Method and device for identifying access attacks

A technology of identification and sequence, applied in the field of network security, can solve problems such as maintenance problems, high cost, increase in computational complexity and system complexity, and achieve the effects of good versatility, shielding differences, and effective identification.

Active Publication Date: 2017-06-13
ADVANCED NEW TECH CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, the cost of analyzing certain access attack behaviors separately will be very high, because each access attack will have its own different characteristics, and the rules for some access attacks may not be applicable to other access attacks , and with the increase of rules, the amount of calculation and the complexity of the system will rise sharply, and subsequent maintenance will be very problematic
At the same time, some access attacks may be hidden in the access of normal users, which increases the difficulty of identifying access attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying access attacks
  • Method and device for identifying access attacks
  • Method and device for identifying access attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purposes, technical solutions and advantages of the embodiments of the present application more clearly understood, the embodiments of the present application will be described in further detail below with reference to the embodiments and the accompanying drawings. Here, the exemplary embodiments and descriptions of the embodiments of the present application are used to explain the embodiments of the present application, but are not intended to limit the embodiments of the present application.

[0027] The inventor of the present application found that access attacks are generally initiated by network robots, and the time interval of these access attacks initiated by network robots is generally periodic, that is to say, the access characteristics of network robots are usually: every adjacent The time interval between the two visits is fixed, such as Figure 4 shown. However, even if the visit of a certain source has a very obvious periodicity in ti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the application provides a method and device for identifying access attacks. The method comprises the following steps: acquiring a first time interval sequence of the adjacent access in each access from the current identification user or IP in a first preset range; implementing spectrum analysis on the first time interval sequence to obtain the weight coefficients of the fundamental frequency and each subharmonic frequency of the first time interval sequence; judging whether the ratio of the weight coefficient of the fundamental frequency of the first time interval sequence to the average value of the weight coefficients of each subharmonic frequency of the first time interval sequence is greater than the preset threshold value; and if the ratio is greater than the preset threshold value, identifying each access from the current identification user or IP in the first preset range as the access attack. According to the method and device provided by the embodiment of the application, the identification is processed based on the time interval sequence of the adjacent access in each access from the same identification user or IP, and thus the diversity of various access can be shielded, the various access can be effectively identified, and relatively good universality can be achieved.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular, to a method and apparatus for identifying an access attack. Background technique [0002] With the development of the Internet, the network traffic has become larger and larger, and it is necessary to continuously expand the network bandwidth and servers to process these visits. However, many of these massive accesses may be access attacks, which may seriously affect users and network resources. Therefore, how to accurately identify which of these massive accesses are access attacks is of great significance. [0003] In the prior art, it is very costly to analyze the behavior of some access attacks separately, because each access attack will have its own different characteristics, and the rules for some access attacks may not necessarily be applicable to other access attacks. In addition, with the increase of rules, the amount of calculation and the complex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441
Inventor 李龙飞罗兰燕鹏举
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products