Method, apparatus, device and system for recognizing attack source information

An attack source and information identification technology, applied in transmission systems, electrical components, etc., can solve problems such as attacks, and achieve the effect of improving the ability to prevent attacks

Inactive Publication Date: 2018-05-15
SANGFOR TECH INC
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Existing solutions intercept brute force cracking by identifying the source of the attack through the firewall, but this method is limited to the local machine, and other servers will continue to be attacked by brute force cracking because they do not recognize the source of the attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, apparatus, device and system for recognizing attack source information
  • Method, apparatus, device and system for recognizing attack source information
  • Method, apparatus, device and system for recognizing attack source information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0043] The embodiment of the invention discloses a method, device, device, system and computer-readable storage medium for identifying attack source information, so as to realize the identification of attack sources by all servers and improve the attack defense capabilities of all servers.

[0044] see figure 1 , a method for identifying attack source information provided by an embodiment of the present invention includes:

[0045] S101. Receive blacklist informat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for recognizing attack source information, and the method comprises the following steps: receiving blacklist information uploaded by a target server, wherein the blacklist information is attack source information recognized by the target server; issuing the blacklist information to all the servers under a sensing cloud platform, and thereby enabling all the serversto recognize the attack source information through the blacklist information. Obviously, in the scheme, after the target server recognizes the attack source information and generates the blacklist information, the blacklist information is uploaded to the sensing cloud platform, the sensing cloud platform issues the blacklist information to all the servers under the platform, thus, the other servers are enabled to improve capability of defensing attacks, and a complete ecological chain is formed; and the invention also discloses an apparatus, a device and a system for recognizing attack sourceinformation and a computer readable storage medium, which also can realize the effects above.

Description

technical field [0001] The present invention relates to the technical field of brute force cracking intrusion detection, and more specifically, to a method, device, equipment, system and computer-readable storage medium for identifying attack source information. Background technique [0002] Brute force cracking refers to using the exhaustive method to verify all possible situations one by one within a certain range on a service until all situations are verified. Existing solutions intercept brute force cracking by identifying the source of the attack through the firewall, but this method is limited to the local machine, and other servers will continue to be attacked by brute force cracking because they do not recognize the source of the attack. [0003] Therefore, how to identify the attack source, so as to improve the attack defense capability of all servers, is a problem to be solved by those skilled in the art. Contents of the invention [0004] The object of the pres...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/1425H04L63/20
Inventor 麦贤亮邹荣新
Owner SANGFOR TECH INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products