Joke Collection Website - Blessing messages - What does the website monitoring service specifically include?

What does the website monitoring service specifically include?

Website monitoring generally includes three functions:

First, the website basic monitoring

ICP record monitoring: Check the records of the website.

WHOIS query monitoring: query whether the basic information of website domain name is normal.

IPv6 monitoring: Check whether the website supports IPv6 network access, and count whether the internal and external links are reachable.

HTTP detection: detect abnormal HTTP connections and conduct functional, performance and security tests.

DNS dial test: create, modify and delete dial test tasks, and bind alarm strategies.

Second, the website content monitoring

Misspelled words monitoring: the text content is summarized, the sentence confusion is calculated by language model, and the optimal solution is obtained by arranging the results.

Cross-link monitoring: comprehensive report is given according to error type/resource type/internal and external link type, and recording and filtering functions are supported.

Sensitive word monitoring: Customize sensitive information base, and capture website text, pictures, JS information, etc. , compared with the font, give an alarm.

Picture compliance: intelligent picture review, filtering all kinds of illegal pictures.

Streaming media monitoring: provide digital streaming media monitoring scheme to detect audio and video security.

Double audit: double audit by machine and manual to eliminate sensitive content and ensure website compliance.

Artificial Internet reading: Public opinion experts provide all-weather Internet reading services.

Third, network security monitoring.

Tampering: including monitoring and alarming titles, pictures, contents, hidden links, etc.

Hang a horse: detect whether the website is inserted into a Trojan horse program to prevent the website from being implanted with malicious code.

Dark chain: dark chain detection, intelligent identification of illegal content on the website.

Vulnerability scanning: vulnerability scanning of WEB applications, including WEB injection vulnerabilities, weak password monitoring, file upload vulnerabilities, etc.

Penetration: Evaluate the network's ability to resist attacks through WEB penetration test.