Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious scanning ip detection method, system, device, equipment and storage medium

A detection method and malicious technology, applied in the computer field, to achieve the effect of accurate and fast detection of malicious scanning IP

Active Publication Date: 2022-03-22
GUANGZHOU HUADUO NETWORK TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if a normal user continues to upload video data and the number of occurrences of the user's IP will be large, this processing method will also judge the normal user's IP as a malicious IP

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious scanning ip detection method, system, device, equipment and storage medium
  • Malicious scanning ip detection method, system, device, equipment and storage medium
  • Malicious scanning ip detection method, system, device, equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0085] Optionally, as in Figure 6 As shown, in the S303 step, a possible implementation manner of obtaining the quintuple information of the traffic network packet accessing the closed port includes:

[0086] S401. According to the destination IP in each quintuple information, search for the open port information list reported by the server corresponding to each traffic network packet.

[0087] Specifically, each network area control device obtains the destination IP in each traffic network packet, and then also obtains a list of open port information reported by the server to which each traffic network packet belongs. That is, each network area control device determines the corresponding server according to the destination IP, and then obtains the list of open port information reported by the corresponding server.

[0088] S402. If the destination port in the quintuple information of the corresponding traffic network packet does not exist in the open port information list r...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application relates to a malicious scanning IP detection method, system, device, device and storage medium. The general control device receives the quintuple information of the traffic network packets in each network area that access the closed port in each network area and uploaded by the control device of each network area, and Obtain the number of different closed ports and the number of different servers accessed by each source IP in the quintuple information, and then detect malicious scanning IPs in each network area based on the number of different closed ports and different servers. The method can quickly and accurately detect malicious scanning IPs, and effectively provides a solution that can accurately and rapidly detect malicious scanning IPs.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to a malicious scanning IP detection method, system, device, equipment and storage medium. Background technique [0002] With the expansion of the scope of computer applications and the rapid development of Internet technology, computer information technology has penetrated into all aspects of people's lives, such as online shopping, commercial trade, financial accounting, etc. However, due to the diversity of connection forms, uneven distribution of terminals, and the openness and interconnectivity of the network, the computer network is vulnerable to attacks by hackers, malware and other unruly people. [0003] Among the many malicious network attacks, Internet Protocol (IP) scanning is the most common attack method. In the Internet world, more than one million IPs are constantly scanning public network IPs every day for Find vulnerabilities and try to hack. There ar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416
Inventor 廖孟军李新海何培辉谭文
Owner GUANGZHOU HUADUO NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products