[go: up one dir, main page]

TWI706646B - Target equipment prediction method, device, electronic equipment and storage medium - Google Patents

Target equipment prediction method, device, electronic equipment and storage medium Download PDF

Info

Publication number
TWI706646B
TWI706646B TW108120240A TW108120240A TWI706646B TW I706646 B TWI706646 B TW I706646B TW 108120240 A TW108120240 A TW 108120240A TW 108120240 A TW108120240 A TW 108120240A TW I706646 B TWI706646 B TW I706646B
Authority
TW
Taiwan
Prior art keywords
preset
devices
log
remote login
training
Prior art date
Application number
TW108120240A
Other languages
Chinese (zh)
Other versions
TW202010292A (en
Inventor
徐子騰
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW202010292A publication Critical patent/TW202010292A/en
Application granted granted Critical
Publication of TWI706646B publication Critical patent/TWI706646B/en

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/12Discovery or management of network topologies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/147Network analysis or design for predicting network behaviour

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Debugging And Monitoring (AREA)

Abstract

本案實施例公開了一種目標設備的預測方法、裝置、電子設備及儲存媒體。該方法包括:獲取網路拓撲結構下預設設備在預定時間段內產生的遠端登錄日誌;從所述遠端登錄日誌中提取預設特徵屬性;利用預先訓練好的設備預測模型對所述預設特徵屬性進行處理,並預測所述預設設備是否為所述網路拓撲結構下的目標設備;其中,所述目標設備被用於管控所述網路拓撲結構下的多個設備。透過本案的實施方式,可以從海量遠端登錄日誌中提取出相關特徵,並透過預先訓練好的設備預測模型對相關特徵進行分析處理,從海量設備中定位出對其他設備具有管控能力的目標設備。The embodiment of this case discloses a prediction method, device, electronic device and storage medium of a target device. The method includes: obtaining a remote login log generated by a preset device in a predetermined time period under a network topology; extracting preset feature attributes from the remote login log; and using a pre-trained device prediction model to analyze the The preset characteristic attributes are processed, and whether the preset device is a target device under the network topology structure is predicted; wherein, the target device is used to manage and control multiple devices under the network topology structure. Through the implementation of this case, relevant features can be extracted from massive remote log-in logs, and the relevant features can be analyzed and processed through the pre-trained device prediction model, and target devices that have control over other devices can be located from the massive devices .

Description

目標設備的預測方法、裝置、電子設備及儲存媒體Target equipment prediction method, device, electronic equipment and storage medium

本案涉及電腦技術領域,具體涉及一種目標設備的預測方法、裝置、電子設備及儲存媒體。This case involves the field of computer technology, and specifically relates to a prediction method, device, electronic device, and storage medium for a target device.

在同一網路拓撲結構下,有些設備為應用設備,而有些設備為運維管控設備。管理人員或者開發人員可以透過一些特定的設備登錄其他應用設備以進行運維管理操作。這些特定的設備通常有具有登錄大量其他設備的能力,可以稱之為運維管控設備。運維管控設備一旦被駭客攻陷,會直接導致大量應用設備被攻陷。因此,如何梳理出這些運維管控設備,則是業內普遍存在的一大難題。Under the same network topology, some devices are application devices, and some devices are operation and maintenance management and control devices. Managers or developers can log in to other application devices through some specific devices to perform operation and maintenance management operations. These specific devices usually have the ability to log in to a large number of other devices, which can be called operation and maintenance control devices. Once the operation and maintenance control equipment is compromised by hackers, a large number of application equipment will be compromised directly. Therefore, how to sort out these operation and maintenance control equipment is a major problem that exists in the industry.

本案實施例提供一種目標設備的預測及設備預測模型的訓練方法、裝置、電子設備、電腦可讀儲存媒體。 第一態樣,本案實施例中提供了一種目標設備的預測方法,包括:獲取網路拓撲結構下預設設備在預定時間段內產生的遠端登錄日誌;從所述遠端登錄日誌中提取預設特徵屬性;利用預先訓練好的設備預測模型對所述預設特徵屬性進行處理,並預測所述預設設備是否為所述網路拓撲結構下的目標設備;其中,所述目標設備被用於管控所述網路拓撲結構下的多個設備。 進一步地,所述預設特徵屬性包括所述預設設備在所述預定時間段內遠端登錄所述網路拓撲結構下其他設備的次數和/或個數。 進一步地,針對每條所述遠端登錄日誌,所述預設特徵屬性還包括以下至少一項:所述預設設備遠端登錄其他設備時是否使用密鑰登錄;所述預設設備以何種用戶身份遠端登錄其他設備;所述預設設備是否登錄成功。 進一步地,所述方法還包括:獲取多個訓練樣本;其中,所述訓練樣本包括特徵部分和結果標註部分,所述特徵部分包括所述預設特徵屬性,所述結果標註部分用於標註所述訓練樣本為正訓練樣本還是負訓練樣本;利用多個所述訓練樣本對人工智慧模型進行訓練,得到所述設備預測模型。 進一步地,所述獲取多個訓練樣本包括:獲取所述網路拓撲結構下多個設備在歷史時間段內產生的遠端登錄日誌;從所述遠端登錄日誌確定所述多個設備登錄其他設備的次數和/或個數;從所述次數和/或個數滿足預設條件的第一設備對應的遠端登錄日誌,產生正訓練樣本,從所述次數和/或個數不滿足所述預設條件的第二設備對應的遠端登錄日誌產生負訓練樣本。 第二態樣,本案實施例提供了一種設備預測模型的訓練方法,包括:獲取網路拓撲結構下多個設備在歷史時間段內產生的遠端登錄日誌;從所述遠端登錄日誌確定所述多個設備登錄其他設備的次數和/或個數;從所述次數和/或個數滿足預設條件的第一設備對應的遠端登錄日誌,產生正訓練樣本,從所述次數和/或個數不滿足所述預設條件的第二設備對應的遠端登錄日誌產生負訓練樣本;利用所述正訓練樣本和負訓練樣本對人工智慧模型進行訓練,得到設備預測模型。 The embodiment of this case provides a method, device, electronic device, and computer-readable storage medium for the prediction of the target device and the training of the device prediction model. In the first aspect, an embodiment of this case provides a method for predicting a target device, which includes: obtaining remote login logs generated by a preset device in a network topology within a predetermined time period; extracting from the remote login logs Preset feature attributes; use a pre-trained device prediction model to process the preset feature attributes, and predict whether the preset device is a target device under the network topology; wherein, the target device is Used to control multiple devices under the network topology. Further, the preset characteristic attribute includes the number of times and/or the number of remote logins of other devices in the network topology by the preset device within the predetermined time period. Further, for each of the remote login logs, the preset feature attribute further includes at least one of the following: whether the preset device uses a key to log in remotely to other devices; how the preset device is used Remotely log in to other devices as a user; whether the preset device is successfully logged in. Further, the method further includes: acquiring a plurality of training samples; wherein the training samples include a feature part and a result labeling part, the characteristic part includes the preset feature attribute, and the result labeling part is used to label the Whether the training sample is a positive training sample or a negative training sample; using a plurality of the training samples to train an artificial intelligence model to obtain the equipment prediction model. Further, the acquiring multiple training samples includes: acquiring remote login logs generated by multiple devices in a historical time period under the network topology; and determining from the remote login logs that the multiple devices log in to others The frequency and/or number of devices; generate a positive training sample from the remote login log corresponding to the first device whose frequency and/or number meets the preset condition, and from the frequency and/or number that do not meet the requirements The remote login log corresponding to the second device under the preset condition generates a negative training sample. In the second aspect, the embodiment of the present case provides a method for training a device prediction model, which includes: obtaining remote login logs generated by multiple devices in a historical time period under a network topology; and determining all remote login logs from the remote login logs. The number and/or number of the multiple devices logging in to other devices; generating a positive training sample from the remote login log corresponding to the first device whose number and/or number meets the preset condition, and from the number and/or number Or, the remote login log corresponding to the second device whose number does not meet the preset condition generates negative training samples; using the positive training samples and the negative training samples to train the artificial intelligence model to obtain the device prediction model.

進一步地,從所述次數和/或個數滿足預設條件的第一設備對應的遠端登錄日誌,產生正訓練樣本,從所述次數和/或個數不滿足所述預設條件的第二設備對應的遠端登錄日誌產生負訓練樣本,包括:從所述第一設備對應的遠端登錄日誌提取第一預設特徵屬性,根據所述第一預設特徵屬性產生所述正訓練樣本;從所述第二設備對應的遠端登錄日誌提取所述第二預設特徵屬性,根據所述第二預設特徵屬性產生所述負訓練樣本。 Further, a positive training sample is generated from the remote login log corresponding to the first device whose times and/or the number meets the preset condition, and from the first device whose times and/or number does not meet the preset condition Generating a negative training sample from the remote login log corresponding to the second device includes: extracting a first preset characteristic attribute from the remote login log corresponding to the first device, and generating the positive training sample according to the first preset characteristic attribute Extracting the second preset characteristic attribute from the remote login log corresponding to the second device, and generating the negative training sample according to the second preset characteristic attribute.

進一步地,所述第一預設特徵屬性至少包括所述第一設備遠端登錄其他設備的次數和/或個數;和/或,所述第二預設特徵屬性至少包括所述第二設備遠端登錄其他設備的次數和/或個數。 Further, the first preset characteristic attribute includes at least the number of times and/or the number of remote logins of other devices by the first device; and/or, the second preset characteristic attribute includes at least the second device The number and/or number of remote logins to other devices.

進一步地,針對所述第一設備對應的每條所述遠端登錄日誌,所述第一預設特徵屬性還包括以下至少一項:所述第一設備遠端登錄其他設備時是否使用密鑰登錄;所述第一設備以何種用戶身份遠端登錄其他設備;所述第一設 備是否登錄成功;和/或,針對所述第二設備對應的每條所述遠端登錄日誌,所述第二預設特徵屬性還包括以下至少一項:所述第二設備遠端登錄其他設備時是否使用密鑰登錄;所述第二設備以何種用戶身份遠端登錄其他設備;所述第二設備是否登錄成功。 Further, for each remote login log corresponding to the first device, the first preset characteristic attribute further includes at least one of the following: whether the first device uses a key when remotely logging in to other devices Login; what user identity the first device uses to remotely log in to other devices; the first device Whether the device is successfully logged in; and/or, for each of the remote login logs corresponding to the second device, the second preset characteristic attribute further includes at least one of the following: the second device remotely logs in to other Whether the device uses a key to log in; what user identity the second device uses to remotely log in to other devices; whether the second device is successfully logged in.

第三態樣,本案實施例提供了一種目標設備的預測裝置,包括:第一獲取模組,被配置為獲取網路拓撲結構下預設設備在預定時間段內產生的遠端登錄日誌;提取模組,被配置為從所述遠端登錄日誌中提取預設特徵屬性;預測模組,被配置為利用預先訓練好的設備預測模型對所述預設特徵屬性進行處理,並預測所述預設設備是否為所述網路拓撲結構下的目標設備;其中,所述目標設備被用於管控所述網路拓撲結構下的多個設備。 In a third aspect, an embodiment of the present case provides a device for predicting a target device, including: a first acquisition module configured to acquire remote login logs generated by a preset device in a network topology within a predetermined time period; and extract; The module is configured to extract preset feature attributes from the remote login log; the prediction module is configured to process the preset feature attributes using a pre-trained device prediction model, and predict the prediction It is assumed that the device is a target device in the network topology; wherein, the target device is used to manage and control multiple devices in the network topology.

進一步地,所述預設特徵屬性包括所述預設設備在所述預定時間段內遠端登錄所述網路拓撲結構下其他設備的次數和/或個數。 Further, the preset characteristic attribute includes the number of times and/or the number of remote logins of other devices in the network topology by the preset device within the predetermined time period.

進一步地,針對每條所述遠端登錄日誌,所述預設特徵屬性還包括以下至少一項:所述預設設備遠端登錄其他設備時是否使用密鑰登錄;所述預設設備以何種用戶身份遠端登錄其他設備;所述預設設備是否登錄成功。 Further, for each of the remote login logs, the preset feature attribute further includes at least one of the following: whether the preset device uses a key to log in remotely to other devices; how the preset device is used Remotely log in to other devices as a user; whether the preset device is successfully logged in.

進一步地,所述裝置還包括:第二獲取模組,被配置為獲取多個訓練樣本;其中,所述訓練樣本包括特徵部分和結果標註部分,所述特徵部分包括所述預設特徵屬性,所述結果標註部分用於標註所述訓練樣本為正訓練樣本還 是負訓練樣本;第一訓練模組,被配置為利用多個所述訓練樣本對人工智慧模型進行訓練,得到所述設備預測模型。 Further, the device further includes: a second acquisition module configured to acquire a plurality of training samples; wherein the training samples include a feature part and a result labeling part, and the feature part includes the preset feature attribute, The result labeling part is used to label the training sample as a positive training sample. Is a negative training sample; the first training module is configured to use a plurality of the training samples to train the artificial intelligence model to obtain the equipment prediction model.

進一步地,所述第二獲取模組,包括:第一獲取子模組,被配置為獲取所述網路拓撲結構下多個設備在歷史時間段內產生的遠端登錄日誌;第一確定子模組,被配置為從所述遠端登錄日誌確定所述多個設備登錄其他設備的次數和/或個數;產生子模組,被配置為從所述次數和/或個數滿足預設條件的第一設備對應的遠端登錄日誌,產生正訓練樣本,從所述次數和/或個數不滿足所述預設條件的第二設備對應的遠端登錄日誌產生負訓練樣本。 Further, the second acquisition module includes: a first acquisition sub-module configured to acquire remote login logs generated by multiple devices in a historical time period under the network topology; a first determining sub-module The module is configured to determine from the remote login log the number and/or the number of times the multiple devices log in to other devices; generating a sub-module configured to satisfy the preset from the number and/or number The remote login log corresponding to the first device of the condition generates a positive training sample, and a negative training sample is generated from the remote login log corresponding to the second device whose number and/or number does not meet the preset condition.

所述功能可以透過硬體實現,也可以透過硬體執行相應的軟體實現。所述硬體或軟體包括一個或多個與上述功能相對應的模組。 The functions can be realized through hardware, or through hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above-mentioned functions.

在一個可能的設計中,目標設備的預測裝置的結構中包括記憶體和處理器,所述記憶體用於儲存一條或多條支持目標設備的預測裝置執行上述第一態樣中目標設備的預測方法的電腦指令,所述處理器被配置為用於執行所述記憶體中儲存的電腦指令。所述目標設備的預測裝置還可以包括通信介面,用於目標設備的預測裝置與其他設備或通信網路通信。 In a possible design, the structure of the prediction device of the target device includes a memory and a processor, and the memory is used to store one or more prediction devices supporting the target device to perform the prediction of the target device in the first aspect. The computer instructions of the method, the processor is configured to execute the computer instructions stored in the memory. The prediction device of the target device may also include a communication interface, and the prediction device of the target device can communicate with other devices or a communication network.

第四態樣,本案實施例提供了一種設備預測模型的訓練裝置,包括:第三獲取模組,被配置為獲取網路拓撲結構下多個設備在歷史時間段內產生的遠端登錄日誌;第一 確定模組,被配置為從所述遠端登錄日誌確定所述多個設備登錄其他設備的次數和/或個數;產生模組,被配置為從所述次數和/或個數滿足預設條件的第一設備對應的遠端登錄日誌,產生正訓練樣本,從所述次數和/或個數不滿足所述預設條件的第二設備對應的遠端登錄日誌產生負訓練樣本;第二訓練模組,被配置為利用所述正訓練樣本和負訓練樣本對人工智慧模型進行訓練,得到設備預測模型。 In a fourth aspect, an embodiment of the present case provides a device prediction model training device, including: a third acquisition module configured to acquire remote login logs generated by multiple devices in a historical time period under a network topology; the first The determining module is configured to determine the number and/or number of times the multiple devices log in to other devices from the remote login log; the generating module is configured to determine the number and/or number of times and/or numbers satisfying a preset The remote login log corresponding to the first device of the condition generates a positive training sample, and a negative training sample is generated from the remote login log corresponding to the second device whose number and/or number does not meet the preset condition; second The training module is configured to use the positive training sample and the negative training sample to train the artificial intelligence model to obtain the equipment prediction model.

進一步地,所述產生模組,包括:第一提取子模組,被配置為從所述第一設備對應的遠端登錄日誌提取第一預設特徵屬性,根據所述第一預設特徵屬性產生所述正訓練樣本;第二提取子模組,被配置為從所述第二設備對應的遠端登錄日誌提取所述第二預設特徵屬性,根據所述第二預設特徵屬性產生所述負訓練樣本。 Further, the generation module includes: a first extraction sub-module configured to extract a first preset characteristic attribute from a remote login log corresponding to the first device, according to the first preset characteristic attribute Generate the positive training sample; a second extraction sub-module configured to extract the second preset feature attribute from the remote login log corresponding to the second device, and generate the second preset feature attribute according to the second preset feature attribute Said negative training sample.

進一步地,所述第一預設特徵屬性至少包括所述第一設備遠端登錄其他設備的次數和/或個數;和/或,所述第二預設特徵屬性至少包括所述第二設備遠端登錄其他設備的次數和/或個數。 Further, the first preset characteristic attribute includes at least the number of times and/or the number of remote logins of other devices by the first device; and/or, the second preset characteristic attribute includes at least the second device The number and/or number of remote logins to other devices.

進一步地,針對所述第一設備對應的每條所述遠端登錄日誌,所述第一預設特徵屬性還包括以下至少一項:所述第一設備遠端登錄其他設備時是否使用密鑰登錄;所述第一設備以何種用戶身份遠端登錄其他設備;所述第一設備是否登錄成功;和/或,針對所述第二設備對應的每條所述遠端登錄日誌,所述第二預設特徵屬性還包括以下至少一項:所述第二設備遠端登錄其他設備時是否使用密鑰登錄;所述第二設備以何種用戶身份遠端登錄其他設備;所述第二設備是否登錄成功。 所述功能可以透過硬體實現,也可以透過硬體執行相應的軟體實現。所述硬體或軟體包括一個或多個與上述功能相對應的模組。 在一個可能的設計中,設備預測模型的訓練裝置的結構中包括記憶體和處理器,所述記憶體用於儲存一條或多條支持設備預測模型的訓練裝置執行上述第一態樣中設備預測模型的訓練方法的電腦指令,所述處理器被配置為用於執行所述記憶體中儲存的電腦指令。所述設備預測模型的訓練裝置還可以包括通信介面,用於設備預測模型的訓練裝置與其他設備或通信網路通信。 第五態樣,本案實施例提供了一種電子設備,包括記憶體和處理器;其中,所述記憶體用於儲存一條或多條電腦指令,其中,所述一條或多條電腦指令被所述處理器執行以實現第一態樣或第二態樣所述的方法步驟。 第六態樣,本案實施例提供了一種電腦可讀儲存媒體,用於儲存目標設備的預測裝置或設備預測模型的訓練裝置所用的電腦指令,其包含用於執行上述第一態樣中目標設備的預測方法或第二態樣中設備預測模型的訓練方法所涉及的電腦指令。 本案實施例提供的技術方案可以包括以下有益效果: 本案實施例透過獲取網路拓撲結構下設備的遠端登錄日誌,並從中提取預設特徵屬性後,根據預先訓練好的設備預測模型對預設特徵屬性進行分析處理,預測出該設備是否為目標設備。透過本案的實施方式,可以從海量遠端登錄日誌中提取出相關特徵,並透過預先訓練好的設備預測模型對相關特徵進行分析處理,從海量設備中定位出對其他設備具有管控能力的目標設備,本案利用設備訓練技術極大的提升了從遠端登錄日誌定位目標設備的準確性,很好的解決了大型網路拓撲結構下具有管控能力的設備難以定位的問題。 應當理解的是,以上的一般描述和後文的細節描述僅是示例性和解釋性的,並不能限制本案。Further, for each remote login log corresponding to the first device, the first preset characteristic attribute further includes at least one of the following: whether the first device uses a key when remotely logging in to other devices Login; what user identity the first device uses to remotely log in to other devices; whether the first device is successfully logged in; and/or, for each remote login log corresponding to the second device, the The second preset characteristic attribute also includes at least one of the following: whether the second device uses a key to log in remotely to other devices; what user identity the second device uses to remotely log in to other devices; the second Whether the device is successfully logged in. The functions can be realized through hardware, or through hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above-mentioned functions. In a possible design, the structure of the device prediction model training device includes a memory and a processor, and the memory is used to store one or more training devices supporting the device prediction model to perform the device prediction in the first aspect. The computer instructions of the model training method, the processor is configured to execute the computer instructions stored in the memory. The training device for the equipment prediction model may also include a communication interface, and the training device for the equipment prediction model communicates with other equipment or a communication network. In a fifth aspect, an embodiment of the present case provides an electronic device including a memory and a processor; wherein the memory is used to store one or more computer instructions, wherein the one or more computer instructions are The processor executes the method steps described in the first aspect or the second aspect. In the sixth aspect, an embodiment of the present case provides a computer-readable storage medium for storing computer instructions used by the prediction device of the target device or the training device of the device prediction model, which includes instructions for executing the target device in the first aspect. The prediction method or the computer instructions involved in the training method of the equipment prediction model in the second aspect. The technical solutions provided by the embodiments of this case may include the following beneficial effects: The embodiment of this case obtains the remote login log of the device under the network topology and extracts the preset feature attributes from it, then analyzes the preset feature attributes according to the pre-trained device prediction model to predict whether the device is the target equipment. Through the implementation of this case, relevant features can be extracted from massive remote log-in logs, and the relevant features can be analyzed and processed through the pre-trained device prediction model, and target devices that have control over other devices can be located from the massive devices In this case, the equipment training technology was used to greatly improve the accuracy of locating the target device from the remote log-in log, and it solved the problem that the equipment with management and control capabilities under the large-scale network topology is difficult to locate. It should be understood that the above general description and the following detailed description are only exemplary and explanatory, and cannot limit the case.

下文中,將參考附圖詳細描述本案的示例性實施方式,以使本領域技術人員可容易地實現它們。此外,為了清楚起見,在附圖中省略了與描述示例性實施方式無關的部分。 在本案中,應理解,諸如“包括”或“具有”等的術語旨在指示本說明書中所公開的特徵、數字、步驟、行為、部件、部分或其組合的存在,並且不欲排除一個或多個其他特徵、數字、步驟、行為、部件、部分或其組合存在或被添加的可能性。 另外還需要說明的是,在不衝突的情況下,本案中的實施例及實施例中的特徵可以相互組合。下面將參考附圖並結合實施例來詳細說明本案。 在一已知的網路拓撲結構下,主站內每天的系統日誌數量大約有1000萬條。已有技術根據系統日誌,統計出每天登錄其他設備數量在100次以上的設備,並確認這批設備為具有管控其他設備能力的目標設備,也可以稱之為運維管控設備。已有技術的方案雖然實現起來較為簡單,但是召回率很低,會漏掉一大批登錄次數在100次以下的運維管控設備。因為很多運維管控設備的登錄頻率並不會很高,有的登錄次數在一個小時一次,有的甚至是一天一次,所以單純的依賴登錄頻率高低不能很好的解決問題。 圖1示出根據本案一實施方式的目標設備的預測方法的流程圖。如圖1所示,所述目標設備的預測方法包括以下步驟S101-S103: 在步驟S101中,獲取網路拓撲結構下預設設備在預定時間段內產生的遠端登錄日誌; 在步驟S102中,從所述遠端登錄日誌中提取預設特徵屬性; 在步驟S103中,利用預先訓練好的設備預測模型對所述預設特徵屬性進行處理,並預測所述預設設備是否為所述網路拓撲結構下的目標設備;其中,所述目標設備被用於管控所述網路拓撲結構下的多個設備。 在本實施例中,一個網路拓撲結構可以包括多台經過傳輸媒體互連的設備,這些設備之間可以進行網路通信,該網路拓撲結構內的多數設備可以為執行相應應用的設備,而有一小部分設備作為管控其他設備的目標設備,可以被管理人員用來遠端登錄其他設備,進而維護和管理其他設備。目標設備是能夠遠端登錄網路拓撲結構下的其他設備並對其他設備進行管控的運維管控設備,其具有遠端登錄大量其他設備的能力。預設設備可以為網路拓撲結構下的任意一台設備,可以是運維管控設備,也可以是其他應用設備。網路拓撲結構下的任意設備所產生的遠端登錄日誌都可以預先儲存在資料庫中,在進行目標設備定位時,可以從資料庫中獲取預設設備在預定時間段內產生的遠端登錄日誌。由於目標設備遠端登錄其他應用設備的頻率不一定很高,因此可以透過設置預定時間段,並基於預定時間段內產生的遠端登錄日誌來判斷預設設備是否為目標設備。預定時間段的單位可以是周、月等,可根據實際情況設置,對此不做限制。 本一實施例中,遠端登錄日誌可以為SSH登錄日誌,一條SSH登錄日誌記錄了預設設備登錄其他設備的相關信息,例如可以包括如下字段: 1. 被登錄設備主機名 2. SSH登錄時間 3. SSH登錄結果(成功或失敗) 4. SSH登錄方法(密碼或密鑰) 5. SSH登錄用戶 6. 源登錄IP 7. 源登錄埠 為預測預設設備是否為目標設備,可以從SSH登錄日誌中的上述字段中提取相關的預設特徵屬性,進而利用預先訓練好的設備預測模型對所提取出的預設特徵屬性進行處理,並預測得到預設設備是否為目標設備的結論。目標設備所具有的共性包括:在一段時間內會多次遠端登錄其他設備,而登錄其他設備的個數基本不會為1(因為一台運維管控設備通常會管理和維護多台其他設備)。此外,目標設備作為運維管控設備,遠端登錄其他設備的目的是管理和維護其他設備,具有較大權利,可能採用根用戶的方式登錄其他設備的概率較大。因此可以基於目標設備的這些共性,預先設置預設特徵屬性,並在獲得預定時間段內的SSH登錄日誌後,從SSH登錄日誌中提取預設特徵屬性,並使用預先訓練好的設備預測模型進行預測。設備預測模型也是透過預設特徵屬性進行預先訓練得到的,能夠根據預設設備的SSH登錄日誌中提取出的預設特徵屬性預測出預設設備是否為目標設備。設備預測模型可以採用人工智慧模型進行訓練。人工智慧模型包括但不限於邏輯回歸、卷積神經網路、深度神經網路、支持向量機、K-means、K-neighbors、決策樹、隨機森林、貝葉斯網路中的一種或多種的組合。 本案實施例透過獲取網路拓撲結構下設備的遠端登錄日誌,並從中提取預設特徵屬性後,根據預先訓練好的預測模型對預設特徵屬性進行分析處理,預測得出該設備是否為目標設備。透過本案的實施方式,可以從海量遠端登錄日誌中提取出相關特徵,並透過預先訓練好的設備預測模型對相關特徵進行分析處理,從海量設備中定位出對其他設備具有管控能力的目標設備,本案利用設備訓練技術極大的提升了從遠端登錄日誌定位目標設備的準確性,很好的解決了大型網路拓撲結構下用於管控的設備難以定位的問題。 在本實施例的一個可選實現方式中,所述預設特徵屬性包括所述預設設備在所述預定時間段內遠端登錄所述網路拓撲結構下其他設備的次數和/或個數。 該可選的實現方式中,預設設備登錄其他設備的次數可以基於每遠端登錄一次其他設備就加1的方式確定;而登錄其他設備的個數可以基於在預定時間段內總共登錄過的其他設備的個數,可以理解的是同一個設備可能被遠端登錄過多次,因此次數大於個數。目標設備作為運維管控設備,至少會在一段時間內遠端登錄其他設備,而且通常所登錄的其他設備不止一個。此外,目標設備作為運維管控設備,還至少會在一段時間內遠端登錄其他設備,且登錄其他設備的次數也不止一次。因此可以基於這兩個預設特徵屬性,即預設設備遠端登錄其他設備的次數和個數中的一個或兩個的組合判斷預設設備是否為目標設備。而目標設備會在一段時間內登錄幾個其他設備以及多少次其他設備,跟其所在的網路拓撲結構以及應用環境相關,因此針對不同的網路拓撲結構及應用環境,至少可以使用預設設備遠端登錄其他設備的次數和個數中的一個或兩個的組合預先訓練得到設備預測模型,進而在實際應用中,利用該設備預測模型對該網路拓撲結構及應用環境下的預設設備進行預測。透過這種方式可以得到準確率較高的設備預測模型,使得目標設備的預測更加準確。 在本實施例的一個可選實現方式中,針對每條所述遠端登錄日誌,所述預設特徵屬性還包括以下至少一項: 所述預設設備遠端登錄其他設備時是否使用密鑰登錄; 所述預設設備以何種用戶身份遠端登錄其他設備; 所述預設設備是否登錄成功。 該可選的實現方式中,除了上述預設設備遠端登錄其他設備的次數和個數之外,還可以包括其他預設特徵屬性,能夠輔助判斷預設設備是否為目標設備,以增加預測的準確性。其他預設特徵屬性包括但不限於預設設備遠端登錄其他設備的登錄方式、用戶身份、是否登錄成功等。登錄方式包括是否使用密鑰登錄,用戶身份包括系統用戶、根用戶和普通用戶。通常情況下,在運維管控其他設備的過程中,目標設備可能會在短時間內多次登錄其他設備,如果每次登錄其他設備都手動輸入用戶名和密碼,會佔用運維人員的很多時間,因此通常情況下運維人員會為其他設備產生密鑰對,即一對公鑰和私鑰,並將公鑰儲存在其他設備上,而目標設備上儲存私鑰,目標設備在登錄其他設備時,可以自動將目標設備上的私鑰和其他設備上的公鑰進行配對,進而登錄其他設備,這種方式下登錄認證的過程都是自動的,無需人工干預,因此能夠節省運維人員的時間和精力。此外,目標設備通常都會以根用戶的身份登錄其他設備,以便能夠以最大權限來管控其他設備。使用上述這些預設特徵屬性進行預測,可以排除一些用戶遠端登錄自己的設備進行工作等情形。在設備預測模型的訓練階段,還可以使用上述其他預設特徵屬性進行訓練,使得設備預測模型的預測準確率進一步提高。 在本實施例的一個可選實現方式中,如圖2所示,所述方法進一步還包括以下步驟S201-S202: 在步驟S201中,獲取多個訓練樣本;其中,所述訓練樣本包括特徵部分和結果標註部分,所述特徵部分包括所述預設特徵屬性,所述結果標註部分用於標註所述訓練樣本為正訓練樣本還是負訓練樣本; 在步驟S202中,利用多個所述訓練樣本對人工智慧模型進行訓練,得到所述設備預測模型。 該可選的實現方式中,設備預測模型的訓練階段,可以先選出合適的人工智慧模型。人工智慧模型包括但不限於邏輯回歸、卷積神經網路、深度神經網路、支持向量機、K-means、K-neighbors、決策樹、隨機森林、貝葉斯網路中的一種或多種的組合。可以根據實際情況選擇相應的人工智慧模型的類型及結構,並根據預設特徵屬性的個數等建立人工智慧模型。之後,可以收集訓練樣本。訓練樣本可以包括特徵部分和結果標註部分,特徵部分包括訓練用的預設特徵屬性,可以是從目標設備(已知是目標設備的情況)在過去一段時間內的遠端登錄日誌提取出來的,也可以是從非目標設備(已知是非目標設備的情況)在過去一段時間內的遠端登錄日誌提取出來的,而結果標註部分用於標註訓練樣本為正訓練樣本還是負訓練樣本,正訓練樣本對應的是目標設備,而負訓練樣本對應的是非目標設備。在收集了足夠多的訓練樣本後,可以利用訓練樣本對建立好的人工智慧模型進行訓練,直到訓練次數達到一定值,或者人工智慧模型的參數收斂,停止訓練,訓練得到的是能夠預測是否為目標設備的設備預測模型。 在本實施例的一個可選實現方式中,如圖3所示,所述步驟201,即獲取多個訓練樣本的步驟,進一步包括以下步驟S301-S303: 在步驟S301中,獲取所述網路拓撲結構下多個設備在歷史時間段內產生的遠端登錄日誌; 在步驟S302中,從所述遠端登錄日誌確定所述多個設備登錄其他設備的次數和/或個數; 在步驟S303中,從所述次數和/或個數滿足預設條件的第一設備對應的遠端登錄日誌,產生正訓練樣本,從所述次數和/或個數不滿足所述預設條件的第二設備對應的遠端登錄日誌產生負訓練樣本。 該可選的實現方式中,歷史時間段可以是過去的某一段時間,具體根據實際情況設置。在一實施例中,歷史時間段和預定時間段的時間長度差不多,也即歷史時間段和預定時間段的時間長度之差可以小於一預設臨限值,這是因為在應用設備預測模型進行預測時,預設特徵屬性中包括預設設備在預定時間段內所登錄其他設備的次數和個數。如果在訓練設備預測模型時,所採用的歷史時間段和預定時間段的時間長度相差不大的話,能使設備預測模型的預測準確率更高。在收集訓練樣本時,該實現方式中透過預設網路拓撲結構下多個設備在歷史時間段內產生的遠端登錄日誌,統計每個設備登錄其他設備的次數和/或個數(包括次數、個數或兩者的組合),並基於該次數和/或個數來確定該設備是否為目標設備,進而從遠端登錄日誌提取出預設特徵屬性產生正訓練樣本和負訓練樣本的。這是因為經過統計分析可以發現,在一個設備登錄其他設備的次數和/或個數大於一個較大臨限值的情況下,基本上可以確定該設備為目標設備,而該次數和/或個數小於一個較小臨限值的情況下,基本上可以確定該設備為非目標設備。因此,透過這種方式可以在並不確定目標設備的情況下,就能夠收集到足夠多的正訓練樣本和負訓練樣本。 下面透過一具體的示例詳細說明設備預測模型的訓練過程。 1、預設特徵屬性提取: 首先針對當前網路拓撲結構下的多個設備,統計一個月內的SSH登錄日誌資料,並對一個月內的SSH登錄日誌資料進行如下兩個方面的統計: 某個IP一個月內登錄其他設備的次數; 某個IP一個月內登錄其他不同設備的個數; 將統計的上述次數和個數作為該IP對應設備的兩個預設特徵屬性值(第一個預設特徵屬性和第二個預設特徵屬性); 除了以上兩個特徵屬性之外,還對每條SSH登錄日誌資料進行了特徵提取,具體方法如下: 登錄結果特徵屬性(第三個預設特徵屬性)的提取:如果登錄成功則將登錄結果特徵屬性置為1,登錄失敗則將登錄結果特徵屬性置為0。 登錄方式特徵屬性(第四個預設特徵屬性)的提取:如果是用公鑰(public key)登錄,則將登錄方式特徵屬性置為1,其他方法則將登錄方式特徵屬性置為0。 用戶身份特徵屬性的提取:用戶分為三類,第一類是root用戶,第二類是系統用戶(admin, log, agent),第三類是其他用戶;如果登錄的用戶身份是root用戶,則將用戶身份特徵屬性中的根用戶身份特徵屬性(第五個預設特徵屬性)置為1,如果登錄的用戶身份是系統用戶,則將用戶身份特徵屬性中的系統用戶身份特徵屬性(第六個預設特徵屬性)置為1,否則根用戶身份特徵屬性和系統用戶身份特徵屬性均置為0。 2、正負訓練樣本產生: 運維管控設備的梳理本質上是一個二分類問題。從SSH日誌中可以確定一台設備是運維管控設備,或者不是運維管控設備。所以正負訓練樣本的產生也是一樣,可以透過已有的經驗,確定一批設備是運維管控設備,也可以確定一批設備為非運維管控設備。下面闡述一下本示例中的正負訓練樣本產生邏輯: 1)正訓練樣本產生邏輯: 運維管控設備通常會登錄大量不同設備,既滿足登錄次數的要求,也需要滿足不同設備個數的要求。所以正訓練樣本的產生滿足兩個要求: 一個月內登錄其他設備次數大於3000次; 一個月內被該設備登錄的其他設備大於3個。 因此,從一個月內網路拓撲結構下多個設備產生的SSH登錄日誌中,可以按照上述邏輯產生正訓練樣本共1012591條。 2)負訓練樣本產生邏輯: 負訓練樣本產生邏輯較簡單,以下兩個條件任滿足其一即可: 一個月內登錄其他設備次數小於10次。 一個月內被該設備登錄的其他設備個數只有一個。 因此,從一個月內網路拓撲結構下多個設備產生的SSH登錄日誌中,可以按照上述邏輯產生負訓練樣本共958061條。 3、人工智慧模型的建立與訓練: 本示例中選擇邏輯回歸模型進行訓練。邏輯回歸算法由於需要指定特徵列和結果列。本示例中指定了上述六個預設特徵屬性為特徵列。將正負訓練樣本的結果(即目標設備還是非目標設備)標記為結果列。設定邏輯回歸模型參數如下: 最大迭代次數:100 收斂誤差:0.000001 目標基準值:1 利用上述收集的正訓練樣本和負訓練樣本對邏輯回歸模型進行訓練,在最大迭代次數達到100或者參數收斂誤差在0.000001時,停止訓練,得到訓練好的設備預測模型。 另一方面,本案還公開了設備預測模型的訓練方法。圖4示出了根據本案另一實施方式的設備預測模型的訓練方法的流程圖。如圖4所示,所述設備預測模型的訓練方法包括以下步驟S401-S404: 在步驟S401中,獲取網路拓撲結構下多個設備在歷史時間段內產生的遠端登錄日誌; 在步驟S402中,從所述遠端登錄日誌確定所述多個設備登錄其他設備的次數和/或個數; 在步驟S403中,從所述次數和/或個數滿足預設條件的第一設備對應的遠端登錄日誌,產生正訓練樣本,從所述次數和/或個數不滿足所述預設條件的第二設備對應的遠端登錄日誌產生負訓練樣本; 在步驟S404中,利用所述正訓練樣本和負訓練樣本對人工智慧模型進行訓練,得到設備預測模型。 本實施例中,目標設備是可以被用來登錄網路拓撲結構下其他設備,進而對其他設備進行管理和維護的設備。網路拓撲結構中的大多數都是非目標設備,也即用於執行應用的應用設備,而有一小部分是目標設備。隨著網路拓撲結構運行時間的增加,越來越難以定位目標設備。因此,為了獲得能夠預測網路拓撲結構下的某台設備是否為目標設備,可以透過訓練樣本訓練人工智慧模型,得到設備預測模型。 本實施例透過從網路拓撲結構下多個設備在歷史時間段內產生的遠端登錄日誌,統計得出一台設備登錄其他設備的次數,以及該設備登錄其他不同設備的個數,進而根據該次數和/或個數是否滿足預設條件來判斷是第一設備還是第二設備,如果是第一設備則可以根據該第一設備對應的遠端登錄日誌產生正訓練樣本,如果是第二設備則可以根據該第二設備對應的遠端登錄日誌產生負訓練樣本。也就是說,如果上述次數和/或個數滿足預設條件,則可以認為該設備為目標設備,而如果不滿足預設條件,則為非目標設備。而預設條件可以根據的網路拓撲結構下目標設備和非目標設備的實際情況進行設置。這是因為經過統計分析,在一個設備登錄其他設備的次數和/或個數大於一個較大臨限值的情況下,基本上可以確定該設備為目標設備,而該次數和/或個數小於一個較小臨限值的情況下,基本上可以確定該設備為非目標設備,而較大臨限值和較小臨限值則可以根據實際情況進行設置。透過這種方式在目標設備不已知的情況下,依然能夠產生正訓練樣本和負訓練樣本,並且所產生的正負訓練樣本的數量也能足夠多。 在產生了訓練樣本後,可以選擇合適的人工智慧模型進行訓練。人工智慧模型包括但不限於邏輯回歸、卷積神經網路、深度神經網路、支持向量機、K-means、K-neighbors、決策樹、隨機森林、貝葉斯網路中的一種或多種的組合。可以根據實際情況選擇相應的人工智慧模型的類型,並根據預設特徵屬性的個數等建立人工智慧模型。之後,可以利用訓練樣本對建立好的人工智慧模型進行訓練,直到訓練次數達到一定值,或者人工智慧模型的參數收斂,停止訓練,訓練得到的是能夠預測是否為目標設備的設備預測模型。訓練樣本的收集、人工智慧模型的選取與建立的順序,可以根據實際情況而定,可以先收集訓練樣本,也可以先選取並建立人工智慧模型。 本實施例的相關細節還可參見上述目標設備的預測方法的描述,在此不再贅述。 在本實施例的一個可選實現方式中,如圖5所示,所述步驟S403,即從所述次數和/或個數滿足預設條件的第一設備對應的遠端登錄日誌,產生正訓練樣本,從所述次數和/或個數不滿足所述預設條件的第二設備對應的遠端登錄日誌產生負訓練樣本的步驟,進一步包括以下步驟; 在步驟S501中,從所述第一設備對應的遠端登錄日誌提取第一預設特徵屬性,根據所述第一預設特徵屬性產生所述正訓練樣本; 在步驟S502中,從所述第二設備對應的遠端登錄日誌提取所述第二預設特徵屬性,根據所述第二預設特徵屬性產生所述負訓練樣本。 Hereinafter, exemplary embodiments of the present case will be described in detail with reference to the accompanying drawings, so that those skilled in the art can easily implement them. In addition, for the sake of clarity, parts irrelevant to describing the exemplary embodiments are omitted in the drawings. In this case, it should be understood that terms such as "including" or "having" are intended to indicate the existence of the features, numbers, steps, actions, components, parts, or combinations thereof disclosed in this specification, and are not intended to exclude one or The possibility that multiple other features, numbers, steps, actions, components, parts or combinations thereof exist or be added. In addition, it should be noted that the embodiments in this case and the features in the embodiments can be combined with each other if there is no conflict. Hereinafter, this case will be described in detail with reference to the drawings and in conjunction with embodiments. Under a known network topology, there are approximately 10 million system logs in the master station every day. According to the system log, the existing technology counts the devices that log in to other devices more than 100 times a day, and confirms that these devices are target devices with the ability to control other devices, which can also be called operation and maintenance control devices. Although the existing technical solutions are relatively simple to implement, the recall rate is very low, and a large number of operation and maintenance control equipment with less than 100 logins will be missed. Because the login frequency of many operation and maintenance control equipment is not very high, some login times are once an hour, and some even once a day, so simply relying on the login frequency cannot solve the problem well. Fig. 1 shows a flowchart of a method for predicting a target device according to an embodiment of the present case. As shown in Figure 1, the prediction method of the target device includes the following steps S101-S103: In step S101, obtain remote login logs generated by a preset device in a predetermined time period under the network topology; In step S102, extract preset characteristic attributes from the remote login log; In step S103, a pre-trained device prediction model is used to process the preset feature attributes and predict whether the preset device is a target device under the network topology; wherein, the target device is Used to control multiple devices under the network topology. In this embodiment, a network topology may include multiple devices interconnected by transmission media, and network communication can be performed between these devices. Most of the devices in the network topology may be devices that execute corresponding applications. However, a small part of the equipment is used as the target equipment for controlling other equipment, which can be used by managers to remotely log in to other equipment, and then maintain and manage other equipment. The target device is an operation and maintenance control device that can remotely log in to other devices in the network topology and manage other devices, and it has the ability to remotely log in to a large number of other devices. The default device can be any device in the network topology, it can be an operation and maintenance control device, or other application devices. The remote login logs generated by any device under the network topology can be stored in the database in advance. When the target device is located, the remote login generated by the preset device within a predetermined time period can be obtained from the database. Log. Since the frequency of the target device remotely logging into other application devices is not necessarily high, it is possible to determine whether the preset device is the target device by setting a predetermined time period and based on the remote login logs generated within the predetermined time period. The unit of the predetermined time period can be week, month, etc., which can be set according to the actual situation, and there is no restriction on this. In this embodiment, the remote login log may be an SSH login log. An SSH login log records information related to a preset device logging in to other devices, and may include the following fields, for example: 1. Host name of the device being logged in 2. SSH login time 3. SSH login result (success or failure) 4. SSH login method (password or key) 5. SSH login user 6. Source login IP 7. Source login port In order to predict whether the preset device is the target device, the relevant preset feature attributes can be extracted from the above fields in the SSH login log, and then the pre-trained device prediction model can be used to process the extracted preset feature attributes, and Predict whether the preset device is the target device. The commonality of the target device includes: multiple remote logins to other devices within a period of time, and the number of logins to other devices is basically not 1 (because one operation and maintenance control device usually manages and maintains multiple other devices ). In addition, the target device is used as an operation and maintenance management and control device, and the purpose of remotely logging in to other devices is to manage and maintain other devices. It has greater rights and may be more likely to log in to other devices as root users. Therefore, based on these commonalities of the target device, preset feature attributes can be set in advance, and after obtaining the SSH login log within a predetermined period of time, the preset feature attributes can be extracted from the SSH login log, and the pre-trained device prediction model can be used to perform prediction. The device prediction model is also obtained by pre-training through preset feature attributes, and can predict whether the preset device is a target device based on the preset feature attributes extracted from the SSH login log of the preset device. The equipment prediction model can be trained using artificial intelligence models. Artificial intelligence models include, but are not limited to, one or more of logistic regression, convolutional neural networks, deep neural networks, support vector machines, K-means, K-neighbors, decision trees, random forests, and Bayesian networks combination. The embodiment of this case obtains the remote login log of the device under the network topology and extracts the preset feature attributes from it, then analyzes and processes the preset feature attributes according to the pre-trained prediction model to predict whether the device is the target equipment. Through the implementation of this case, relevant features can be extracted from massive remote log-in logs, and the relevant features can be analyzed and processed through the pre-trained device prediction model, and target devices that have control over other devices can be located from the massive devices In this case, the equipment training technology was used to greatly improve the accuracy of locating the target device from the remote log-in log, and solve the problem that the equipment used for management and control under the large-scale network topology is difficult to locate. In an optional implementation of this embodiment, the preset characteristic attribute includes the number and/or number of remote logins of other devices in the network topology by the preset device within the predetermined time period. . In this alternative implementation, the number of times the preset device logs in to other devices can be determined based on the addition of 1 for each remote log in to other devices; and the number of other devices logged in can be based on the total number of logged-in devices within a predetermined time period. For the number of other devices, it can be understood that the same device may have been remotely logged in multiple times, so the number is greater than the number. As the operation and maintenance control device, the target device will log in to other devices remotely at least for a period of time, and usually more than one other device is logged in. In addition, as the operation and maintenance control device, the target device will also log in to other devices remotely at least within a period of time, and the number of times to log in to other devices is more than once. Therefore, it is possible to determine whether the preset device is the target device based on the combination of one or two of the two preset characteristic attributes, that is, the number and number of remote logins of the preset device to other devices. The target device will register several other devices and how many other devices within a period of time, depending on the network topology and application environment where it is located. Therefore, for different network topologies and application environments, at least the default device can be used One or a combination of one or two of the number and number of remote logins to other devices is pre-trained to obtain a device prediction model, and then in practical applications, use the device prediction model to the network topology and the default device in the application environment Make predictions. In this way, a device prediction model with higher accuracy can be obtained, making the prediction of the target device more accurate. In an optional implementation manner of this embodiment, for each remote login log, the preset characteristic attribute further includes at least one of the following: Whether the preset device uses a key to log in when remotely logging in to other devices; What user identity the preset device uses to remotely log in to other devices; Whether the preset device is successfully logged in. In this optional implementation manner, in addition to the above-mentioned preset device remote login times and numbers of other devices, other preset feature attributes may also be included, which can assist in determining whether the preset device is a target device, so as to increase prediction accuracy. Other preset characteristic attributes include, but are not limited to, the login method for the preset device to remotely log in to other devices, user identity, and whether the login is successful. The login method includes whether to log in with a key, and user identities include system users, root users, and ordinary users. Normally, in the process of O&M and control of other devices, the target device may log in to other devices multiple times in a short period of time. If you manually enter the user name and password every time you log in to other devices, it will take up a lot of time for O&M personnel. Therefore, under normal circumstances, the operation and maintenance personnel will generate a key pair for other devices, that is, a pair of public and private keys, and store the public key on other devices, while the private key is stored on the target device. When the target device logs in to other devices , Can automatically pair the private key on the target device with the public key on other devices, and then log in to other devices. In this way, the login authentication process is automatic without manual intervention, so it can save the time of operation and maintenance personnel And energy. In addition, the target device usually logs in to other devices as the root user so that it can control other devices with the maximum authority. Using the above-mentioned preset characteristic attributes to make predictions can exclude some users from remotely logging in to their devices to work. In the training stage of the equipment prediction model, the above-mentioned other preset feature attributes can also be used for training, so that the prediction accuracy of the equipment prediction model is further improved. In an optional implementation of this embodiment, as shown in FIG. 2, the method further includes the following steps S201-S202: In step S201, a plurality of training samples are obtained; wherein, the training sample includes a feature part and a result labeling part, the feature part includes the preset feature attribute, and the result labeling part is used to label the training sample as Positive training sample or negative training sample; In step S202, a plurality of the training samples are used to train an artificial intelligence model to obtain the equipment prediction model. In this optional implementation manner, in the training phase of the equipment prediction model, a suitable artificial intelligence model can be selected first. Artificial intelligence models include, but are not limited to, one or more of logistic regression, convolutional neural networks, deep neural networks, support vector machines, K-means, K-neighbors, decision trees, random forests, and Bayesian networks combination. The type and structure of the corresponding artificial intelligence model can be selected according to the actual situation, and the artificial intelligence model can be established according to the number of preset feature attributes. After that, training samples can be collected. The training sample can include a feature part and a result annotation part. The feature part includes preset feature attributes for training, which can be extracted from the remote login log of the target device (known as the target device) in the past period of time. It can also be extracted from the remote login logs of non-target devices (known as non-target devices) in the past period of time, and the result labeling part is used to label the training samples as positive training samples or negative training samples, positive training The sample corresponds to the target device, and the negative training sample corresponds to the non-target device. After collecting enough training samples, you can use the training samples to train the established artificial intelligence model until the number of training reaches a certain value, or the parameters of the artificial intelligence model converge, stop training, and the training can predict whether it is The equipment prediction model of the target equipment. In an optional implementation of this embodiment, as shown in FIG. 3, the step 201, that is, the step of obtaining multiple training samples, further includes the following steps S301-S303: In step S301, obtain remote login logs generated by multiple devices in the historical time period under the network topology; In step S302, determine the number of times and/or the number of the multiple devices logging in to other devices from the remote login log; In step S303, a positive training sample is generated from the remote login log corresponding to the first device whose times and/or numbers meet the preset condition, and the times and/or numbers do not meet the preset condition The remote login log corresponding to the second device generates negative training samples. In this optional implementation manner, the historical time period may be a certain period of time in the past, which is specifically set according to actual conditions. In one embodiment, the historical time period is similar to the predetermined time period, that is, the difference between the historical time period and the predetermined time period may be less than a preset threshold. This is because the application device prediction model When forecasting, the preset feature attributes include the number and number of other devices logged in by the preset device within a predetermined time period. If the historical time period and the predetermined time period used when training the equipment prediction model are not much different, the prediction accuracy of the equipment prediction model can be made higher. When collecting training samples, this implementation method uses the remote login logs generated by multiple devices in the historical time period under the preset network topology to count the number of times and/or the number (including times) that each device logs in to other devices , Number, or a combination of the two), and based on the number and/or number to determine whether the device is a target device, and then extract preset feature attributes from the remote login log to generate positive training samples and negative training samples. This is because after statistical analysis, it can be found that when the number and/or number of logins of a device to other devices is greater than a larger threshold, it can basically be determined that the device is the target device, and the number and/or number of When the number is less than a small threshold, it can basically be determined that the device is a non-target device. Therefore, in this way, enough positive training samples and negative training samples can be collected when the target device is not certain. The following describes the training process of the equipment prediction model in detail through a specific example. 1. Preset feature attribute extraction: First, for multiple devices under the current network topology, make statistics on the SSH login log data within one month, and perform the following two statistics on the SSH login log data within one month: The number of times a certain IP has logged in to other devices in a month; The number of logins to other different devices from a certain IP within a month; Use the counted times and numbers as the two preset characteristic attribute values (the first preset characteristic attribute and the second preset characteristic attribute) of the device corresponding to the IP; In addition to the above two feature attributes, feature extraction is performed on each SSH login log data. The specific methods are as follows: The extraction of the characteristic attribute of the login result (the third preset characteristic attribute): If the login is successful, the characteristic attribute of the login result is set to 1, and the characteristic attribute of the login result is set to 0 if the login fails. The extraction of the characteristic attribute of the login method (the fourth preset characteristic attribute): If the login is with a public key, the characteristic attribute of the login method is set to 1, and the characteristic attribute of the login method is set to 0 in other methods. Extraction of user identity features: users are divided into three categories, the first category is root users, the second category is system users (admin, log, agent), and the third category is other users; if the logged-in user identity is root user, Then set the root user identity characteristic attribute (the fifth preset characteristic attribute) in the user identity characteristic attribute to 1. If the logged-in user identity is a system user, set the system user identity characteristic attribute (the fifth The six preset characteristic attributes) are set to 1, otherwise the root user identity characteristic attributes and the system user identity characteristic attributes are both set to 0. 2. Generate positive and negative training samples: The sorting of operation and maintenance control equipment is essentially a two-class problem. From the SSH log, it can be determined that a device is an O&M control device or not an O&M control device. Therefore, the generation of positive and negative training samples is the same. Through existing experience, a batch of equipment can be determined as operation and maintenance control equipment, or a batch of equipment can be determined as non-operation and maintenance control equipment. The following explains the logic of generating positive and negative training samples in this example: 1) Positive training sample generation logic: Operation and maintenance management and control equipment usually log in to a large number of different devices, which not only meets the requirements of the number of logins, but also needs to meet the requirements of the number of different devices. Therefore, the generation of positive training samples meets two requirements: Log in to other devices more than 3000 times within a month; There are more than 3 other devices logged in by this device within a month. Therefore, from the SSH login logs generated by multiple devices under the network topology within a month, a total of 1012591 positive training samples can be generated according to the above logic. 2) Logic for generating negative training samples: The logic of generating negative training samples is relatively simple. Either one of the following two conditions is satisfied: The number of logins to other devices in a month is less than 10 times. There is only one other device logged in by this device within a month. Therefore, from the SSH login logs generated by multiple devices under the network topology within a month, a total of 958061 negative training samples can be generated according to the above logic. 3. Establishment and training of artificial intelligence models: In this example, the logistic regression model is selected for training. The logistic regression algorithm needs to specify the feature column and the result column. In this example, the above six preset feature attributes are designated as feature columns. Mark the results of the positive and negative training samples (that is, whether the target device or the non-target device) is the result column. Set the logistic regression model parameters as follows: Maximum number of iterations: 100 Convergence error: 0.000001 Target benchmark value: 1 Use the positive training samples and negative training samples collected above to train the logistic regression model. When the maximum number of iterations reaches 100 or the parameter convergence error is 0.000001, the training is stopped to obtain a trained equipment prediction model. On the other hand, this case also discloses the training method of the equipment prediction model. Fig. 4 shows a flowchart of a training method of a device prediction model according to another embodiment of the present case. As shown in FIG. 4, the training method of the equipment prediction model includes the following steps S401-S404: In step S401, obtain remote login logs generated by multiple devices in the historical time period under the network topology; In step S402, determine the number of times and/or the number of the multiple devices logging in to other devices from the remote login log; In step S403, a positive training sample is generated from the remote login log corresponding to the first device whose times and/or numbers meet the preset condition, and the times and/or numbers do not meet the preset condition The remote login log corresponding to the second device in, generates negative training samples; In step S404, the artificial intelligence model is trained using the positive training sample and the negative training sample to obtain an equipment prediction model. In this embodiment, the target device is a device that can be used to log in to other devices in the network topology, and then to manage and maintain other devices. Most of the network topology is non-target devices, that is, application devices used to execute applications, and a small part are target devices. As the running time of the network topology increases, it becomes increasingly difficult to locate the target device. Therefore, in order to obtain the ability to predict whether a certain device under the network topology is a target device, an artificial intelligence model can be trained through training samples to obtain a device prediction model. In this embodiment, the number of remote login logs generated by multiple devices in the historical period of time under the network topology is calculated to obtain the number of times that one device logs in to other devices, and the number of times that device logs in to other different devices. Whether the number of times and/or the number meets the preset conditions is used to determine whether it is the first device or the second device. If it is the first device, a positive training sample can be generated according to the remote login log corresponding to the first device. The device can generate negative training samples according to the remote login log corresponding to the second device. That is, if the above-mentioned times and/or numbers meet the preset condition, the device can be considered as a target device, and if the preset condition is not satisfied, it is a non-target device. The preset conditions can be set according to the actual conditions of target devices and non-target devices under the network topology. This is because after statistical analysis, when the number and/or number of logins of a device to other devices is greater than a larger threshold, it can basically be determined that the device is the target device, and the number and/or number are less than In the case of a smaller threshold value, it can basically be determined that the device is a non-target device, while the larger threshold value and the smaller threshold value can be set according to actual conditions. In this way, when the target device is not known, positive training samples and negative training samples can still be generated, and the number of positive and negative training samples generated can also be large enough. After the training samples are generated, a suitable artificial intelligence model can be selected for training. Artificial intelligence models include, but are not limited to, one or more of logistic regression, convolutional neural networks, deep neural networks, support vector machines, K-means, K-neighbors, decision trees, random forests, and Bayesian networks combination. The type of the corresponding artificial intelligence model can be selected according to the actual situation, and the artificial intelligence model can be established according to the number of preset feature attributes. After that, training samples can be used to train the established artificial intelligence model until the number of training times reaches a certain value, or the parameters of the artificial intelligence model converge, stop training, and the training obtains a device prediction model that can predict whether it is the target device. The sequence of collection of training samples, selection and establishment of artificial intelligence models can be determined according to actual conditions. Training samples can be collected first, or artificial intelligence models can be selected and established first. For the relevant details of this embodiment, refer to the description of the prediction method of the target device described above, which will not be repeated here. In an optional implementation of this embodiment, as shown in FIG. 5, the step S403 is to generate a positive log from the remote login log corresponding to the first device whose number and/or number meets the preset condition. Training samples, the step of generating negative training samples from remote login logs corresponding to the second device whose times and/or numbers do not meet the preset conditions, further includes the following steps; In step S501, extract a first preset characteristic attribute from the remote login log corresponding to the first device, and generate the positive training sample according to the first preset characteristic attribute; In step S502, the second preset characteristic attribute is extracted from the remote login log corresponding to the second device, and the negative training sample is generated according to the second preset characteristic attribute.

該可選的實現方式中,在確定了第一設備(也即目標設備)和第二設備(非目標設備)後,還可以從第一設備和第二設備對應的遠端登錄日誌再提取第一預設特徵屬性和第二預設特徵屬性,進而產生正訓練樣本和負訓練樣本。無論是正訓練樣本還是負訓練樣本,都包括兩部分:特徵部分和結果標註部分;特徵部分包括能夠表徵該設備是否為目標設備的特徵,也即前面提到的第一預設特徵屬性和第二預設特徵屬性,而結果標註部分用於標註該特徵部分對應的是目標設備的特徵還是非目標設備的特徵。在第一預設特徵屬性和第二預設特徵屬性至少要包括第一設備和第二設備在歷史時間段內登錄其他設備的次數和登錄其他不同設備的個數,除了這兩個預設特徵屬性之外,還可以包括其他特徵屬性。 In this optional implementation manner, after the first device (that is, the target device) and the second device (non-target device) are determined, the first device and the second device can be extracted from the remote login logs corresponding to the second device. A preset feature attribute and a second preset feature attribute are used to generate positive training samples and negative training samples. Whether it is a positive training sample or a negative training sample, it includes two parts: a feature part and a result labeling part; the feature part includes the features that can characterize whether the device is the target device, that is, the first preset feature attribute and the second The feature attribute is preset, and the result labeling part is used to label whether the feature part corresponds to the feature of the target device or the feature of the non-target device. The first preset feature attribute and the second preset feature attribute must include at least the number of times the first device and the second device log in to other devices and the number of other devices logged in during the historical time period, except for these two preset characteristics In addition to attributes, other characteristic attributes can also be included.

在本實施例的一個可選實現方式中,所述第一預設特徵屬性至少包括所述第一設備遠端登錄其他設備的次數和/或個數;和/或,所述第二預設特徵屬性至少包括所述第二設備遠端登錄其他設備的次數和/或個數。 In an optional implementation of this embodiment, the first preset characteristic attribute includes at least the number of times and/or the number of remote logins by the first device to other devices; and/or, the second preset The characteristic attribute includes at least the number of times and/or the number of remote logins by the second device to other devices.

在本實施例的一個可選實現方式中,針對所述第一設備對應的每條所述遠端登錄日誌,所述第一預設特徵屬性還包括以下至少一項:所述第一設備遠端登錄其他設備時是否使用密鑰登錄; 所述第一設備以何種用戶身份遠端登錄其他設備;所述第一設備是否登錄成功;和/或,針對所述第二設備對應的每條所述遠端登錄日誌,所述第二預設特徵屬性還包括以下至少一項:所述第二設備遠端登錄其他設備時是否使用密鑰登錄;所述第二設備以何種用戶身份遠端登錄其他設備;所述第二設備是否登錄成功。 In an optional implementation of this embodiment, for each remote login log corresponding to the first device, the first preset characteristic attribute further includes at least one of the following: the first device remote Whether to log in with the key when logging in to other devices; What user identity the first device uses to remotely log in to other devices; whether the first device is successfully logged in; and/or, for each remote log in log corresponding to the second device, the second device The preset characteristic attributes also include at least one of the following: whether the second device uses a key to log in remotely to other devices; what user identity the second device uses to remotely log in to other devices; whether the second device login successful.

該可選的實現方式中,第一設備對應的第一預設特徵屬性除了所述第一設備遠端登錄其他設備的次數和/或個數之外,還包括第一設備登錄其他設備時的登錄方式、登錄結果以及登錄所使用的用戶身份。登錄方式可以包括是否使用密鑰登錄,用戶身份可以包括系統用戶、根用戶和普通用戶。通常情況下,目標設備會採用密鑰登錄其他設備,目標設備通常都會以根用戶的身份登錄其他設備,以便能夠以最大權利來管控其他設備。使用其他預設特徵屬性進行訓練,可以使得設備預測模型的預測準確率進一步提高。 In this optional implementation manner, the first preset characteristic attribute corresponding to the first device includes, in addition to the number of times and/or the number of remote logins of the first device to other devices, the first device to log in to other devices. Login method, login result, and user identity used for login. The login method can include whether to log in with a key, and the user identity can include system users, root users, and ordinary users. Under normal circumstances, the target device will use the key to log in to other devices, and the target device will usually log in to other devices as the root user, so as to be able to control other devices with maximum rights. Using other preset feature attributes for training can further improve the prediction accuracy of the device prediction model.

該設備預測模型的訓練方法的一些相關細節還可以參考上述對目標設備的預測方法中的描述,在此不再贅述。 For some related details of the training method of the device prediction model, reference may also be made to the description in the above prediction method for the target device, which will not be repeated here.

下述為本案裝置實施例,可以用於執行本案方法實施例。 The following are the device embodiments of this case, which can be used to implement the method embodiments of this case.

圖6示出根據本案一實施方式的目標設備的預測裝置的結構方塊圖,該裝置可以透過軟體、硬體或者兩者的結合實現成為電子設備的部分或者全部。如圖6所示,所述目標設備的預測裝置包括第一獲取模組601、提取模組602和預測模組603: 第一獲取模組601,被配置為獲取網路拓撲結構下預設設備在預定時間段內產生的遠端登錄日誌; 提取模組602,被配置為從所述遠端登錄日誌中提取預設特徵屬性; 預測模組603,被配置為利用預先訓練好的設備預測模型對所述預設特徵屬性進行處理,並預測所述預設設備是否為所述網路拓撲結構下的目標設備;其中,所述目標設備被用於管控所述網路拓撲結構下的多個設備。 在本實施例中,一個網路拓撲結構可以包括多台經過傳輸媒體互連的設備,共同處於同一個生產域內,這些設備之間可以進行網路通信,該網路拓撲結構內的多數設備可以為執行相應應用的設備,而有一小部分設備作為管控其他設備的目標設備,可以被管理人員用來遠端登錄其他設備,進而維護和管理其他設備。目標設備是能夠遠端登錄網路拓撲結構下的其他設備並對其他設備進行管控的運維管控設備,其具有遠端登錄大量其他設備的能力。預設設備可以為網路拓撲結構下的任意一台設備,可以是運維管控設備,也可以是其他應用設備。網路拓撲結構下的任意設備所產生的遠端登錄日誌都可以預先儲存在資料庫中,在進行目標設備定位時,可以從資料庫中獲取預設設備在預定時間段內產生的遠端登錄日誌。由於目標設備遠端登錄其他應用設備的頻率不一定很高,因此可以透過設置預定時間段,並基於預定時間段內產生的遠端登錄日誌來判斷預設設備是否為目標設備。預定時間段的單位可以是周、月等,可根據實際情況設置,對此不做限制。 本實施例中,遠端登錄日誌可以為SSH登錄日誌,一條SSH登錄日誌記錄了預設設備登錄其他設備的相關信息,例如可以包括如下字段: 1. 被登錄設備主機名 2. SSH登錄時間 3. SSH登錄結果(成功或失敗) 4. SSH登錄方法(密碼或公鑰) 5. SSH登錄用戶 6. 源登錄IP 7. 源登錄埠 為預測預設設備是否為目標設備,可以從SSH登錄日誌中的上述字段中提取相關的預設特徵屬性,進而利用預先訓練好的設備預測模型對所提取出的預設特徵屬性進行處理,並預測得到預設設備是否為目標設備的結論。目標設備所具有的共性包括:在一段時間內會多次遠端登錄其他設備,而登錄其他設備的個數基本不會為1(因為一台運維管控設備通常會管理和維護多台其他設備)。此外,目標設備作為運維管控設備,遠端登錄其他設備的目的是管理和維護其他設備,具有較大權利,可能採用根用戶的方式登錄其他設備的概率較大。因此可以基於目標設備的這些共性,預先設置預設特徵屬性,並在獲得預定時間段內的SSH登錄日誌後,從SSH登錄日誌中提取預設特徵屬性,並使用預先訓練好的設備預測模型進行預測。設備預測模型也是透過預設特徵屬性進行預先訓練得到的,能夠根據預設設備的SSH登錄日誌中提取出的預設特徵屬性預測出預設設備是否為目標設備。設備預測模型可以採用人工智慧模型進行訓練。人工智慧模型包括但不限於邏輯回歸、卷積神經網路、深度神經網路、支持向量機、K-means、K-neighbors、決策樹、隨機森林、貝葉斯網路中的一種或多種的組合。 本案實施例中,第一獲取模組601透過獲取網路拓撲結構下設備的遠端登錄日誌,提取模組602從中提取預設特徵屬性後,預測模組603根據預先訓練好的預測模型對預設特徵屬性進行分析處理,預測得出該設備是否為目標設備。透過本案的實施方式,可以從海量遠端登錄日誌中提取出相關特徵,並透過預先訓練好的設備預測模型對相關特徵進行分析處理,從海量設備中定位出對其他設備具有管控能力的目標設備,本案利用設備訓練技術極大的提升了從遠端登錄日誌定位目標設備的準確性,很好的解決了大型網路拓撲結構下用於管控的設備難以定位的問題。 在本實施例的一個可選實現方式中,所述預設特徵屬性包括所述預設設備在所述預定時間段內遠端登錄所述網路拓撲結構下其他設備的次數和/或個數。 該可選的實現方式中,預設設備登錄其他設備的次數可以基於每遠端登錄一次其他設備就加1的方式確定;而登錄其他設備的個數可以基於在預定時間段內總共登錄過的其他設備的個數,可以理解的是同一個設備可能被遠端登錄過多次,因此次數大於個數。目標設備作為運維管控設備,至少會在一段時間內遠端登錄其他設備,而且通常所登錄的其他設備不止一個。此外,目標設備作為運維管控設備,還至少會在一段時間內遠端登錄其他設備,且登錄其他設備的次數也不止一次。因此可以基於這兩個預設特徵屬性,即預設設備遠端登錄其他設備的次數和個數中的一個或兩個的組合判斷預設設備是否為目標設備。而目標設備會在一段時間內登錄幾個其他設備以及多少次其他設備,跟其所在的網路拓撲結構以及應用環境相關,因此針對不同的網路拓撲結構及應用環境,至少可以使用預設設備遠端登錄其他設備的次數和個數中的一個或兩個的組合預先訓練得到設備預測模型,進而在實際應用中,利用該設備預測模型對該網路拓撲結構及應用環境下的預設設備進行預測。透過這種方式可以得到準確率較高的設備預測模型,使得目標設備的預測更加準確。 在本實施例的一個可選實現方式中,針對每條所述遠端登錄日誌,所所述預設特徵屬性還包括以下至少一項: 所述預設設備遠端登錄其他設備時是否使用密鑰登錄; 所述預設設備以何種用戶身份遠端登錄其他設備; 所述預設設備是否登錄成功。 該可選的實現方式中,除了上述預設設備遠端登錄其他設備的次數和個數之外,還可以包括其他預設特徵屬性,能夠輔助判斷預設設備是否為目標設備,以增加預測的準確性。其他預設特徵屬性包括但不限於預設設備遠端登錄其他設備的登錄方式、用戶身份、是否登錄成功等。登錄方式包括是否使用密鑰登錄,用戶身份包括系統用戶、根用戶和普通用戶。通常情況下,在運維管控其他設備的過程中,目標設備可能會在短時間內多次登錄其他設備,如果每次登錄其他設備都手動輸入用戶名和密碼,會佔用運維人員的很多時間,因此通常情況下運維人員會為其他設備產生密鑰對,即一對公鑰和私鑰,並將公鑰儲存在其他設備上,而目標設備上儲存私鑰,目標設備在登錄其他設備時,可以自動將目標設備上的私鑰和其他設備上的公鑰進行配對,進而登錄其他設備,這種方式下登錄認證的過程都是自動的,無需人工干預,因此能夠節省運維人員的時間和精力。此外,目標設備通常都會以根用戶的身份登錄其他設備,以便能夠以最大權限來管控其他設備。使用上述這些預設特徵屬性進行預測,可以排除一些用戶遠端登錄自己的設備進行工作等情形。在設備預測模型的訓練階段,還可以使用上述其他預設特徵屬性進行訓練,使得設備預測模型的預測準確率進一步提高。 在本實施例的一個可選實現方式中,所述裝置還包括: 第二獲取模組,被配置為獲取多個訓練樣本;其中,所述訓練樣本包括特徵部分和結果標註部分,所述特徵部分包括所述預設特徵屬性,所述結果標註部分用於標註所述訓練樣本為正訓練樣本還是負訓練樣本; 第一訓練模組,被配置為利用多個所述訓練樣本對人工智慧模型進行訓練,得到所述設備預測模型。 該可選的實現方式中,設備預測模型的訓練階段,可以先選出合適的人工智慧模型。人工智慧模型包括但不限於邏輯回歸、卷積神經網路、深度神經網路、支持向量機、K-means、K-neighbors、決策樹、隨機森林、貝葉斯網路中的一種或多種的組合。可以根據實際情況選擇相應的人工智慧模型的類型及結構,並根據預設特徵屬性的個數等建立人工智慧模型。之後,第二獲取模組可以收集訓練樣本。訓練樣本可以包括特徵部分和結果標註部分,特徵部分包括訓練用的預設特徵屬性,可以是從目標設備(已知是目標設備的情況)在過去一段時間內的遠端登錄日誌提取出來的,也可以是從非目標設備(已知是非目標設備的情況)在過去一段時間內的遠端登錄日誌提取出來的,而結果標註部分用於標註訓練樣本為正訓練樣本還是負訓練樣本,正訓練樣本對應的是目標設備,而負訓練樣本對應的是非目標設備。在收集了足夠多的訓練樣本後,訓練模組可以利用訓練樣本對建立好的人工智慧模型進行訓練,直到訓練次數達到一定值,或者人工智慧模型的參數收斂,停止訓練,訓練得到的是能夠預測是否為目標設備的設備預測模型。 在本實施例的一個可選實現方式中,所述第二獲取模組,包括: 第一獲取子模組,被配置為獲取所述網路拓撲結構下多個設備在歷史時間段內產生的遠端登錄日誌; 第一確定子模組,被配置為從所述遠端登錄日誌確定所述多個設備登錄其他設備的次數和/或個數; 產生子模組,被配置為從所述次數和/或個數滿足預設條件的第一設備對應的遠端登錄日誌,產生正訓練樣本,從所述次數和/或個數不滿足所述預設條件的第二設備對應的遠端登錄日誌產生負訓練樣本。 該可選的實現方式中,歷史時間段可以是過去的某一段時間,具體根據實際情況設置。在一實施例中,歷史時間段和預定時間段的時間長度差不多,也即歷史時間段和預定時間段的時間長度之差可以小於一預設臨限值,這是因為在應用設備預測模型進行預測時,預設特徵屬性中包括預設設備在預定時間段內所登錄其他設備的次數和個數。如果在訓練設備預測模型時,所採用的歷史時間段和預定時間段的時間長度相差不大的話,能使設備預測模型的預測準確率更高。在收集訓練樣本時,該實現方式中第一獲取子模組收集預設網路拓撲結構下多個設備在歷史時間段內產生的遠端登錄日誌,第一確定子模組統計每個設備登錄其他設備的次數和/或個數(包括次數、個數或兩者的組合),產生子模組基於該次數和/或個數來確定該設備是否為目標設備,進而從遠端登錄日誌提取出預設特徵屬性產生正訓練樣本和負訓練樣本的。這是因為經過統計分析可以發現,在一個設備登錄其他設備的次數和/或個數大於一個較大臨限值的情況下,基本上可以確定該設備為目標設備,而該次數和/或個數小於一個較小臨限值的情況下,基本上可以確定該設備為非目標設備。因此,透過這種方式可以在並不確定目標設備的情況下,就能夠收集到足夠多的正訓練樣本和負訓練樣本。 另一方面,本案還公開了設備預測模型的訓練裝置。圖7示出根據本案一實施方式的設備預測模型的訓練裝置的結構方塊圖,該裝置可以透過軟體、硬體或者兩者的結合實現成為電子設備的部分或者全部。如圖6所示,所述設備預測模型的訓練包括第三獲取模組701、第一確定模組702、產生模組703和訓練模組704: 第三獲取模組701,被配置為獲取網路拓撲結構下多個設備在歷史時間段內產生的遠端登錄日誌; 第一確定模組702,被配置為從所述遠端登錄日誌確定所述多個設備登錄其他設備的次數和/或個數; 產生模組703,被配置為從所述次數和/或個數滿足預設條件的第一設備對應的遠端登錄日誌,產生正訓練樣本,從所述次數和/或個數不滿足所述預設條件的第二設備對應的遠端登錄日誌產生負訓練樣本; 第二訓練模組704,被配置為利用所述正訓練樣本和負訓練樣本對人工智慧模型進行訓練,得到設備預測模型。 本實施例中,目標設備是可以被用來登錄網路拓撲結構下其他設備,進而對其他設備進行管理和維護的設備。網路拓撲結構中的大多數都是非目標設備,也即用於執行應用的應用設備,而有一小部分是目標設備。隨著網路拓撲結構運行時間的增加,越來越難以定位目標設備。因此,為了獲得能夠預測網路拓撲結構下的某台設備是否為目標設備,可以透過訓練樣本訓練人工智慧模型,得到設備預測模型。 本實施例中,第三獲取模組701透過從網路拓撲結構下多個設備在歷史時間段內產生的遠端登錄日誌,第一確定模組702統計得出一台設備登錄其他設備的次數,以及該設備登錄其他不同設備的個數,產生模組703進而根據該次數和/或個數是否滿足預設條件來判斷是第一設備還是第二設備,如果是第一設備則產生模組703可以根據該第一設備對應的遠端登錄日誌產生正訓練樣本,如果是第二設備則產生模組703可以根據該第二設備對應的遠端登錄日誌產生負訓練樣本。也就是說,如果上述次數和/或個數滿足預設條件,則可以認為該設備為目標設備,而如果不滿足預設條件,則為非目標設備。而預設條件可以根據的網路拓撲結構下目標設備和非目標設備的實際情況進行設置。這是因為經過統計分析可以發現,在一個設備登錄其他設備的次數和/或個數大於一個較大臨限值的情況下,基本上可以確定該設備為目標設備,而該次數和/或個數小於一個較小臨限值的情況下,基本上可以確定該設備為非目標設備,而較大臨限值和較小臨限值則可以根據實際情況進行設置。透過這種方式在目標設備不已知的情況下,依然能夠產生正訓練樣本和負訓練樣本,並且所產生的正負訓練樣本的數量也能足夠多。 在產生了訓練樣本後,第二訓練模組704可以選擇合適的人工智慧模型進行訓練。人工智慧模型包括但不限於邏輯回歸、卷積神經網路、深度神經網路、支持向量機、K-means、K-neighbors、決策樹、隨機森林、貝葉斯網路中的一種或多種的組合。可以根據實際情況選擇相應的人工智慧模型的類型,並根據預設特徵屬性的個數等建立人工智慧模型。之後,可以利用訓練樣本對建立好的人工智慧模型進行訓練,直到訓練次數達到一定值,或者人工智慧模型的參數收斂,停止訓練,訓練得到的是能夠預測是否為目標設備的設備預測模型。訓練樣本的收集、人工智慧模型的選取與建立的順序,可以根據實際情況而定,可以先收集訓練樣本,也可以先選取並建立人工智慧模型。 本實施例的相關細節還可參見上述目標設備的預測裝置的描述,在此不再贅述。 在本實施例的一個可選實現方式中,所述產生模組703,包括: 第一提取子模組,被配置為從所述第一設備對應的遠端登錄日誌提取第一預設特徵屬性,根據所述第一預設特徵屬性產生所述正訓練樣本; 第二提取子模組,被配置為從所述第二設備對應的遠端登錄日誌提取所述第二預設特徵屬性,根據所述第二預設特徵屬性產生所述負訓練樣本。 FIG. 6 shows a block diagram of the structure of a prediction device for a target device according to an embodiment of the present case. The device can be implemented as part or all of an electronic device through software, hardware or a combination of both. As shown in FIG. 6, the prediction apparatus of the target device includes a first acquisition module 601, an extraction module 602, and a prediction module 603: The first obtaining module 601 is configured to obtain remote login logs generated by a preset device in a predetermined time period under the network topology; The extraction module 602 is configured to extract preset feature attributes from the remote login log; The prediction module 603 is configured to use a pre-trained device prediction model to process the preset feature attributes and predict whether the preset device is a target device under the network topology; wherein, the The target device is used to manage multiple devices under the network topology. In this embodiment, a network topology may include multiple devices interconnected by transmission media, which are in the same production domain. These devices can communicate with each other on the network. Most devices in the network topology It can be the device that executes the corresponding application, and a small part of the device is the target device for controlling other devices, which can be used by the administrator to remotely log in to other devices, and then maintain and manage other devices. The target device is an operation and maintenance control device that can remotely log in to other devices in the network topology and manage other devices, and it has the ability to remotely log in to a large number of other devices. The default device can be any device in the network topology, it can be an operation and maintenance control device, or other application devices. The remote login logs generated by any device under the network topology can be stored in the database in advance. When the target device is located, the remote login generated by the preset device within a predetermined time period can be obtained from the database. Log. Since the frequency of the target device remotely logging into other application devices is not necessarily high, it is possible to determine whether the preset device is the target device by setting a predetermined time period and based on the remote login logs generated within the predetermined time period. The unit of the predetermined time period can be week, month, etc., which can be set according to the actual situation, and there is no restriction on this. In this embodiment, the remote login log may be an SSH login log. An SSH login log records information related to a preset device logging in to other devices, and may include the following fields, for example: 1. Host name of the device being logged in 2. SSH login time 3. SSH login result (success or failure) 4. SSH login method (password or public key) 5. SSH login user 6. Source login IP 7. Source login port In order to predict whether the preset device is the target device, the relevant preset feature attributes can be extracted from the above fields in the SSH login log, and then the pre-trained device prediction model can be used to process the extracted preset feature attributes, and Predict whether the preset device is the target device. The commonality of the target device includes: multiple remote logins to other devices within a period of time, and the number of logins to other devices is basically not 1 (because one operation and maintenance control device usually manages and maintains multiple other devices ). In addition, the target device is used as an operation and maintenance management and control device, and the purpose of remotely logging in to other devices is to manage and maintain other devices. It has greater rights and may be more likely to log in to other devices as root users. Therefore, based on these commonalities of the target device, preset feature attributes can be set in advance, and after obtaining the SSH login log within a predetermined period of time, the preset feature attributes can be extracted from the SSH login log, and the pre-trained device prediction model can be used to perform prediction. The device prediction model is also obtained by pre-training through preset feature attributes, and can predict whether the preset device is a target device based on the preset feature attributes extracted from the SSH login log of the preset device. The equipment prediction model can be trained using artificial intelligence models. Artificial intelligence models include, but are not limited to, one or more of logistic regression, convolutional neural networks, deep neural networks, support vector machines, K-means, K-neighbors, decision trees, random forests, and Bayesian networks combination. In the embodiment of this case, the first acquisition module 601 acquires the remote login log of the device under the network topology, and after the extraction module 602 extracts the preset feature attributes therefrom, the prediction module 603 compares the predictions based on the pre-trained prediction model. Set the characteristic attributes for analysis and processing, and predict whether the device is the target device. Through the implementation of this case, relevant features can be extracted from massive remote log-in logs, and the relevant features can be analyzed and processed through the pre-trained device prediction model, and target devices that have control over other devices can be located from the massive devices In this case, the equipment training technology was used to greatly improve the accuracy of locating the target device from the remote log-in log, and solve the problem that the equipment used for management and control under the large-scale network topology is difficult to locate. In an optional implementation of this embodiment, the preset characteristic attribute includes the number and/or number of remote logins of other devices in the network topology by the preset device within the predetermined time period. . In this alternative implementation, the number of times the preset device logs in to other devices can be determined based on the addition of 1 for each remote log in to other devices; and the number of other devices logged in can be based on the total number of logged-in devices within a predetermined time period. For the number of other devices, it can be understood that the same device may have been remotely logged in multiple times, so the number is greater than the number. As the operation and maintenance control device, the target device will log in to other devices remotely at least for a period of time, and usually more than one other device is logged in. In addition, as the operation and maintenance control device, the target device will also log in to other devices remotely at least within a period of time, and the number of times to log in to other devices is more than once. Therefore, it is possible to determine whether the preset device is the target device based on the combination of one or two of the two preset characteristic attributes, that is, the number and number of remote logins of the preset device to other devices. The target device will register several other devices and how many other devices within a period of time, depending on the network topology and application environment where it is located. Therefore, for different network topologies and application environments, at least the default device can be used One or a combination of one or two of the number and number of remote logins to other devices is pre-trained to obtain a device prediction model, and then in practical applications, use the device prediction model to the network topology and the default device in the application environment Make predictions. In this way, a device prediction model with higher accuracy can be obtained, making the prediction of the target device more accurate. In an optional implementation manner of this embodiment, for each remote login log, the preset characteristic attribute further includes at least one of the following: Whether the preset device uses a key to log in when remotely logging in to other devices; What user identity the preset device uses to remotely log in to other devices; Whether the preset device is successfully logged in. In this optional implementation manner, in addition to the above-mentioned preset device remote login times and numbers of other devices, other preset feature attributes may also be included, which can assist in determining whether the preset device is a target device, so as to increase prediction accuracy. Other preset characteristic attributes include, but are not limited to, the login method for the preset device to remotely log in to other devices, user identity, and whether the login is successful. The login method includes whether to log in with a key, and user identities include system users, root users, and ordinary users. Normally, in the process of O&M and control of other devices, the target device may log in to other devices multiple times in a short period of time. If you manually enter the user name and password every time you log in to other devices, it will take up a lot of time for O&M personnel. Therefore, under normal circumstances, the operation and maintenance personnel will generate a key pair for other devices, that is, a pair of public and private keys, and store the public key on other devices, while the private key is stored on the target device. When the target device logs in to other devices , Can automatically pair the private key on the target device with the public key on other devices, and then log in to other devices. In this way, the login authentication process is automatic without manual intervention, so it can save the time of operation and maintenance personnel And energy. In addition, the target device usually logs in to other devices as the root user so that it can control other devices with the maximum authority. Using the above-mentioned preset characteristic attributes to make predictions can exclude some users from remotely logging in to their devices to work. In the training stage of the equipment prediction model, the above-mentioned other preset feature attributes can also be used for training, so that the prediction accuracy of the equipment prediction model is further improved. In an optional implementation manner of this embodiment, the device further includes: The second acquisition module is configured to acquire a plurality of training samples; wherein the training sample includes a feature part and a result labeling part, the characteristic part includes the preset feature attribute, and the result labeling part is used to label the Whether the training sample is a positive training sample or a negative training sample; The first training module is configured to train an artificial intelligence model by using a plurality of the training samples to obtain the equipment prediction model. In this optional implementation manner, in the training phase of the equipment prediction model, a suitable artificial intelligence model can be selected first. Artificial intelligence models include, but are not limited to, one or more of logistic regression, convolutional neural networks, deep neural networks, support vector machines, K-means, K-neighbors, decision trees, random forests, and Bayesian networks combination. The type and structure of the corresponding artificial intelligence model can be selected according to the actual situation, and the artificial intelligence model can be established according to the number of preset feature attributes. After that, the second acquisition module can collect training samples. The training sample can include a feature part and a result annotation part. The feature part includes preset feature attributes for training, which can be extracted from the remote login log of the target device (known as the target device) in the past period of time. It can also be extracted from the remote login logs of non-target devices (known as non-target devices) in the past period of time, and the result labeling part is used to label the training samples as positive training samples or negative training samples, positive training The sample corresponds to the target device, and the negative training sample corresponds to the non-target device. After collecting enough training samples, the training module can use the training samples to train the established artificial intelligence model until the number of training reaches a certain value, or the parameters of the artificial intelligence model converge, stop training, and the training is able to Predict whether it is the equipment prediction model of the target equipment. In an optional implementation manner of this embodiment, the second acquisition module includes: The first obtaining sub-module is configured to obtain remote login logs generated by multiple devices in the historical time period under the network topology; The first determining submodule is configured to determine the number of times and/or the number of the multiple devices logging in to other devices from the remote login log; The generation sub-module is configured to generate a positive training sample from the remote login log corresponding to the first device whose times and/or numbers meet the preset conditions, and from the times and/or numbers that do not meet the The remote login log corresponding to the second device with the preset condition generates a negative training sample. In this optional implementation manner, the historical time period may be a certain period of time in the past, which is specifically set according to actual conditions. In one embodiment, the historical time period is similar to the predetermined time period, that is, the difference between the historical time period and the predetermined time period may be less than a preset threshold. This is because the application device prediction model When forecasting, the preset feature attributes include the number and number of other devices logged in by the preset device within a predetermined time period. If the historical time period and the predetermined time period used when training the equipment prediction model are not much different, the prediction accuracy of the equipment prediction model can be made higher. When collecting training samples, the first acquisition sub-module in this implementation method collects remote login logs generated by multiple devices in the historical time period under the preset network topology, and the first determining sub-module counts the logins of each device The frequency and/or number of other devices (including frequency, number or a combination of the two), the generation sub-module determines whether the device is the target device based on the frequency and/or number, and then extracts it from the remote login log Generate positive training samples and negative training samples from preset feature attributes. This is because after statistical analysis, it can be found that when the number and/or number of logins of a device to other devices is greater than a larger threshold, it can basically be determined that the device is the target device, and the number and/or number of When the number is less than a small threshold, it can basically be determined that the device is a non-target device. Therefore, in this way, enough positive training samples and negative training samples can be collected when the target device is not certain. On the other hand, this case also discloses a training device for the equipment prediction model. FIG. 7 shows a structural block diagram of a training device for a device prediction model according to an embodiment of the present case. The device can be implemented as part or all of an electronic device through software, hardware, or a combination of both. As shown in FIG. 6, the training of the device prediction model includes a third acquisition module 701, a first determination module 702, a generation module 703, and a training module 704: The third acquisition module 701 is configured to acquire remote login logs generated by multiple devices in a historical time period under the network topology; The first determining module 702 is configured to determine the number and/or number of times the multiple devices log in to other devices from the remote login log; The generating module 703 is configured to generate a positive training sample from the remote login log corresponding to the first device whose times and/or numbers meet the preset conditions, and from the times and/or numbers that do not meet the The remote login log corresponding to the second device with preset conditions generates negative training samples; The second training module 704 is configured to use the positive training samples and the negative training samples to train the artificial intelligence model to obtain a device prediction model. In this embodiment, the target device is a device that can be used to log in to other devices in the network topology, and then to manage and maintain other devices. Most of the network topology is non-target devices, that is, application devices used to execute applications, and a small part are target devices. As the running time of the network topology increases, it becomes increasingly difficult to locate the target device. Therefore, in order to obtain the ability to predict whether a certain device under the network topology is a target device, an artificial intelligence model can be trained through training samples to obtain a device prediction model. In this embodiment, the third obtaining module 701 uses remote login logs generated by multiple devices in a historical period of time under the network topology, and the first determining module 702 counts the number of times that one device logs in to other devices. , And the number of other different devices registered by the device, the generation module 703 then determines whether it is the first device or the second device according to whether the number and/or number meets the preset conditions, and if it is the first device, it generates the module 703 may generate positive training samples according to the remote login log corresponding to the first device, and if it is a second device, the generating module 703 may generate negative training samples according to the remote login log corresponding to the second device. That is, if the above-mentioned times and/or numbers meet the preset condition, the device can be considered as a target device, and if the preset condition is not satisfied, it is a non-target device. The preset conditions can be set according to the actual conditions of target devices and non-target devices under the network topology. This is because after statistical analysis, it can be found that when the number and/or number of logins of a device to other devices is greater than a larger threshold, it can basically be determined that the device is the target device, and the number and/or number of When the number is less than a smaller threshold, it can basically be determined that the device is a non-target device, and the larger and smaller thresholds can be set according to actual conditions. In this way, when the target device is not known, positive training samples and negative training samples can still be generated, and the number of positive and negative training samples generated can also be sufficient. After the training samples are generated, the second training module 704 can select a suitable artificial intelligence model for training. Artificial intelligence models include, but are not limited to, one or more of logistic regression, convolutional neural networks, deep neural networks, support vector machines, K-means, K-neighbors, decision trees, random forests, and Bayesian networks combination. The type of the corresponding artificial intelligence model can be selected according to the actual situation, and the artificial intelligence model can be established according to the number of preset feature attributes. After that, training samples can be used to train the established artificial intelligence model until the number of training reaches a certain value, or the parameters of the artificial intelligence model converge, stop training, and the training obtains a device prediction model that can predict whether it is the target device. The sequence of collection of training samples, selection and establishment of artificial intelligence models can be determined according to actual conditions. Training samples can be collected first, or artificial intelligence models can be selected and established first. For the relevant details of this embodiment, please refer to the description of the prediction apparatus of the target device mentioned above, which will not be repeated here. In an optional implementation of this embodiment, the generating module 703 includes: The first extraction submodule is configured to extract a first preset characteristic attribute from a remote login log corresponding to the first device, and generate the positive training sample according to the first preset characteristic attribute; The second extraction sub-module is configured to extract the second preset feature attribute from the remote login log corresponding to the second device, and generate the negative training sample according to the second preset feature attribute.

該可選的實現方式中,在確定了第一設備(也即目標設備)和第二設備(非目標設備)後,第一提取子模組和第二提取子模組還可以從第一設備和第二設備對應的遠端登錄日誌提取第一預設特徵屬性和第二預設特徵屬性,進而產生正訓練樣本和負訓練樣本。無論是正訓練樣本還是負訓練樣本,都包括兩部分:特徵部分和結果標註部分;特徵部分包括能夠表徵該設備是否為目標設備的特徵,也即前面提到的第一預設特徵屬性和第二預設特徵屬性,而結果標註部分用於標註該特徵部分對應的是目標設備的特徵還是非目標設備的特徵。在第一預設特徵屬性和第二預設特徵屬性至少要包括第一設備和第二設備在歷史時間段內登錄其他設備的次數和登錄其他不同設備的個數,除了這兩個預設特徵屬性之外,還可以包括其他特徵屬性。 In this optional implementation manner, after the first device (that is, the target device) and the second device (non-target device) are determined, the first extraction sub-module and the second extraction sub-module can also obtain data from the first device The remote login log corresponding to the second device extracts the first preset feature attribute and the second preset feature attribute, and then generates a positive training sample and a negative training sample. Whether it is a positive training sample or a negative training sample, it includes two parts: a feature part and a result labeling part; the feature part includes the features that can characterize whether the device is the target device, that is, the first preset feature attribute and the second The feature attribute is preset, and the result labeling part is used to label whether the feature part corresponds to the feature of the target device or the feature of the non-target device. The first preset feature attribute and the second preset feature attribute must include at least the number of times the first device and the second device log in to other devices and the number of other devices logged in during the historical time period, except for these two preset characteristics In addition to attributes, other characteristic attributes can also be included.

在本實施例的一個可選實現方式中,所述第一預設特徵屬性至少包括所述第一設備遠端登錄其他設備的次數和/或個數;和/或,所述第二預設特徵屬性至少包括所述第二設備遠端登錄其他設備的次數和/或個數。 In an optional implementation of this embodiment, the first preset characteristic attribute includes at least the number of times and/or the number of remote logins by the first device to other devices; and/or, the second preset The characteristic attribute includes at least the number of times and/or the number of remote logins by the second device to other devices.

在本實施例的一個可選實現方式中,針對所述第一設備對應的每條所述遠端登錄日誌,所述第一預設特徵屬性還包括以下至少一項:所述第一設備遠端登錄其他設備時是否使用密鑰登錄; 所述第一設備以何種用戶身份遠端登錄其他設備;所述第一設備是否登錄成功;和/或,針對所述第二設備對應的每條所述遠端登錄日誌,所述第二預設特徵屬性還包括以下至少一項:所述第二設備遠端登錄其他設備時是否使用密鑰登錄;所述第二設備以何種用戶身份遠端登錄其他設備;所述第二設備是否登錄成功。 In an optional implementation of this embodiment, for each remote login log corresponding to the first device, the first preset characteristic attribute further includes at least one of the following: the first device remote Whether to log in with the key when logging in to other devices; What user identity the first device uses to remotely log in to other devices; whether the first device is successfully logged in; and/or, for each remote log in log corresponding to the second device, the second device The preset characteristic attributes also include at least one of the following: whether the second device uses a key to log in remotely to other devices; what user identity the second device uses to remotely log in to other devices; whether the second device login successful.

該可選的實現方式中,第一設備對應的第一預設特徵屬性除了所述第一設備遠端登錄其他設備的次數和/或個數之外,還包括第一設備登錄其他設備時的登錄方式、登錄結果以及登錄所使用的用戶身份。登錄方式可以包括是否使用密鑰登錄,用戶身份可以包括系統用戶、根用戶和普通用戶。通常情況下,目標設備會採用密鑰登錄其他設備,且目標設備通常都會以根用戶的身份登錄其他設備,以便能夠以最大權利來管控其他設備。使用其他預設特徵屬性進行訓練,可以使得設備預測模型的預測準確率進一步提高。 In this optional implementation manner, the first preset characteristic attribute corresponding to the first device includes, in addition to the number of times and/or the number of remote logins of the first device to other devices, the first device to log in to other devices. Login method, login result, and user identity used for login. The login method can include whether to log in with a key, and the user identity can include system users, root users, and ordinary users. Under normal circumstances, the target device will use the key to log in to other devices, and the target device will usually log in to other devices as the root user, so as to be able to control other devices with maximum rights. Using other preset feature attributes for training can further improve the prediction accuracy of the device prediction model.

該設備預測模型的訓練裝置的一些相關細節還可以參考上述對目標設備的預測裝置中的描述,在此不再贅述。 For some related details of the training device of the equipment prediction model, reference can also be made to the description of the above-mentioned prediction device of the target equipment, which will not be repeated here.

圖8是適於用來實現根據本案實施方式的目標設備的預測方法的電子設備的結構示意圖。 FIG. 8 is a schematic structural diagram of an electronic device suitable for implementing the prediction method of the target device according to the embodiment of the present case.

如圖8所示,電子設備800包括中央處理單元(CPU)801,其可以根據儲存在唯讀記憶體(ROM)802中的程式或者從儲存部分808加載到隨機存取記憶體(RAM)803中的程式而執行上述圖1所示的實施方式中的各種處理。在RAM803中,還儲存有電子設備800操作所需的各種程式和資料。CPU801、ROM802以及RAM803透過匯流排804彼此相連。輸入/輸出(I/O)介面805也連接至匯流排804。 以下部件連接至I/O介面805:包括鍵盤、滑鼠等的輸入部分806;包括諸如陰極射線管(CRT)、液晶顯示器(LCD)等以及揚聲器等的輸出部分807;包括硬碟等的儲存部分808;以及包括諸如LAN卡、數據機等的網路介面卡的通信部分809。通信部分809經由諸如網際網路的網路執行通信處理。驅動器810也根據需要連接至I/O介面805。可移除媒體811,諸如磁碟、光碟、磁光碟、半導體記憶體等等,根據需要安裝在驅動器810上,以便於從其上讀出的電腦程式根據需要被安裝入儲存部分808。 特別地,根據本案的實施方式,上文參考圖1描述的方法可以被實現為電腦軟體程式。例如,本案的實施方式包括一種電腦程式產品,其包括有形地包含在及其可讀媒體上的電腦程式,所述電腦程式包含用於執行圖1的方法的程式碼。在這樣的實施方式中,該電腦程式可以透過通信部分809從網路上被下載和安裝,和/或從可拆卸媒體811被安裝。 圖8示出的上述電子設備同樣適用於實現根據本案另一實施方式的設備預測模型的訓練方法。 附圖中的流程圖和方塊圖,圖示了按照本案各種實施方式的系統、方法和電腦程式產品的可能實現的體系架構、功能和操作。在這點上,路程圖或方塊圖中的每個方塊可以代表一個模組、程式段或碼的一部分,所述模組、程式段或碼的一部分包含一個或多個用於實現規定的邏輯功能的可執行指令。也應當注意,在有些作為替換的實現中,方塊中所標註的功能也可以以不同於附圖中所標註的順序發生。例如,兩個接連地表示的方塊實際上可以基本並行地執行,它們有時也可以按相反的順序執行,這依所涉及的功能而定。也要注意的是,方塊圖和/或流程圖中的每個方塊、以及方塊圖和/或流程圖中的方塊的組合,可以用執行規定的功能或操作的專用的基於硬體的系統來實現,或者可以用專用硬體與電腦指令的組合來實現。 描述於本案實施方式中所涉及到的單元或模組可以透過軟體的方式實現,也可以透過硬體的方式來實現。所描述的單元或模組也可以設置在處理器中,這些單元或模組的名稱在某種情況下並不構成對該單元或模組本身的限定。 作為另一態樣,本案還提供了一種電腦可讀儲存媒體,該電腦可讀儲存媒體可以是上述實施方式中所述裝置中所包含的電腦可讀儲存媒體;也可以是單獨存在,未裝配入設備中的電腦可讀儲存媒體。電腦可讀儲存媒體儲存有一個或者一個以上程式,所述程式被一個或者一個以上的處理器用來執行描述於本案的方法。 以上描述僅為本案的較佳實施例以及對所運用技術原理的說明。本領域技術人員應當理解,本案中所涉及的發明範圍,並不限於上述技術特徵的特定組合而成的技術方案,同時也應涵蓋在不脫離所述發明構思的情況下,由上述技術特徵或其等同特徵進行任意組合而形成的其它技術方案。例如上述特徵與本案中公開的(但不限於)具有類似功能的技術特徵進行互相替換而形成的技術方案。As shown in FIG. 8, the electronic device 800 includes a central processing unit (CPU) 801, which can be loaded into a random access memory (RAM) 803 according to a program stored in a read-only memory (ROM) 802 or from a storage part 808 The program in FIG. 1 executes various processes in the embodiment shown in FIG. 1 above. Various programs and data required for the operation of the electronic device 800 are also stored in the RAM 803. The CPU 801, the ROM 802, and the RAM 803 are connected to each other through a bus 804. The input/output (I/O) interface 805 is also connected to the bus 804. The following components are connected to the I/O interface 805: the input part 806 including keyboard, mouse, etc.; including the output part 807 such as cathode ray tube (CRT), liquid crystal display (LCD), etc., and speakers; including storage of hard disks, etc. Part 808; and a communication part 809 including a network interface card such as a LAN card and a modem. The communication section 809 performs communication processing via a network such as the Internet. The driver 810 is also connected to the I/O interface 805 as needed. Removable media 811, such as magnetic disks, optical disks, magneto-optical disks, semiconductor memory, etc., are installed on the drive 810 as needed, so that the computer programs read from it can be installed into the storage portion 808 as needed. In particular, according to the implementation of this case, the method described above with reference to FIG. 1 can be implemented as a computer software program. For example, the implementation of this case includes a computer program product, which includes a computer program tangibly contained on a readable medium thereof, and the computer program includes a program code for executing the method of FIG. 1. In such an embodiment, the computer program can be downloaded and installed from the Internet through the communication part 809, and/or installed from the removable medium 811. The above-mentioned electronic device shown in FIG. 8 is also suitable for implementing the training method of the device prediction model according to another embodiment of the present case. The flowcharts and block diagrams in the accompanying drawings illustrate the possible implementation of the system architecture, functions, and operations of the system, method, and computer program product according to various embodiments of the present case. In this regard, each block in the route diagram or block diagram can represent a module, program segment, or part of the code, and the module, program segment, or part of the code contains one or more logic for implementing the specified Function executable instructions. It should also be noted that, in some alternative implementations, the functions marked in the block may also occur in a different order from the order marked in the drawings. For example, two blocks shown in succession can actually be executed substantially in parallel, or they can sometimes be executed in the reverse order, depending on the functions involved. It should also be noted that each block in the block diagram and/or flowchart, as well as the combination of blocks in the block diagram and/or flowchart, can be implemented by a dedicated hardware-based system that performs specified functions or operations. It can be realized, or it can be realized by a combination of dedicated hardware and computer instructions. The units or modules involved in the embodiments described in this case can be implemented through software, or through hardware. The described units or modules can also be arranged in the processor, and the names of these units or modules do not constitute a limitation on the unit or module itself under certain circumstances. As another aspect, the present case also provides a computer-readable storage medium. The computer-readable storage medium may be the computer-readable storage medium included in the device described in the above-mentioned embodiment; it may also exist alone without being installed. A computer-readable storage medium inserted into the device. The computer-readable storage medium stores one or more programs, and the programs are used by one or more processors to execute the method described in this case. The above description is only a preferred embodiment of this case and an explanation of the applied technical principles. Those skilled in the art should understand that the scope of the invention involved in this case is not limited to the technical solution formed by the specific combination of the above-mentioned technical features, and should also cover the above-mentioned technical features or technical solutions without departing from the inventive concept. Other technical solutions formed by any combination of its equivalent features. For example, the above-mentioned features and the technical features disclosed in this case (but not limited to) with similar functions are mutually replaced to form a technical solution.

S101‧‧‧步驟 S102‧‧‧步驟 S103‧‧‧步驟 S201‧‧‧步驟 S202‧‧‧步驟 S301‧‧‧步驟 S302‧‧‧步驟 S303‧‧‧步驟 S401‧‧‧步驟 S402‧‧‧步驟 S403‧‧‧步驟 S404‧‧‧步驟 S501‧‧‧步驟 S502‧‧‧步驟 601‧‧‧第一獲取模組 602‧‧‧提取模組 603‧‧‧預測模組 701‧‧‧第三獲取模組 702‧‧‧第一確定模組 703‧‧‧產生模組 704‧‧‧第二訓練模組 800‧‧‧電子設備 801‧‧‧中央處理單元 802‧‧‧唯讀記憶體 803‧‧‧隨機存取記憶體 804‧‧‧匯流排 805‧‧‧I/O介面 806‧‧‧輸入部分 807‧‧‧輸出部分 808‧‧‧儲存部分 809‧‧‧通信部分 810‧‧‧驅動器 811‧‧‧可移除媒體S101‧‧‧Step S102‧‧‧Step S103‧‧‧Step S201‧‧‧Step S202‧‧‧Step S301‧‧‧Step S302‧‧‧Step S303‧‧‧Step S401‧‧‧Step S402‧‧‧Step S403‧‧‧Step S404‧‧‧Step S501‧‧‧Step S502‧‧‧Step 601‧‧‧First acquisition module 602‧‧‧Extraction Module 603‧‧‧Prediction Module 701‧‧‧The third acquisition module 702‧‧‧First Confirmation Module 703‧‧‧Generate Module 704‧‧‧Second Training Module 800‧‧‧Electronic equipment 801‧‧‧Central Processing Unit 802‧‧‧Read only memory 803‧‧‧Random access memory 804‧‧‧Bus 805‧‧‧I/O interface 806‧‧‧input part 807‧‧‧Output section 808‧‧‧Storage section 809‧‧‧Communication part 810‧‧‧Drive 811‧‧‧Removable media

結合附圖,透過以下非限制性實施方式的詳細描述,本案的其它特徵、目的和優點將變得更加明顯。在附圖中: 圖1示出根據本案一實施方式的目標設備的預測方法的流程圖; 圖2示出根據本案一實施方式的目標設備的預測方法中設備預測模型訓練部分的流程圖; 圖3示出根據圖2所示實施方式的步驟S201的流程圖; 圖4示出根據本案一實施方式的設備預測模型的訓練方法的流程圖; 圖5示出根據圖4所示實施方式的步驟S403的流程圖; 圖6示出根據本案一實施方式的目標設備的預測裝置的結構方塊圖; 圖7示出根據本案一實施方式的設備預測模型的訓練裝置的結構方塊圖; 圖8是適於用來實現根據本案一實施方式的目標設備的預測方法的電子設備的結構示意圖。With reference to the accompanying drawings, through the following detailed description of the non-limiting implementation manners, other features, purposes and advantages of this case will become more apparent. In the attached picture: Fig. 1 shows a flowchart of a method for predicting a target device according to an embodiment of the present case; 2 shows a flowchart of the training part of the equipment prediction model in the target equipment prediction method according to an embodiment of the present case; FIG. 3 shows a flowchart of step S201 according to the embodiment shown in FIG. 2; Fig. 4 shows a flowchart of a training method of a device prediction model according to an embodiment of the present case; FIG. 5 shows a flowchart of step S403 according to the embodiment shown in FIG. 4; FIG. 6 shows a block diagram of the structure of a prediction device of a target device according to an embodiment of the present case; FIG. 7 shows a block diagram of the structure of a training device for a device prediction model according to an embodiment of the present case; FIG. 8 is a schematic structural diagram of an electronic device suitable for implementing the prediction method of the target device according to an embodiment of the present case.

Claims (20)

一種目標設備的預測方法,其特徵在於,包括:獲取網路拓撲結構下預設設備在預定時間段內產生的遠端登錄日誌;從所述遠端登錄日誌中提取預設特徵屬性;利用預先訓練好的設備預測模型對所述預設特徵屬性進行處理,並預測所述預設設備是否為所述網路拓撲結構下的目標設備;其中,所述目標設備被用於管控所述網路拓撲結構下的多個設備。 A method for predicting a target device, characterized by comprising: obtaining remote login logs generated by a preset device in a predetermined time period under a network topology; extracting preset feature attributes from the remote login log; The trained device prediction model processes the preset feature attributes and predicts whether the preset device is a target device under the network topology; wherein, the target device is used to control the network Multiple devices under the topology. 根據申請專利範圍第1項所述的目標設備的預測方法,其中,所述預設特徵屬性包括所述預設設備在所述預定時間段內遠端登錄所述網路拓撲結構下其他設備的次數和/或個數。 The method for predicting the target device according to item 1 of the scope of patent application, wherein the preset characteristic attribute includes the remote login of the preset device to other devices in the network topology within the predetermined time period Frequency and/or number. 根據申請專利範圍第2項所述的目標設備的預測方法,其中,針對每條所述遠端登錄日誌,所述預設特徵屬性還包括以下至少一項:所述預設設備遠端登錄其他設備時是否使用密鑰登錄;所述預設設備以何種用戶身份遠端登錄其他設備;所述預設設備是否登錄成功。 According to the method for predicting the target device according to item 2 of the scope of patent application, wherein, for each remote login log, the preset characteristic attribute further includes at least one of the following: the preset device remotely logs in to others Whether the device uses a key to log in; what user identity the preset device uses to remotely log in to other devices; whether the preset device is successfully logged in. 根據申請專利範圍第1項所述的目標設備的預測方法,其中,所述方法還包括:獲取多個訓練樣本;其中,所述訓練樣本包括特徵部分和結果標註部分,所述特徵部分包括所述預設特徵屬性,所述結果標註部分用於標註所述訓練樣本為正訓練樣本還是負訓練樣本;利用多個所述訓練樣本對人工智慧模型進行訓練,得到所述設備預測模型。 The method for predicting a target device according to item 1 of the scope of patent application, wherein the method further includes: acquiring a plurality of training samples; wherein the training samples include a characteristic part and a result labeling part, and the characteristic part includes all The preset feature attributes, the result labeling part is used to label whether the training sample is a positive training sample or a negative training sample; a plurality of the training samples are used to train an artificial intelligence model to obtain the equipment prediction model. 根據申請專利範圍第4項所述的目標設備的預測方法,其中,所述獲取多個訓練樣本包括:獲取所述網路拓撲結構下多個設備在歷史時間段內產生的遠端登錄日誌;從所述遠端登錄日誌確定所述多個設備登錄其他設備的次數和/或個數;從所述次數和/或個數滿足預設條件的第一設備對應的遠端登錄日誌,產生正訓練樣本,從所述次數和/或個數不滿足所述預設條件的第二設備對應的遠端登錄日誌產生負訓練樣本。 The method for predicting a target device according to item 4 of the scope of patent application, wherein said obtaining multiple training samples includes: obtaining remote login logs generated by multiple devices in a historical time period under the network topology; From the remote login log, determine the number of times and/or the number of the multiple devices logging in to other devices; from the remote login log corresponding to the first device whose times and/or number meet the preset condition, generate a positive Training samples, generating negative training samples from remote login logs corresponding to second devices whose times and/or numbers do not meet the preset conditions. 一種設備預測模型的訓練方法,其特徵在於,包括:獲取網路拓撲結構下多個設備在歷史時間段內產生的遠端登錄日誌;從所述遠端登錄日誌確定所述多個設備登錄其他設備 的次數和/或個數;從所述次數和/或個數滿足預設條件的第一設備對應的遠端登錄日誌,產生正訓練樣本,從所述次數和/或個數不滿足所述預設條件的第二設備對應的遠端登錄日誌產生負訓練樣本;利用所述正訓練樣本和負訓練樣本對人工智慧模型進行訓練,得到設備預測模型。 A method for training a device prediction model, characterized in that it comprises: obtaining remote login logs generated by multiple devices in a historical time period under a network topology; and determining from the remote login logs that the multiple devices log in to others equipment The number of times and/or the number; from the remote login log corresponding to the first device whose number and/or number meets the preset condition, a positive training sample is generated, and the number of times and/or number does not meet the The remote login log corresponding to the second device with preset conditions generates negative training samples; the artificial intelligence model is trained by using the positive training samples and the negative training samples to obtain the device prediction model. 根據申請專利範圍第6項所述的設備預測模型的訓練方法,其中,從所述次數和/或個數滿足預設條件的第一設備對應的遠端登錄日誌,產生正訓練樣本,從所述次數和/或個數不滿足所述預設條件的第二設備對應的遠端登錄日誌產生負訓練樣本,包括:從所述第一設備對應的遠端登錄日誌提取第一預設特徵屬性,根據所述第一預設特徵屬性產生所述正訓練樣本;從所述第二設備對應的遠端登錄日誌提取所述第二預設特徵屬性,根據所述第二預設特徵屬性產生所述負訓練樣本。 According to the training method of the device prediction model described in item 6 of the scope of patent application, a positive training sample is generated from the remote login log corresponding to the first device whose number and/or number meets the preset conditions, and The generation of a negative training sample from the remote login log corresponding to the second device whose number and/or number does not satisfy the preset condition includes: extracting a first preset characteristic attribute from the remote login log corresponding to the first device , Generating the positive training sample according to the first preset characteristic attribute; extracting the second preset characteristic attribute from the remote login log corresponding to the second device, and generating all the samples according to the second preset characteristic attribute Said negative training sample. 根據申請專利範圍第7項所述的設備預測模型的訓練方法,其中,所述第一預設特徵屬性至少包括所述第一設備遠端登錄其他設備的次數和/或個數;和/或,所述第二預設特徵屬性至少包括所述第二設備遠端登錄其他設備的 次數和/或個數。 The method for training a device prediction model according to item 7 of the scope of patent application, wherein the first preset characteristic attribute includes at least the number and/or number of remote logins of the first device to other devices; and/or , The second preset characteristic attribute at least includes the remote login of the second device to other devices Frequency and/or number. 根據申請專利範圍第8項所述的設備預測模型的訓練方法,其中,針對所述第一設備對應的每條所述遠端登錄日誌,所述第一預設特徵屬性還包括以下至少一項:所述第一設備遠端登錄其他設備時是否使用密鑰登錄;所述第一設備以何種用戶身份遠端登錄其他設備;所述第一設備是否登錄成功;和/或,針對所述第二設備對應的每條所述遠端登錄日誌,所述第二預設特徵屬性還包括以下至少一項:所述第二設備遠端登錄其他設備時是否使用密鑰登錄;所述第二設備以何種用戶身份遠端登錄其他設備;所述第二設備是否登錄成功。 The method for training a device prediction model according to item 8 of the scope of patent application, wherein, for each remote login log corresponding to the first device, the first preset characteristic attribute further includes at least one of the following : Whether the first device remotely logs in to other devices using a key to log in; what user identity the first device uses to remotely log in to other devices; whether the first device logs in successfully; and/or, for the For each remote login log corresponding to the second device, the second preset characteristic attribute further includes at least one of the following: whether the second device uses a key to log in remotely to other devices; the second What user identity the device uses to remotely log in to other devices; whether the second device is successfully logged in. 一種目標設備的預測裝置,其特徵在於,包括:第一獲取模組,被配置為獲取網路拓撲結構下預設設備在預定時間段內產生的遠端登錄日誌;提取模組,被配置為從所述遠端登錄日誌中提取預設特徵屬性;預測模組,被配置為利用預先訓練好的設備預測模型對所述預設特徵屬性進行處理,並預測所述預設設備是否為所述網路拓撲結構下的目標設備;其中,所述目標設備 被用於管控所述網路拓撲結構下的多個設備。 A predicting device for a target device, characterized by comprising: a first acquisition module configured to acquire remote login logs generated by a preset device in a network topology structure within a predetermined time period; and the extraction module is configured to Extract the preset feature attributes from the remote login log; the prediction module is configured to process the preset feature attributes using a pre-trained device prediction model, and predict whether the preset device is the The target device under the network topology; wherein, the target device It is used to control multiple devices under the network topology. 根據申請專利範圍第10項所述的目標設備的預測裝置,其中,所述預設特徵屬性包括所述預設設備在所述預定時間段內遠端登錄所述網路拓撲結構下其他設備的次數和/或個數。 The prediction device of the target device according to item 10 of the scope of patent application, wherein the preset characteristic attribute includes the remote login of the preset device to other devices in the network topology within the predetermined time period Frequency and/or number. 根據申請專利範圍第11項所述的目標設備的預測裝置,其中,針對每條所述遠端登錄日誌,所述預設特徵屬性還包括以下至少一項:所述預設設備遠端登錄其他設備時是否使用密鑰登錄;所述預設設備以何種用戶身份遠端登錄其他設備;所述預設設備是否登錄成功。 The predicting device of the target device according to item 11 of the scope of patent application, wherein, for each of the remote login logs, the preset characteristic attribute further includes at least one of the following: the preset device remotely logs in other Whether the device uses a key to log in; what user identity the preset device uses to remotely log in to other devices; whether the preset device is successfully logged in. 根據申請專利範圍第10項所述的目標設備的預測裝置,其中,所述裝置還包括:第二獲取模組,被配置為獲取多個訓練樣本;其中,所述訓練樣本包括特徵部分和結果標註部分,所述特徵部分包括所述預設特徵屬性,所述結果標註部分用於標註所述訓練樣本為正訓練樣本還是負訓練樣本;第一訓練模組,被配置為利用多個所述訓練樣本對人工智慧模型進行訓練,得到所述設備預測模型。 The prediction device of the target device according to item 10 of the scope of patent application, wherein the device further includes: a second acquisition module configured to acquire a plurality of training samples; wherein the training samples include characteristic parts and results An annotation part, the feature part includes the preset feature attributes, and the result annotation part is used to annotate whether the training sample is a positive training sample or a negative training sample; the first training module is configured to use a plurality of The training samples train the artificial intelligence model to obtain the equipment prediction model. 根據申請專利範圍第13項所述的目標設備的預測裝置,其中,所述第二獲取模組,包括:第一獲取子模組,被配置為獲取所述網路拓撲結構下多個設備在歷史時間段內產生的遠端登錄日誌;第一確定子模組,被配置為從所述遠端登錄日誌確定所述多個設備登錄其他設備的次數和/或個數;產生子模組,被配置為從所述次數和/或個數滿足預設條件的第一設備對應的遠端登錄日誌,產生正訓練樣本,從所述次數和/或個數不滿足所述預設條件的第二設備對應的遠端登錄日誌產生負訓練樣本。 The prediction device of the target device according to item 13 of the scope of patent application, wherein the second acquisition module includes: a first acquisition sub-module configured to acquire the status of multiple devices in the network topology A remote login log generated in a historical time period; a first determining sub-module configured to determine the number and/or number of the multiple devices logging in to other devices from the remote login log; generating a sub-module, Is configured to generate a positive training sample from the remote login log corresponding to the first device whose times and/or numbers meet the preset condition, and from the first device whose times and/or numbers do not meet the preset condition The remote login log corresponding to the second device generates negative training samples. 一種設備預測模型的訓練裝置,其特徵在於,包括:第三獲取模組,被配置為獲取網路拓撲結構下多個設備在歷史時間段內產生的遠端登錄日誌;第一確定模組,被配置為從所述遠端登錄日誌確定所述多個設備登錄其他設備的次數和/或個數;產生模組,被配置為從所述次數和/或個數滿足預設條件的第一設備對應的遠端登錄日誌,產生正訓練樣本,從所述次數和/或個數不滿足所述預設條件的第二設備對應的遠端登錄日誌產生負訓練樣本;第二訓練模組,被配置為利用所述正訓練樣本和負訓練樣本對人工智慧模型進行訓練,得到設備預測模型。 A device prediction model training device, which is characterized by comprising: a third acquisition module configured to acquire remote login logs generated by multiple devices in a historical time period under a network topology; a first determination module, Is configured to determine from the remote login log the number of times and/or numbers of the multiple devices logging in to other devices; the generating module is configured to determine the number and/or number of the first device that meets the preset condition from the number and/or number The remote login log corresponding to the device generates a positive training sample, and a negative training sample is generated from the remote login log corresponding to the second device whose number and/or number does not meet the preset condition; the second training module, It is configured to use the positive training sample and the negative training sample to train an artificial intelligence model to obtain a device prediction model. 根據申請專利範圍第15項所述的設備預測模型的訓練 裝置,其中,所述產生模組,包括:第一提取子模組,被配置為從所述第一設備對應的遠端登錄日誌提取第一預設特徵屬性,根據所述第一預設特徵屬性產生所述正訓練樣本;第二提取子模組,被配置為從所述第二設備對應的遠端登錄日誌提取所述第二預設特徵屬性,根據所述第二預設特徵屬性產生所述負訓練樣本。 Training according to the equipment prediction model described in item 15 of the scope of patent application The device, wherein the generation module includes: a first extraction sub-module configured to extract a first preset feature attribute from a remote login log corresponding to the first device, and according to the first preset feature Attribute to generate the positive training sample; a second extraction sub-module configured to extract the second preset feature attribute from the remote login log corresponding to the second device, and generate it according to the second preset feature attribute The negative training sample. 根據申請專利範圍第16項所述的設備預測模型的訓練裝置,其中,所述第一預設特徵屬性至少包括所述第一設備遠端登錄其他設備的次數和/或個數;和/或,所述第二預設特徵屬性至少包括所述第二設備遠端登錄其他設備的次數和/或個數。 The device for training a device prediction model according to item 16 of the scope of patent application, wherein the first preset characteristic attribute includes at least the number of times and/or the number of remote logins by the first device to other devices; and/or The second preset characteristic attribute includes at least the number of times and/or the number of remote logins by the second device to other devices. 根據申請專利範圍第17項所述的設備預測模型的訓練裝置,其中,針對所述第一設備對應的每條所述遠端登錄日誌,所述第一預設特徵屬性還包括以下至少一項:所述第一設備遠端登錄其他設備時是否使用密鑰登錄;所述第一設備以何種用戶身份遠端登錄其他設備;所述第一設備是否登錄成功;和/或,針對所述第二設備對應的每條所述遠端登錄日誌,所述第二預設特徵屬性還包括以下至少一項:所述第二設備遠端登錄其他設備時是否使用密鑰登 錄;所述第二設備以何種用戶身份遠端登錄其他設備;所述第二設備是否登錄成功。 The training device for the equipment prediction model according to item 17 of the scope of patent application, wherein, for each remote login log corresponding to the first equipment, the first preset characteristic attribute further includes at least one of the following : Whether the first device remotely logs in to other devices using a key to log in; what user identity the first device uses to remotely log in to other devices; whether the first device logs in successfully; and/or, for the For each remote login log corresponding to the second device, the second preset characteristic attribute further includes at least one of the following: whether the second device uses a key to log in remotely to other devices Record; what user identity the second device uses to remotely log in to other devices; whether the second device logs in successfully. 一種電子設備,其特徵在於,包括記憶體和處理器;其中,所述記憶體用於儲存一條或多條電腦指令,其中,所述一條或多條電腦指令被所述處理器執行以實現申請專利範圍第1-9項中任一項所述的方法步驟。 An electronic device, characterized by comprising a memory and a processor; wherein the memory is used to store one or more computer instructions, wherein the one or more computer instructions are executed by the processor to implement the application The method steps described in any one of items 1-9 in the scope of the patent. 一種電腦可讀儲存媒體,其上儲存有電腦指令,其特徵在於,該電腦指令被處理器執行時實現申請專利範圍第1-9項中任一項所述的方法步驟。A computer-readable storage medium having computer instructions stored thereon is characterized in that, when the computer instructions are executed by a processor, the method steps described in any one of items 1-9 of the scope of patent application are realized.
TW108120240A 2018-08-14 2019-06-12 Target equipment prediction method, device, electronic equipment and storage medium TWI706646B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810924481.3 2018-08-14
CN201810924481.3A CN109218077A (en) 2018-08-14 2018-08-14 Prediction technique, device, electronic equipment and the storage medium of target device

Publications (2)

Publication Number Publication Date
TW202010292A TW202010292A (en) 2020-03-01
TWI706646B true TWI706646B (en) 2020-10-01

Family

ID=64988653

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108120240A TWI706646B (en) 2018-08-14 2019-06-12 Target equipment prediction method, device, electronic equipment and storage medium

Country Status (3)

Country Link
CN (1) CN109218077A (en)
TW (1) TWI706646B (en)
WO (1) WO2020034756A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109218077A (en) * 2018-08-14 2019-01-15 阿里巴巴集团控股有限公司 Prediction technique, device, electronic equipment and the storage medium of target device
CN110753039B (en) * 2019-09-29 2022-04-22 苏州浪潮智能科技有限公司 Method and device for remote login safety protection
CN114757716B (en) * 2022-05-10 2025-11-14 北京明略昭辉科技有限公司 Methods and apparatus for equipment connection, electronic equipment, storage media

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201110614A (en) * 2009-09-04 2011-03-16 Chunghwa Telecom Co Ltd Broadband network information service topology analysis method
US20140222983A1 (en) * 2013-02-05 2014-08-07 Cisco Technology, Inc. Dynamically determining node locations to apply learning machine based network performance improvement
CN105227383A (en) * 2015-11-06 2016-01-06 广东电网有限责任公司电力科学研究院 A kind of device of network topology investigation
CN105450442A (en) * 2015-11-06 2016-03-30 广东电网有限责任公司电力科学研究院 Network topology checking method and system thereof
TW201703474A (en) * 2015-07-14 2017-01-16 Chunghwa Telecom Co Ltd Smart redirection system for content delivery network and method thereof for assigning the corresponding probing module as a service node according to the source network segment of the user premise and the full-area direction corresponding table
TW201822521A (en) * 2016-12-02 2018-06-16 台灣大哥大股份有限公司 System and method for mobile device application optimization in telecommunication network
CN108306760A (en) * 2017-12-28 2018-07-20 中国银联股份有限公司 For making the self-healing method and apparatus of managerial ability in a distributed system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101694652B (en) * 2009-09-30 2012-11-28 西安交通大学 Network resource personalized recommendation method based on extremely fast neural network
CN102263790A (en) * 2011-07-18 2011-11-30 华北电力大学 An Intrusion Detection Method Based on Ensemble Learning
CN103077347B (en) * 2012-12-21 2015-11-04 中国电力科学研究院 A kind of hybrid intrusion detection method based on improving the fusion of kernel vector machine data
CN105119750B (en) * 2015-09-08 2019-04-19 南京联成科技发展股份有限公司 A kind of safe operation management platform system of distributed information based on big data
US10949765B2 (en) * 2016-09-15 2021-03-16 Accenture Global Solutions Limited Automated inference of evidence from log information
CN206332681U (en) * 2016-11-24 2017-07-14 国网新疆电力公司信息通信公司 Portable PDA network alarms collector
CN106778259B (en) * 2016-12-28 2020-01-10 北京明朝万达科技股份有限公司 Abnormal behavior discovery method and system based on big data machine learning
CN107800683A (en) * 2017-09-08 2018-03-13 微梦创科网络科技(中国)有限公司 A kind of method and device for excavating malice IP
CN107819631B (en) * 2017-11-23 2021-03-02 东软集团股份有限公司 Equipment anomaly detection method, device and equipment
CN109218077A (en) * 2018-08-14 2019-01-15 阿里巴巴集团控股有限公司 Prediction technique, device, electronic equipment and the storage medium of target device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TW201110614A (en) * 2009-09-04 2011-03-16 Chunghwa Telecom Co Ltd Broadband network information service topology analysis method
US20140222983A1 (en) * 2013-02-05 2014-08-07 Cisco Technology, Inc. Dynamically determining node locations to apply learning machine based network performance improvement
TW201703474A (en) * 2015-07-14 2017-01-16 Chunghwa Telecom Co Ltd Smart redirection system for content delivery network and method thereof for assigning the corresponding probing module as a service node according to the source network segment of the user premise and the full-area direction corresponding table
CN105227383A (en) * 2015-11-06 2016-01-06 广东电网有限责任公司电力科学研究院 A kind of device of network topology investigation
CN105450442A (en) * 2015-11-06 2016-03-30 广东电网有限责任公司电力科学研究院 Network topology checking method and system thereof
TW201822521A (en) * 2016-12-02 2018-06-16 台灣大哥大股份有限公司 System and method for mobile device application optimization in telecommunication network
CN108306760A (en) * 2017-12-28 2018-07-20 中国银联股份有限公司 For making the self-healing method and apparatus of managerial ability in a distributed system

Also Published As

Publication number Publication date
WO2020034756A1 (en) 2020-02-20
TW202010292A (en) 2020-03-01
CN109218077A (en) 2019-01-15

Similar Documents

Publication Publication Date Title
US12289338B2 (en) Threat disposition analysis and modeling using supervised machine learning
US12177086B2 (en) Classification and relationship correlation learning engine for the automated management of complex and distributed networks
US10592666B2 (en) Detecting anomalous entities
US8805839B2 (en) Analysis of computer network activity by successively removing accepted types of access events
US12393860B2 (en) Systems and methods for optimizing machine learning models by summarizing list characteristics based on multi-dimensional feature vectors
Lou et al. Mining dependency in distributed systems through unstructured logs analysis
US20160294666A1 (en) Method and system for monitoring server cluster
CN110046297B (en) Operation and maintenance violation identification method and device and storage medium
TWI706646B (en) Target equipment prediction method, device, electronic equipment and storage medium
US20220217177A1 (en) Intrusion Management with Threat Type Clustering
US11734025B2 (en) Configurable action generation for a remote network management platform
US20240127140A1 (en) Qualification-Based Task Management
CN120029858B (en) Comprehensive financial IT operation and maintenance management system and method based on artificial intelligence
US9922116B2 (en) Managing big data for services
Shih et al. Implementation and visualization of a netflow log data lake system for cyberattack detection using distributed deep learning: WC. Shih et al.
CN118245261A (en) Alarm analysis method, device, apparatus, medium and program product
CN115168828A (en) Account security login method and device and electronic equipment
Ya et al. An automatic approach to extract the formats of network and security log messages
CN109412861B (en) A kind of terminal network establishes security association display method
CN118885971A (en) A heterogeneous data fusion method, device, equipment and storage medium
KR102509382B1 (en) A big data-based IT infrastructure event control plan using machine learning
WO2024104614A1 (en) A self-adaptive fault correlation system based on causality matrices and machine learning
Yan et al. First demonstration of imbalanced data learning-based failure prediction in self-optimizing optical networks with large scale field topology
CN115480843A (en) Business processing method, device, electronic device, and nonvolatile storage medium
CN115767601A (en) A method and device for automatic management of 5GC network elements based on multidimensional data

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees