Abnormal network access connection identifying and blocking method, system, medium and device
A network access and network connection technology, applied in the field of network connection identification and blocking, abnormal network access connection identification and blocking, can solve problems such as difficult to configure blocking strategy, long time period, inability to detect well, and achieve fine-grained The effect of applying access control
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0059] Such as figure 1 As shown, the method for identifying and blocking abnormal network access connections in this embodiment includes the following steps:
[0060] S101. Identification of abnormal network access connections.
[0061] (1) Identification of abnormal network access connections based on behavior;
[0062] Based on the source IP and destination IP real-time statistical analysis of access sessions per unit time, the source IP addresses with a high frequency range and a wide range are determined. If the number of these IP-related sessions is greater than a certain threshold, they are considered to be abnormal network access connections.
[0063] (2) Abnormal network access connection definition based on multi-dimensional policy rule matching;
[0064] Supports policy rules based on the following dimensions: source address, source port, destination address, destination port, transport layer protocol (TCP / UDP), application layer protocol (HTTP, etc.), source / destination devi...
Embodiment 2
[0085] Such as image 3 As shown, this embodiment provides an abnormal network access connection identification and blocking system. The system includes an abnormal network identification module 1 and an access connection blocking module 2. The specific functions of each module are as follows:
[0086] Abnormal network identification module 1, used to access the accessed network and identify whether it is an abnormal network access connection;
[0087] Access connection blocking module 2 is used to block network access connections by bypassing, that is, collecting real-time communication traffic of network connection communication, obtaining communication control information of both parties in communication, and constructing specific data packets to simultaneously block both parties in communication Send out the control packet of connection interruption, thereby blocking the communication connection;
[0088] The access connection blocking module 2 includes: a strategy construction ...
Embodiment 3
[0095] This embodiment provides a storage medium that stores one or more programs, and when the programs are executed by a processor, the method for identifying and blocking abnormal network access connections in the above embodiment 1 is implemented, as follows:
[0096] For the accessed network access, identify whether it is an abnormal network access connection;
[0097] The bypass method is used to block the network access connection, that is, to collect the real-time communication traffic of the network connection communication, obtain the communication control information of the communication parties, and construct a specific data packet, and at the same time send a connection interruption control packet to the communication parties, thereby blocking Disconnect the communication connection; specifically:
[0098] Establish a matching rule strategy and generate a matching rule tree;
[0099] Capture data packets and store the data packets in user space;
[0100] Extract data packe...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



