CN115514779A - Method and system for recording weblog - Google Patents

Method and system for recording weblog Download PDF

Info

Publication number
CN115514779A
CN115514779A CN202211213359.8A CN202211213359A CN115514779A CN 115514779 A CN115514779 A CN 115514779A CN 202211213359 A CN202211213359 A CN 202211213359A CN 115514779 A CN115514779 A CN 115514779A
Authority
CN
China
Prior art keywords
weblog
data message
original
weblog data
unique
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211213359.8A
Other languages
Chinese (zh)
Inventor
聂文慧
孙斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hubei University
Original Assignee
Hubei University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hubei University filed Critical Hubei University
Priority to CN202211213359.8A priority Critical patent/CN115514779A/en
Publication of CN115514779A publication Critical patent/CN115514779A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • G06F16/1824Distributed file systems implemented using Network-attached Storage [NAS] architecture

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application provides a method and a system for recording weblogs, and relates to the technical field of computer networks. The method for recording the weblog comprises the following steps: acquiring a weblog data message, and performing distributed storage on the original weblog data message in the weblog data message; reading an original weblog data message and weblog data of the weblog data message, and judging whether the weblog data carries a unique ID representing the source of the original weblog data message; and adding the unique ID representing the source of the original weblog data message into the hyperlink of the weblog data message. The method can accurately determine which page the user starts to access to another page when accessing the network, and is more accurate than the network access path determined based on the time stamp in the prior art. In addition, the application also provides a weblog recording system.

Description

Method and system for recording weblog
Technical Field
The present application relates to the field of computer network technologies, and in particular, to a method and a system for recording weblogs.
Background
With the rapid development of computer network technology, the network access path of the user is restored based on the recorded weblog, so that a website can more conveniently provide more humanized service for the user, the network access path of the user is accurately and efficiently restored according to the requirements related to network security or network examination, and the network security maintenance can be more quickly and accurately realized.
In the prior art, the following scheme can be adopted to restore the network access path of the user:
in the process that a user accesses a webpage, a log server in the internet stores and manages a temporary session Cookie with a timestamp corresponding to the webpage accessed by the user, wherein the temporary session Cookie comprises: URL (Uniform Resource Locator) of the access page, ID of the user session and timestamp of the user access page, and the Cookie of the temporary session is recorded in the weblog.
When a web page path accessed by the user needs to be restored, all log records including the unified user session ID are collected, the log with the smallest recorded timestamp is the first access page log when the user accesses the network this time, and the URL in the first access page log is the first access web page when the user accesses the network this time and can also be called a paging page (landing page), and then the URLs in all the log records are sequenced according to the sequence of the timestamps from small to large, so that the network access path when the user accesses the network this time is restored.
Although the foregoing prior art scheme can implement path restoration for a webpage visited by a user to a certain extent, since the timestamp of the visited page is recorded on the server only in the process of accessing the web log, when the network access path is restored, the access sequence can only be determined based on the recorded timestamp, so that there are technical problems that the network access information recorded in the web log is not comprehensive, and the restoration result cannot correctly reflect the process of the user accessing the webpage at some time, which results in an unclear logical structural relationship between the visited pages. For example: as shown in fig. 1, a user sends a page a of a website, and accesses a page B and a page C in sequence, assuming that the page B is accessed first and the page C is accessed later, according to the above prior art scheme, a path for the user to access the website page is determined to be from the page a to the page B, and then from the page B to the page C, so that a restored network access path is not consistent with an actual path for the actual user to access the page B and the page C in sequence, respectively, triggered from the page a, and the restored network access path is inaccurate.
Disclosure of Invention
The application aims to provide a method for recording a weblog, which can accurately determine which page a user starts to access another page when accessing a network, and is more accurate than a network access path determined based on a timestamp only in the prior art.
Another object of the present application is to provide a logging system of a blog, which can operate a logging method of the blog.
The embodiment of the application is realized as follows:
in a first aspect, an embodiment of the present application provides a method for recording a blog, which includes acquiring a blog data packet, and performing distributed storage on an original blog data packet in the blog data packet; reading an original weblog data message and weblog data of the weblog data message, and judging whether the weblog data carries a unique ID representing the source of the original weblog data message; and adding the unique ID representing the source of the original weblog data message into the hyperlink of the weblog data message.
In some embodiments of the present application, the obtaining the blog data packet and performing distributed storage on the original blog data packet in the blog data packet includes: and merging the obtained original weblog data messages with the size smaller than a preset threshold into a large file and then performing distributed storage.
In some embodiments of the present application, the above further includes: and receiving the weblog data message, storing the weblog data message, and providing the stored weblog data message for query.
In some embodiments of the present application, the reading the original weblog data packet and the weblog data of the weblog data packet, and determining whether the weblog data carries a unique ID representing a source of the original weblog data packet includes: and calculating the sending speed of the weblog data by inquiring the weblog data message within a certain time according to the original weblog data message of the read weblog data message.
In some embodiments of the present application, the above further includes: the method comprises the steps of obtaining a hop value in a unique ID representing the source of an original weblog data message, determining a sum of the hop value and a set increment, and generating a unique ID which comprises a unique identifier, a timestamp representing the obtaining time of the original weblog data message and an initial value serving as the hop value.
In some embodiments of the present application, the adding the unique ID representing the source of the original blog data message to the hyperlink of the blog data message includes: the HBase open source database based on the HDFS distributed file system is used for storing the statistical analysis results of the structured and semi-structured weblog data messages.
In some embodiments of the present application, the above further includes: and recording a user cookie corresponding to the current access page in a weblog data message corresponding to the current access page, or recording a user ID (identity) corresponding to the current access page and distributed by a website.
In a second aspect, an embodiment of the present application provides a logging system for weblogs, which includes an obtaining module, configured to obtain a weblog data packet, and perform distributed storage on an original weblog data packet in the weblog data packet;
the unique ID module is used for reading an original weblog data message and weblog data of the weblog data message and judging whether the weblog data carries a unique ID representing the source of the original weblog data message;
and the record adding module is used for adding the unique ID representing the source of the original weblog data message into the hyperlink of the weblog data message.
In some embodiments of the present application, the above includes: at least one memory for storing computer instructions; at least one processor in communication with the memory, wherein the at least one processor, when executing the computer instructions, causes the system to: the system comprises an acquisition module, a unique ID module and an adding record module.
In a third aspect, embodiments of the present application provide a computer-readable storage medium on which a computer program is stored, where the computer program, when executed by a processor, implements a method such as any one of the recording methods of a weblog.
Compared with the prior art, the embodiment of the application has at least the following advantages or beneficial effects:
the method has the advantages that distributed storage is carried out on the obtained log record files, statistical analysis is carried out on the stored log record files based on a big data analysis technology, compared with the traditional single machine technology, the method has the advantages of being safe in storage and rapid in analysis, and the network access path is determined to be the network page represented by the page identifier in the first network log entry to the page identifier in the second network log entry, so that the page from which a user accesses the other page when accessing the network can be accurately determined, and compared with the network access path determined only based on the time stamp in the prior art, the method is more accurate.
Drawings
To more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
Fig. 1 is a schematic diagram illustrating steps of a method for recording weblogs according to an embodiment of the present application;
fig. 2 is a schematic diagram illustrating detailed steps of a method for recording weblogs according to an embodiment of the present disclosure;
fig. 3 is a schematic diagram of a logging system module of a weblog according to an embodiment of the present disclosure;
fig. 4 is an electronic device provided in an embodiment of the present application.
An icon: 10-an acquisition module; 20-a unique ID module; 30-adding a recording module; 101-a memory; 102-a processor; 103-a communication interface.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, as generally described and illustrated in the figures herein, could be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined or explained in subsequent figures.
It should be noted that the term "comprises/comprising" or any other variation thereof is intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments and features of the embodiments described below can be combined with one another without conflict.
Example 1
Referring to fig. 1, fig. 1 is a schematic diagram illustrating steps of a method for recording weblogs according to an embodiment of the present application, where the steps are as follows:
step S100, obtaining a weblog data message, and performing distributed storage on an original weblog data message in the weblog data message;
in some embodiments, the weblog data message is transmitted and the original weblog data message is recorded, preferably by the weblog data transmission means;
step S110, reading an original weblog data message and weblog data of the weblog data message, and judging whether the weblog data carries a unique ID representing the source of the original weblog data message;
in some embodiments, it is determined whether the current blog data packet carries a unique access ID that represents a source page of the current blog data packet. If so, generating a unique access ID for representing the weblog data message of the current time, and correspondingly recording the page identification of the weblog data message of the current time, the unique access ID for representing the weblog data message of the current time and the unique access ID for representing the source page in the weblog entry corresponding to the weblog data message of the current time. If not, generating a unique access ID for representing the weblog data message, and correspondingly recording the page identifier of the weblog data message, the unique access ID for representing the weblog data message and the unique access ID for representing the source page in the weblog entry corresponding to the weblog data message.
Step S120, add the unique ID representing the source of the original blog data packet to the hyperlink of the blog data packet.
In some embodiments, the unique access ID of the current blog data packet is used as the unique identifier of the current blog data packet, so that accesses of different users to the same page can be distinguished, and different accesses of the same user to the same page can be distinguished, that is, the unique access IDs of the same user in accessing the same page twice in the process of one network access are different. The unique identifier GUID is used to represent the current network access, and the TimeStamp represents the access time of the weblog data packet, and preferably, the unique identifier GUID may further include a hop count value HopNumber experienced by the current weblog data packet in the current network access process.
Example 2
Referring to fig. 2, fig. 2 is a schematic diagram illustrating detailed steps of a method for recording weblogs according to an embodiment of the present disclosure, where the steps are as follows:
step S200, merging the acquired original weblog data messages with the size smaller than a preset threshold into a large file, and then performing distributed storage.
Step S210, receiving the blog data message, storing the blog data message, and providing a query of the stored blog data message.
Step S220, according to the original weblog data message of the read weblog data message, by inquiring the weblog data message within a certain time, the sending speed of the weblog data is calculated.
Step S230, obtaining a hop count value in the unique ID representing the source of the original blog data packet, determining a sum of the hop count value and the set increment, and generating a unique ID including a unique identifier, a timestamp indicating the obtaining time of the original blog data packet, and an initial value as the hop count value.
Step S240, based on the HBase database of the HDFS distributed file system, is configured to store the statistical analysis result of the structured and semi-structured blog data packet.
Step S250, recording the user cookie corresponding to the current access page in the weblog data message corresponding to the current access page, or recording the user ID distributed by the website corresponding to the current access page.
In some embodiments, the determination may be performed based on whether the URL of the page requested to be accessed, which is carried in the page access request, carries a unique access ID, if the URL carries the unique access ID, it is determined that the current weblog data packet carries the unique access ID representing the source page of the current weblog data packet, that is, the unique access ID carried in the URL, and if the URL does not carry the unique access ID, it is determined that the current weblog data packet does not carry the unique access ID representing the source page of the current weblog data packet.
In other embodiments, the determination may also be made in other manners, for example, according to whether the page access request carries a unique access ID that represents a source page of the weblog data packet of this time.
The website server generates a unique access ID representing the weblog data message at this time, and the following two methods can be specifically adopted:
the first mode is as follows: distributing a unique identifier GUID for the current network log data message, which is also equivalent to distributing the GUID for the current network access, determining the access time of the current network log data message, and then generating a unique access ID comprising the GUID and a TimeStamp Timestamp representing the access time as a unique access ID representing the current network log data message;
the second mode is as follows: and if the initial value is determined to be 0, generating a unique access ID which comprises the GUID, a TimeStamp TimeStamp representing the access time and takes the initial value as the HopNumber and is used as the unique access ID for representing the weblog data message.
Example 3
Referring to fig. 3, fig. 3 is a schematic diagram of a weblog recording system module according to an embodiment of the present application, which is shown as follows:
the acquisition module 10 is configured to acquire a blog data packet and perform distributed storage on an original blog data packet in the blog data packet;
the unique ID module 20 is configured to read an original weblog data packet of the weblog data packet and weblog data, and determine whether the weblog data carries a unique ID that represents a source of the original weblog data packet;
and the adding and recording module 30 is configured to add the unique ID representing the source of the original blog data packet to the hyperlink of the blog data packet.
As shown in fig. 4, an embodiment of the present application provides an electronic device, which includes a memory 101 for storing one or more programs; a processor 102. The one or more programs, when executed by the processor 102, implement the method of any of the first aspects as described above.
Also included is a communication interface 103, and the memory 101, processor 102 and communication interface 103 are electrically connected to each other, directly or indirectly, to enable transfer or interaction of data. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The memory 101 may be used to store software programs and modules, and the processor 102 executes the software programs and modules stored in the memory 101 to thereby execute various functional applications and data processing. The communication interface 103 may be used for communicating signaling or data with other node devices.
The Memory 101 may be, but is not limited to, a Random Access Memory 101 (RAM), a Read Only Memory 101 (ROM), a Programmable Read Only Memory 101 (PROM), an Erasable Read Only Memory 101 (EPROM), an electrically Erasable Read Only Memory 101 (EEPROM), and the like.
The processor 102 may be an integrated circuit chip having signal processing capabilities. The Processor 102 may be a general-purpose Processor 102, including a Central Processing Unit (CPU) 102, a Network Processor 102 (NP), and the like; but may also be a Digital Signal processor 102 (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components.
In the embodiments provided in the present application, it should be understood that the disclosed method and system can be implemented in other ways. The method and system embodiments described above are merely illustrative, for example, the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of methods and systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
In another aspect, embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, which, when executed by the processor 102, implements the method according to any one of the first aspect described above. The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory 101 (ROM), a Random Access Memory 101 (RAM), a magnetic disk or an optical disk, and various media capable of storing program codes.
In summary, the weblog recording method and system provided in the embodiments of the present application perform distributed storage on the obtained weblog recording file, and perform statistical analysis on the stored weblog recording file based on the big data analysis technology, and compared with the conventional single machine technology, the method and system have the beneficial effects of safe storage and rapid analysis, and determine a network access path from a weblog page represented by a page identifier in a first weblog entry to a weblog page represented by a page identifier in a second weblog entry, so that it can be accurately determined from which page a user accesses another page when accessing a network, and compared with a network access path determined only based on a timestamp in the prior art, the method and system are more accurate.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made to the present application by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
It will be evident to those skilled in the art that the application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (10)

1. A method for logging a weblog, comprising:
acquiring a weblog data message, and performing distributed storage on the original weblog data message in the weblog data message;
reading an original weblog data message and weblog data of the weblog data message, and judging whether the weblog data carries a unique ID representing the source of the original weblog data message;
and adding the unique ID representing the source of the original weblog data message into a hyperlink of the weblog data message.
2. The method for recording the blog according to claim 1, wherein the obtaining the blog data packet and the distributively storing the original blog data packet in the blog data packet comprises:
and merging the acquired original weblog data messages with the size smaller than a preset threshold into a large file and then performing distributed storage.
3. The method of logging a weblog as in claim 2, further comprising:
and receiving the weblog data message, storing the weblog data message, and providing the stored weblog data message for query.
4. The method as claimed in claim 1, wherein the reading the original blog data packet and the blog data of the blog data packet and determining whether the blog data carries a unique ID that characterizes a source of the original blog data packet comprises:
and calculating the sending speed of the weblog data by inquiring the weblog data message within a certain time according to the original weblog data message of the read weblog data message.
5. The method of logging a web log of claim 4, further comprising:
and acquiring a hop value in the unique ID representing the source of the original weblog data message, determining the sum of the hop value and the set increment, and generating the unique ID which comprises a unique identifier, a timestamp representing the acquisition time of the original weblog data message and an initial value as the hop value.
6. The method of claim 1, wherein adding the unique ID characterizing the origin of the original blog data message to the hyperlink in the blog data message comprises:
the HBase open source database based on the HDFS distributed file system is used for storing the statistical analysis results of the structured and semi-structured weblog data messages.
7. The method of logging a web log of claim 6, further comprising:
and recording a user cookie corresponding to the current access page in a weblog data message corresponding to the current access page, or recording a user ID (identity) corresponding to the current access page and distributed by a website.
8. A logging system for weblogs, comprising:
the acquisition module is used for acquiring the weblog data message and performing distributed storage on the original weblog data message in the weblog data message;
the unique ID module is used for reading an original weblog data message and weblog data of the weblog data message and judging whether the weblog data carries a unique ID representing the source of the original weblog data message;
and the adding and recording module is used for adding the unique ID representing the source of the original weblog data message into the hyperlink of the weblog data message.
9. A logging system for weblogs, as claimed in claim 8, comprising:
at least one memory for storing computer instructions;
at least one processor in communication with the memory, wherein the at least one processor, when executing the computer instructions, causes the system to perform: the system comprises an acquisition module, a unique ID module and an adding record module.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-7.
CN202211213359.8A 2022-09-30 2022-09-30 Method and system for recording weblog Pending CN115514779A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211213359.8A CN115514779A (en) 2022-09-30 2022-09-30 Method and system for recording weblog

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211213359.8A CN115514779A (en) 2022-09-30 2022-09-30 Method and system for recording weblog

Publications (1)

Publication Number Publication Date
CN115514779A true CN115514779A (en) 2022-12-23

Family

ID=84507584

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211213359.8A Pending CN115514779A (en) 2022-09-30 2022-09-30 Method and system for recording weblog

Country Status (1)

Country Link
CN (1) CN115514779A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242307A (en) * 2008-02-01 2008-08-13 刘峰 Website access analysis system and method based on built-in code proxy log
US20100332550A1 (en) * 2009-06-26 2010-12-30 Microsoft Corporation Platform For Configurable Logging Instrumentation
CN103684823A (en) * 2012-09-12 2014-03-26 阿里巴巴集团控股有限公司 Weblog recording method, network access path determining method and related devices
US20140181968A1 (en) * 2012-12-20 2014-06-26 At&T Intellectual Property I, L.P. Monitoring Operational Activities In Networks And Detecting Potential Network Intrusions And Misuses
CN110098957A (en) * 2019-04-04 2019-08-06 北京市天元网络技术股份有限公司 Big data analysis system based on network log
CN111352903A (en) * 2020-03-13 2020-06-30 京东方科技集团股份有限公司 Log management platform, log management method, medium, and electronic device
CN112491602A (en) * 2020-11-17 2021-03-12 中国平安财产保险股份有限公司 Behavior data monitoring method and device, computer equipment and medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101242307A (en) * 2008-02-01 2008-08-13 刘峰 Website access analysis system and method based on built-in code proxy log
US20100332550A1 (en) * 2009-06-26 2010-12-30 Microsoft Corporation Platform For Configurable Logging Instrumentation
CN103684823A (en) * 2012-09-12 2014-03-26 阿里巴巴集团控股有限公司 Weblog recording method, network access path determining method and related devices
US20140181968A1 (en) * 2012-12-20 2014-06-26 At&T Intellectual Property I, L.P. Monitoring Operational Activities In Networks And Detecting Potential Network Intrusions And Misuses
CN110098957A (en) * 2019-04-04 2019-08-06 北京市天元网络技术股份有限公司 Big data analysis system based on network log
CN111352903A (en) * 2020-03-13 2020-06-30 京东方科技集团股份有限公司 Log management platform, log management method, medium, and electronic device
CN112491602A (en) * 2020-11-17 2021-03-12 中国平安财产保险股份有限公司 Behavior data monitoring method and device, computer equipment and medium

Similar Documents

Publication Publication Date Title
US10587707B2 (en) Method and apparatus for monitoring website access data
CN109194671B (en) Abnormal access behavior identification method and server
CN111159514B (en) Method, device and equipment for detecting task effectiveness of web crawler and storage medium
CN109600375B (en) Message tracking method and device, electronic equipment and storage medium
CN107748790B (en) Online service system, data loading method, device and equipment
CN112632129A (en) Code stream data management method, device and storage medium
CN112835885B (en) Processing method, device and system for distributed form storage
CN112069384A (en) Buried point data processing method, server and readable storage medium
CN112165517A (en) Return source detection method and device, storage medium and electronic equipment
CN107526748B (en) Method and equipment for identifying user click behavior
CN108234392B (en) Website monitoring method and device
CN110543509B (en) Monitoring system, method and device for user access data and electronic equipment
CN115514779A (en) Method and system for recording weblog
US20190251130A1 (en) Method and apparatus for detecting page redirection circulation
CN112491943A (en) Data request method, device, storage medium and electronic equipment
CN115712552A (en) API and database correlation auditing method and system
CN112333206B (en) Safety test method and device and electronic equipment
CN111582832B (en) Fair competition checking method and system based on block chain
CN111291127B (en) Data synchronization method, device, server and storage medium
CN112861031B (en) URL refreshing method, device and equipment in CDN and CDN node
CN113779439A (en) Remote file identification method and device, server and readable storage medium
CN108763291B (en) Data management method and device and electronic equipment
CN112131198A (en) Log analysis method and device and electronic equipment
CN110929049B (en) User account identification method and device
WO2022222665A1 (en) Request recognition method and apparatus, and device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20221223

RJ01 Rejection of invention patent application after publication