Method, system, device and storage medium for brute force attack detection

An attack detection and brute force technology, applied in the field of network security, can solve the problem of not considering the network status, unable to detect whether the brute force attack is successful, etc., to achieve the effect of solving the judgment problem

Active Publication Date: 2021-06-18
北京中睿天下信息技术有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the embodiment of the present invention is to provide a brute force attack detection method, system, device and storage medium to solve the problem that the prior art cannot detect the brute force due to the fact that the detection does not consider the network status and the change of the attacker's behavior after the attack is successful. Crack the question of whether the attack was successful

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system, device and storage medium for brute force attack detection
  • Method, system, device and storage medium for brute force attack detection
  • Method, system, device and storage medium for brute force attack detection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0031] Brute force cracking attack means that the attacker enumerates all possible username / password combinations by guessing or dictionary, sends them as login credentials to the server login verification system, and tries to guess one by one to find usable username / password pairs.

[0032]According to the differences in the transmission modes supported by different connection protocols, user login can be roughly divided into plaintext login and ciphertext login. It is relatively easy to detect and judge the success of a brute-force cracking attack under the condition of plaintext login. The success of the attack can be confirmed by checking the key fields of the server response packet. The ciphertext login system uses an encryption protocol to ensure the privacy of transmitted data, which increases security for users and increases difficulty for detection. Since the client and the server use the negotiated public / private key pair to encrypt the communication data between the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention discloses a brute force attack detection method, system, device, and storage medium, which relate to the field of network security technology. The embodiment of the present invention establishes a multi-stage brute force attack behavior model based on a behavior analysis method, and the model is complete. Describes the whole process of brute force attack, clarifies the characteristics and detection elements of different stages of attack, and provides a basis for confirming the attack result by summarizing the different behavior elements of attack success and attack failure, and solves the problem of judging the result of brute force attack .

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method, system, device and storage medium for brute force attack detection. Background technique [0002] Existing detection and analysis methods for brute force attacks are limited to detecting whether an event occurs, and none of the existing solutions can give results as to whether the brute force attack is successful. In particular, the brute force cracking attacks under the encryption protocol cannot be judged or analyzed by conventional detection methods. At present, there are mainly the following two types of detection methods and technical means: one is to monitor network traffic and set a dangerous threshold. When a large number of suspicious data packets exceed the threshold, an attack is considered to have occurred. The second is to perform feature matching. When it is detected that the content of the data packet contains known threat features, it is determ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 刘庆林魏海宇刘海洋吴小勇白应东熊文砚谢辉
Owner 北京中睿天下信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products