CDN attack detection method and device, storage medium and electronic equipment

An attack detection and predetermined time period technology, applied in the field of data processing, can solve the problems of inability to accurately characterize abnormal access and different website access characteristics, and achieve the effect of quickly identifying dangerous IP information

Active Publication Date: 2021-02-12
PING AN TECH (SHENZHEN) CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, different IP addresses and different users have different website access characteristics, so that it is impossible to accurately characterize whether there is an abnormal access

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CDN attack detection method and device, storage medium and electronic equipment
  • CDN attack detection method and device, storage medium and electronic equipment
  • CDN attack detection method and device, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053]Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or more of the specific details being omitted, or other methods, components, devices, steps, etc. may be adopted. In other instances, well-known technical solutions...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a CDN attack detection method and device, a storage medium and electronic equipment, and belongs to the technical field of data processing, and the method comprises the steps: obtaining a to-be-processed log, carrying out the cleaning of the to-be-processed log, and obtaining the time information and access IP information of the to-be-processed log; and determining a presettime period corresponding to the to-be-processed log according to the time information of the to-be-processed log. According to the number of the logs to be processed corresponding to each predetermined time period, identifying an early warning time period from each predetermined time period; and identifying dangerous IP information with an attack risk according to the access IP information of theto-be-processed log corresponding to the early warning time period. According to the method, the IP address of the abnormal access can be quickly identified so as to quickly respond to the abnormal access.

Description

technical field [0001] The present disclosure relates to the technical field of data processing, and in particular, relates to a CDN attack detection method, a CDN attack detection device, a computer-readable storage medium, and electronic equipment. Background technique [0002] Content Delivery Network (CDN), as the infrastructure of the modern Internet, not only provides users with the ultimate network access experience, but also makes the services provided by the website more secure. However, the CDN server is often paralyzed due to attacks. In the current technical solution, the general IP attack defense method is to set the upper limit of the number of visits per unit time to avoid abnormal visits. However, different IP addresses and different users have different website access characteristics, so that it is impossible to accurately characterize whether there is an abnormal access. Therefore, how to quickly identify the IP address of the abnormal access to quickly r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F21/55
CPCH04L63/1425H04L63/1416H04L63/108G06F21/55
Inventor 张安发
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products