Method and device for recognizing malicious system vulnerability scanner

A vulnerability scanner and identification method technology, which is applied in transmission systems, electrical components, etc., can solve the problem that malicious system vulnerability scanners cannot be quickly and accurately identified, and achieve the effect of rapid and accurate identification and improved accuracy

Active Publication Date: 2017-01-11
杭州迪普信息技术有限公司
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In view of this, the present application provides a method and device for identifying a malicious system vulnerability scanner to solve the problem in the related art that the malicious system vulnerability scanner cannot be quickly and accurately identified

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for recognizing malicious system vulnerability scanner
  • Method and device for recognizing malicious system vulnerability scanner
  • Method and device for recognizing malicious system vulnerability scanner

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0020] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for recognizing a malicious system vulnerability scanner. The method comprises the steps of receiving an access request which is oriented towards a preset detection port, recording a source IP address of the access request as a suspicious IP address, wherein the detection port is a non-service port; counting the number of access requests which are from the suspicious IP address and oriented towards the detection port; and determining a sending party of the access request is a malicious system vulnerability scanner when the number is greater than a preset threshold. The technical scheme provided by the invention can recognize a malicious system vulnerability scanner quickly and accurately.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a method and device for identifying malicious system vulnerability scanners. Background technique [0002] With the rapid development of the Internet, network security incidents that use system vulnerabilities to attack are becoming more and more serious, and the damage and scope of the attack are also increasing. Usually, an attacker will first use a system vulnerability scanner to conduct a vulnerability scan to obtain system vulnerabilities, and then use the obtained system vulnerabilities to attack. Therefore, in order to prevent malicious vulnerability scanning, it is necessary to quickly and accurately identify malicious system vulnerability scanners. Contents of the invention [0003] In view of this, the present application provides a method and device for identifying malicious system vulnerability scanners, so as to solve the problem in the relate...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/1433H04L63/1441
Inventor 李小龙王树太
Owner 杭州迪普信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products