Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for determining malicious access, and method and apparatus for intercepting malicious access

A malicious access and device judgment technology, applied in the field of Internet security, can solve problems such as excessive access times, affecting user experience, and insufficient accuracy

Active Publication Date: 2016-04-13
NETEASE (HANGZHOU) NETWORK CO LTD
View PDF3 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, this approach is only a general way of judging, the accuracy is not enough, and it is likely to cause misjudgment
For example, in the past period of time, the user's account was hacked and accessed the server with high frequency. After the user retrieved the account, he restored the normal frequency of accessing the server. After the user retrieves the account, it is still considered that the total number of visits exceeds the threshold and will still be restricted, which greatly affects the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for determining malicious access, and method and apparatus for intercepting malicious access
  • Method and apparatus for determining malicious access, and method and apparatus for intercepting malicious access
  • Method and apparatus for determining malicious access, and method and apparatus for intercepting malicious access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0093] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0094] see figure 1 , is a schematic flowchart of a first embodiment of a method for updating an application program of a mobile terminal provided by the present invention, and the method includes the following steps:

[0095] S101. When receiving an access request from an IP address, determine a first time period; the first time period is a time period between past time T1 and current time T0; wherein, the first time period is divided into N consecutive sub-time ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and apparatus for determining a malicious access. The method comprises the following steps: determining a first time period when an access request of an IP address is received; counting the access frequency of the IP address in each sub time period; according to the access frequency of the IP address in each sub time period and an access frequency weight value configured to each sub time period, counting an weighing average value of the access frequency of the IP address in each sub time period; and comparing the weighing average value with a preset first access frequency threshold, and when the weighing average value is greater than the preset first access frequency threshold, determining that the IP address belongs to the malicious access. The invention also simultaneously discloses a method and apparatus for determining a malicious access. By using the methods and apparatus provided by the invention, the accuracy in determining the malicious access can be improved, access of the IP address of the malicious access is restricted, an over high server load is prevented, and at the same time, quite good application experience of users can be guaranteed.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to a judgment method, interception method and device for malicious access. Background technique [0002] It is a very common problem that network applications are accessed by a large number of malicious programs; a large number of accesses by malicious programs in a short period of time may cause a sharp increase in server load or even stop responding; access to cold data by web crawlers will also bring pressure to the database server. Come on for extra stress. [0003] At present, the common practice in judging whether an IP address belongs to malicious access is to count the total number of visits of the IP address in the past period of time and compare it with a threshold. When the threshold is exceeded, the IP address is considered It belongs to malicious access, and corresponding restrictive measures are taken to limit the access of this IP address. [0004] However...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/1441
Inventor 庄上林魏中华岳帅杰解保功李叠
Owner NETEASE (HANGZHOU) NETWORK CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products