Unlock instant, AI-driven research and patent intelligence for your innovation.

A credential stuffing behavior detection method and system

A detection method and detection system technology, applied in the field of network security, can solve the problems of time-consuming and laborious operation process, and difficulty in real-time detection of credential stuffing attacks.

Active Publication Date: 2021-07-02
亚信科技(成都)有限公司
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the credential stuffing attack behavior can be better identified by setting the threshold, the threshold is an empirical value, which needs to be adjusted continuously according to the specific behavior of the credential stuffing, and the specific operation process is time-consuming and laborious. Behavior is difficult to achieve real-time detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A credential stuffing behavior detection method and system
  • A credential stuffing behavior detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0023] User data leakage has always been a focus in the Internet world today. Credential stuffing attacks and the threats they bring occur frequently. Service providers and hackers have been engaged in a protracted offensive and defensive battle on the stage of user data. If credential stuffing occurs and relevant user information is successfully obtained, it will cause a very serious leakage of user privacy information. Most of the existing technical solution...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a credential stuffing behavior detection method and system, which relate to the field of network security technology, and can obtain data that is more conducive to credential stuffing behavior detection model learning by detecting abnormal behaviors of historical login data, thereby improving credible stuffing behavior detection. Accuracy and real-time performance of behavior detection models. The method includes: acquiring historical login data within a first predetermined period of time; performing historical abnormal behavior data detection on the historical login data according to a first predetermined algorithm to generate historical login behavior data clusters; the historical login behavior data clusters include historical Login behavior and historical login feature data clusters; learning the historical login behavior data clusters according to a second predetermined algorithm to generate a credential stuffing behavior detection model; inputting the login feature data clusters within the second predetermined time period into the credential stuffing behavior Detect the model and obtain the credential stuffing behavior detection results. The embodiment of the present invention is applied to a network system.

Description

technical field [0001] Embodiments of the present invention relate to the technical field of network security, in particular to a credential stuffing behavior detection method and system. Background technique [0002] Credential stuffing attack means that hackers collect leaked user and password information on the Internet, generate corresponding dictionary tables, and try to log in to other websites in batches to obtain a series of users who can log in. If a user uses the same user account and password on different websites, once the attacker obtains the user account and password and can log in on any other website, the consequences will be disastrous. User data leakage has always been a focus in the Internet world today. Credential stuffing attacks and the threats they bring occur frequently. Service providers and hackers have been engaged in a protracted offensive and defensive battle on the stage of user data. If credential stuffing occurs and relevant user information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/142H04L41/145H04L63/0815H04L63/1425
Inventor 陈磊高福海李春江
Owner 亚信科技(成都)有限公司