Login behavior detection method and device, storage equipment and electronic equipment

A technology of behavior and detection results, applied in secure communication devices, electrical components, digital transmission systems, etc., can solve problems such as poor versatility, and achieve the effect of reliable attack data and secure login requirements.

Active Publication Date: 2022-06-17
北京微步在线科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although this method can protect the user's login security, this method can only perform security detection on a specific server side, and cannot detect the login behavior of various types of network assets on the side of network assets (that is, network devices) , poor versatility

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Login behavior detection method and device, storage equipment and electronic equipment
  • Login behavior detection method and device, storage equipment and electronic equipment
  • Login behavior detection method and device, storage equipment and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The technical solutions in some embodiments of the present application will be described below with reference to the accompanying drawings in some embodiments of the present application.

[0043] It should be noted that like numerals and letters refer to like items in the following figures, so once an item is defined in one figure, it does not require further definition and explanation in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", etc. are only used to distinguish the description, and cannot be understood as indicating or implying relative importance.

[0044] In the related art, the data packet detection technology based on network traffic is a very critical link in the detection of security threats. The current Network Intrusion Detection System (NIDS) and Network Detection and Response (NDR) systems first collect network traffic data, and then use NIDS or NDR to analyze the network traffic data. Threat ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide a login behavior detection method and apparatus, a storage device and an electronic device. The method comprises the steps of at least obtaining target login data generated when any client logs in any server; by analyzing the target login data, login behavior characteristics of the any client are obtained, and the login behavior characteristics are at least used for representing the relation between all user names and all login passwords in the multiple login processes; a login behavior detection result is determined according to the login behavior characteristics, and the login behavior detection result is used for representing that any client has a blasting attack behavior, a spraying attack behavior, a library collision attack behavior or a weak password login risk behavior. According to the method provided by the embodiment of the invention, the security detection of the login behavior can be realized, and the universality is relatively high.

Description

technical field [0001] The present application relates to the technical field of login behavior detection, and in particular, to a method, device, storage device, and electronic device for login behavior detection. Background technique [0002] With the development of information technology, network equipment has become an essential tool for daily office, communication and collaboration. Therefore, in the process of transmitting information from network equipment to the server, how to ensure the security of user information becomes more and more important. [0003] At present, in order to ensure the safe login of user information, the traffic data packets collected by network devices are usually sent to the corresponding security detection products (for example, network intrusion detection systems), so as to analyze and detect whether the server is at risk of being attacked. Although this method can protect the user's login security, this method can only perform security det...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L9/32
CPCH04L63/1416H04L63/083H04L9/3226
Inventor 王鑫赵林林童兆丰薛锋
Owner 北京微步在线科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products