Attacker portrait generation method and device and electronic equipment
An attacker and portrait technology, applied in the field of network security, can solve the problem of not being able to portray the attacker's portrait
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0062] like figure 1 As shown, the embodiment of the present application provides a method for generating an attacker portrait, the method including:
[0063] S101: Obtain attacker information;
[0064] S102: Expand the attacker's information to obtain the expanded attacker's information;
[0065] S103: Generate an attacker portrait according to the attacker's information and the expanded attacker's information.
[0066] In the above implementation process, the attacker’s information is first obtained. The existing technology is to directly generate an attacker’s portrait based on the attacker’s information. However, the embodiment of the present application expands the attacker’s information to obtain the expanded attacker’s information. ; An attacker portrait generated based on the expanded attacker information and the previously obtained attacker information. Based on the above implementation manner, the generated attacker portrait is more complete than the attacker port...
Embodiment 2
[0068] see figure 2 , a method for generating a portrait of an attacker provided by the application, the method comprising:
[0069] S201: Obtain the first IP address of the attacker through instant messaging technology (Web Real-Time Communication, WebRTC);
[0070] In the above embodiments, WebRTC is an application programming interface that supports web browsers to conduct real-time voice conversations or video conversations. WebRTC is an extension to HTML5 that allows to get the current client's IP address.
[0071] S202: Obtain the attacker's second IP address through remote access technology;
[0072] The traditional method of obtaining the IP of website visitors is generally to directly obtain the remote access IP at the code level, or to load a third-party JS (JavaScript) file that obtains the IP to obtain the visitor's IP. There is a flaw in this method that if the attacker uses a proxy IP access to the website, the IP obtained by the above method is the proxy IP,...
Embodiment 3
[0100] see image 3 , the present application is an embodiment to provide an attacker portrait generation device, the device includes:
[0101] Obtain module 1, which is used to obtain the information of the attacker;
[0102] The extension module 2 is used to expand the attacker's information to obtain the expanded attacker's information;
[0103] A generating module 3, configured to generate an attacker portrait according to the attacker's information and the expanded attacker's information.
[0104] In the above implementation process, the acquisition module 1 first acquires the attacker's information. The existing technology directly generates the attacker's portrait according to the attacker's information, but in the embodiment of the present application, the extension module 2 expands the attacker's information to obtain an extended The attacker's information; the generation module 3 generates the attacker portrait according to the expanded attacker's information and t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


