Attack information tracking and tracing method and device based on homologous analysis

A technology for information tracking and attackers, which is applied in the field of attack information tracking and traceability based on homology analysis, and can solve problems such as high technical threshold, inaccurate attack information traceability, and inability to trace network attack information

Active Publication Date: 2018-11-27
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF10 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In order to analyze network attack incidents, the usual practice is to reverse infiltrate the proxy springboard machine through technical means. After obtaining the server authority, the real IP of the proxy can be traced, and then the proxy IP address can be associated with the real IP, or according to According to the experience judgment of the analysts, which attack source IPs may be related. However, the technical threshold required for reverse osmosis is relatively high, and ordinary security workers cannot handle it. There may be errors in the experience judgment of the analysts. The attack information traceability of source analysis is inaccurate, and it is impossible to accurately trace the source of network attack information, thereby failing to guarantee network security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack information tracking and tracing method and device based on homologous analysis
  • Attack information tracking and tracing method and device based on homologous analysis
  • Attack information tracking and tracing method and device based on homologous analysis

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0049]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0050] It should be noted that like numerals and lett...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an attack information tracking and tracing method and device based on homologous analysis. The method comprises the following steps of obtaining a plurality ofattack logs expressing the attack information in a target time period; extracting a plurality of similar attacking logs with similarity from the plurality of attack logs according to the feature information of the plurality of attack logs; sequencing a plurality of similar attack logs according to the preset rule to obtain the sequencing result; judging whether the relevancy exists between the plurality of similar attack logs or not according to the sequencing result; if so, determining that a plurality of source IP addresses in the plurality of similar attack logs are from the same attacker;sending the plurality of source IP addresses to network security protection equipment so as the network security protection equipment is based on a plurality of source IP addresses to generate warning prompts. Therefore in the scheme, the homologous attack can be fast analyzed; next, the warning prompt can be generated for the homologous attack in a unified way so as to remind a user of timely protecting the attack information; the network safety is further improved.

Description

technical field [0001] The present invention relates to the field of network security, in particular to a method and device for tracking and tracing attack information based on homology analysis. Background technique [0002] With the development of Internet informatization, there are more and more cyber hacking incidents, and hacking methods are also constantly evolving. Through the analysis experience of attack traffic and logs, it is found that many network hackers will use their own real IP when simply stepping on the attack target, and before the attack, they will switch to the IP address of the proxy springboard, and then There are many attack records of proxy IP addresses in the server's WEB-related logs. [0003] In order to analyze network attack incidents, the usual practice is to reverse infiltrate the proxy springboard machine through technical means. After obtaining the server authority, the real IP of the proxy can be traced, and then the proxy IP address can ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1441H04L63/20H04L2463/146
Inventor 王世晋范渊黄进
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products