Warning system of database-hit attack

An alarm system and database technology, applied in the computer field, can solve problems such as the difficulty of timely detection and alarm of application servers, and achieve the effect of information security protection and reduction of subsequent losses

Active Publication Date: 2016-05-11
LINEWELL SOFTWARE
View PDF3 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Hackers collect leaked user and password information on the Internet, generate corresponding dictionary tables, and try to log in to other websites in batches to obtain a series of user names and account passwords that can be logged in. Therefore, hackers can try ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Warning system of database-hit attack
  • Warning system of database-hit attack
  • Warning system of database-hit attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] An embodiment of the present invention provides a credential stuffing attack warning system, which is used to discover the credential stuffing attack suffered by an application server in the Internet, and realize information security protection for the application server.

[0018] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0019] The terms "comprising" and "having" in the description and claims of the present invention and t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a warning system of a database-hit attack. The warning system is used for finding a database-hit attack of an application server in the internet. The warning system of the database-hit attack comprises a client, an application server, a network device and a database-hit attack analyzing device, wherein the client is connected with the network device through the internet; the network device is connected with the application server and the database-hit attack analyzing device; the network device is used for performing a mirroring process to communication data transmitted between the client and the application server so as to generate mirror data corresponding to the communication data, and sending the mirror data to the database-hit attack analyzing device; the database-hit attack analyzing device is used for acquiring the mirror data from the network device; a user access action corresponding to the communication data is acquired according to the mirror data; according to the user access action, judge whether the application server is suffering the database-hit attack or not; if so, a warning is sent in real time.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an alarm system for credential stuffing attacks. Background technique [0002] In recent years, incidents of credential stuffing attacks targeting Internet applications and stealing a large amount of user private information have emerged in an endless stream. Hackers collect leaked user and password information on the Internet, generate corresponding dictionary tables, and try to log in to other websites in batches to obtain a series of user names and account passwords that can be logged in. Therefore, hackers can try to log in by obtaining the user's account on a website Another website, this is a credential stuffing attack. According to existing network security products, it is difficult to detect and warn in time when an application server is under a credential stuffing attack. Contents of the invention [0003] The object of the present invention is to provide an alarm s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/0631H04L63/20
Inventor 周文军姚建新易宜生郭晋峰
Owner LINEWELL SOFTWARE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products