Check patentability & draft patents in minutes with Patsnap Eureka AI!

Method and device for detecting network malicious behaviors

A malicious and behavioral technology, applied in the direction of data exchange network, digital transmission system, electrical components, etc., can solve the problem that the attack cannot be completely prevented from happening again

Inactive Publication Date: 2010-12-22
ALCATEL LUCENT SAS
View PDF5 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, identifying the puppet machine can only temporarily eliminate a part of the attack, but cannot completely prevent the attack from happening again

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for detecting network malicious behaviors
  • Method and device for detecting network malicious behaviors
  • Method and device for detecting network malicious behaviors

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0059] figure 1 A structural block diagram of a communication network implementing an embodiment of the present invention is exemplarily shown. Such as figure 1 As shown, the general communication network includes an application server 10, a subscriber information database 12, an agent (Proxy) 14 and a cloud diagram 16, and the cloud diagram 16 represents clients connected to various services, such as a client 161 of business 1 and a client 162 of business 2 . Application server 10 , subscriber information database 12 and cloud map 16 are all connected to agent 14 . In a common communication network, a subscriber information database associates accounts with customers. During business processing, the agent 14 will query the subscriber information database to authenticate the customer. After passing the authentication, the client can perform such s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and a device for detecting network malicious behaviors and a network unit. The method comprises the following steps: standardizing message number to reach a packet switching domain in a time internal period; setting a detection identification which is the greater one between the sum of the historical value of the detection identification and the difference between the standardized message number and a first parameter as well as a first pre-determined threshold, wherein the first parameter is greater than the average value of the standardized message number; and if the detection identification is greater than the first pre-determined value, detecting the attack of malicious behavior, thus the malicious attacks can be detected in advance on the basis of application and the accounts of the malicious users can be marked so as to thoroughly prevent the malicious attacks finally.

Description

technical field [0001] The present invention relates to a method and a device for attacking malicious behaviors in a network, more particularly, to detection of malicious behaviors of Distributed Denial of Service (DDOS). Background technique [0002] The use of the network is becoming more and more extensive. With the development of the network, various application services are produced to facilitate people's life. Such a network is almost ubiquitous in people's life. However, due to various factors such as business competition, retaliation and network extortion, many network service providers such as IDC hosting rooms, commercial sites, game servers, and chat networks have been attacked by denial of service (DOS) and DDOS for a long time. plagued by attacks. In the third generation network, an IP Multimedia Subsystem (IMS) supporting a user's multimedia service is widely used, however the security of the IMS network is not sufficiently checked. It has been proved that su...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/26H04L12/56H04L29/06H04L29/08
Inventor 迟彩霞
Owner ALCATEL LUCENT SAS
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More