Method, device and system of protection of hostile attacks

A malicious attack and malicious technology, applied in transmission systems, electrical components, etc., can solve problems such as protection loopholes and lack of versatility

Inactive Publication Date: 2016-03-30
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] Embodiments of the present invention provide a malicious attack protection method, device, and system to at least solve the t...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system of protection of hostile attacks
  • Method, device and system of protection of hostile attacks
  • Method, device and system of protection of hostile attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] According to an embodiment of the present invention, a method embodiment of a malicious attack protection method is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0037] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, figure 2 It is a block diagram of the hardware structure of a computer terminal running a malicious attack protection method according to an embodiment of the present invention. Such as figure 2 As shown, the computer terminal 10 may include one or more (only one is shown in t...

Embodiment approach

[0099] Option One:

[0100] Detect the service request data of a device with malicious attack characteristics, and save the device parameters of the device with malicious attack characteristics to the grayscale device when the service request data of the device with malicious attack characteristics meets any preset behavior data list.

[0101] The above solution of the present application provides a function of further classifying devices with malicious attack characteristics. In the actual application process, there are some devices with malicious attack characteristics, which are essentially terminals with high access volume.

[0102] For example, in the application environment of Internet cafes or companies, suppose the Internet cafes or companies have 500 clients running at the same time. When these 500 clients access the server through the Internet, the gateway router and the server recognize the same IP address. , therefore, access devices with IP addresses of this typ...

Embodiment 2

[0129]According to an embodiment of the present invention, an embodiment of an apparatus for implementing the foregoing method embodiments is also provided, and the apparatus provided by the foregoing embodiments of the present application can run on a computer terminal.

[0130] Figure 6 It is a schematic structural diagram of a protection device against malicious attacks according to Embodiment 2 of this law.

[0131] Such as Figure 6 As shown, the malicious attack protection device may include: an acquisition module 60 , a storage module 62 , a detection module 64 , a first processing module 66 and a second processing module 68 .

[0132] Wherein, the obtaining module 60 is used to obtain the device parameters of the access device with malicious attack characteristics and the device parameters of the access device with security access characteristics; the storage module 62 is used to save the device parameters of the access device with malicious attack characteristics to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method, device and system of protection of hostile attacks. The method of protection of hostile attacks comprises: obtaining device parameters of an access device with hostile attack features and device parameters of an access device with safe access features; storing the device parameters of the access device with hostile attack features to an attack device list, and storing the device parameters of the access device with safe access features to a safety device list; detecting the device parameters of the current access device which accesses a gateway router in the protection of hostile attacks, wherein if the matching degree of the device parameters of the current access device which accesses the gateway router and one or more than one device parameters in the attack device list is not less than a first threshold value, the current access device is determined to be an attack device. The technical problems of the existence of protection vulnerability in the protection scheme aiming at hostile attacks and the lack of the universality are solved in the prior art.

Description

technical field [0001] The present invention relates to the field of computer Internet, in particular, to a method, device and system for protecting against malicious attacks. Background technique [0002] With the rapid development of Internet technology, Internet technology provides users with various convenient applications, such as instant chat, social platforms, online shopping, etc. At the same time, hackers maliciously attack the network servers of the above applications, making legitimate users unable to Access the web server normally. Taking Distributed Denial of Service (DDOS for short) as an example, a large number of "zombie hosts" invaded or indirectly used by attackers send a large number of disguised network packets to the attack target (that is, the network server), in order to cause network congestion or The server resources are exhausted, which causes the network server to refuse to provide services for legitimate users, that is, the network packets sent b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 白卫国邹鹏
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products