Hacking defending implementation method and device

An implementation method and a technology of the number of logins, applied in the field of network security, can solve the problems of reduced accuracy of account theft detection, poor network security, and inability to effectively detect account theft behavior, so as to improve security reliability, improve accuracy, and avoid defense failures. Effect

Active Publication Date: 2016-12-07
MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
View PDF7 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The embodiments of the present invention provide a method and device for implementing account theft defense, which are used to solve the problem in the prior art that the threshold value of the account theft d

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hacking defending implementation method and device
  • Hacking defending implementation method and device
  • Hacking defending implementation method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0053] The implementation method of account hacking defense provided by Embodiment 1 of the present invention, its flow is as follows figure 1 shown, including the following steps:

[0054] Step S101: Monitor the login data of each IP address, and obtain the login times and failure times of each IP address.

[0055] By monitoring the login data of each IP address, and counting the number of login times and failure times, it is possible to monitor whether the login behavior is abnormal. The reasons for the login failure may include the user does not exist, the password is wrong, and remote login, etc.

[0056] The number of failures can also be the number of exceptions, and the login exceptions can include login failures and login successes but exceptions.

[0057] Step S102: For each IP address, perform the following operations:

[0058] Step S103: According to the obtained number of logins and the number of failures, determine the probability of failure corresponding to th...

Embodiment 2

[0070] The implementation method of account hacking defense provided by Embodiment 2 of the present invention, its process is as follows image 3 shown, including the following steps:

[0071] Step S301: Obtain the login log of the system.

[0072] The login logs of the system can come from various login behaviors of the user through the terminal device, and the login logs within a certain period of time or a certain number of login logs can be obtained.

[0073] Step S302: Establish a threshold curve representing the corresponding relationship between the number of login times and the failure probability threshold according to the login log.

[0074] When establishing the threshold curve, first determine several eigenvalues, and then fit the threshold curve according to the eigenvalues. Specifically, according to the obtained login log, determine the characteristic value of establishing the threshold curve; wherein, the characteristic value includes the characteristic value...

Embodiment 3

[0085] Embodiment 3 of the present invention provides an implementation process for establishing the threshold curve of the above-mentioned method for implementing defense against hacking, and its flow is as follows Figure 4 shown, including the following steps:

[0086] Step S401: Obtain the login log of the system.

[0087] Step S402: According to the obtained login log, determine the characteristic value of establishing the threshold curve. Wherein, the eigenvalues ​​include the eigenvalues ​​of the login times and the corresponding eigenvalues ​​of the failure probability.

[0088] The characteristic value for establishing the threshold curve can be determined according to the login log, and the update can be dynamically adjusted when the login log is updated.

[0089] The process of determining the eigenvalues ​​involves:

[0090] Count the number of failed logins and logins for each IP address in the login logs obtained;

[0091] Sort according to the number of fail...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a hacking defending implementation method and device. The method comprises the following steps of: monitoring login data of various IP addresses, and obtaining the login time and the failure time on the various IP addresses; and, for each IP address, executing the following operations: determining the failure probability corresponding to the obtained login time according to the obtained login time and failure time; judging whether the determined failure probability is greater than a failure probability threshold value corresponding to the login time on a pre-established threshold value curve or not, wherein the threshold value curve is a curve, which is established according to a login log and used for representing the corresponding relationship between the login time and the failure probability threshold value; if the determined failure probability is greater than the failure probability threshold value, determining abnormal login exists in the IP address; and if not, determining that abnormal login does not exist in the IP address. Hacking behaviours can be defended in a dynamic threshold value manner; the hacking behaviours can be detected more accurately and effectively; and the network safety is improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method and device for implementing defense against account theft. Background technique [0002] With the continuous development of the Internet black industry, the databases of many companies have been leaked by hackers using various loopholes, and the account and password pairs stored in the databases of these companies are used in the black industry. For most users, using the same user name / password on different websites is the simplest and quickest behavior, but this also causes great security risks. For example, users use the same username / password on website A and website B. If website A is attacked and the user’s information is leaked, hackers can use the username / password obtained on website A to log in to website B. website. In this way, no matter how high the security of website B is, it cannot prevent the user's account from being maliciously used. This is...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1425
Inventor 何为舟
Owner MICRO DREAM TECHTRONIC NETWORK TECH CHINACO
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products