Early warning method and device of network attack

A network attack and network management technology, which is applied in the field of network attack early warning methods and devices, and can solve problems such as inability to operate effective prevention measures and inability to sense

Inactive Publication Date: 2017-05-10
BEIJING SENSESHIELD TECH
View PDF1 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention provides a method for early warning of network attacks, the main purpose of which is to solve the problem of being unable to perceive when s

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Early warning method and device of network attack
  • Early warning method and device of network attack
  • Early warning method and device of network attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0025] Embodiments of the present invention provide a method for early warning of network attacks, such as figure 1 shown, including:

[0026] 101. When remotely logging in to a terminal operating system through SSH, detect whether there is a log of login failure in the terminal operating system login log.

[0027] What needs to be explained here is that when SSH remotely logs in to the terminal operating system, the logs of the l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an early warning method and device of a network attack, relates to the technical field of network safety and mainly aims at solving the problems that an operating system when suffering from a malicious SSH brute force attack cannot percept the attack and efficient controlling measures cannot be taken in time and efficiently for the operating system which suffers from the SSH brute force attack. The main technical scheme comprises the steps of detecting whether a log about login failure exists in a login log of a terminal operating system when remotely logging in the terminal operating system through a secure shell protocol (SSH); if the log about the login failure exists, analyzing the log about the login failure to determine whether an SSH brute force attack exists; if the SSH brute force attack exists, sending information indicating the existence of the SSH brute force attack to a network manager so as to enable the network manager to prevent the SSH brute force attack conveniently. The early warning method and device of the network attack are mainly used in an SSH brute force attack early warning process.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network attack early warning method and device. Background technique [0002] Secure Shell (SSH), developed by the Network Working Group of the Internet Engineering Task Force (IETF); SSH is a security protocol based on the application layer and the transport layer. SSH is currently the most reliable protocol designed to provide security for remote login sessions and other network services. Using the SSH protocol can effectively prevent information leakage in the remote management process. [0003] However, Linux servers currently exposed to the Internet are subjected to malicious SSH brute force attacks to varying degrees every day, ranging from dozens of times to tens of thousands of times. Since the initially installed linux server does not have any notification and early warning service when it is subjected to malicious SSH violent attacks, for general system adm...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L29/06H04L29/08
CPCH04L41/069H04L63/1425H04L63/1466H04L67/08
Inventor 孙吉平贾彦成
Owner BEIJING SENSESHIELD TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products