Method and device for intercepting network attack based on cloud

A network attack and cloud technology, applied in the field of network communication and information security, can solve problems such as user loss and theft, and achieve the effect of preventing attacks and ensuring information security.

Active Publication Date: 2014-07-02
ZHUHAI BAOQU TECH CO LTD
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Once the system is successfully invaded, hackers or viruses will install malicious programs on the system, steal confidential data or use the controlled computer to send spam, causing irreparable losses to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for intercepting network attack based on cloud
  • Method and device for intercepting network attack based on cloud

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] see figure 1 , which is a flow chart of the cloud-based method for intercepting network attacks of the present invention. The cloud-based method for intercepting network attacks includes the following steps:

[0025] Step S11: Determine whether the client has been attacked. Usually, after a hacker attack is successful, a script file, such as FTP or Wscript, will be run to download the virus. Therefore, when an FTP or Wscript program is detected to be downloaded, it can be judged as being attacked.

[0026] Step S12: collecting suspicious IP address data on the client side. The IP address data is the target address of the malicious download.

[0027] Step S13: Send the collected suspicious IP address data to the cloud server.

[0028] Step S14: Extensive screening is performed on the IP address data on the cloud server. The IP address is compared with a hacker IP address database, if the IP address matches an IP address in the hacker IP database, it is judged to be...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for intercepting network attack based on cloud comprises the following steps: step 1, whether a client is attacked is judged; step 2, suspicious IP address data is collected at the client; step 3, the collected suspicious IP address data is sent to a cloud server; step 4, breadth screening is carried out on IP address data at the cloud server; step 5, whether the number of times of reporting of an IP address by all users is greater than a threshold value is judged, the IP address is judged as a hacker IP address if the number of times of reporting of the IP address by all users is greater than the threshold value, or downloading is allowed; step 6, the IP address is stored in a hacker IP address database, and the updated hacker IP address database is sent to the client; and step 7, a suspicious IP address is compared with the updated hacker IP address database at the client, the IP address is intercepted if the IP address is matched with an IP address in the hacker IP address database, or downloading is allowed. Hacker IP addresses are identified, checked and judged at the cloud, and attack of hackers is effectively prevented.

Description

technical field [0001] The invention relates to the field of information security in the field of network communication, in particular to a cloud-based method and device for intercepting network attacks. Background technique [0002] At present, with the continuous development of computer technology, the accompanying information security issues have attracted more and more attention. As a carrier of information, computers face a variety of information security issues, for example, hacker attacks from the network, virus intrusions, etc. bring threats to information security. Hackers don't just break into PCs, they break into those larger networks as well. Once the system is successfully invaded, hackers or viruses will install malicious programs on the system, steal confidential data or use the controlled computer to send spam, causing irreparable losses to users. Contents of the invention [0003] The purpose of the present invention is to overcome the shortcomings and d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 杨军潘建军陈勇
Owner ZHUHAI BAOQU TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products