Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for detecting user to make malicious IP scanning

A user, malicious technology, applied in the direction of digital transmission system, data exchange network, electrical components, etc., can solve the problem of not detecting malicious users and so on

Active Publication Date: 2006-03-01
GLOBAL INNOVATION AGGREGATORS LLC
View PDF0 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these methods have no means of detecting malicious users, thus failing to solve the problem fundamentally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for detecting user to make malicious IP scanning
  • Method for detecting user to make malicious IP scanning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0016] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0017] figure 1 It is a flow chart of a method for detecting users who scan malicious IP addresses according to a preferred embodiment of the present invention. like figure 1 As shown, in a preferred embodiment of the method for detecting and scanning users with malicious IP addresses according to the present invention, in order to detect malicious attacks, the process of learning the destination IP is firstly modified. The traditional purpose IP address learning task is only after starting the purpose unresolved learning task (step s101), after simply performing IP address learning (step s102), and then ending the current learning task (step s105).

[0018] In order to detect the attack, it is necessary to collect statistics on the IP addresses in the current specified time slice while learning the IP addresses, so as to find the IP address...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for detecting out user carrying on vicious IP scanning includes counting up all source IP address of received messages , finding out source IP address being occurred most frequently in statistic value , judging whether source IP address being occurred most frequently is IP address of user carrying in vicious IP scanning or not and controlling confirmed IP address of user carrying on vicious IP scanning .

Description

field of invention [0001] The invention relates to a technology for preventing network switching equipment from being attacked by malicious IP address scanning in network communication, in particular to a method for detecting users who scan malicious IP addresses on the network switching equipment. Background technique [0002] In network communication, network switching devices are often subject to various malicious attacks. Among the many malicious network attacks, IP scanning is the most common attack method. There is no authoritative judgment on the prevention strategy for malicious IP scanning in the industry, and many equipment manufacturers believe that the prevention measures against network attacks should be divided into the functions of professional firewalls. [0003] Take a Layer 3 switch as an example. At present, among many network switching devices, the large-scale popularization and application of Layer 3 switches in China has become a new trend in the deve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24
Inventor 王燕平刘建锋李玉涛
Owner GLOBAL INNOVATION AGGREGATORS LLC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products