Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for identifying network access source based on network address

A network address and network access technology, which is applied in the field of identifying network access sources based on network addresses, can solve problems such as low defense efficiency, inability to carry out effective defense, and inability to identify access source types, etc., to achieve the effect of improving defense efficiency

Active Publication Date: 2021-10-08
ALIBABA GRP HLDG LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the current identification of access source types relying on malicious IP databases is a passive defense method. If an IP has never participated in malicious network attacks and is not stored in the database, the access source type cannot be identified, nor can it be stored in the database. effective defense
Therefore, the current method for identifying access sources has the problem of low defense efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying network access source based on network address
  • Method and device for identifying network access source based on network address
  • Method and device for identifying network access source based on network address

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0076] refer to figure 1 , which shows a flow chart of the steps of Embodiment 1 of a method for identifying a network access source based on a network address of the present application, which may specifically include the following steps:

[0077] Step 101, look up at least one type of network attribute information of the network address.

[0078] It should be noted that the network address can be an IP address, and the IP address is a method of encoding the host on the Internet. Through this encoding method, the IP address becomes the unique identifier of the device after it is connected to the Internet, that is, the device with a specific IP address can guarantee It is unique in the Internet so that ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

An embodiment of the present application provides a method for identifying a network access source based on a network address. The method includes: searching for at least one type of network attribute information of the network address; and identifying the source of this network access according to the at least one type of network attribute information of the network address. According to the embodiment of the present application, the real network access source can be identified, so that effective defense can be performed, and the defense efficiency against malicious network attacks is improved.

Description

technical field [0001] The present application relates to the technical field of the Internet, in particular to a method for identifying a source of network access based on a network address and a device for identifying a source of network access based on a network address. Background technique [0002] In the face of malicious network attacks, it is necessary to judge whether it is a manual operation based on the network address from which the attack was initiated, and deploy corresponding protective measures. For example, in the case of a DDOS attack, it is necessary to identify whether the type of access source is manual operation or program automatic operation according to the IP address (Internet Protocol Address) that initiates the connection request, and the firewall makes a permission based on the identification result of the type of access source or reject connections, thereby mitigating the threat of such cyber attacks. [0003] At present, the identification of t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/10H04L63/1466H04L61/4552H04L61/4511
Inventor 张旭俊
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products