Method for intelligently intercepting threat IP based on cloud protection

An intelligent and protective platform technology, applied in the field of Internet security, can solve the problems of low accuracy, easy to be bypassed, difficult to update and maintain, achieve high real-time performance, improve real-time performance, and reduce rules being bypassed and mistaken. the effect of

Inactive Publication Date: 2018-06-29
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF0 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Existing interception methods based on static blacklist database and rules have several problems: 1) static blacklist database is not easy to accumulate, difficult to update and maintain, high cost and low accuracy; 2) r...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for intelligently intercepting threat IP based on cloud protection
  • Method for intelligently intercepting threat IP based on cloud protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] First of all, it should be explained that the present invention is an application of computer technology in the field of information security technology. During the implementation of the present invention, the application of multiple software function modules will be involved. The applicant believes that, after carefully reading the application documents and accurately understanding the realization principle and purpose of the present invention, combined with existing known technologies, those skilled in the art can fully implement the present invention by using their software programming skills. Everything mentioned in the application documents of the present invention belongs to this category, and the applicant will not list them one by one.

[0025] The cloud protection platform refers to a cloud computing platform that can effectively analyze, calculate and intercept network attacks and intrusions; it can clean the access traffic of hosted websites, intercept attack...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of Internet security, and aims to provide a method for intelligently intercepting a threat IP based on cloud protection. The method for intelligently intercepting athreat IP based on cloud protection comprises the steps that: after receiving a cloud protection log, a big data log analysis server performs analysis according to a preset analysis rule, and stores the analyzed field information to an hbase cluster; a machine learning cluster establishes an analytic statistics model, the analytic statistics model can identify the behavior characteristics of an IPafter training, the machine learning cluster pushes the threat IP and corresponding domain name information to a cloud protection platform engine in real time, and the cloud protection platform engine dynamically adds the threat IP and the corresponding domain name information to a blacklist after receiving and implements corresponding interruption based on the attack threat level. The IP blacklist has high real-time property, and the configuration can be dynamically added and changed according to the log analysis result to effectively reduce the problem that the rule is bypassed and falselyreported.

Description

technical field [0001] The invention relates to the field of Internet security, in particular to a method for intelligently intercepting threat IP based on cloud protection. Background technique [0002] In recent years, cyber attacks against Internet websites have emerged in an endless stream, and the attack methods are changing with each passing day, which poses great challenges to the cloud protection platform. Traditional cloud protection mostly uses static blacklist libraries and rules (static rules and custom condition rules) to match user Http requests, so as to judge whether the request is a threat or attack, and then block or allow it. [0003] Existing interception methods based on static blacklist database and rules have several problems: 1) static blacklist database is not easy to accumulate, difficult to update and maintain, high cost and low accuracy; 2) rule matching is relatively fixed, easy to be Bypass, it is difficult to update and maintain; 3) It is diff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L29/12
CPCH04L61/10H04L63/10H04L63/1416H04L63/1425H04L63/1466H04L67/02H04L61/4511
Inventor 杨国平范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products