IP attack detection method and device and electronic equipment

A detection method and IP address technology, applied in the field of communications, can solve problems such as manslaughter of normal IP addresses, and achieve the effect of improving accuracy and user experience

Pending Publication Date: 2022-01-28
QINGDAO HAIER TECH +1
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In this way, there may be a situation where the normal IP address is killed by mistake

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IP attack detection method and device and electronic equipment
  • IP attack detection method and device and electronic equipment
  • IP attack detection method and device and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0035] Currently, methods for detecting IP attack addresses for websites usually need to be analyzed and processed in combination with their business scenarios and deployment environments. There are two common methods of operation. The first is to set a unique identifier for the user by analyzing the user's access behavior, and combine the preset acce...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an IP attack detection method and device and electronic equipment, and the method comprises the steps: obtaining access request information for accessing a server in a preset time period, with the access request information comprising an IP address of a visitor; counting the access request information in a preset time period, and determining whether the IP address is a suspicious IP address according to the access request information in the preset time period; if the IP address is the suspicious IP address, judging whether the IP address is in a preset white list, wherein the preset white list comprises a plurality of legal IPs; and if the IP address is not in the preset white list, determining that the IP address is an attack IP address. Through the method, the accuracy of determining the attack IP address can be improved, the legal IP address is prevented from being killed by mistake, and the user experience is improved.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a detection method, device and electronic equipment for an IP attack. Background technique [0002] With the development of science and technology, the network has affected all aspects of people's lives, and it is particularly important to improve network security. [0003] Usually, the attacker continuously sends a huge number of requests to the server through the virtual IP address, causing the server to be overwhelmed and the response ability to decline, which seriously affects the quality of service provided by the server to normal users. [0004] In the prior art, the IP attack address is determined by obtaining the IP address of the access server and comparing it with a preset blacklist of IP addresses. In this way, the normal IP address may be killed by mistake. Contents of the invention [0005] The present application provides an IP attack detect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1408H04L63/1441H04L63/101
Inventor 姜爽
Owner QINGDAO HAIER TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products