Supercharge Your Innovation With Domain-Expert AI Agents!

Method and device for computing malice index

A malicious index and computing unit technology, applied in the computer field, can solve the problems of inability to accurately distinguish the gray list IP malicious index and the number of attacks

Active Publication Date: 2016-08-17
HANGZHOU LANGHE TECH
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The IP in the existing gray list IP has only one level, and the malicious index of each IP in the gray list cannot be accurately distinguished. Among them, the malicious index can refer to the degree of maliciousness of the IP in the gray list IP, and the larger the value, the higher the IP level. The more previous attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for computing malice index
  • Method and device for computing malice index
  • Method and device for computing malice index

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0103] The principle and spirit of the present invention will be described below with reference to several exemplary embodiments. It should be understood that these embodiments are given only to enable those skilled in the art to better understand and implement the present invention, rather than to limit the scope of the present invention in any way. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.

[0104] Those skilled in the art know that the embodiments of the present invention can be implemented as a system, device, device, method or computer program product. Therefore, the present disclosure may be embodied in the form of complete hardware, complete software (including firmware, resident software, microcode, etc.), or a combination of hardware and software.

[0105] According to an embodiment of the present invention, a method and device for calcul...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention provide a method and a device for computing a malice index. The method comprises the steps of determining an Internet protocol (IP) address corresponding to attack behavior when detecting the attack behavior; obtaining the recorded malice index corresponding to the IP address according to the IP address; and computing and updating the malice index corresponding to the IP address based on the recorded malice index. According to the method, the malice index is only iteratively computed and updated according to the recorded malice index and the current attack condition, such as the attack condition in the period or the short time, so that the storage of a large amount of logs is not needed, and thus the occupation of a storage space is reduced, and meanwhile, one or more attack behavior within a predetermined time is recorded as one attack behavior, so that a condition that each malice index is close to 1 can be avoided, and the accuracy for distinguishing the malice index of each IP is improved.

Description

technical field [0001] Embodiments of the present invention relate to the field of computer technology, and more specifically, embodiments of the present invention relate to a method and device for calculating a malicious index. Background technique [0002] This section is intended to provide a background or context for implementations of the invention that are recited in the claims. The descriptions herein are not admitted to be prior art by inclusion in this section. [0003] In the existing DDoS (Distributed Denial of Service, Distributed Denial of Service) defense system, there are blacklist IP (Internet Protocol, Internet Protocol), whitelist IP and gray list IP, wherein: blacklist IP is in DDoS defense system It can refer to malicious IPs that have been manually confirmed, and the access behavior of these IPs will be directly discarded; whitelist IPs in the DDoS defense system can refer to manually confirmed benign IPs, and the access behavior of these IPs will be di...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 沈明星
Owner HANGZHOU LANGHE TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More