CN114640571A - A terminal security analysis method, system, computer equipment and storage medium - Google Patents
A terminal security analysis method, system, computer equipment and storage medium Download PDFInfo
- Publication number
- CN114640571A CN114640571A CN202210337885.9A CN202210337885A CN114640571A CN 114640571 A CN114640571 A CN 114640571A CN 202210337885 A CN202210337885 A CN 202210337885A CN 114640571 A CN114640571 A CN 114640571A
- Authority
- CN
- China
- Prior art keywords
- server
- query
- user terminal
- terminal
- virtual table
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/901—Indexing; Data structures therefor; Storage structures
- G06F16/9017—Indexing; Data structures therefor; Storage structures using directory or table look-up
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/04—Processing captured monitoring data, e.g. for logfile generation
- H04L43/045—Processing captured monitoring data, e.g. for logfile generation for graphical visualisation of monitoring data
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
Landscapes
- Engineering & Computer Science (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Debugging And Monitoring (AREA)
Abstract
Description
技术领域technical field
本发明涉及安全分析领域,特别是涉及一种终端安全分析方法、系统、计算机设备和存储介质。The invention relates to the field of security analysis, in particular to a terminal security analysis method, system, computer equipment and storage medium.
背景技术Background technique
传统的终端安全分析工作需要安全工程师在不同平台使用限定平台的安全工具进行安全监控,技术门槛较高,且不同平台的分析结果难以统一管理维护。Traditional terminal security analysis work requires security engineers to use platform-limited security tools for security monitoring on different platforms. The technical threshold is high, and the analysis results of different platforms are difficult to manage and maintain in a unified manner.
发明内容SUMMARY OF THE INVENTION
基于此,有必要针对上述技术问题,提供一种能够统一使用服务端管理软件实现不同平台的用户终端安全分析的终端安全分析方法、系统、计算机设备和存储介质。Based on this, it is necessary to provide a terminal security analysis method, system, computer equipment and storage medium that can uniformly use server management software to realize user terminal security analysis of different platforms.
一方面,提供一种终端安全分析方法,所述方法包括:In one aspect, a terminal security analysis method is provided, the method comprising:
在用户终端上安装终端代理软件,通过所述终端代理软件获取与所述用户终端适配的虚拟表,并将所述用户终端的系统信息映射到所述适配的虚拟表上;Install terminal agent software on the user terminal, obtain a virtual table adapted to the user terminal through the terminal agent software, and map the system information of the user terminal to the adapted virtual table;
服务端向所述终端代理软件发送结构化查询语句,所述终端代理软件接收所述结构化查询语句后执行对所述适配的虚拟表的查询操作;The server sends a structured query statement to the terminal agent software, and the terminal agent software performs a query operation on the adapted virtual table after receiving the structured query statement;
获取查询结果,并将所述查询结果传输到所述服务端的数据库或预设位置;Obtain query results, and transmit the query results to the database or preset location of the server;
所述服务端执行监控操作,从所述数据库中获取监控信息。The server performs monitoring operations, and obtains monitoring information from the database.
在其中一个实施例中,所述在用户终端上安装终端代理软件,通过所述终端代理软件获取适配所述用户终端的虚拟表,并将所述用户终端的系统信息映射到所述虚拟表上,具体包括:In one embodiment, the terminal agent software is installed on the user terminal, a virtual table adapted to the user terminal is obtained through the terminal agent software, and the system information of the user terminal is mapped to the virtual table on, including:
获取与所述用户终端相适配的虚拟表和与所述适配的虚拟表相应的处理函数;acquiring a virtual table adapted to the user terminal and a processing function corresponding to the adapted virtual table;
在用户终端上安装终端代理软件;Install terminal agent software on the user terminal;
所述终端代理软件通过所述处理函数将所述用户终端的系统信息与所述适配的虚拟表之间建立映射关系。The terminal agent software establishes a mapping relationship between the system information of the user terminal and the adapted virtual table through the processing function.
在其中一个实施例中,所述服务端包括服务端管理软件和服务端监控软件,所述服务端向所述终端代理软件发送结构化查询语句前,还包括:In one embodiment, the server includes server management software and server monitoring software, and before the server sends a structured query statement to the terminal agent software, it further includes:
接收运维人员通过所述服务端管理软件和所述服务端监控软件执行的信息配置。The information configuration performed by the operation and maintenance personnel through the server management software and the server monitoring software is received.
在其中一个实施例中,所述适配的虚拟表的查询操作,具体包括:In one embodiment, the query operation of the adapted virtual table specifically includes:
获取任务配置;Get task configuration;
从所述任务配置中获取定时查询任务列表;Obtain a list of timed query tasks from the task configuration;
根据所述定时查询任务列表执行状态表和事件表的查询任务;Execute the query task of the state table and the event table according to the timed query task list;
其中,所述虚拟表包括所述状态表和所述事件表,所述状态表为未设定查询时间的虚拟表,所述事件表为设定查询时间的虚拟表。Wherein, the virtual table includes the state table and the event table, the state table is a virtual table with no query time set, and the event table is a virtual table with set query time.
在其中一个实施例中,所述服务端上设置通信接口,所述查询结果中涉及监控信息的查询结果均通过所述通信接口返回所述服务端并存储到所述数据库中。In one embodiment, a communication interface is set on the server, and the query results involving monitoring information in the query results are all returned to the server through the communication interface and stored in the database.
在其中一个实施例中,所述监控操作,具体包括:In one embodiment, the monitoring operation specifically includes:
所述服务端接收监控指令;the server receives the monitoring instruction;
所述服务端从所述数据库中拉取监控信息;The server pulls the monitoring information from the database;
根据所述监控信息判断是否执行告警。Whether to execute an alarm is determined according to the monitoring information.
在其中一个实施例中,所述通信接口,具体包括:In one embodiment, the communication interface specifically includes:
活跃检测接口,用于检测所述用户终端是否处于活跃状态;an activity detection interface, used to detect whether the user terminal is in an active state;
任务获取接口,用于所述用户终端从所述服务端获取查询任务;a task acquisition interface, used for the user terminal to acquire a query task from the server;
临时查询接口,用于所述服务端向所述用户终端下发临时的结构化查询语句;a temporary query interface, used for the server to issue a temporary structured query statement to the user terminal;
结果返回接口,用于所述用户终端向所述服务端返回查询结果。The result return interface is used for the user terminal to return the query result to the server.
另一方面,提供了一种终端安全分析系统,所述系统包括:In another aspect, a terminal security analysis system is provided, the system comprising:
服务端模块,用于向用户终端模块下发结构化查询语句及存储查询结果;The server module is used to issue structured query statements and store query results to the user terminal module;
用户终端模块,用于执行结构化查询语句完成查询操作,输出查询结果;The user terminal module is used to execute the structured query statement to complete the query operation and output the query result;
虚拟表模块,用于通过映射关系获取用户终端模块的系统信息。The virtual table module is used to obtain the system information of the user terminal module through the mapping relationship.
再一方面,提供了一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现以下步骤:In another aspect, a computer device is provided, comprising a memory, a processor, and a computer program stored on the memory and running on the processor, wherein the processor implements the following steps when executing the computer program:
在用户终端上安装终端代理软件,通过所述终端代理软件获取与所述用户终端适配的虚拟表,并将所述用户终端的系统信息映射到所述适配的虚拟表上;Install terminal agent software on the user terminal, obtain a virtual table adapted to the user terminal through the terminal agent software, and map the system information of the user terminal to the adapted virtual table;
服务端向所述终端代理软件发送结构化查询语句,所述终端代理软件接收所述结构化查询语句后执行对所述适配的虚拟表的查询操作;The server sends a structured query statement to the terminal agent software, and the terminal agent software performs a query operation on the adapted virtual table after receiving the structured query statement;
获取查询结果,并将所述查询结果传输到所述服务端的数据库或预设位置;Obtain query results, and transmit the query results to the database or preset location of the server;
所述服务端执行监控操作,从所述数据库中获取监控信息。The server performs monitoring operations, and obtains monitoring information from the database.
又一方面,提供了一种计算机可读存储介质,所述计算机可读存储介质存储有程序,当所述程序被处理器执行时,使得所述处理器执行以下步骤:In yet another aspect, a computer-readable storage medium is provided, and the computer-readable storage medium stores a program, which, when the program is executed by a processor, causes the processor to perform the following steps:
在用户终端上安装终端代理软件,通过所述终端代理软件获取与所述用户终端适配的虚拟表,并将所述用户终端的系统信息映射到所述适配的虚拟表上;Install terminal agent software on the user terminal, obtain a virtual table adapted to the user terminal through the terminal agent software, and map the system information of the user terminal to the adapted virtual table;
服务端向所述终端代理软件发送结构化查询语句,所述终端代理软件接收所述结构化查询语句后执行对所述适配的虚拟表的查询操作;The server sends a structured query statement to the terminal agent software, and the terminal agent software performs a query operation on the adapted virtual table after receiving the structured query statement;
获取查询结果,并将所述查询结果传输到所述服务端的数据库或预设位置;Obtain query results, and transmit the query results to the database or preset location of the server;
所述服务端执行监控操作,从所述数据库中获取监控信息。The server performs monitoring operations, and obtains monitoring information from the database.
本发明的上述技术方案相比现有技术具有以下优点:The above-mentioned technical scheme of the present invention has the following advantages compared with the prior art:
上述终端安全分析方法、系统、计算机设备和存储介质,建立了适合不同平台的用户终端的虚拟表,在执行查询操作时,终端代理软件获取与用户终端适配的虚拟表;服务端向终端代理软件发送结构化查询语句,并执行对适配的虚拟表的查询操作;获取查询结果,并将查询结果传输到服务端的数据库或预设位置;服务端执行监控操作,从数据库中获取监控信息,由于虚拟表的存在,不同平台的用户终端的安全分析不再需要使用专用的安全分析工具,通过服务端管理软件下发结构化查询语句对虚拟表进行查询即可,提高了安全分析工具的通用性。The above-mentioned terminal security analysis method, system, computer equipment and storage medium establish a virtual table suitable for user terminals of different platforms. When performing a query operation, the terminal agent software obtains the virtual table adapted to the user terminal; the server sends the terminal agent to the terminal agent. The software sends a structured query statement and executes the query operation on the adapted virtual table; obtains the query result, and transmits the query result to the database or preset location of the server; the server performs the monitoring operation and obtains the monitoring information from the database, Due to the existence of virtual tables, the security analysis of user terminals on different platforms no longer needs to use special security analysis tools. The virtual table can be queried by issuing structured query statements through the server management software, which improves the generality of security analysis tools. sex.
附图说明Description of drawings
为了更清楚地说明本发明实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。In order to illustrate the technical solutions in the embodiments of the present invention more clearly, the following briefly introduces the accompanying drawings used in the description of the embodiments. Obviously, the accompanying drawings in the following description are only some embodiments of the present invention. For those of ordinary skill in the art, other drawings can also be obtained from these drawings without any creative effort.
图1是本发明的终端安全分析方法的第一方法流程图;Fig. 1 is the first method flow chart of the terminal security analysis method of the present invention;
图2是本发明的终端安全分析方法的第二方法流程图;Fig. 2 is the second method flow chart of the terminal security analysis method of the present invention;
图3是本发明的终端安全分析系统的系统结构图;Fig. 3 is the system structure diagram of the terminal security analysis system of the present invention;
图4是本发明的计算机设备的设备结构图。FIG. 4 is a device structure diagram of the computer device of the present invention.
具体实施方式Detailed ways
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。In order to make the objectives, technical solutions and advantages of the present application more clear, the present application will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the present application, but not to limit the present application.
实施例一:Example 1:
本实施例的终端安全分析方法,参照图1~图2所示,图1为本发明的终端安全分析的第一方法流程图;图2是本发明的终端安全分析方法的第二方法流程图。1 to 2, FIG. 1 is a flowchart of the first method of terminal security analysis of the present invention; FIG. 2 is a flowchart of the second method of the terminal security analysis method of the present invention .
方法包括以下步骤:The method includes the following steps:
在用户终端上安装终端代理软件,通过所述终端代理软件获取适合所述用户终端的虚拟表,并将所述用户终端的系统信息映射到所述适配的虚拟表上;Install terminal proxy software on the user terminal, obtain a virtual table suitable for the user terminal through the terminal proxy software, and map the system information of the user terminal to the adapted virtual table;
现有技术的安全分析中,各个平台(如Windows平台、macOS平台、Linux平台)需要使用各自的专用安全分析工具才能进行相关的系统信息查询工作。本发明通过建立虚拟表的方式来实现统一使用服务端管理软件获取不同平台的查询结果,从而进行安全分析,提高了安全分析工具的通用性。首先要在用户终端上获取与用户终端适配的虚拟表,并安装终端代理软件,通过终端代理软件将用户终端的系统信息映射到用户终端所适配的虚拟表上,服务端需要获取用户终端的系统信息时只需要通过服务端管理软件下发查询指令或者配置定时查询任务便可以读取虚拟表上的信息。不同平台的用户终端适配不同的虚拟表。要获取的系统信息,也就是虚拟表上的信息,包括系统相关的基本信息,如操作系统、硬件信息和磁盘信息等;运行状态信息,如进程列表、端口列表和网络连接列表等;操作日志信息,如文件操作日志等。用户还可以根据具体需求创建额外的虚拟表。In the security analysis of the prior art, each platform (such as the Windows platform, the macOS platform, and the Linux platform) needs to use its own dedicated security analysis tool to perform related system information query work. The invention realizes the unified use of the server management software to obtain the query results of different platforms by establishing a virtual table, so as to carry out security analysis and improve the generality of the security analysis tool. First, obtain the virtual table adapted to the user terminal on the user terminal, install the terminal agent software, and map the system information of the user terminal to the virtual table adapted to the user terminal through the terminal agent software. The server needs to obtain the user terminal. When the system information is stored, the information on the virtual table can be read only by issuing a query command through the server management software or configuring a timed query task. User terminals of different platforms adapt to different virtual tables. System information to be obtained, that is, the information on the virtual table, including basic system-related information, such as operating system, hardware information, and disk information; running status information, such as process list, port list, and network connection list; operation log Information, such as file operation logs, etc. Users can also create additional virtual tables according to specific needs.
服务端向所述终端代理软件发送结构化查询语句,所述终端代理软件接收所述结构化查询语句后执行所述适配的虚拟表的查询操作;The server sends a structured query statement to the terminal agent software, and the terminal agent software executes the query operation of the adapted virtual table after receiving the structured query statement;
在用户终端上获取适配的虚拟表、安装好终端代理软件并且建立起适配的虚拟表与用户终端的系统信息之间的映射关系后,服务端便可以通过结构化查询语句对虚拟表进行查询,或者通过配置定时查询任务进行查询,以获取虚拟表中的系统信息,也就是用户终端的系统信息,系统信息,即,服务端所要查询的与用户终端有关的信息。通过虚拟表建立起服务端和用户终端的交互关系,只需要在服务端管理软件上通过统一的结构化查询语句或者配置定时查询任务便可以实现不同平台的系统信息的获取。其中,结构化查询语句采用类SQL查询语句。After the adapted virtual table is obtained on the user terminal, the terminal agent software is installed, and the mapping relationship between the adapted virtual table and the system information of the user terminal is established, the server can query the virtual table through structured query statements. Query, or query by configuring a timed query task, to obtain the system information in the virtual table, that is, the system information of the user terminal, and the system information, that is, the information related to the user terminal to be queried by the server. The interaction between the server and the user terminal is established through the virtual table, and the system information of different platforms can be obtained only through a unified structured query statement or the configuration of timed query tasks on the server management software. The structured query statement adopts an SQL-like query statement.
获取查询结果,并将所述查询结果传输到所述服务端的数据库或预设位置;Obtain query results, and transmit the query results to the database or preset location of the server;
执行查询操作后,便可以获取到查询结果,用户终端将查询结果通过服务端的通信接口传输到服务端的数据库中,将查询结果保存,以便于对系统信息进行安全分析,进一步从系统信息中获取监控信息。或者将查询结果输出到预设位置,包括本地位置、接口返回位置和ElasticSearch-搜索引擎等。After the query operation is performed, the query result can be obtained. The user terminal transmits the query result to the database of the server through the communication interface of the server, and saves the query result, so as to facilitate the security analysis of the system information and further obtain monitoring from the system information. information. Or output query results to preset locations, including local locations, interface return locations, and ElasticSearch-search engines.
所述服务端执行监控操作,从所述数据库中获取监控信息。The server performs monitoring operations, and obtains monitoring information from the database.
服务端执行监控操作时,服务端监控软件会直接从数据库中获取监控信息,以便于通过监控信息进行安全分析。When the server performs monitoring operations, the server monitoring software will directly obtain monitoring information from the database, so as to facilitate security analysis through the monitoring information.
其中,服务端安装服务端管理软件和服务端监控软件,服务端要设置其系统防火墙,以允许服务端对外开放通信接口,以便于用户终端能够通过通信接口与用户终端进行信息交互。服务端管理软件可配置定时查询、监控条件、告警等内容。服务端监控软件可配置监控日志、告警触发条件等内容,并且服务端监控软件会自动连接数据库。服务端安装服务端管理软件和服务端监控软件时,包括以下步骤:初始化服务端环境和数据库环境,安装好依赖;在服务端系统防火墙中允许服务端对外开放通信接口;部署服务端管理软件源码并运行;服务端管理软件自动连接数据库并开放通信接口,等待用户终端连接;在服务端管理软件界面配置相关内容;部署服务端监控软件源码并运行;服务端监控软件自动连接数据库,在服务端监控软件界面配置相关内容,如监控日志保存内容和告警条件等内容。Among them, the server installs server management software and server monitoring software, and the server should set up its system firewall to allow the server to open a communication interface to the outside, so that the user terminal can exchange information with the user terminal through the communication interface. The server management software can configure timing query, monitoring conditions, alarms, etc. The server monitoring software can configure monitoring logs, alarm trigger conditions, etc., and the server monitoring software will automatically connect to the database. When the server installs the server management software and server monitoring software, it includes the following steps: initialize the server environment and database environment, install dependencies; allow the server to open the communication interface in the server system firewall; deploy the server management software source code And run; the server management software automatically connects to the database and opens the communication interface, waiting for the user terminal to connect; configure the relevant content on the server management software interface; deploy the server monitoring software source code and run; the server monitoring software automatically connects to the database, on the server Configure related content on the monitoring software interface, such as monitoring log storage content and alarm conditions.
在其中一个实施方式中,所述在用户终端上安装终端代理软件,通过所述终端代理软件获取适配所述用户终端的虚拟表,并将所述用户终端的系统信息映射到所述虚拟表上,具体包括:In one embodiment, the terminal agent software is installed on the user terminal, a virtual table adapted to the user terminal is obtained through the terminal agent software, and the system information of the user terminal is mapped to the virtual table on, including:
获取与所述用户终端相适配的虚拟表和与所述适配的虚拟表相应的处理函数;acquiring a virtual table adapted to the user terminal and a processing function corresponding to the adapted virtual table;
要想通过统一的服务端管理软件实现不同平台的安全分析,就要先在用户终端上获取与用户终端相适配的虚拟表,以及与用户终端相适配的虚拟表相应的处理函数,以便于建立与用户终端相适配的虚拟表与用户终端的系统信息之间的映射关系。In order to realize the security analysis of different platforms through the unified server management software, it is necessary to first obtain the virtual table adapted to the user terminal and the corresponding processing function of the virtual table adapted to the user terminal on the user terminal. It is used to establish the mapping relationship between the virtual table adapted to the user terminal and the system information of the user terminal.
在用户终端上安装终端代理软件;Install terminal agent software on the user terminal;
安装终端代理软件,便于实现虚拟表与用户终端的系统信息之间的映射。终端代理软件上要配置服务端的通信接口,以便于实现与服务端的信息交互。Install the terminal agent software to facilitate the mapping between the virtual table and the system information of the user terminal. The communication interface of the server should be configured on the terminal agent software to facilitate the information exchange with the server.
终端代理软件还会通过通信接口自动从服务端获取查询任务。安装终端代理软件时包括以下步骤:初始化用户终端环境并安装好依赖;部署终端代理软件,并配置通信接口地址及输出地址;运行终端代理软件;终端代理软件会自动从服务端获取本机任务;终端代理软件执行任务后根据配置输出查询日志。The terminal agent software also automatically obtains the query task from the server through the communication interface. Installing the terminal agent software includes the following steps: initialize the user terminal environment and install dependencies; deploy the terminal agent software, and configure the communication interface address and output address; run the terminal agent software; the terminal agent software will automatically obtain local tasks from the server; After the terminal agent software executes the task, the query log is output according to the configuration.
所述终端代理软件通过所述处理函数将所述用户终端的系统信息与所述适配的虚拟表之间建立映射关系。The terminal agent software establishes a mapping relationship between the system information of the user terminal and the adapted virtual table through the processing function.
在用户终端上安装终端代理软件后,终端代理软件通过处理函数将用户终端的系统信息与适配的虚拟表之间建立映射关系,以便于通过处理函数查询虚拟表而获取用户终端的系统信息。After the terminal agent software is installed on the user terminal, the terminal agent software establishes a mapping relationship between the system information of the user terminal and the adapted virtual table through the processing function, so as to obtain the system information of the user terminal by querying the virtual table through the processing function.
在其中一个实施方式中,所述服务端包括服务端管理软件和服务端监控软件,所述服务端向所述终端代理软件发送结构化查询语句前,还包括:In one embodiment, the server includes server management software and server monitoring software, and before the server sends a structured query statement to the terminal agent software, it further includes:
接收运维人员通过所述服务端管理软件和所述服务端监控软件执行的信息配置;Receive the information configuration performed by the operation and maintenance personnel through the server management software and the server monitoring software;
服务端包括两个软件,一个服务端管理软件,一个服务端监控软件。服务端管理软件主要用于实现对用户终端的查询操作,以获取用户终端的进程信息、文件修改记录等信息,因此需要通过服务端管理软件对查询信息进行相关的信息配置,例如配置定时查询任务、配置日志输出等信息。服务端监控软件主要用于实现服务端的监控操作,以获取监控数据和漏洞监控结果。因此需要通过服务端监控软件对监控信息进行相关的信息配置,例如配置监控条件、配置告警方式等信息。服务端管理软件提供相关配置界面,如显示连接过服务端接口的用户终端的信息界面、显示运维人员修改定时查询任务的界面、显示手动输入查询语句并等待查询结果的界面、显示运维人员配置日志监控条件的界面、显示运维人员配置告警人及告警方式的界面。The server includes two softwares, a server management software and a server monitoring software. The server management software is mainly used to realize the query operation of the user terminal to obtain the process information, file modification records and other information of the user terminal. Therefore, it is necessary to configure the query information through the server management software, such as configuring the timing query task. , configuration log output and other information. Server-side monitoring software is mainly used to implement server-side monitoring operations to obtain monitoring data and vulnerability monitoring results. Therefore, it is necessary to configure the monitoring information through the server monitoring software, such as configuring monitoring conditions, configuring alarm methods and other information. The server management software provides related configuration interfaces, such as displaying the information interface of the user terminal connected to the server interface, displaying the interface for the operation and maintenance personnel to modify the timed query task, displaying the interface for manually entering the query statement and waiting for the query result, and displaying the interface for the operation and maintenance personnel. The interface for configuring log monitoring conditions, and the interface for displaying who and how the operation and maintenance personnel configure the alarm.
在其中一个实施方式中,所述虚拟表的查询操作,具体包括:In one embodiment, the query operation of the virtual table specifically includes:
获取任务配置;Get task configuration;
任务配置,例如查询任务的ID,查询语句、结果形式、输出位置等。其中,结果形式包括全量结果和已变更结果;如果任务列表中的某查询任务配置的结果形式为全量结果,那么在查询结束时输出全量结果,即,最新一次的查询的所有的结果;如果任务列表中的某查询任务配置的结果形式为已变更结果,那么在查询结束时输出与上一次查询结果相比已变更的地方,即,与上一次查询结果相比已变更的结果。输出位置,即,预设位置,包括本地位置、接口返回位置和ElasticSearch-搜索引擎等。接口返回位置是指服务端上设置的结果返回接口,用户终端通过服务端上的结果接口可以将查询的结果返回到服务端。此外,任务不仅是配置在用户终端本地的查询任务,还包括通过任务获取接口从服务端获取的查询任务。Task configuration, such as query task ID, query statement, result format, output location, etc. Among them, the result form includes the full result and the changed result; if the result form of a query task configuration in the task list is the full result, then the full result is output at the end of the query, that is, all the results of the latest query; if the task If the result of a query task configuration in the list is a changed result, then at the end of the query, output the changed place compared with the last query result, that is, the changed result compared with the last query result. The output location, that is, the preset location, includes the local location, the interface return location, and ElasticSearch-search engine, etc. The interface return location refers to the result return interface set on the server, and the user terminal can return the query result to the server through the result interface on the server. In addition, the task is not only a query task configured locally on the user terminal, but also includes a query task obtained from the server through the task obtaining interface.
从所述任务配置中获取定时查询任务列表;Obtain a list of timed query tasks from the task configuration;
任务配置中存储了定时查询任务列表,定时查询列表中会列举需要执行的查询任务,以及相关查询任务的配置,如任务的ID,查询语句、结果形式、输出位置等。The scheduled query task list is stored in the task configuration. The scheduled query list lists the query tasks to be executed and the configuration of related query tasks, such as task ID, query statement, result format, and output location.
根据所述定时查询任务列表执行状态表和事件表的查询任务;Execute the query task of the state table and the event table according to the timed query task list;
获取到定时查询任务列表后,按照定时查询任务列表依次进行查询,并按任务配置完成查询任务。查询任务包括状态表的查询任务和事件表的查询任务。After obtaining the scheduled query task list, perform the query in sequence according to the scheduled query task list, and complete the query task according to the task configuration. The query tasks include query tasks for the status table and query tasks for the event table.
其中,所述虚拟表包括所述状态表和所述事件表,所述状态表为未设定查询时间的虚拟表,所述事件表为设定查询时间的虚拟表。Wherein, the virtual table includes the state table and the event table, the state table is a virtual table with no query time set, and the event table is a virtual table with set query time.
状态表为未设定查询时间的虚拟表,按照定时任务列表的配置执行查询任务即可;所述事件表为设定查询时间的虚拟表,时间表在查询的时候会设定一个时间段,执行查询任务时,会自动查询该时间段内的系统信息,即,监听用户终端的系统事件。The status table is a virtual table with no query time set, and the query task can be executed according to the configuration of the scheduled task list; the event table is a virtual table with set query time, and the timetable will set a time period when querying, When the query task is executed, the system information in the time period is automatically queried, that is, the system events of the user terminal are monitored.
在其中一个实施方式中,所述服务端上设置通信接口,所述查询结果中涉及监控信息的查询结果均通过所述通信接口返回所述服务端并存储到所述数据库中。In one embodiment, a communication interface is set on the server, and query results involving monitoring information in the query results are returned to the server through the communication interface and stored in the database.
服务端上会设置通信接口,用于实现执行查询任务时用户终端与服务端的信息交互。通过查询得到的查询结果中会保存很多信息,例如监控信息,在本发明中,服务端管理软件与服务端监控软件共用一个数据库,所有的查询得到的信息都储存在这个数据库中。一般的,输出位置包括三个选项,即,本地位置、接口返回位置和ElasticSearch-搜索引擎。除了监控信息以外的系统信息会按照任务配置中的输出位置进行输出;但是涉及监控信息的系统信息会通过通信接口统一返回到服务端,并保存到数据库中,以便于服务端监控软件直接从数据库中获取监控信息,进行安全分析。A communication interface will be set on the server to realize the information exchange between the user terminal and the server when performing the query task. A lot of information, such as monitoring information, will be stored in the query result obtained through the query. In the present invention, the server management software and the server monitoring software share a database, and all the information obtained from the query are stored in this database. Generally, the output location includes three options, namely, the local location, the interface return location, and ElasticSearch-search engine. System information other than monitoring information will be output according to the output position in the task configuration; however, system information involving monitoring information will be uniformly returned to the server through the communication interface and saved to the database, so that the server monitoring software can directly access the database from the database. Obtain monitoring information and conduct security analysis.
所述监控操作,具体包括:The monitoring operation specifically includes:
所述服务端接收监控指令;the server receives the monitoring instruction;
服务端会接收监控指令,以便于启动服务端的监控组操作。The server will receive monitoring instructions to facilitate the start of monitoring group operations on the server.
所述服务端从所述数据库中拉取监控信息;The server pulls the monitoring information from the database;
服务端接收到监控指令启动监控操作后,服务端监控软件与服务端管理软件共用一个数据库,服务端监控软件直接从数据库中获取监控信息,降低了安全工程师的使用门槛。也可以进行相关的监控配置,服务端监控软件自动定时的从数据库中获取监控信息。After the server receives the monitoring instruction and starts the monitoring operation, the server monitoring software and the server management software share a database, and the server monitoring software directly obtains monitoring information from the database, which reduces the threshold for security engineers to use. Related monitoring configuration can also be performed, and the server monitoring software automatically obtains monitoring information from the database at regular intervals.
根据所述监控信息判断是否执行告警。Whether to execute an alarm is determined according to the monitoring information.
服务端监控软件获取到监控信息后,对监控信息判断是否需要执行告警操作。监控信息包含两种,一种是用户终端的常规信息,如CPU,内存和磁盘等信息;一种是漏洞信息,服务端会获取到用户终端上所有的安装软件的安装包信息,与漏洞库进行对比,判断是否存在漏洞,如果存在漏洞则向运维人员执行告警操作。After the server monitoring software obtains the monitoring information, it judges whether an alarm operation needs to be performed on the monitoring information. There are two types of monitoring information, one is the general information of the user terminal, such as CPU, memory and disk information; the other is vulnerability information, the server will obtain the installation package information of all the installed software on the user terminal, and the vulnerability library. Make a comparison to determine whether there is a vulnerability, and if there is a vulnerability, alert the operation and maintenance personnel.
在其中一个实施方式中,所述通信接口,具体包括:In one embodiment, the communication interface specifically includes:
活跃检测接口,用于检测所述用户终端是否处于活跃状态;an activity detection interface, used to detect whether the user terminal is in an active state;
活跃检测接口,用于检测所述用户终端是否处于活跃状态,也就是检测用户终端是否能够响应服务端下发的查询任务,以便于用户终端不能响应服务端时运维人员能够及时处理。The activity detection interface is used to detect whether the user terminal is in an active state, that is, to detect whether the user terminal can respond to the query task sent by the server, so that the operation and maintenance personnel can deal with it in time when the user terminal cannot respond to the server.
任务获取接口,用于所述用户终端从所述服务端获取查询任务;a task acquisition interface, used for the user terminal to acquire a query task from the server;
任务获取接口,用于所述用户终端从所述服务端获取查询任务,即,用户终端执行的查询任务不仅是配置在用户终端本地的查询任务,还包括通过任务获取接口从服务端获取的查询任务。The task acquisition interface is used for the user terminal to acquire the query task from the server, that is, the query task executed by the user terminal is not only the query task configured locally on the user terminal, but also includes the query acquired from the server through the task acquisition interface Task.
临时查询接口,用于所述服务端向所述用户终端下发临时的结构化查询语句;a temporary query interface, used for the server to issue a temporary structured query statement to the user terminal;
临时查询接口,用于所述服务端向所述用户终端下发临时的结构化查询语句。临时查询接口是指的是服务端非定时的查询语句。例如,服务端突然要查询某些数据,但是这些数据不是定时任务,而是突然要查询,这时候用户终端便会定时检测临时查询接口是否存在临时查询任务,如果存在,则执行临时查询并返回结果。The temporary query interface is used for the server to issue a temporary structured query statement to the user terminal. The temporary query interface refers to the non-timed query statement of the server. For example, the server suddenly wants to query some data, but the data is not a scheduled task, but suddenly needs to be queried. At this time, the user terminal will regularly detect whether there is a temporary query task in the temporary query interface. If there is, execute the temporary query and return result.
结果返回接口,用于所述用户终端向所述服务端返回查询结果。The result return interface is used for the user terminal to return the query result to the server.
通过查询得到的查询结果中会保存很多信息,根据信息配置,所有的需要返回服务端的信息都通过结果返回接口返回到服务端的数据库中,以便于服务端监控软件直接从数据库中获取监控信息,进行安全分析。优选的,根据信息配置,需要返回服务端的信息会添加待提交标记,如果存在待提交标记,则将该存在待提交标记的信息通过结果返回接口返回服务端。A lot of information will be saved in the query result obtained through the query. According to the information configuration, all the information that needs to be returned to the server will be returned to the database of the server through the result return interface, so that the monitoring software of the server can directly obtain the monitoring information from the database and perform Security Analysis. Preferably, according to the information configuration, the information that needs to be returned to the server is added with a to-be-submitted mark, and if there is a to-be-submitted mark, the information with the to-be-submitted mark is returned to the server through the result return interface.
实施例二:Embodiment 2:
参照图2所示,图2为本发明的终端安全分析方法的第二方法流程图。Referring to FIG. 2 , FIG. 2 is a flowchart of the second method of the terminal security analysis method of the present invention.
获取与所述用户终端相适配的虚拟表和与所述适配的虚拟表相应的处理函数;acquiring a virtual table adapted to the user terminal and a processing function corresponding to the adapted virtual table;
要想通过统一的服务端管理软件实现不同平台的安全分析,就要先在用户终端上获取与用户终端相适配的虚拟表,以及与用户终端相适配的虚拟表相应的处理函数,以便于建立与用户终端相适配的虚拟表与用户终端的系统信息之间的映射关系。In order to realize the security analysis of different platforms through the unified server management software, it is necessary to first obtain the virtual table adapted to the user terminal and the corresponding processing function of the virtual table adapted to the user terminal on the user terminal. It is used to establish the mapping relationship between the virtual table adapted to the user terminal and the system information of the user terminal.
在用户终端上安装终端代理软件;Install terminal agent software on the user terminal;
安装终端代理软件,便于实现虚拟表与用户终端的系统信息之间的映射。终端代理软件上要配置服务端的通信接口,以便于实现与服务端的信息交互。终端代理软件还会通过通信接口自动从服务端获取查询任务。Install the terminal agent software to facilitate the mapping between the virtual table and the system information of the user terminal. The communication interface of the server should be configured on the terminal agent software to facilitate the information exchange with the server. The terminal agent software also automatically obtains the query task from the server through the communication interface.
所述终端代理软件通过所述处理函数将所述用户终端的系统信息与所述适配的虚拟表之间建立映射关系;The terminal agent software establishes a mapping relationship between the system information of the user terminal and the adapted virtual table through the processing function;
在用户终端上安装终端代理软件后,终端代理软件通过处理函数将用户终端的系统信息与适配的虚拟表之间建立映射关系,以便于通过查询虚拟表而获取用户终端的系统信息。After the terminal agent software is installed on the user terminal, the terminal agent software establishes a mapping relationship between the system information of the user terminal and the adapted virtual table through the processing function, so as to obtain the system information of the user terminal by querying the virtual table.
接收运维人员通过所述服务端管理软件和所述服务端监控软件执行的信息配置;Receive the information configuration performed by the operation and maintenance personnel through the server management software and the server monitoring software;
服务端包括两个软件,一个服务端管理软件,一个服务端监控软件。服务端管理软件主要用于实现对用户终端的查询操作,以获取用户终端的进程信息、文件修改记录等信息,因此需要通过服务端管理软件对查询信息进行相关的信息配置,例如配置定时查询任务、配置日志输出等信息。服务端监控软件主要用于实现服务端的监控操作,以获取监控数据和漏洞监控结果。因此需要通过服务端监控软件对监控信息进行相关的信息配置,例如配置监控条件、配置告警方式等信息。The server includes two softwares, a server management software and a server monitoring software. The server management software is mainly used to realize the query operation of the user terminal to obtain the process information, file modification records and other information of the user terminal. Therefore, it is necessary to configure the query information through the server management software, such as configuring the timing query task. , configuration log output and other information. Server-side monitoring software is mainly used to implement server-side monitoring operations to obtain monitoring data and vulnerability monitoring results. Therefore, it is necessary to configure the monitoring information through the server monitoring software, such as configuring monitoring conditions, configuring alarm methods and other information.
服务端向所述终端代理软件发送结构化查询语句;The server sends a structured query statement to the terminal agent software;
在用户终端上建立好虚拟表、安装好终端代理软件并且建立起虚拟表与用户终端的系统信息之间的映射关系后,服务端便可以通过结构化查询语句对虚拟表进行查询,以获取虚拟表中的系统信息,也就是用户终端的系统信息,系统信息,即,服务端所要查询的用户终端的信息。After the virtual table is established on the user terminal, the terminal agent software is installed, and the mapping relationship between the virtual table and the system information of the user terminal is established, the server can query the virtual table through a structured query statement to obtain the virtual table. The system information in the table is the system information of the user terminal, and the system information is the information of the user terminal to be queried by the server.
获取任务配置;Get task configuration;
任务配置,例如查询任务的ID,查询语句、结果形式、输出位置等。Task configuration, such as query task ID, query statement, result format, output location, etc.
从所述任务配置中获取定时查询任务列表;Obtain a list of timed query tasks from the task configuration;
任务配置中存储了定时查询任务列表,定时查询列表中会列举需要执行的查询任务,以及相关查询任务的配置,如任务的ID,查询语句、结果形式、输出位置等。The scheduled query task list is stored in the task configuration. The scheduled query list lists the query tasks to be executed and the configuration of related query tasks, such as task ID, query statement, result format, and output location.
根据所述定时查询任务列表执行状态表和事件表的查询任务;Execute the query task of the state table and the event table according to the timed query task list;
获取到定时查询任务列表后,按照定时查询任务列表依次进行查询,并按任务配置完成查询任务。查询任务包括状态表和事件表的查询任务。After obtaining the scheduled query task list, perform the query in sequence according to the scheduled query task list, and complete the query task according to the task configuration. Query tasks include query tasks for the status table and the event table.
获取查询结果,并将所述查询结果传输到所述服务端的数据库或预设位置;Obtain query results, and transmit the query results to the database or preset location of the server;
执行查询操作后,便可以获取到查询结果,用户终端将查询结果通过服务端的通信接口传输到服务端的数据库中,将查询结果保存,以便于对系统信息进行安全分析,进一步从系统信息中获取监控信息。或者将查询结果输出到预设位置,包括本地位置、接口返回位置和ElasticSearch-搜索引擎等。After the query operation is performed, the query result can be obtained. The user terminal transmits the query result to the database of the server through the communication interface of the server, and saves the query result, so as to facilitate the security analysis of the system information and further obtain monitoring from the system information. information. Or output query results to preset locations, including local locations, interface return locations, and ElasticSearch-search engines.
所述服务端执行监控操作,从所述数据库中获取监控信息。The server performs monitoring operations, and obtains monitoring information from the database.
服务端执行监控操作时,服务端监控软件会从数据库中拉取监控信息,以便于通过监控信息进行安全分析。When the server performs monitoring operations, the server monitoring software will pull the monitoring information from the database to facilitate security analysis through the monitoring information.
应该理解的是,虽然图1~2的流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,图1~2中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。It should be understood that although the steps in the flowcharts of FIGS. 1-2 are sequentially displayed according to the arrows, these steps are not necessarily executed in the order indicated by the arrows. Unless explicitly stated herein, the execution of these steps is not strictly limited to the order, and these steps may be performed in other orders. Moreover, at least a part of the steps in FIGS. 1 to 2 may include multiple sub-steps or multiple stages. These sub-steps or stages are not necessarily executed at the same time, but may be executed at different times. These sub-steps or stages are not necessarily completed at the same time. The order of execution of the steps is not necessarily sequential, but may be performed alternately or alternately with other steps or at least a part of sub-steps or stages of other steps.
实施例三:Embodiment three:
参照图3所示,图3为本发明的终端安全分析系统的系统结构图。Referring to FIG. 3 , FIG. 3 is a system structure diagram of the terminal security analysis system of the present invention.
本实施例的终端安全分析系统,包括:The terminal security analysis system of this embodiment includes:
服务端模块,用于向用户终端模块下发结构化查询语句及存储查询结果;The server module is used to issue structured query statements and store query results to the user terminal module;
服务端模块包含服务端管理软件和服务端监控软件,通过服务端模块可以统一使用服务端管理软件向用户终端模块下发结构化查询语句,以获取不同平台的用户终端的系统信息,也就是查询结果,并将查询结果保存到预设位置,以进行安全分析。The server module includes server management software and server monitoring software. Through the server module, the server management software can be used uniformly to issue structured query statements to the user terminal module to obtain system information of user terminals on different platforms, that is, query results, and save the query results to a preset location for security analysis.
用户终端模块,用于执行结构化查询语句完成查询操作,输出查询结果;The user terminal module is used to execute the structured query statement to complete the query operation and output the query result;
用户终端模块,用于接收用户终端模块下发的结构化查询语句,然后执行虚拟表的查询操作,获取查询结果。The user terminal module is used to receive the structured query statement issued by the user terminal module, and then execute the query operation of the virtual table to obtain the query result.
虚拟表模块,用于通过映射关系获取用户终端模块的系统信息。The virtual table module is used to obtain the system information of the user terminal module through the mapping relationship.
虚拟表模块建立起了服务端模块与用户终端模块之间的桥梁,通过该桥梁便可以实现服务端模块统一使用服务端管理软件向用户终端模块下结构化查询语句,以获取不同平台的用户终端的系统信息。The virtual table module establishes a bridge between the server module and the user terminal module. Through this bridge, the server module can use the server management software to download structured query statements to the user terminal module to obtain user terminals on different platforms. system information.
关于终端安全分析系统的具体限定可以参见上文中对于方法的限定,在此不再赘述。上述终端安全分析系统中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。For specific limitations of the terminal security analysis system, reference may be made to the limitations on the method above, which will not be repeated here. Each module in the above-mentioned terminal security analysis system may be implemented in whole or in part by software, hardware and combinations thereof. The above modules can be embedded in or independent of the processor in the computer device in the form of hardware, or stored in the memory in the computer device in the form of software, so that the processor can call and execute the operations corresponding to the above modules.
实施例四:Embodiment 4:
本实施例提供一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,其特征在于,所述处理器执行所述计算机程序时实现终端安全分析方法的步骤。This embodiment provides a computer device, including a memory, a processor, and a computer program stored in the memory and running on the processor, characterized in that, when the processor executes the computer program, the method for analyzing the terminal security is implemented. step.
该计算机设备可以是终端,其内部结构图可以如图4所示。该计算机设备包括通过系统总线连接的处理器、存储器、网络接口、显示屏和输入装置。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统和计算机程序。该内存储器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机程序被处理器执行时以实现终端安全分析方法。该计算机设备的显示屏可以是液晶显示屏或者电子墨水显示屏,该计算机设备的输入装置可以是显示屏上覆盖的触摸层,也可以是计算机设备外壳上设置的按键、轨迹球或触控板,还可以是外接的键盘、触控板或鼠标等。The computer equipment may be a terminal, and its internal structure diagram may be as shown in FIG. 4 . The computer equipment includes a processor, memory, a network interface, a display screen, and an input device connected by a system bus. Among them, the processor of the computer device is used to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium, an internal memory. The nonvolatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the execution of the operating system and computer programs in the non-volatile storage medium. The network interface of the computer device is used to communicate with an external terminal through a network connection. The computer program is executed by the processor to implement the terminal security analysis method. The display screen of the computer equipment may be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment may be a touch layer covered on the display screen, or a button, a trackball or a touchpad set on the shell of the computer equipment , or an external keyboard, trackpad, or mouse.
本领域内的技术人员应明白,图4中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。Those skilled in the art should understand that the structure shown in FIG. 4 is only a block diagram of a partial structure related to the solution of the present application, and does not constitute a limitation on the computer equipment to which the solution of the present application is applied. A device may include more or fewer components than shown in the figures, or combine certain components, or have a different arrangement of components.
在其中一个实施方式中,提供了一种计算机设备,包括存储器、处理器及存储在存储器上并可在处理器上运行的计算机程序,处理器执行计算机程序时实现以下步骤:In one of the embodiments, a computer device is provided, comprising a memory, a processor, and a computer program stored in the memory and running on the processor, and the processor implements the following steps when executing the computer program:
在用户终端上安装终端代理软件,通过所述终端代理软件获取与所述用户终端适配的虚拟表,并将所述用户终端的系统信息映射到所述适配的虚拟表上;Install terminal agent software on the user terminal, obtain a virtual table adapted to the user terminal through the terminal agent software, and map the system information of the user terminal to the adapted virtual table;
服务端向所述终端代理软件发送结构化查询语句,所述终端代理软件接收所述结构化查询语句后执行对所述适配的虚拟表的查询操作;The server sends a structured query statement to the terminal agent software, and the terminal agent software performs a query operation on the adapted virtual table after receiving the structured query statement;
获取查询结果,并将所述查询结果传输到所述服务端的数据库或预设位置;Obtain query results, and transmit the query results to the database or preset location of the server;
所述服务端执行监控操作,从所述数据库中获取监控信息。The server performs monitoring operations, and obtains monitoring information from the database.
在其中一个实施方式中,处理器执行计算机程序时还实现以下步骤:In one of the embodiments, the processor further implements the following steps when executing the computer program:
获取与所述用户终端相适配的虚拟表和与所述适配的虚拟表相应的处理函数;acquiring a virtual table adapted to the user terminal and a processing function corresponding to the adapted virtual table;
在用户终端上安装终端代理软件;Install terminal agent software on the user terminal;
所述终端代理软件通过所述处理函数将所述用户终端的系统信息与所述适配的虚拟表之间建立映射关系。The terminal agent software establishes a mapping relationship between the system information of the user terminal and the adapted virtual table through the processing function.
在其中一个实施方式中,处理器执行计算机程序时还实现以下步骤:In one of the embodiments, the processor further implements the following steps when executing the computer program:
接收运维人员通过所述服务端管理软件和所述服务端监控软件执行的信息配置。The information configuration performed by the operation and maintenance personnel through the server management software and the server monitoring software is received.
在其中一个实施方式中,处理器执行计算机程序时还实现以下步骤:In one of the embodiments, the processor further implements the following steps when executing the computer program:
获取任务配置;Get task configuration;
从所述任务配置中获取定时查询任务列表;Obtain a list of timed query tasks from the task configuration;
根据所述定时查询任务列表执行状态表和事件表的查询任务。The query task of the state table and the event table is executed according to the list of timed query tasks.
在其中一个实施方式中,处理器执行计算机程序时还实现以下步骤:In one of the embodiments, the processor further implements the following steps when executing the computer program:
所述服务端接收监控指令;the server receives the monitoring instruction;
所述服务端从所述数据库中拉取监控信息;The server pulls the monitoring information from the database;
根据所述监控信息判断是否执行告警。Whether to execute an alarm is determined according to the monitoring information.
实施例五:Embodiment 5:
本实施例提供一种计算机可读存储介质,其上存储有计算机程序,计算机程序被处理器执行时实现以下步骤:This embodiment provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, the following steps are implemented:
在用户终端上安装终端代理软件,通过所述终端代理软件获取与所述用户终端适配的虚拟表,并将所述用户终端的系统信息映射到所述适配的虚拟表上;Install terminal agent software on the user terminal, obtain a virtual table adapted to the user terminal through the terminal agent software, and map the system information of the user terminal to the adapted virtual table;
服务端向所述终端代理软件发送结构化查询语句,所述终端代理软件接收所述结构化查询语句后执行对所述适配的虚拟表的查询操作;The server sends a structured query statement to the terminal agent software, and the terminal agent software performs a query operation on the adapted virtual table after receiving the structured query statement;
获取查询结果,并将所述查询结果传输到所述服务端的数据库或预设位置;Obtain query results, and transmit the query results to the database or preset location of the server;
所述服务端执行监控操作,从所述数据库中获取监控信息。The server performs monitoring operations, and obtains monitoring information from the database.
在其中一个实施方式中,处理器执行计算机程序时还实现以下步骤:In one of the embodiments, the processor further implements the following steps when executing the computer program:
获取与所述用户终端相适配的虚拟表和与所述适配的虚拟表相应的处理函数;acquiring a virtual table adapted to the user terminal and a processing function corresponding to the adapted virtual table;
在用户终端上安装终端代理软件;Install terminal agent software on the user terminal;
所述终端代理软件通过所述处理函数将所述用户终端的系统信息与所述适配的虚拟表之间建立映射关系。The terminal agent software establishes a mapping relationship between the system information of the user terminal and the adapted virtual table through the processing function.
在其中一个实施方式中,处理器执行计算机程序时还实现以下步骤:In one of the embodiments, the processor further implements the following steps when executing the computer program:
接收运维人员通过所述服务端管理软件和所述服务端监控软件执行的信息配置。The information configuration performed by the operation and maintenance personnel through the server management software and the server monitoring software is received.
在其中一个实施方式中,处理器执行计算机程序时还实现以下步骤:In one of the embodiments, the processor further implements the following steps when executing the computer program:
获取任务配置;Get task configuration;
从所述任务配置中获取定时查询任务列表;Obtain a list of timed query tasks from the task configuration;
根据所述定时查询任务列表执行状态表和事件表的查询任务。The query task of the state table and the event table is executed according to the list of timed query tasks.
在其中一个实施方式中,处理器执行计算机程序时还实现以下步骤:In one of the embodiments, the processor further implements the following steps when executing the computer program:
所述服务端接收监控指令;the server receives the monitoring instruction;
所述服务端从所述数据库中拉取监控信息;The server pulls the monitoring information from the database;
根据所述监控信息判断是否执行告警。Whether to execute an alarm is determined according to the monitoring information.
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储于一非易失性计算机可读取存储介质中,该计算机程序在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。Those of ordinary skill in the art can understand that all or part of the processes in the methods of the above embodiments can be implemented by instructing relevant hardware through a computer program, and the computer program can be stored in a non-volatile computer-readable storage In the medium, when the computer program is executed, it may include the processes of the above-mentioned method embodiments. Wherein, any reference to memory, storage, database or other medium used in the various embodiments provided in this application may include non-volatile and/or volatile memory. Nonvolatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory. Volatile memory may include random access memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in various forms such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Road (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。The technical features of the above embodiments can be combined arbitrarily. In order to make the description simple, all possible combinations of the technical features in the above embodiments are not described. However, as long as there is no contradiction in the combination of these technical features It is considered to be the range described in this specification.
以上所述实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。The above-mentioned embodiments only represent several embodiments of the present application, and the descriptions thereof are specific and detailed, but should not be construed as a limitation on the scope of the invention patent. It should be pointed out that for those skilled in the art, without departing from the concept of the present application, several modifications and improvements can be made, which all belong to the protection scope of the present application. Therefore, the scope of protection of the patent of the present application shall be subject to the appended claims.
Claims (10)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210337885.9A CN114640571A (en) | 2022-03-31 | 2022-03-31 | A terminal security analysis method, system, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210337885.9A CN114640571A (en) | 2022-03-31 | 2022-03-31 | A terminal security analysis method, system, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114640571A true CN114640571A (en) | 2022-06-17 |
Family
ID=81951418
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210337885.9A Pending CN114640571A (en) | 2022-03-31 | 2022-03-31 | A terminal security analysis method, system, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114640571A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6694306B1 (en) * | 1999-10-06 | 2004-02-17 | Hitachi, Ltd. | System and method for query processing using virtual table interface |
CN101304360A (en) * | 2007-05-08 | 2008-11-12 | 艾岩 | System and method for virtualization of user digital terminal |
US8631034B1 (en) * | 2012-08-13 | 2014-01-14 | Aria Solutions Inc. | High performance real-time relational database system and methods for using same |
US20160103874A1 (en) * | 2014-10-08 | 2016-04-14 | Cloudera, Inc. | Querying operating system state on multiple machines declaratively |
US20160232235A1 (en) * | 2015-02-06 | 2016-08-11 | Red Hat, Inc. | Data virtualization for workflows |
US20180165307A1 (en) * | 2016-12-09 | 2018-06-14 | International Business Machines Corporation | Executing Queries Referencing Data Stored in a Unified Data Layer |
CN109308305A (en) * | 2018-09-30 | 2019-02-05 | 广州圣亚科技有限公司 | Querying method, device and the computer equipment of monitoring data |
CN111913958A (en) * | 2020-07-15 | 2020-11-10 | 山东山大电力技术股份有限公司 | Equipment information asset monitoring method and system |
CN113992721A (en) * | 2021-12-24 | 2022-01-28 | 中国电力科学研究院有限公司 | Intelligent terminal control method, system, equipment and storage medium |
-
2022
- 2022-03-31 CN CN202210337885.9A patent/CN114640571A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6694306B1 (en) * | 1999-10-06 | 2004-02-17 | Hitachi, Ltd. | System and method for query processing using virtual table interface |
CN101304360A (en) * | 2007-05-08 | 2008-11-12 | 艾岩 | System and method for virtualization of user digital terminal |
US8631034B1 (en) * | 2012-08-13 | 2014-01-14 | Aria Solutions Inc. | High performance real-time relational database system and methods for using same |
US20160103874A1 (en) * | 2014-10-08 | 2016-04-14 | Cloudera, Inc. | Querying operating system state on multiple machines declaratively |
US20160232235A1 (en) * | 2015-02-06 | 2016-08-11 | Red Hat, Inc. | Data virtualization for workflows |
US20180165307A1 (en) * | 2016-12-09 | 2018-06-14 | International Business Machines Corporation | Executing Queries Referencing Data Stored in a Unified Data Layer |
CN109308305A (en) * | 2018-09-30 | 2019-02-05 | 广州圣亚科技有限公司 | Querying method, device and the computer equipment of monitoring data |
CN111913958A (en) * | 2020-07-15 | 2020-11-10 | 山东山大电力技术股份有限公司 | Equipment information asset monitoring method and system |
CN113992721A (en) * | 2021-12-24 | 2022-01-28 | 中国电力科学研究院有限公司 | Intelligent terminal control method, system, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110196731B (en) | Operation and maintenance system, method and storage medium | |
CN112491602B (en) | Behavior data monitoring method and device, computer equipment and medium | |
WO2019148722A1 (en) | Electronic device, data migrating and calling method and storage medium | |
CN110362009A (en) | Building system configuration logic generation method and device and building system | |
CN100517249C (en) | A way to catch functions that cause memory to be overwritten by wild pointers | |
US11706084B2 (en) | Self-monitoring | |
WO2019148727A1 (en) | Electronic device, redis-based exception warning method and storage medium | |
CN113190286B (en) | MES system, loading method, terminal and medium for dynamically and remotely loading functional plug-ins | |
CN109783064B (en) | Intelligent application integration development system based on big data | |
CN113504916A (en) | Code updating method and device, computer equipment and medium | |
CN110688305B (en) | Test environment synchronization method, device, medium and electronic equipment | |
CN114201511A (en) | Project management and control method and device, computer equipment and storage medium | |
CN112416762B (en) | API test method and device, equipment and computer readable storage medium | |
CN115578051A (en) | Vehicle asset management method and device | |
US10191844B2 (en) | Automatic garbage collection thrashing monitoring | |
CN114640571A (en) | A terminal security analysis method, system, computer equipment and storage medium | |
CN113419922A (en) | Method and device for processing batch job running data of host | |
CN113268401A (en) | Log information output method and device and computer readable storage medium | |
CN112817573B (en) | Method, apparatus, computer system, and medium for building a streaming computing application | |
CN108566293B (en) | Electronic device, zk node information notification method and storage medium | |
CN112416698A (en) | Monitoring system expansion method and device, storage medium and electronic equipment | |
CN112506654B (en) | Distributed collaborative debugging method and system for industrial robot | |
CN115033397A (en) | Interface calling method, apparatus, device and storage medium | |
CN113031964A (en) | Management method, device, equipment and storage medium for big data application | |
RU2846174C1 (en) | Method and system for implementation of vehicle bus virtual channel |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20230614 Address after: 518052 Room 201, building A, 1 front Bay Road, Shenzhen Qianhai cooperation zone, Shenzhen, Guangdong Applicant after: ZHONGAN INFORMATION TECHNOLOGY SERVICE Co.,Ltd. Address before: 201210 3rd floor, building 1, No.400, Fangchun Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai Applicant before: Shanghai Zhongzhi Technology Co.,Ltd. |
|
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20220617 |