Method and device for establishing malicious IP address threat intelligence library and preventing malicious attack
An IP address and establishment method technology, applied in the field of network security, can solve problems such as high risk, poor ability to resist network attack behavior, and enterprises cannot predict malicious attack behavior, so as to reduce losses, improve the ability to resist, and reduce risks.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example
[0099] In other embodiments, the first period of time can also be determined from the angle during the day and night. Among them, during the day, it is 7: 00 ~ 22: 00 of the area where the company is located is the main business period of the enterprise. Night is 22:00 on the time zone of the corporate, 7:00, is a non-primary business period of the company. Correspondingly, the first time period is, for example, N days during day and / or at night, the predetermined condition is an attack situation in the daytime and / or nights of continuous N days, and the daily attack is more than 3,000 times.
[0100] In particular, the first time period and predetermined conditions can be adjusted according to the actual situation, and this paper is not limited.
[0101] The ban on the IP address refers to the control of the IP address of the initiating attack behavior on the network boundary router of the enterprise, making the attack behavior cannot be implemented. The release of the IP add...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap