Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious scanning IP detection method, system and device, equipment and storage medium

A detection method, malicious technology, applied in the computer field

Active Publication Date: 2020-06-19
GUANGZHOU HUADUO NETWORK TECH
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if a normal user continues to upload video data and the number of occurrences of the user's IP will be large, this processing method will also judge the normal user's IP as a malicious IP

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious scanning IP detection method, system and device, equipment and storage medium
  • Malicious scanning IP detection method, system and device, equipment and storage medium
  • Malicious scanning IP detection method, system and device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0085] Optionally, as in Figure 6 As shown, in the S303 step, a possible implementation manner of obtaining the quintuple information of the traffic network packet accessing the closed port includes:

[0086] S401. According to the destination IP in each quintuple information, search for the open port information list reported by the server corresponding to each traffic network packet.

[0087] Specifically, each network area control device obtains the destination IP in each traffic network packet, and then also obtains a list of open port information reported by the server to which each traffic network packet belongs. That is, each network area control device determines the corresponding server according to the destination IP, and then obtains the list of open port information reported by the corresponding server.

[0088] S402. If the destination port in the quintuple information of the corresponding traffic network packet does not exist in the open port information list r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a malicious scanning IP detection method, system and device, equipment and a storage medium. The method comprises the following steps: receiving quintuple information of a traffic network packet accessing a closed port in each network area uploaded by each network area control device through a master control device; and acquiring different numbers of closed ports and different numbers of servers accessed by each source IP in the quintuple information, and then detecting malicious scanning IPs in each network area based on the different numbers of closed ports and the different numbers of servers. According to the method, the malicious scanning IP can be rapidly and accurately detected, and a scheme capable of accurately and rapidly detecting the malicious scanningIP is effectively provided.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a malicious scanning IP detection method, system, device, equipment and storage medium. Background technique [0002] With the expansion of the scope of computer applications and the rapid development of Internet technology, computer information technology has penetrated into all aspects of people's lives, such as online shopping, commercial trade, financial accounting, etc. However, due to the diversity of connection forms, uneven distribution of terminals, and the openness and interconnectivity of the network, the computer network is vulnerable to attacks by hackers, malware and other unruly people. [0003] Among the many malicious network attacks, Internet Protocol (IP) scanning is the most common attack method. In the Internet world, more than one million IPs are constantly scanning public network IPs every day for Find vulnerabilities and try to hack. There ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416
Inventor 廖孟军李新海何培辉谭文
Owner GUANGZHOU HUADUO NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products