Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network attack defense method, server and computer readable storage medium

A network attack and server technology, applied in the field of network security, can solve the problems of unsustainable application of attack features, difficult setting, easy forgery, etc., and achieve the effect of improving identification and protection efficiency

Pending Publication Date: 2021-03-02
CHINANETCENT TECH
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the way of access control to prevent crawler attacks is usually based on conventional known information such as IP (Internet Protocol, Internet Protocol), User-Agent (User Agent), Cookie (data stored on the user's local terminal), etc. Enterprise security policies are set based on characteristics, and such characteristics are easy to forge, so enterprise security policies can be easily bypassed; client access frequency limitation is used to prevent crawler attacks, although it can be done to a certain extent Mitigate the impact of crawler attacks on enterprise business, but with the continuous update and iteration of network hacking technology and tools, the behavior of crawlers is becoming more and more anthropomorphic, so it is difficult to set an appropriate access frequency limit threshold to balance normal users Access and crawler attacks, such as in a multi-user single exit or NAT (Network Address Translation, Network Address Translation) environment, the user group shares the same exit IP, if the threshold is set unreasonably, it may cause serious false positives or false positives. However, based on access log analysis and identification to prevent crawler attacks, there will be a great dependence on the delay of log collection and analysis. Attackers can use proxy IP, second dial IP and other hacking tools to switch identity characteristics to carry out distributed attacks or Ultra-low frequency attacks, resulting in the inability to continuously apply the attack signatures based on log analysis output, thereby bypassing enterprise security policies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack defense method, server and computer readable storage medium
  • Network attack defense method, server and computer readable storage medium
  • Network attack defense method, server and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, those skilled in the art can understand that in each embodiment of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following embodiments, the technical solutions claimed in this application can also be realized. The division of the following embodiments is for the convenience of description, and should not constitute any limitation to the specific implementation of the present invention, and the various embodiments can be combined and referred to each other on the premise of no contradiction.

[0037] The first embodiment of the present invention relates to a metho...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network attack defense method, a server and a computer readable storage medium. According to the invention, feature information corresponding to a preset analysis factor is extracted from a service request initiated by a client based on the preset analysis factor in a pre-constructed behavior analysis statistical table, and the index data corresponding to the preset analysis factor is updated according to the extracted feature information, namely, the access behavior of the client to the website is mapped in the behavior analysis statistical table, so that a pluralityof target preset analysis factors meeting an attack judgment rule can be selected from the behavior analysis statistical table according to a preset attack judgment rule before the service request becomes a log; and whether the service request is an attack request or not is judged according to the attack judgment rule and the index data corresponding to the target preset analysis factor, so thatthe attack request is directly blocked, whether the service request is an attack behavior or not can be identified in advance based on the attack request, and the crawler attack identification, namelythe protection efficiency is greatly improved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of network security, and in particular to a method for defending against network attacks, a server, and a computer-readable storage medium. Background technique [0002] A crawler is a program that automatically obtains web content. It is usually divided into legal crawlers based on its legality, such as search engine crawlers that are purely used to collect data for searchers to consult; and illegal crawlers, such as illegally collecting data. Even malicious crawlers that launch DDoS attacks (Distributed denial of service attack, distributed denial of service attack). [0003] With the development of the Internet, the number of malicious crawlers on the Internet is increasing day by day. These malicious crawlers will forge user information, simulate user behavior, bypass enterprise security policies, and continuously access servers to obtain information. This not only seriously sl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/56G06F21/62G06F21/60
CPCG06F21/577G06F21/566G06F21/62G06F21/604
Inventor 陈志勇王凤杰蔡舒晗
Owner CHINANETCENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products