CN114710420A - Hybrid network monitoring system based on active network technology - Google Patents

Hybrid network monitoring system based on active network technology Download PDF

Info

Publication number
CN114710420A
CN114710420A CN202210392965.4A CN202210392965A CN114710420A CN 114710420 A CN114710420 A CN 114710420A CN 202210392965 A CN202210392965 A CN 202210392965A CN 114710420 A CN114710420 A CN 114710420A
Authority
CN
China
Prior art keywords
monitoring
instruction
monitoring system
function module
monitored
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210392965.4A
Other languages
Chinese (zh)
Inventor
蔡雅静
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Xingyin Technology Co ltd
Original Assignee
Guangzhou Xingyin Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Xingyin Technology Co ltd filed Critical Guangzhou Xingyin Technology Co ltd
Priority to CN202210392965.4A priority Critical patent/CN114710420A/en
Publication of CN114710420A publication Critical patent/CN114710420A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/04Processing captured monitoring data, e.g. for logfile generation
    • H04L43/045Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the technical field of monitoring systems, in particular to a hybrid network monitoring system based on an active network technology, which comprises a monitoring system, wherein the monitoring system comprises a display remote screen function module, a screen real-time monitoring function module, a connection display function module, a file transmission function module, a remote process monitoring function module and an operation recording function module, the comprehensive monitoring of all computer resources in a computer local area network in colleges and universities is realized through the design of the monitoring system of the networks of a monitoring end and a monitored end, a user can conveniently monitor a remote computer, the information interaction between teachers and students is greatly facilitated, the teaching efficiency is improved, the teaching effect is enhanced, various functions of the system are conveniently realized through the monitoring system, the reusability and maintainability of the system are enhanced, and the system is independently designed with an information structure and an instruction structure, meanwhile, an interface program is designed to improve the stability of system functions.

Description

Hybrid network monitoring system based on active network technology
Technical Field
The invention relates to the technical field of monitoring systems, in particular to a hybrid network monitoring system based on an active network technology.
Background
At present, along with the global wave of informatization, it can be said that information technology has become an indispensable tool for human beings to transform nature. The monitoring system based on the computer network is used as a core component in the network monitoring system, thereby greatly facilitating resource sharing and communication among networked computer users in colleges and universities and providing the functions of remote assistance, remote management, remote teaching teleworking and the like for the users. Aiming at the application of a monitoring system in colleges and universities, a hybrid network monitoring system based on an active network technology is designed by applying a client/server (C/S) system mode on the basis of a Windows socket network programming technology.
Disclosure of Invention
The present invention is directed to a hybrid network monitoring system based on active network technology to solve the problems set forth in the background art.
In order to achieve the purpose, the invention provides the following technical scheme:
a hybrid network monitoring system based on an active network technology comprises a monitoring system, wherein the monitoring system comprises a display remote screen function module, a screen real-time monitoring function module, a connection display function module, a file transmission function module, a remote process monitoring function module and an operation recording function module.
As a preferred aspect of the present invention, the display remote screen function module: sending a command of intercepting a remote computer screen by using a monitoring end, receiving the command by the monitored end, judging the command, intercepting a screen of a local computer, sending a screen picture to the monitoring end, and displaying the sent screen picture on a picture display control of the monitoring end;
the screen real-time monitoring function module: the real-time monitoring function of the screen is established on the basis of the function of monitoring the screen, and is realized at a monitoring end by adding a clock control when the real-time monitoring function of the screen is specifically realized, and a screen capturing request is automatically sent to a monitored end at intervals, so that a coherent remote computer screen picture is obtained;
the connection display function module: the monitoring end connects the monitored computer through the host name or IP address of the remote computer; after receiving the connection request, the monitored end establishes connection and sends information of successful connection and the host name or the IP address of the computer to the monitoring end, and the monitoring end displays the information in a Tree-view control mode;
the file transmission function module: the module mainly realizes the functions of two aspects, namely, common operations such as deletion and renaming aiming at remote and local files; the mutual transmission of the folders and the files between the monitoring end and the monitored end;
the remote process monitoring function module: the module has the functions of performing shutdown and other operations on the remote computer, such as restarting, closing, logout and other operations of the remote computer; in the implementation process, the implementation is realized by sending a specific command to the monitored computer through the control end, namely, the closing operation of the computer is realized through a shutdown.
The operation recording function module: when the monitored end receives all the instructions, the content and time of the received instructions and the IP address of the monitoring end are stored in the system in a fixed file format and displayed in a control form.
As a preferable scheme of the invention, the monitoring system is provided with a data compression technology, data compression coding can be generally divided into lossless compression and lossy compression coding, the lossless compression can completely recover source information, no distortion is generated, the lossless compression coding is information-retaining coding, and a lossy compression coding algorithm utilizes the spatial and temporal correlation of data and the auditory sense and visual sense of people to eliminate the objective and subjective redundancy of the data and improve the compression ratio.
As a preferred scheme of the present invention, the network security of the monitoring system: in order to ensure that the on-site monitoring information and the remote monitoring information are protected by confidentiality, integrity and authenticity when transmitted on the network, certain safety precautionary measures must be taken:
a. anti-virus software;
b. firewall: packet filtering firewalls and proxy server firewalls;
c. identity authentication;
d. data encryption: the method mainly comprises a private key algorithm and a public key algorithm, wherein the same key is used by both communication parties of the private key algorithm, but the decryption steps are just opposite to those of the public key algorithm, and different keys are used for encryption and decryption, wherein the encrypted key is public, and the decrypted key is secret;
e. digital signature: the cipher text is transmitted with the key, which is itself encrypted and needs another key to decrypt.
As a preferred scheme of the present invention, the implementation of the monitoring end in the monitoring system: according to the design of the monitoring part, after the monitoring end is started, a thread is firstly created, the thread can try to connect with the monitored end, if the connection fails, after a period of time, the connection is carried out again: if the connection is successful, sending a related instruction to the monitored end according to the operation of the monitoring end user, analyzing the received instruction by the monitored end, then implementing corresponding operation according to the instruction, and if the connection with the monitored end is disconnected in the communication implementation process, disconnecting the communication connection, closing the thread and releasing all resources.
As a preferred scheme of the present invention, the implementation of the monitored end in the monitoring system: once the monitored end is started, the system can immediately establish a thread to carry out network communication, the thread establishes a socket and simultaneously monitors a corresponding port, connection of a client program is waited, if an external connection request exists, communication connection is established with the connection of the monitoring end, the connection is in a data communication state, after the monitored end receives an instruction, specific analysis is carried out on the received instruction, and after the analysis instruction is completed, corresponding operation is carried out according to system rules: if the received instruction is a program exit instruction, the communication connection with the monitoring terminal is disconnected, the thread is closed, all resources are released, and the whole communication process is finished.
As a preferred scheme of the present invention, the design of the monitoring instruction in the monitoring system is as follows: in order to achieve all monitoring purposes of the system, the monitoring end and the monitored end need to be agreed with each other so as to realize smooth communication, firstly, a basic instruction structure (Code) needs to be designed, instruction types are specified through an instruction head in the instruction structure, the system can make corresponding reaction actions according to the instruction head, then, the specific instruction types can inherit the structure, and the own due instruction contents are added, so that the system is greatly convenient to expand in the future through an inheritance technology.
As the preferred scheme of the invention, the overall design of the monitoring system is based on the remote monitoring system of the computer network, it is a set of intelligent, scalability, integrated high-efficiency and effective monitoring system, the system adopts the framework of customer end/service end (C/S), divide the system into two parts of monitoring end and monitored end, the main function of the monitoring end is to send the control command, receive the information that the monitored end returns; the monitored end receives the instruction sent by the monitoring end, executes the instruction and feeds back the execution result to the monitoring end; and an information structure and an instruction structure are independently designed, and an interface program is simultaneously designed.
Compared with the prior art, the invention has the beneficial effects that:
1. in the invention, voice and image data are compressed in a lossy mode in a remote monitoring system through a data compression technology, character files are compressed in a lossless mode, multi-channel load compression in a protocol is a better compression scheme, and the compression scheme has better compression ratio for various different data streams, particularly when the data streams are mixed, confidentiality, integrity and authenticity of on-site monitoring information and remote monitoring information can be protected when the on-site monitoring information and the remote monitoring information are transmitted on the network through the network security of the monitoring system, so that the network security in the monitoring system is high, the data transmission effect of the monitoring system is good, all-around monitoring of all computer resources in a local area network of a computer in high school is realized through the design of the monitoring system of the network of a monitoring end and a monitored end, a user can conveniently monitor the remote computer, and the information interaction between teachers and students is greatly facilitated, the teaching efficiency is improved, and the teaching effect is enhanced.
2. In the invention, the instruction type is specified through the instruction head in the instruction structure, the system can make corresponding reaction action according to the instruction head, then the specific instruction type can inherit the structure and add the own due instruction content into the structure, the future expansion of the system is greatly facilitated through the inheritance technology, various functions of the system are conveniently realized through the monitoring system, the reusability and the maintainability of the system are enhanced, the information structure and the instruction structure are independently designed by the system, and meanwhile, the interface program is designed, so that the stability of the system function is improved.
3. In the invention, the flow is determined through the trigger event, the related modules are further determined, the comprehensive execution capacity of the modules is further determined, the execution capacity of all the modules is further obtained, whether the target flow is qualified or not is determined, and the mutual effectiveness of the flow and the modules is ensured to be qualified.
Drawings
FIG. 1 is a schematic block diagram of a system of the present invention;
FIG. 2 is a system architecture diagram of the present invention;
fig. 3 is a network security architecture diagram of the monitoring system of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all embodiments, and all other embodiments obtained by a person of ordinary skill in the art without creative efforts based on the embodiments of the present invention belong to the protection scope of the present invention.
In order to facilitate an understanding of the invention, the invention will now be described more fully hereinafter with reference to the accompanying drawings, in which several embodiments of the invention are shown, but which can be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete.
Example (b): please refer to fig. 1-3, which illustrate a hybrid network monitoring system based on active network technology, comprising a monitoring system, wherein the monitoring system comprises a display remote screen function module, a screen real-time monitoring function module, a connection display function module, a file transmission function module, a remote process monitoring function module, and an operation recording function module; display remote screen function module: sending a command of intercepting a remote computer screen by using a monitoring end, receiving the command by the monitored end, judging the command, intercepting a screen of a local computer, sending a screen picture to the monitoring end, and displaying the sent screen picture on a picture display control of the monitoring end;
the screen real-time monitoring function module: the real-time monitoring function of the screen is established on the basis of the function of monitoring the screen, and is realized at a monitoring end by adding a clock control when the real-time monitoring function of the screen is specifically realized, and a screen capturing request is automatically sent to a monitored end at intervals, so that a coherent remote computer screen picture is obtained;
connecting a display function module: the monitoring end connects the monitored computer through the host name or IP address of the remote computer; after receiving the connection request, the monitored end establishes connection and sends information of successful connection and the host name or the IP address of the computer to the monitoring end, and the monitoring end displays the information in a Tree-view control mode;
the file transmission function module: the module mainly realizes the functions of two aspects, namely, common operations such as deletion and renaming aiming at remote and local files; the mutual transmission of the folders and the files between the monitoring end and the monitored end;
remote process monitoring function module: the module has the functions of performing shutdown and other operations on the remote computer, such as restarting, closing, logout and other operations of the remote computer; in the implementation process, the implementation is realized by sending a specific command to the monitored computer through the control end, namely, the closing operation of the computer is realized through a shutdown.
The operation recording function module: when the monitored end receives all the instructions, the content and time of the received instructions and the IP address of the monitoring end are stored in the system in a fixed file format and displayed in a control form.
In the embodiment, the monitoring system is provided with a data compression technology, data compression coding can be generally divided into lossless compression and lossy compression coding, the lossless compression can completely recover source information, the lossless compression coding is information-retaining coding without any distortion, a lossy compression coding algorithm utilizes the spatial and temporal correlation of data and the auditory sense and visual sense of people to eliminate the objective and subjective redundancy of the data and improve the compression ratio, voice and image data in a remote monitoring system are compressed in a lossy mode through the data compression technology, a character file is compressed in a lossless mode, multi-channel load compression in a protocol is a better compression scheme, and the monitoring system has a better compression ratio for various different data streams, particularly when the data streams are mixed.
In this embodiment, the network security of the monitoring system: in order to ensure that the on-site monitoring information and the remote monitoring information are protected by confidentiality, integrity and authenticity when transmitted on the network, certain safety precautionary measures must be taken:
a. anti-virus software;
b. firewall: packet filtering firewalls and proxy server firewalls;
c. identity authentication;
d. data encryption: the private key algorithm communication parties use the same key, but the decryption steps are just opposite to those of the public key algorithm, the public key algorithm encrypts and decrypts by using different keys, wherein the encrypted key is public, and the decrypted key is secret;
e. digital signature: the cipher text and the key are sent together, the key is encrypted, and another key is needed for decryption;
the network security of the monitoring system can protect the confidentiality, integrity and authenticity of the on-site monitoring information and the remote monitoring information during network transmission, so that the network security in the monitoring system is high, and the data transmission effect of the monitoring system is good.
In this embodiment, the implementation of the monitoring end in the monitoring system is as follows: according to the design of the monitoring part, after the monitoring end is started, a thread is firstly created, the thread can try to connect with the monitored end, if the connection fails, after a period of time, the connection is carried out again: if the connection is successful, sending a related instruction to the monitored end according to the operation of the monitoring end user, analyzing the received instruction by the monitored end, then implementing corresponding operation according to the instruction, and in the communication implementation process, if the connection with the monitored end is disconnected, disconnecting the communication connection, closing the thread, releasing all resources, and implementing the monitored end in the monitoring system: once the monitored end is started, the system can immediately establish a thread to carry out network communication, the thread establishes a socket and simultaneously monitors a corresponding port, connection of a client program is waited, if an external connection request exists, communication connection is established with the connection of the monitoring end, the connection is in a data communication state, after the monitored end receives an instruction, specific analysis is carried out on the received instruction, and after the analysis instruction is completed, corresponding operation is carried out according to system rules: if the received instruction is a program exit instruction, the communication connection with the monitoring terminal is disconnected, the thread is closed, all resources are released, the whole communication process is finished, all computer resources in a computer local area network in colleges and universities are monitored comprehensively through the design of the monitoring system of the network of the monitoring terminal and the monitored terminal, a user can conveniently monitor a remote computer, information interaction between teachers and students is greatly facilitated, teaching efficiency is improved, and the teaching effect is enhanced.
In this embodiment, the design of the monitoring instructions in the monitoring system: in order to achieve all monitoring purposes of the system, the monitoring end and the monitored end need to be agreed with each other so as to realize smooth communication, firstly, a basic instruction structure (Code) needs to be designed, instruction types are specified through an instruction head in the instruction structure, the system can make corresponding reaction actions according to the instruction head, then, the specific instruction types can inherit the structure, the own due instruction content is added, and the future expansion of the system is greatly facilitated through an inheritance technology.
In the embodiment, the overall design of the monitoring system is a remote monitoring system based on a computer network, which is a set of monitoring system with intellectualization, expandability, high integration efficiency and effectiveness, the system adopts a client/server (C/S) framework, the system is divided into a monitoring end and a monitored end, and the main function of the monitoring end is to send a control instruction and receive information returned by the monitored end; the monitored end receives the instruction sent by the monitoring end, executes the instruction and feeds back the execution result to the monitoring end; and the information structure and the instruction structure are independently designed, the interface program is simultaneously designed, the monitoring system is used for conveniently realizing various functions of the system, the reusability and the maintainability of the system are enhanced, the information structure and the instruction structure are independently designed, and the interface program is simultaneously designed, so that the stability of the system function is improved.
The working principle is as follows: when in use, the overall design of the monitoring system is a remote monitoring system based on a computer network, and the system is a set of monitoring system with intellectualization, expandability, high integration efficiency and effectiveness, the system adopts a client/server (C/S) framework, the system is divided into a monitoring end and a monitored end, and the main function of the monitoring end is to send a control instruction and receive information returned by the monitored end; the monitored end receives the instruction sent by the monitoring end, executes the instruction and feeds back the execution result to the monitoring end; and designed information structure and instruction structure alone, designed interface program simultaneously, through monitored control system for each item function of convenient realization system, strengthen the reusability and the maintainability of system, the system has designed information structure and instruction structure alone, has designed interface program simultaneously to improve system function's stability, show remote screen functional module: sending a command of intercepting a remote computer screen by using a monitoring end, receiving the command by the monitored end, judging the command, intercepting a screen of a local computer, sending a screen picture to the monitoring end, and displaying the sent screen picture on a picture display control of the monitoring end;
the screen real-time monitoring function module: the real-time monitoring function of the screen is established on the basis of the function of monitoring the screen, and when the real-time monitoring function of the screen is realized specifically, a clock control is added to a monitoring end to automatically send a screen capturing request to a monitored end at intervals, so that a coherent remote computer screen picture is obtained;
connecting a display function module: the monitoring end connects the monitored computer through the host name or IP address of the remote computer; after receiving the connection request, the monitored end establishes connection and sends information of successful connection and the host name or the IP address of the computer to the monitoring end, and the monitoring end displays the information in a Tree-view control mode;
the file transmission function module: the module mainly realizes the functions of two aspects, namely, common operations such as deletion and renaming aiming at remote and local files; the mutual transmission of the folders and the files between the monitoring end and the monitored end;
remote process monitoring function module: the module has the functions of performing shutdown and other operations on the remote computer, such as restarting, closing, logout and other operations of the remote computer; in the implementation process, the implementation is realized by sending a specific command to the monitored computer through the control end, namely, the closing operation of the computer is realized through a shutdown.
The operation recording function module: when the monitored end receives all the instructions, the content and time of the received instructions and the IP address of the monitoring end are stored in the system in a fixed file format and displayed in a control form;
the monitoring system is provided with a data compression technology, the data compression coding can be generally divided into lossless compression and lossy compression coding, the lossless compression can completely recover source information, the lossless compression coding does not generate any distortion and is an information-retaining coding, the lossy compression coding algorithm eliminates objective and subjective redundancy of data by utilizing the spatial and time correlation of the data and the auditory and visual properties of people and improves the compression ratio, voice and image data in the remote monitoring system are compressed in a lossy mode through the data compression technology, while character files are compressed in a lossless mode, and multi-channel load compression in a protocol is a better compression scheme and has a better compression ratio for a plurality of different data streams, particularly when the data streams are mixed;
network security of the monitoring system: in order to ensure that the on-site monitoring information and the remote monitoring information are protected by confidentiality, integrity and authenticity when transmitted on the network, certain safety precautionary measures must be taken:
a. anti-virus software;
b. firewall: packet filtering firewalls and proxy server firewalls;
c. identity authentication;
d. data encryption: the private key algorithm communication parties use the same key, but the decryption steps are just opposite to those of the public key algorithm, the public key algorithm encrypts and decrypts by using different keys, wherein the encrypted key is public, and the decrypted key is secret;
e. digital signature: the cipher text and the key are transmitted together, and the key is encrypted and needs another key for decryption;
the confidentiality, integrity and authenticity protection of the on-site monitoring information and the remote monitoring information during network transmission can be realized through the network security of the monitoring system, so that the network security in the monitoring system is high, and the data transmission effect of the monitoring system is good;
the realization of a monitoring end in the monitoring system: according to the design of the monitoring part, after the monitoring end is started, a thread is firstly created, the thread can try to connect with the monitored end, if the connection fails, after a period of time, the connection is carried out again: if the connection is successful, sending a related instruction to the monitored end according to the operation of the monitoring end user, analyzing the received instruction by the monitored end, then implementing corresponding operation according to the instruction, and in the communication implementation process, if the connection with the monitored end is disconnected, disconnecting the communication connection, closing the thread, releasing all resources, and implementing the monitored end in the monitoring system: once the monitored end is started, the system can immediately establish a thread to carry out network communication, the thread establishes a socket and simultaneously monitors a corresponding port, connection of a client program is waited, if an external connection request exists, communication connection is established with the connection of the monitoring end, the connection is in a data communication state, after the monitored end receives an instruction, specific analysis is carried out on the received instruction, and after the analysis instruction is completed, corresponding operation is carried out according to system rules: if the received instruction is a program exit instruction, the communication connection with the monitoring terminal is disconnected, the thread is closed, all resources are released, the whole communication process is finished, and the design of the monitoring system of the network of the monitoring terminal and the monitored terminal is used for realizing the all-round monitoring of all computer resources in the computer local area network in colleges and universities, so that a user can conveniently monitor a remote computer, the information interaction between teachers and students is greatly facilitated, the teaching efficiency is improved, and the teaching effect is enhanced;
designing a monitoring instruction in the monitoring system: in order to achieve all monitoring purposes of the system, the monitoring end and the monitored end need to be agreed with each other so as to realize smooth communication, firstly, a basic instruction structure (Code) needs to be designed, instruction types are specified through an instruction head in the instruction structure, the system can make corresponding reaction actions according to the instruction head, then, the specific instruction types can inherit the structure, the own due instruction contents are added, and the system is greatly convenient for future expansion through an inheritance technology.
In one embodiment, the operation recording function module is further configured to obtain a trigger event, and determine, based on the trigger event, a target process involved and a target module involved in each item in the target process;
recording an initial execution action, an intermediate execution action and a termination execution action of a corresponding target module under each project, determining a first execution capacity of the corresponding module based on the initial execution action and the intermediate execution action, and determining a second execution capacity of the corresponding module based on the intermediate execution action and the termination execution action;
determining an execution process of each target module based on a target process, and determining the execution capacity of the corresponding target module based on the target process based on a plurality of first execution capacities and a plurality of second execution capacities in the execution process;
Figure BDA0003596263930000121
Figure BDA0003596263930000122
wherein n isi1Representing the number of items involved in the target module i 1; n isi2The execution capacity number of the i2 th project related to the target module i1 is represented, and the value is 2; a. thei1,i2Representing the execution capacity of the i2 th item referred to by the target module i 1; is at a position ofi1,i2The execution correction factor of the i2 th item related to the target module i1 is represented, and the value range is [0.8, 1 ]];Bi1,i2,2Represents the duration of the intermediate execution action of the i2 th item referred by the target module i 1; b isi1,i2,1Represents the duration of the initial execution action of the i2 th item referred to by the target module i 1; b isi1,i2,3Represents the duration of the termination execution action of the i2 th item referred to by the target module i1, and Bi1,i2,2>Bi1,i2,3>Bi1,i2,1
Figure BDA0003596263930000123
An operation scale index representing the middle execution action of the i2 th project related to the target module i 1; e represents the operation scale, and the value is 0.3; si1,i2A hinting function representing the i2 th item to which the goal module i1 relates;
determining whether the target process is qualified or not based on the execution capacity of each target module;
if the trigger event is qualified, reserving the trigger event and the execution content after corresponding trigger, and storing the trigger event and the execution content to a normal standard unit;
otherwise, storing the unqualified flow items and the corresponding trigger events in an unqualified standard unit, and establishing a corresponding index, wherein the index comprises: and unqualified execution information.
In this embodiment, the target module may include: any one or combination of a plurality of display remote screen function modules, screen real-time monitoring function modules, connection display function modules, file transmission function modules and remote process monitoring function modules.
Such as: in the triggering event, the number of the related screen real-time monitoring function module, the connection display function module and the file transmission function module is 3, and the number of the corresponding target modules is 3, because the operations executed by each module based on each item in the flow are different, for example, the screen real-time monitoring function module is executed in item 1, and the connection display function module is executed in items 2 and 3, the number of the items related to each module may be different.
In this embodiment, for example, in item 1, the initial execution action of the connected display function module is to display a first frame image, the intermediate execution action is to display a second frame image, a third frame image, and a fourth frame image, and the termination execution action is to display a fifth frame image, so as to determine the execution time corresponding to each execution action, and the execution capability between adjacent execution actions, such as: the first frame image, the second frame image, the third frame image and the fourth frame image can be displayed normally, and the transition from the fourth frame image to the fifth frame image is abnormal, so that the execution capacity is poor.
In this embodiment, the comprehensive execution capacity is obtained by multiplying the current execution capacity of each target module by the execution weight of the target module in the process, and finally accumulating.
In this embodiment, the normal specification unit and the unqualified specification unit are pre-established storage units, which facilitates storage of qualified information and unqualified information and facilitates subsequent retrieval and checking of unqualified information.
The beneficial effects of the above technical scheme are: the process is determined through the trigger event, the related modules are further determined, the comprehensive execution capacity of the modules is further determined, the execution capacity of all the modules is further obtained, whether the target process is qualified or not is determined, and the mutual effectiveness of the process and the modules is guaranteed to be qualified.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (10)

1. A hybrid network monitoring system based on active network technology comprises a monitoring system and is characterized in that: the monitoring system comprises a display remote screen function module, a screen real-time monitoring function module, a connection display function module, a file transmission function module, a remote process monitoring function module and an operation recording function module.
2. A hybrid network monitoring system based on active network technology according to claim 1, characterized in that: the display remote screen function module: sending a command of intercepting a remote computer screen by using a monitoring end, receiving the command by the monitored end, judging the command, intercepting a screen of a local computer, sending a screen picture to the monitoring end, and displaying the sent screen picture on a picture display control of the monitoring end;
the screen real-time monitoring function module: the real-time monitoring function of the screen is established on the basis of the function of monitoring the screen, and when the real-time monitoring function of the screen is realized specifically, a clock control is added to a monitoring end to automatically send a screen capturing request to a monitored end at intervals, so that a coherent remote computer screen picture is obtained;
the connection display function module: the monitoring end connects the monitored computer through the host name or IP address of the remote computer; after receiving the connection request, the monitored end establishes connection and sends information of successful connection and the host name or the IP address of the computer to the monitoring end, and the monitoring end displays the information in a Tree-view control mode;
the file transmission function module: the module mainly realizes the functions of two aspects, namely, the common operation aiming at remote and local files; the mutual transmission of the folders and the files between the monitoring end and the monitored end;
the remote process monitoring function module: the function of the module is to perform behavior operations on a remote computer; in the implementation process, the implementation is realized by sending a specific command to the monitored computer through the control end, namely, the closing operation of the computer is realized through a shutdown.
The operation recording function module: when the monitored end receives all the instructions, the content and time of the received instructions and the IP address of the monitoring end are stored in the system in a fixed file format and displayed in a control form.
3. A hybrid network monitoring system based on active network technology according to claim 1, characterized in that: the monitoring system is provided with a data compression technology, data compression coding can be generally divided into lossless compression and lossy compression coding, source information can be completely restored through lossless compression, no distortion is generated, the monitoring system is information-retaining coding, objective and subjective redundancy of data is eliminated through a lossy compression coding algorithm by means of spatial and temporal correlation of the data and human hearing and vision, and the compression ratio is improved.
4. A hybrid network monitoring system based on active network technology according to claim 1, characterized in that: network security of the monitoring system: in order to ensure that the on-site monitoring information and the remote monitoring information are protected by confidentiality, integrity and authenticity when transmitted on the network, certain safety precautionary measures must be taken:
a. anti-virus software;
b. firewall: packet filtering firewalls and proxy server firewalls;
c. identity authentication;
d. data encryption: the method mainly comprises a private key algorithm and a public key algorithm, wherein the same key is used by both communication parties of the private key algorithm, but the decryption steps are just opposite to those of the public key algorithm, and different keys are used for encryption and decryption, wherein the encrypted key is public, and the decrypted key is secret;
e. digital signature: the cipher text is transmitted with the key, which is itself encrypted and needs another key to decrypt.
5. A hybrid network monitoring system based on active network technology according to claim 1, characterized in that: the monitoring end in the monitoring system is realized as follows: according to the design of the monitoring part, after the monitoring end is started, a thread is firstly created, the thread can try to connect with the monitored end, if the connection fails, after a period of time, the connection is carried out again: if the connection is successful, sending a related instruction to the monitored end according to the operation of the monitoring end user, analyzing the received instruction by the monitored end, then implementing corresponding operation according to the instruction, and if the connection with the monitored end is disconnected in the communication implementation process, disconnecting the communication connection, closing the thread and releasing all resources.
6. A hybrid network monitoring system based on active network technology according to claim 1, characterized in that: the implementation of the monitored end in the monitoring system is as follows: once the monitored end is started, the system can immediately establish a thread to carry out network communication, the thread establishes a socket and simultaneously monitors a corresponding port, connection of a client program is waited, if an external connection request exists, communication connection is established with the connection of the monitoring end, the connection is in a data communication state, after the monitored end receives an instruction, specific analysis is carried out on the received instruction, and after the analysis instruction is completed, corresponding operation is carried out according to system rules: if the received instruction is a program exit instruction, the communication connection with the monitoring end is disconnected, the thread is closed, all resources are released, and the whole communication process is finished.
7. A hybrid network monitoring system based on active network technology according to claim 1, characterized in that: designing a monitoring instruction in the monitoring system: in order to achieve all monitoring purposes of the system, the monitoring end and the monitored end need to be agreed with each other so as to realize smooth communication, firstly, a basic instruction structure (Code) needs to be designed, instruction types are specified through an instruction head in the instruction structure, the system can make corresponding reaction actions according to the instruction head, then, the specific instruction types can inherit the structure, and the own due instruction contents are added, so that the system is greatly convenient to expand in the future through an inheritance technology.
8. A hybrid network monitoring system based on active network technology according to claim 1, characterized in that: the overall design of the monitoring system is based on the remote monitoring system of the computer network, it is a set of intelligent, scalability, integrated high-efficiency and effective monitoring system, the system adopts the framework of customer end/service end (C/S), divide the system into two parts of monitoring end and monitored end, the main function of the monitoring end is to send the control command, receive the information that the monitored end returns; the monitored end receives the instruction sent by the monitoring end, executes the instruction and feeds back the execution result to the monitoring end.
9. A hybrid network monitoring system based on active network technology according to claim 2, characterized in that:
the common operations include: delete and rename;
the behavior operation comprises: and restarting, shutting down and logging off the remote computer.
10. A hybrid network monitoring system based on active network technology according to claim 1, characterized in that:
the monitoring system designs an information structure and an instruction structure independently and also designs an interface program simultaneously.
CN202210392965.4A 2022-04-14 2022-04-14 Hybrid network monitoring system based on active network technology Pending CN114710420A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210392965.4A CN114710420A (en) 2022-04-14 2022-04-14 Hybrid network monitoring system based on active network technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210392965.4A CN114710420A (en) 2022-04-14 2022-04-14 Hybrid network monitoring system based on active network technology

Publications (1)

Publication Number Publication Date
CN114710420A true CN114710420A (en) 2022-07-05

Family

ID=82174765

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210392965.4A Pending CN114710420A (en) 2022-04-14 2022-04-14 Hybrid network monitoring system based on active network technology

Country Status (1)

Country Link
CN (1) CN114710420A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6405250B1 (en) * 1999-01-25 2002-06-11 Lucent Technologies Inc. Network management system based on passive monitoring and proactive management for formulation behavior state transition models
CN1725703A (en) * 2005-06-03 2006-01-25 南京才华信息技术有限公司 Network behaviour management method and system
CN103281594A (en) * 2012-01-12 2013-09-04 特克特朗尼克公司 Monitoring over-the-top adaptive video streaming in a network
CN103631692A (en) * 2013-12-09 2014-03-12 中山大学深圳研究院 Computer screen monitoring system and realization method based on intelligent box
CN108093068A (en) * 2017-12-27 2018-05-29 浪潮金融信息技术有限公司 Terminal monitoring method and device, computer storage media, terminal
CN108833425A (en) * 2018-06-26 2018-11-16 九江职业技术学院 A kind of network safety system and method based on big data
CN108965217A (en) * 2017-05-17 2018-12-07 中国科学院软件研究所 A kind of multi-screen digital video interactive based on C/S framework
CN109831681A (en) * 2019-03-12 2019-05-31 杭州联驱科技有限公司 Display screen monitoring system and monitoring method
CN110315799A (en) * 2019-06-27 2019-10-11 济宁科力光电产业有限责任公司 A kind of remote monitoring system and method for servo-pressing machine production scene
CN111274578A (en) * 2018-11-20 2020-06-12 慧盾信息安全科技(苏州)股份有限公司 Data safety protection system and method for video monitoring system

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6405250B1 (en) * 1999-01-25 2002-06-11 Lucent Technologies Inc. Network management system based on passive monitoring and proactive management for formulation behavior state transition models
CN1725703A (en) * 2005-06-03 2006-01-25 南京才华信息技术有限公司 Network behaviour management method and system
CN103281594A (en) * 2012-01-12 2013-09-04 特克特朗尼克公司 Monitoring over-the-top adaptive video streaming in a network
CN103631692A (en) * 2013-12-09 2014-03-12 中山大学深圳研究院 Computer screen monitoring system and realization method based on intelligent box
CN108965217A (en) * 2017-05-17 2018-12-07 中国科学院软件研究所 A kind of multi-screen digital video interactive based on C/S framework
CN108093068A (en) * 2017-12-27 2018-05-29 浪潮金融信息技术有限公司 Terminal monitoring method and device, computer storage media, terminal
CN108833425A (en) * 2018-06-26 2018-11-16 九江职业技术学院 A kind of network safety system and method based on big data
CN111274578A (en) * 2018-11-20 2020-06-12 慧盾信息安全科技(苏州)股份有限公司 Data safety protection system and method for video monitoring system
CN109831681A (en) * 2019-03-12 2019-05-31 杭州联驱科技有限公司 Display screen monitoring system and monitoring method
CN110315799A (en) * 2019-06-27 2019-10-11 济宁科力光电产业有限责任公司 A kind of remote monitoring system and method for servo-pressing machine production scene

Similar Documents

Publication Publication Date Title
US11968186B2 (en) Secure data parser method and system
JP6118778B2 (en) System and method for securing data in motion
JP6120895B2 (en) System and method for securing data in the cloud
BRPI0618725A2 (en) secure data analyzer method and system
JP2013524352A (en) System and method for securing data in motion
CN112436936B (en) Cloud storage method and system with quantum encryption function
CN114710420A (en) Hybrid network monitoring system based on active network technology
CN112437031A (en) Multi-terminal converged homeland resource mobile government system based on heterogeneous network
CN109286635A (en) Multiterminal logon data encryption method
Singh et al. Securing data privacy on mobile devices in emergency health situations
CN116016994A (en) Method suitable for high-efficiency video encryption transmission of Internet
AU2015204396B2 (en) Systems and Methods for Securing Data in Motion
CN112765617A (en) Data remote cooperative protection method and system
Aguirre et al. A secure remote database backup system
CN114629803A (en) Zero-trust data monitoring architecture and method based on security key
CN116055805A (en) Video encryption method, video decryption method and related equipment
CN115412575A (en) Enterprise data transmission method and device
Asuntha et al. Scrutiny on Cloud Computing Preservation and Architectonics in Prevailing Orientation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination