Unlock instant, AI-driven research and patent intelligence for your innovation.

Brute force cracking detection method, system and device and medium

A detection method and brute force technology, applied in the field of financial technology, which can solve problems such as web/mobile applications that have not been properly certified, security operators spend a lot of time, and brute force attack behavior alarms cannot be dealt with in a timely manner.

Pending Publication Date: 2021-04-20
WEBANK (CHINA)
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, it is mainly determined whether there is brute force cracking behavior by detecting whether the number of failed logins reaches the threshold. If the number of failed logins reaches the threshold, an alarm will be issued so that security operators can handle the alarm. This method only uses the number of failed logins to issue an alarm. Too one-sided, many normal operations may also cause the number of login failures to reach the threshold. For example, the same IP address uses the same password to log in to the same account repeatedly. This situation may be just a Web / It is only a mobile application. At this time, the system will also issue false alarms, causing security operators to spend a lot of time on alarm processing that is not actually a brute force cracking attack behavior, so that the real brute force cracking attack behavior alarm cannot be processed in a timely manner.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Brute force cracking detection method, system and device and medium
  • Brute force cracking detection method, system and device and medium
  • Brute force cracking detection method, system and device and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046]It should be understood that the specific embodiments described herein are merely intended to illustrate the invention and are not intended to limit the invention.

[0047]Such asfigure 1 Distancefigure 1 The structural diagram of the violent crack detection device of the hardware operating environment according to the embodiment of the present invention.

[0048]The violent cracking device of the embodiment of the present invention may be a PC or a server device, which operates on the virtual machine.

[0049]Such asfigure 1 As shown, the violent crack detection apparatus can include: processor 1001, such as a CPU, network interface 1004, user interface 1003, a memory 1005, and a communication bus 1002. The communication bus 1002 is used to implement connection communication between these components. User interface 1003 can include a display screen, an input unit such as a keyboard, optionally user interface 1003, can also include a standard wired interface, a wireless interface. Netw...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of financial science and technology, and discloses a brute force cracking detection method, system and device, and a computer storage medium, and the method comprises the steps: obtaining a suspicious source IP address of which the login failure frequency reaches a preset frequency threshold value in a preset duration; obtaining dimension features of the suspicious source IP address, wherein the number of the dimension features is at least two; and determining whether the login behavior of the suspicious source IP address is a brute force cracking behavior or not according to the dimension characteristics of the suspicious source IP address. Compared with a scheme in the prior art that whether brute force cracking behaviors exist in the IP is determined only according to whether the login failure frequency reaches the threshold value or not, after the suspicious source IP address is determined according to whether the login failure frequency reaches the threshold value or not, comprehensive analysis is performed according to the dimension characteristics of the suspicious source IP address, and then whether the login behavior of the suspicious source IP address is a brute force cracking behavior is determined, so that the one-sidedness and limitation of single-dimension judgment can be avoided, and the accuracy of brute force cracking detection judgment is improved.

Description

Technical field[0001]The present invention relates to the field of financial technology, in particular to violent cracking detection methods, systems, equipment, and computer storage media.Background technique[0002]With the development of computer technology, more and more technologies (large data, distributed, artificial intelligence, etc.) are applied to the financial field, and the traditional financial industry is changing to Fintech, but due to the safety of the financial industry. The versatility requirement, also proposed higher requirements for violent crack detection technology.[0003]Violent crack refers to an attacker to combine various possible user verification information (such as login account names, passwords, etc.) to try various possibilities to crack the user account. An attacker often uses an automated script or a violent crack tool to attack. Since the attacker will use different usernames and passwords frequent login attempts, there will be many entries that hav...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06G06F21/55
Inventor 邵樊
Owner WEBANK (CHINA)