Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Violent cracking attack detection method, system and device and storage medium

An attack detection and brute force technology, which is applied in the field of network security, can solve the problems of not considering the network status and the inability to detect whether the brute force attack is successful, and achieve the effect of solving the judgment problem

Active Publication Date: 2019-05-10
北京中睿天下信息技术有限公司
View PDF5 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the embodiment of the present invention is to provide a brute force attack detection method, system, device and storage medium to solve the problem that the prior art cannot detect the brute force due to the fact that the detection does not consider the network status and the change of the attacker's behavior after the attack is successful. Crack the question of whether the attack was successful

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Violent cracking attack detection method, system and device and storage medium
  • Violent cracking attack detection method, system and device and storage medium
  • Violent cracking attack detection method, system and device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0031] Brute force cracking attack means that the attacker enumerates all possible username / password combinations by guessing or dictionary, sends them as login credentials to the server login verification system, and tries to guess one by one to find usable username / password pairs.

[0032]According to the differences in the transmission modes supported by different connection protocols, user login can be roughly divided into plaintext login and ciphertext login. It is relatively easy to detect and judge the success of a brute-force cracking attack under the condition of plaintext login. The success of the attack can be confirmed by checking the key fields of the server response packet. The ciphertext login system uses an encryption protocol to ensure the privacy of transmitted data, which increases security for users and increases difficulty for detection. Since the client and the server use the negotiated public / private key pair to encrypt the communication data between the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a violent cracking attack detection method, system, device and storage medium, and relates to the technical field of network security. According to the embodiment of the invention, a multi-section violent cracking attack behavior model is established based on a behavior analysis method; The whole violent cracking attack process is completely described by the model, the characteristics and detection elements of different stages of the attack are defined, a basis is provided for confirming an attack result by summarizing different behavior elements of attack success and attack failure conditions, and the problem of judgment of the violent cracking attack result is solved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method, system, device and storage medium for brute force attack detection. Background technique [0002] Existing detection and analysis methods for brute force attacks are limited to detecting whether an event occurs, and none of the existing solutions can give results as to whether the brute force attack is successful. In particular, the brute force cracking attacks under the encryption protocol cannot be judged or analyzed by conventional detection methods. At present, there are mainly the following two types of detection methods and technical means: one is to monitor network traffic and set a dangerous threshold. When a large number of suspicious data packets exceed the threshold, an attack is considered to have occurred. The second is to perform feature matching. When it is detected that the content of the data packet contains known threat features, it is determ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 刘庆林魏海宇刘海洋吴小勇白应东熊文砚谢辉
Owner 北京中睿天下信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products