Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for discovering malicious traffic-free servers

A discovery method and server technology, applied in transmission systems, accounting/billing services, electrical components, etc., can solve problems affecting operators' operating income, user information leakage, etc., and achieve the effect of reducing the risk of leakage

Active Publication Date: 2021-02-02
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, criminals are taking advantage of this feature to apply for data-free services from operators by forging specific types of websites. After successful applications, they sell them to users at low prices through privately built malicious "data-free" platforms, which not only affects operations The operating income of the operator, while this "free traffic"
[0004] Platforms often store user information privately, and there is a risk of user information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for discovering malicious traffic-free servers
  • Method and system for discovering malicious traffic-free servers
  • Method and system for discovering malicious traffic-free servers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0068] figure 1 For the flowchart of the discovery method of the malicious flow-free server provided by the embodiment of the present invention, please refer to figure 1 The method for discovering a malicious traffic-free server provided by an embodiment of the present invention includes the following steps:

[0069] S1, analyze the network behavior of each server in the whitelist database, and find out the suspected malicious traffic-free server.

[0070] Wherein, the so-called whitelist database refers to the list of servers that are set to avoid traffic in the operator's system. Specifically, the network behavior of each server is analyzed in an IDC (Internet Data Center, Internet Data Center) access database.

[0071] S2, extracting all source IP addresses accessing each suspected malicious traffic-free server.

[0072] Specifically, all source IP addresses of accessing each suspected malicious traffic-free server can be extracted from the access database of IDC (Intern...

Embodiment 2

[0109] Figure 4 It is a functional block diagram of the discovery system of the malicious flow-free server provided by the embodiment of the present invention. see Figure 4 The discovery system of the malicious flow-free server provided by the embodiment of the present invention includes: an analysis module 10, an extraction module 11, an acquisition module 12 and a query determination module 13. in

[0110] Analysis module 10 is used for analyzing the network behavior of each server in the white list database, finds out suspected malicious traffic-free server.

[0111] The extraction module 11 is used to extract all source IP addresses of accessing each suspected malicious traffic-free server.

[0112] The obtaining module 12 is used to obtain the intranet IP address matching each source IP address.

[0113] Inquiry determination module 13 is used to inquire about the corresponding mobile terminal number and the online record of each intranet IP address, and judges that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method for discovering a malicious traffic-free server, comprising the following steps: analyzing the network behavior of each server in a white list database to find out a suspected malicious traffic-free server; extracting all the suspected malicious traffic-free servers source IP address; obtain the intranet IP address matching each of the source IP addresses; query the mobile terminal number and Internet access records corresponding to each of the intranet IP addresses, and determine the corresponding The suspected malicious traffic-free server is a malicious traffic-free server. The invention also provides a discovery system of malicious flow-free servers. The method and system for discovering malicious traffic-free servers can not only detect malicious traffic-free servers in time, thereby preventing the malicious traffic-free servers from affecting the income of operators, but also reducing the risk of leakage of user information due to access to malicious traffic-free servers.

Description

technical field [0001] The invention belongs to the technical field of the Internet, and in particular relates to a method and system for discovering malicious traffic-free servers. Background technique [0002] With the popularity of smart phones, mobile Internet access anytime, anywhere, convenient and fast, rich in resources, safe and stable, etc., has become the most popular business at present. When the user enjoys the mobile Internet service, the operator will charge by calculating the traffic used by the user. However, under certain circumstances, the operator does not charge for the reduction or exemption policy implemented by the user to access certain types of website traffic, that is, the operator's billing system includes a whitelist database. If the destination server accessed by the user is in the whitelist , the traffic bill will not be billed. [0003] At present, criminals are taking advantage of this feature to apply for data-free services to operators by...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04W4/24
CPCH04L63/1416H04L63/1425H04L63/20H04W4/24
Inventor 杨宇张第肖吉王蓉
Owner CHINA UNITED NETWORK COMM GRP CO LTD