A kind of ssh path tracing method, system and medium
A path tracking and storage medium technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve problems such as inability to be handled by attackers, lack of upper-level login IP address information, and inability to locate the host IP address, etc. The effect of improving the safety defense coefficient
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
1 example 1
[0033] refer to figure 2 , the attacking host M1 logs in to the host M2 through SSH, and then logs in from the host M2 to the host M3 through SSH in this connection, generating a link A (M1->M2->M3). When the host M3 is attacked by the host M1's SSH multi-level attack, it can quickly locate the host IP address of the host M1 that initiated the attack. The process includes:
[0034] I) Splicing of multiple single connections.
[0035] When logging in to M2 from host M1 through SSH, host M2 will generate connection A1 (M1->M2), and the value of connection A1 is [S1, P1, D1], where S1 is the IP of host M1, and P1 is opened by host M1 D1 is the IP of the host M2; when logging in to the host M3 through SSH in the connection A1, the host M2 generates a connection A2 (M2->M3), and the value of the connection A2 is [S2, P2, D2], where S2 is the IP of the host M2, P2 is the port opened by the host M2, and D2 is the IP of the host M3; since the connection to A2 is connected in the co...
2 example 2
[0039] In Example 1, the host M1 has been connected to M3, and in this connection, log in to the host M4 through SSH from the host M3, generate link B (M2->M3->M4), link A and link B Splicing forms a link C (M1->M2->M3->M4). When the host M4 is attacked by the host M1's SSH multi-level attack, it can quickly locate the host IP address of the host M1 that initiated the attack. The process includes:
[0040] I) Splicing of multiple single links.
[0041] In example 1, link A (M1->M2-M3) is generated, and the value of link A is {[S1, P1, D1], [S2, P2, D2]}. When logging in from the host M3 to M4, the host M3 will generate a connection A4 (M3->M4), and the value of A4 is (S4, P4, D4), where S4 is the IP of the host M3, and P4 is the port opened by the host M3. D4 is the IP of the host M4. According to the connection A3 (M2->M3) and connection A4 (M3->M4), the same processing as Example 1 can generate link B (M2->M3->M4), and the value of link B is {[S3,P3,D3],[S4,P4,D4]}. Sinc...
3 example 3
[0045] In Example 2, the host M1 has been connected to M4, and in this connection, log in to the host M5 through SSH from the host M4 to generate link D (M3->M4->M5), link C and link D splicing to form a link F (M1->M2->M3->M4->M5). When the host M5 is attacked by the host M1's SSH multi-level attack, it can quickly locate the host IP address of the host M1 that initiated the attack. The process includes:
[0046] I) Splicing of multiple single links.
[0047] In example 2, a link C (M1->M2->M3->M4) is generated,
[0048] The value of link C is {[S1,P1,D1],[S2,P2,D2],[S4,P4,D4]}.
[0049] When logging in from the host M4 to M5, the host M4 will generate a connection A6 (M4->M5), and the value of A6 is (S6, P6, D6), where S6 is the IP of the host M4, and P6 is the port opened by the host M4. D6 is the IP of host M5. According to the connection A5 (M3->M4) and connection A6 (M4->M5), the same processing as Example 1 can generate link D (M3->M4->M5), and the value of link D i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

