Abnormal access monitoring method and device

A technology of abnormal and historical access, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as increasing the user's operational burden, misjudging abnormal access, and unreasonable access exception boundaries.

Inactive Publication Date: 2019-12-31
曹严清
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, in many cases, it is necessary to monitor the access status of the server, so as to determine whether there is an abnormal access and access to facilitate operations such as maintaining network security; and currently, when performing access monitoring, users usually need to manually set the access in advance. The exception limit, so

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal access monitoring method and device
  • Abnormal access monitoring method and device
  • Abnormal access monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0061] In order to solve the above technical problems, the embodiment of the present invention provides a method for abnormal access monitoring, which can be used in an abnormal access monitoring program, system or device, and the execution subject corresponding to the method can be a terminal or a server, such as figure 1 As shown, the method includes steps S101 to S103:

[0062] Step S101, ob...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an abnormal access monitoring method and device. The method comprises the steps of obtaining historical access data; obtaining access reference data and an access discrete degree value based on the historical access data; determining an access exception boundary according to the access reference data and the access discrete degree value; and monitoring whether an access exception occurs or not according to the access exception boundary. By means of the technical scheme, a user is prevented from manually setting the access exception boundary, the monitoring efficiency of the access situation of the server can be improved, the access exception boundary automatically determined based on the historical access data is obviously more reasonable, and the judgment accuracyof exception access can be improved.

Description

technical field [0001] The invention relates to the technical field of terminals, in particular to a method and device for monitoring abnormal access. Background technique [0002] At present, in many cases, it is necessary to monitor the access status of the server, so as to determine whether there is an abnormal access and access to facilitate operations such as maintaining network security; and currently, when performing access monitoring, users usually need to manually set the access in advance. The exception limit, so that the user will be reminded if the access exception limit manually set by the user is exceeded. This monitoring method not only increases the user's operational burden, but also seriously affects the monitoring efficiency. In addition, the access exception limit is likely due to the set It is unreasonable and leads to misjudgment and abnormal access. Contents of the invention [0003] The embodiment of the present invention provides a method and a de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06
CPCH04L41/0631H04L41/147H04L41/142H04L63/1425
Inventor 曹严清
Owner 曹严清
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products