Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Abnormal login identification method and system, storage medium and electronic equipment

An identification method and abnormal login technology, applied in the Internet field, can solve problems such as inconvenience for normal users to log in to the website, affect customers, and high consumption of manual intervention, so as to achieve accurate and effective identification and defense, and ensure account security.

Active Publication Date: 2018-05-29
SHANGHAI CTRIP COMMERCE CO LTD
View PDF4 Cites 42 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, the general defense methods against credentialing behaviors, including limiting the number of IP logins, verification code defense, etc., are all "passive" defenses, that is, waiting for the credentialing and scanning behavior to attack this website before defending, which is not effective enough , and will affect a large number of customers who use this website normally, and bring inconvenience to normal users logging in to the website
[0004] At the same time, single-dimensional defense rules are easily bypassed by attackers, which cannot achieve the purpose of defense. After being cracked, the consumption of manual intervention is relatively high.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal login identification method and system, storage medium and electronic equipment
  • Abnormal login identification method and system, storage medium and electronic equipment
  • Abnormal login identification method and system, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments.

[0031] Furthermore, the drawings are merely schematic illustrations of the invention and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus repeated descriptions thereof will be omitted. Some of the block diagrams shown in the drawings are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be impleme...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an abnormal login identification method and system, a storage medium and electronic equipment. The method includes the following steps: receiving and extracting characteristic attributes carried in a real-time login request; judging whether an account of the real-time login request tries to log in to multiple third-party websites within a preset time and fails more than a preset number of times, and if yes, identifying the login as an abnormal login; traversing a blacklist library according to the extracted characteristic attributes, and assigning a first risk value based on a traversal result; assigning a second risk value according to the matching degree between an IP address of the real-time login request and a common IP attribution of a UID of the real-time loginrequest; comparing the number of login failures and the number of preset times of each characteristic attribute within the preset time, and assigning a third risk value according to a comparison result; and performing weighted calculation on the first, second and third risk values to obtain a risk reference value of the real-time login request, and identifying the login as the abnormal login whenthe risk reference value exceeds a risk threshold. According to the scheme of the invention, by combining the external anti-scanning identification and the internal multidimensional identification, abnormal login behaviors can be intercepted to a maximum extent.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to an identification method, system, storage medium and electronic equipment for abnormal login. Background technique [0002] With the continuous development of the Internet industry, black attack incidents continue to occur. Crash library (or called account scanning) is a hacker who collects leaked user and password information on the Internet, generates corresponding dictionary tables, and tries to log in to other websites in batches. A list of users who can log in. Many users use the same account password on different websites, so hackers can try to log in to other websites such as B, C, and D by obtaining the user's account on A website, which can be understood as a credential stuffing attack. [0003] At present, the general defense methods against credentialing behaviors, including limiting the number of IP logins, verification code defense, etc., are all "passive" defe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0815H04L63/0876H04L63/101H04L63/1441
Inventor 任华炯凌云闵杰陈宇杨再三
Owner SHANGHAI CTRIP COMMERCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products