Brute force attack prevention method, device and system

A technology of brute force and login information, applied in the computer field, can solve the problems of inability to brute force the hosts in the cluster to crack each other's defenses, low defense efficiency, and inability to defend against malicious attackers

Active Publication Date: 2016-11-23
ALIBABA GRP HLDG LTD
View PDF7 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide a method, device, and system for preventing brute-force cracking, which are used to solve the problem in the prior art that the defense efficiency of the mechanism for preventing brute-fo

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Brute force attack prevention method, device and system
  • Brute force attack prevention method, device and system
  • Brute force attack prevention method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The embodiment of the present invention provides a method, device and system for preventing brute force cracking. The system is an anti-brute force cracking cloud system based on the Linux system login verification module (Pam). By connecting all hosts in the cluster to a unified server , record the login events of all hosts to the database uniformly, and make statistics and analysis of all user login events in the database. When a certain host reports a certain login information to the server, the server analyzes the login information and matches the rules , when it is determined that a brute force cracking behavior occurs based on the login information, an interception command for the corresponding login user is issued to the host, instructing the host to intercept the login of the corresponding user, and when the login user continues to attack other hosts, the server When receiving the login information of the login user reported by other hosts, there is no need to an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a brute force attack prevention method, device and system. The method, the device and the system are used for improving the brute force attack prevention efficiency of cluster hosts. The method comprises the steps that a server carries out analysis and rule matching on each piece of login information each time after the login information reported by one host in a cluster is received; indicating interception of a login user corresponding to the host reporting any one piece of login information when it is judged that brute force attack behaviors are generated based on any one piece of login information; and directly indicating interception of the login user corresponding to any one host when the login information which is reported by any one host in the cluster and is similar to the login information is further received. In this way, the brute force attack prevention efficiency of the cluster hosts is improved, the hosts in the whole cluster can defense malicious attackers timely, the mutual brute force attacks of the hosts in the cluster are effectively prevented, the realization cost is low, and the realization is easy.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method, device and system for preventing violent cracking. Background technique [0002] The brute-force cracking prevention system of the traditional Linux Secure Shell (SSH) login authentication system implements single-point defense by configuring the local Linux login authentication module (Pam), that is, defends against a single host. When the brute force cracking behavior that meets the number of times setting occurs, the attacker's IP and account will be added to the blacklist to prevent the attacker from continuing to try. For example, by configuring certain rules and setting a certain number of logins within a certain time threshold, the attacker's IP and account will be added to the blacklist. [0003] However, in a large cluster environment, this defense can only defend against a single host in time, while other hosts are still exposed to the attacker, and the att...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/0876H04L63/1466
Inventor 李普金
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products