Supercharge Your Innovation With Domain-Expert AI Agents!

IP address analysis method, device and storage medium for network attack

A network attack and IP address technology, applied in the Internet field, can solve the problems of low computing speed, large computing cost, and large amount of computing, and achieve the effect of reducing computing time, reducing computing time, and reducing the number of clustered IPs.

Active Publication Date: 2022-04-05
中国移动通信集团陕西有限公司 +1
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This clustering method has a particularly large amount of calculation, high calculation cost, and low calculation speed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IP address analysis method, device and storage medium for network attack
  • IP address analysis method, device and storage medium for network attack
  • IP address analysis method, device and storage medium for network attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to cluster IPs more effectively and prepare for preventing network attacks, the embodiments of the present application provide an IP address analysis method, device and storage medium for network attacks. In order to better understand the solutions provided by the embodiments of this application, some nouns in the embodiments of this application are explained below:

[0028] Clustering method with constraints: also known as conditional system clustering method, this method is based on the idea of ​​system clustering, in the clustering process, clustering is carried out according to the conditions of clustering between classes, and those who do not meet the conditions are not allowed to gather together, specifically, Those who do not meet the criteria will not be placed in either category.

[0029] Next, the principle of the scheme provided by the embodiment of the present application is described:

[0030] DDos attackers will use hundreds of thousands of agent...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application provides an IP address analysis method, device and storage medium for network attacks, which relate to the technical field of the Internet and are used for effective clustering of IP addresses. In this method, multiple data packets are collected; the source IP and destination IP of each data packet are obtained; for each IP, the IP is matched with the IP in the pre-stored network attack case; if the same IP is matched , determine the IP as a known IP; if the same IP is not matched, determine the IP as an unknown IP. Among the known IPs, k known IPs are selected as clustering centers; according to the clustering centers, cluster analysis is performed on unknown IPs with constraints to obtain k classes; the IPs contained in the k classes are determined as potential Risk IP. In this way, the collected IPs are divided into known IPs and unknown IPs, and cluster analysis with constraints is performed on unknown IPs instead of clustering all IPs, which reduces the number of IPs that need to be clustered.

Description

technical field [0001] The present application relates to the technical field of the Internet, in particular to an IP address analysis method, device and storage medium for network attacks. Background technique [0002] DDos (Distributed Denial of Service) attackers first obtain as many attack agents as possible and implant attack programs through the following four steps: (1) Scan a large number of hosts to find hosts that can be invaded; (2) The intrusion has security holes (3) In the intruded host, implant specific programs or attack programs according to the purpose of the intruded host; (4) Use the intruded host to continue scanning and intrusion, and implant in the intruded host attack program. After the attacker controls enough attack agents, he establishes a figure 1 The DDos attack network shown in the figure; then, at an appropriate time, the attack command is issued through the attack console; the attack console issues the parameters required for the operation o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40G06K9/62
CPCH04L63/1416H04L63/1458H04L2463/146G06F18/23213
Inventor 张瑜康慧秦惠友为王创
Owner 中国移动通信集团陕西有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More