Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Password blasting attack detection method and device

A password, to-be-detected technology, applied in the field of anomaly detection, can solve problems such as easy sealing by mistake and degrading user experience

Pending Publication Date: 2022-04-12
CHINA UNIONPAY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 1. Regarding the scheme based on user name detection, this defense scheme is easy to be blocked by the trial and error behavior of ordinary users, which reduces the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password blasting attack detection method and device
  • Password blasting attack detection method and device
  • Password blasting attack detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purpose, technical solution and advantages of the application clearer, the application will be further described in detail below in conjunction with the accompanying drawings. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0042] For some systems currently developed, it is easy to encounter password blasting attacks, that is, it is easy for malicious elements to try to log in to these systems to carry out sabotage. In order to prevent this kind of password blasting attack, although the currently used defense schemes based on user name detection, verification code detection, and IP detection can reduce the occurrence of password blasting attacks to a certain extent, these defenses There a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a password blasting attack detection method and device, and the method comprises the steps: determining all second to-be-detected logs which fail to log according to the login state information for all obtained first to-be-detected logs; for any associated element in the associated elements, constructing a first network sub-graph of each second to-be-detected log under the associated element; for any first network sub-graph, performing community discovery processing to obtain each community of the first network sub-graph; processing each community in the first network sub-graph to obtain a second network sub-graph; for any second to-be-detected log, determining the weight of the second to-be-detected log in each second network sub-graph according to the occurrence condition of the second to-be-detected log in each second network sub-graph; and determining whether a login behavior corresponding to the second to-be-detected log is a password blasting attack or not according to the weight of the second to-be-detected log in each second network sub-graph. The scheme can be used for improving the accuracy of detecting the behavior of the password blasting attack in the system login process.

Description

technical field [0001] The embodiments of the present application relate to the field of anomaly detection, and in particular to a method and device for detecting password blasting attacks. Background technique [0002] At present, for the account password blasting attack of the company system, it is easy to become the entry point of penetration attack, and the current various security protection schemes are difficult to form effective protection and traceability. [0003] Among them, the current defense schemes for password blasting attacks are mainly as follows: [0004] 1. Detection based on username. [0005] That is, if the same user name fails to log in N times in a row, it will be judged as an attack and automatically locked. If you want to unlock it, you need to contact the administrator. [0006] 2. Based on verification code detection. [0007] That is, by setting a verification code and performing reinforcement processing on the verification code. If the set v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/40
CPCY02D30/50
Inventor 黄自力杨阳陈舟熊璐邱震尧张叶
Owner CHINA UNIONPAY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products