Method, device and system of protection of hostile attacks
A malicious attack and malicious technology, applied in transmission systems, electrical components, etc., can solve problems such as protection loopholes and lack of versatility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0036] According to an embodiment of the present invention, a method embodiment of a malicious attack protection method is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0037] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 2 It is a block diagram of the hardware structure of a computer terminal running a malicious attack protection method according to an embodiment of the present invention. Such as figure 2 As shown, the computer terminal 10 may include one or more (only one is shown in t...
Embodiment approach
[0099] Option One:
[0100] Detect the service request data of a device with malicious attack characteristics, and save the device parameters of the device with malicious attack characteristics to the grayscale device when the service request data of the device with malicious attack characteristics meets any preset behavior data list.
[0101] The above solution of the present application provides a function of further classifying devices with malicious attack characteristics. In the actual application process, there are some devices with malicious attack characteristics, which are essentially terminals with high access volume.
[0102] For example, in the application environment of Internet cafes or companies, suppose the Internet cafes or companies have 500 clients running at the same time. When these 500 clients access the server through the Internet, the gateway router and the server recognize the same IP address. , therefore, access devices with IP addresses of this typ...
Embodiment 2
[0129]According to an embodiment of the present invention, an embodiment of an apparatus for implementing the foregoing method embodiments is also provided, and the apparatus provided by the foregoing embodiments of the present application can run on a computer terminal.
[0130] Figure 6 It is a schematic structural diagram of a protection device against malicious attacks according to Embodiment 2 of this law.
[0131] Such as Figure 6 As shown, the malicious attack protection device may include: an acquisition module 60 , a storage module 62 , a detection module 64 , a first processing module 66 and a second processing module 68 .
[0132] Wherein, the obtaining module 60 is used to obtain the device parameters of the access device with malicious attack characteristics and the device parameters of the access device with security access characteristics; the storage module 62 is used to save the device parameters of the access device with malicious attack characteristics to...
PUM

Abstract
Description
Claims
Application Information

- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com