Supercharge Your Innovation With Domain-Expert AI Agents!

Method and device for preventing malicious attacks

A malicious attack and rule-based technology, applied in the field of financial technology, can solve problems affecting system security, singleness, etc., and achieve the effect of reducing network load and improving security

Active Publication Date: 2019-09-20
WEBANK (CHINA)
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Since the current judgment rule corresponds to a single prevention strategy, when a malicious user tries many times, it is easy to crack the prevention strategy, thereby bypassing the prevention strategy and further affecting the security of the system. Embodiments of the present invention provide a method for preventing malicious attacks Method and device

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing malicious attacks
  • Method and device for preventing malicious attacks
  • Method and device for preventing malicious attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] In order to make the object, technical solution and beneficial effects of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0053] For the convenience of understanding, the terms involved in the embodiments of the present invention are explained below.

[0054] Conditional probability: refers to the probability of event A occurring under the condition that another event B has already occurred. Conditional probability is expressed as: P(A|B), read as "probability of A given B".

[0055] Uniform distribution: The random variable X has n different values, all of which have the same probability.

[0056] The method for preventing malicious attacks in the embodiment of the present invention can be applied to suc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and device for preventing malicious attacks and relates to financial technology field, the method comprises the following steps of receiving a first request message sent by a user side, and when the first request message is matched with the identification rule in the identification rule set, determining the first request message as a suspicious message, and determining a target prevention strategy from the prevention strategies corresponding to the matched identification rule, the prevention strategy corresponding to the identification rule being updated according to the historical matching times of the identification rule; and processing the first request message by adopting a target prevention strategy, and sending a processing result to the user side. Due to the fact that the prevention strategy corresponding to each identification rule is not single and can be updated according to the number of historical matching times, when a malicious user attacks, it is difficult to bypass the prevention strategy through multiple attempts, and therefore safety is improved. In addition, when a malicious user finds that the prevention strategy is random, the number of times of malicious attempts can be reduced, thereby reducing the network load.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of financial technology, and in particular to a method and device for preventing malicious attacks. Background technique [0002] With the development of computer technology, more and more technologies are applied in the financial field, and the traditional financial industry is gradually transforming into Fintech. However, due to the security and real-time requirements of the financial industry, higher requirements are placed on technology. requirements. At present, the malicious attacks on the financial system are mainly attacked in a point-to-point way, that is, the judgment rules and corresponding prevention strategies are set in advance, and when the user's behavior data hits the judgment rules, the corresponding prevention strategies are used for processing. Since the determination rule in this method corresponds to a single prevention strategy, it is easy for a malicious use...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/20H04L63/1441
Inventor 郭旭阳
Owner WEBANK (CHINA)
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More