Method for detection of address entropy
A technology of address and IP address, which is applied in the field of information security, and can solve problems such as wasteful processing of useless information by security managers, intuitive acquisition of abnormal behaviors, and difficult network attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0026] The following is the process of detecting the entropy distribution value of source address and target address. The flow starts from step 101 .
[0027] Step 101: Read entropy detection configuration parameter information, and set the current address entropy detection stage as the learning stage.
[0028] Step 102: Query all logs reported by the intrusion detection device in the current observation period.
[0029] Step 103: Count all logs reported by the intrusion detection device, and count the occurrence times of all source IP addresses and destination IP addresses in the logs. The source IP address and the destination IP address are mapped to integers using the hash (Hash) algorithm during statistics. Preferably, the source IP address and the destination IP address are 32-bit IPv4 addresses, and the Hash (hash) algorithm is used to map these 32-bit IPv4 addresses into 16-bit integers during statistics.
[0030] Step 104: Calculate the entropy distribution H of the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More