Abnormal equipment identification method and apparatus

A device identification and abnormal technology, applied in the field of network security, can solve the problems of server bandwidth and computing resources being full, normal users providing services, and the server can no longer provide services, to achieve the effect of avoiding network attacks

Active Publication Date: 2017-12-12
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the request reaches a certain amount, the bandwidth and computing resources of the server will be fully occupied, so that the server can no longer provide services to normal users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Abnormal equipment identification method and apparatus
  • Abnormal equipment identification method and apparatus
  • Abnormal equipment identification method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The embodiment of the present invention proposes an abnormal device identification method, which can find suspected abnormal devices according to the access data of known abnormal devices, and then can identify abnormal devices more quickly and accurately, and realize fast and accurate network attack interception .

[0045] figure 1 The flow of the method for identifying abnormal equipment described in the embodiment of the present invention is shown. Such as figure 1 As shown, the method mainly includes:

[0046] Step 101, recording the access data of the user equipment within a preset observation time.

[0047] It should be noted that, in each step of the embodiment of the present invention, each user equipment can be identified by its IP (Internet Protocol) address. For example, in this step, when recording the access data of each user equipment within the preset observation time, the access data within the preset observation time may be recorded corresponding to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an abnormal equipment identification method and apparatus. The abnormal device identification method comprises the following steps: recording access data of user equipment within a preset observation time; screening abnormal equipment according to the access data of the user equipment; listing the pages accessed by all abnormal equipment according to the screened access data of the abnormal equipment, and generating an abnormal equipment access page set; generating a feature vector of the user equipment for each user equipment according to the accessed page of each user equipment within the observation time, wherein feature values in the feature vector of the user equipment are in one-to-one correspondence with the pages in the abnormal equipment access page set; classifying the feature vectors of call user equipment via a clustering algorithm; and determining the user equipment that is classified as the same category as the abnormal equipment as suspected abnormal equipment. By adoption of the abnormal equipment identification method and apparatus, the abnormal equipment and the suspected abnormal equipment can be identified, thereby effectively avoiding the network attack from the abnormal equipment.

Description

technical field [0001] The invention relates to network security technology, in particular to a method and device for identifying abnormal equipment. Background technique [0002] A website on the Internet is a place for merchants to provide information display or exchange to ordinary users. When users normally access network links, they will get the webpage displayed by the service provider. But each visit will take up the bandwidth and computing resources of the server. Therefore, a black industry has emerged, which consumes the resources of the service provider by sending enough requests to a certain service provider. When the request reaches a certain amount, the bandwidth and computing resources of the server will be fully occupied, so that the server can no longer provide services to normal users. Usually, attackers or hackers will use proxy servers or remotely control other common user devices to generate legitimate requests directed to victim hosts to implement Dis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/1425H04L63/1466
Inventor 彭丹丹
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products