315799A (en) * | 2019-06-27 | 2019-10-11 | 济宁科力光电产业有限责任公司 | A kind of remote monitoring system and method for servo-pressing machine production scene |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11968186B2 (en) | Secure data parser method and system | |
JP6118778B2 (en) | System and method for securing data in motion | |
JP6120895B2 (en) | System and method for securing data in the cloud | |
BRPI0618725A2 (en) | secure data analyzer method and system | |
JP2013524352A (en) | System and method for securing data in motion | |
CN112436936B (en) | Cloud storage method and system with quantum encryption function | |
CN114710420A (en) | Hybrid network monitoring system based on active network technology | |
CN112437031A (en) | Multi-terminal converged homeland resource mobile government system based on heterogeneous network | |
CN109286635A (en) | Multiterminal logon data encryption method | |
Singh et al. | Securing data privacy on mobile devices in emergency health situations | |
CN116016994A (en) | Method suitable for high-efficiency video encryption transmission of Internet | |
AU2015204396B2 (en) | Systems and Methods for Securing Data in Motion | |
CN112765617A (en) | Data remote cooperative protection method and system | |
Aguirre et al. | A secure remote database backup system | |
CN114629803A (en) | Zero-trust data monitoring architecture and method based on security key | |
CN116055805A (en) | Video encryption method, video decryption method and related equipment | |
CN115412575A (en) | Enterprise data transmission method and device | |
Asuntha et al. | Scrutiny on Cloud Computing Preservation and Architectonics in Prevailing Orientation |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |