Method and device for establishing malicious IP address threat intelligence library and preventing malicious attack

An IP address and establishment method technology, applied in the field of network security, can solve problems such as high risk, poor ability to resist network attack behavior, and enterprises cannot predict malicious attack behavior, so as to reduce losses, improve the ability to resist, and reduce risks.

Active Publication Date: 2021-08-06
INDUSTRIAL AND COMMERCIAL BANK OF CHINA
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004]In the existing technology, enterprises cannot predict malicious atta

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for establishing malicious IP address threat intelligence library and preventing malicious attack
  • Method and device for establishing malicious IP address threat intelligence library and preventing malicious attack
  • Method and device for establishing malicious IP address threat intelligence library and preventing malicious attack

Examples

Experimental program
Comparison scheme
Effect test

Example

[0099] In other embodiments, the first period of time can also be determined from the angle during the day and night. Among them, during the day, it is 7: 00 ~ 22: 00 of the area where the company is located is the main business period of the enterprise. Night is 22:00 on the time zone of the corporate, 7:00, is a non-primary business period of the company. Correspondingly, the first time period is, for example, N days during day and / or at night, the predetermined condition is an attack situation in the daytime and / or nights of continuous N days, and the daily attack is more than 3,000 times.

[0100] In particular, the first time period and predetermined conditions can be adjusted according to the actual situation, and this paper is not limited.

[0101] The ban on the IP address refers to the control of the IP address of the initiating attack behavior on the network boundary router of the enterprise, making the attack behavior cannot be implemented. The release of the IP add...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for establishing a malicious IP address threat intelligence library and preventing a malicious attack, and the method comprises the steps: screening out IP address information of which the page view meets a preset condition in a continuous first time period according to IP address information accessed by an enterprise business system; according to the banning/unbanning information of the IP addresses, screening out the IP addresses of which the difference between the banning moment of the same IP address and the banning moment of the next time is smaller than a preset difference; according to the attack logs of the network attack protection devices, screening out IP addresses contained in the attack logs of all the network attack protection devices in a continuous second time period; according to the access log information of the enterprise e-commerce platform and the banning/unbanning information of the IP addresses, screening out the IP addresses of which the access amount exceeds a predetermined amount in a continuous third time period and which have banning history; and establishing a malicious IP address threat intelligence library according to the screened IP addresses. According to the invention, passivity can be changed into active, the network attack resisting capability of enterprises is improved, and the risk is reduced.

Description

technical field [0001] This article relates to the field of network security, in particular to a method and device for establishing a malicious IP address threat intelligence database, and a method and device for preventing malicious attacks. Background technique [0002] At present, most enterprises can only passively wait for defense in the face of network attacks, or prevent the same malicious attacks from happening again based on past malicious attacks. [0003] In the prior art, enterprises cannot predict malicious attacks, and have problems of poor resistance to network attacks and high risks. Contents of the invention [0004] In the prior art, enterprises cannot predict malicious attacks, and have problems of poor resistance to network attacks and high risks. [0005] In order to solve the above technical problems, the first aspect of this paper provides a method for establishing a malicious IP address threat intelligence database, including: [0006] Obtain the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1433H04L63/1416H04L63/1425H04L63/1466H04L63/02H04L63/0236
Inventor 王佳音周佳铭成浩淼
Owner INDUSTRIAL AND COMMERCIAL BANK OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products