CN116071057A - Encrypted coin mining behavior recognition method, encrypted coin detection device and storage medium - Google Patents

Encrypted coin mining behavior recognition method, encrypted coin detection device and storage medium Download PDF

Info

Publication number
CN116071057A
CN116071057A CN202111290067.XA CN202111290067A CN116071057A CN 116071057 A CN116071057 A CN 116071057A CN 202111290067 A CN202111290067 A CN 202111290067A CN 116071057 A CN116071057 A CN 116071057A
Authority
CN
China
Prior art keywords
network address
private network
coin
information
encrypted
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111290067.XA
Other languages
Chinese (zh)
Inventor
江舟
连超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN202111290067.XA priority Critical patent/CN116071057A/en
Priority to PCT/CN2022/121416 priority patent/WO2023077993A1/en
Publication of CN116071057A publication Critical patent/CN116071057A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a method for identifying mining behaviors of encrypted coins, an encrypted coin detection device and a storage medium. The encrypted coin mining behavior identification method comprises the following steps: acquiring a first private network address suspected to have a coin mining behavior through a preset mode; sending a coin detection message to a first private network address; and obtaining the encrypted coin response information sent from the first private network address to determine a second private network address from the first private network address, wherein the second private network address is the private network address with the encrypted coin mining behavior. In the technical scheme of the embodiment, the encrypted coin detection device can obtain the first private network address with the suspected encrypted coin behavior through the core network, and then send the encrypted coin detection message aiming at the first private network address to confirm the second private network address with the encrypted coin behavior, so that the problem that a specific user cannot be accurately positioned through public network address information can be solved, and the accuracy of identifying the encrypted coin mining behavior can be effectively improved.

Description

Encrypted coin mining behavior recognition method, encrypted coin detection device and storage medium
Technical Field
The invention relates to the technical field of communication, in particular to a method for identifying mining behaviors of encrypted coins, an encrypted coin detection device and a storage medium.
Background
With the development of society, the demand for electric power is also increasing, and the problem of electric power shortage often afflicts various countries. But with the rise of the cryptocurrency in recent years, such a service that severely consumes power resources aggravates a power resource gap, and in addition, the service also poses a serious challenge to the security of the power grid. Carbon neutralization programs have recently been proposed: "will improve the national autonomous contribution, take more powerful policy and measure, the carbon dioxide emissions strive to reach the peak before 2030, strive to realize the carbon neutralization before 2060. Therefore, the work of striking illegal mining behaviors, protecting the safety of a power grid and achieving the national planning target is very important. The related method proposes to deploy a large number of bitcoin probes in the public network, and presumes the identity information of the designated node by acquiring bitcoin transaction information broadcast information, but because the network address is limited, a public network address is usually divided into a plurality of users, and in addition, the public network address allocated to the users by the existing communication system is constantly changed, so that the specific users cannot be precisely positioned according to the public network address information by the method.
Disclosure of Invention
The following is a summary of the subject matter described in detail herein. This summary is not intended to limit the scope of the claims.
The embodiment of the invention provides a method for identifying the mining behavior of a encrypted coin, a device for detecting the encrypted coin and a storage medium, which can effectively improve the accuracy of identifying the mining behavior of the encrypted coin.
In a first aspect, an embodiment of the present invention provides a method for identifying a mining behavior of a cryptographic coin, which is applied to a cryptographic coin detection device, where the cryptographic coin detection device is disposed in a core network, and the method includes:
acquiring a first private network address through a preset mode, wherein the first private network address is a private network address corresponding to a user node suspected to have a coin mining behavior;
sending a coin detection message to the first private network address;
obtaining the response information of the encrypted coin sent by the first private network address;
and determining a second private network address from the first private network address according to the encrypted coin response information, wherein the second private network address is the private network address with encrypted coin mining behavior.
In a second aspect, an embodiment of the present invention further provides a cryptographic coin detecting apparatus, including: the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor realizes the encrypted coin mining behavior identification method according to the first aspect when executing the computer program.
In a third aspect, an embodiment of the present invention further provides a computer-readable storage medium storing computer-executable instructions for performing the encrypted coin mining behavior identification method according to the first aspect above.
The encrypted coin mining behavior recognition method is applied to an encrypted coin detection device, the encrypted coin detection device is arranged on a core network, the encrypted coin detection device obtains a first private network address through a preset mode, and the first private network address is a private network address corresponding to a user node suspected of the encrypted coin mining behavior; sending a coin detection message to a first private network address; obtaining the response information of the encrypted coin sent by the first private network address; and determining a second private network address from the first private network address according to the encrypted coin response information, wherein the second private network address is the private network address with the encrypted coin mining behavior. In the technical scheme of the embodiment, the encrypted coin detection device can obtain the first private network address with the suspected encrypted coin behavior through the core network, and then send the encrypted coin detection message aiming at the first private network address to confirm the second private network address with the encrypted coin behavior, so that the problem that a specific user cannot be accurately positioned through public network address information can be solved, and the accuracy of identifying the encrypted coin mining behavior can be effectively improved.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
The accompanying drawings are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate and do not limit the invention.
FIG. 1 is a schematic diagram of a system architecture for performing a method for recognizing a cryptographic coin mining behavior provided in one embodiment of the present invention;
FIG. 2 is a flow chart of a method for identifying a mining behavior of a cryptocoin according to an embodiment of the present invention;
FIG. 3 is a flowchart of determining a first private network address by a first preset module in a method for identifying a cryptographic coin mining behavior according to an embodiment of the invention;
FIG. 4 is a flowchart of a method for identifying a cryptographic coin mining behavior according to one embodiment of the present invention, further defining a first private network address;
FIG. 5 is a flowchart of determining a target mining behavior user in a method for identifying a mining behavior of a cryptocoin according to an embodiment of the present invention;
FIG. 6 is a flowchart of determining a first private network address by a second preset module in a method for identifying a cryptographic coin mining behavior according to an embodiment of the invention;
fig. 7 is a flowchart of generating a mining behavior user list in the method for identifying a mining behavior of a cryptocoin according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
It should be noted that although a logical order is illustrated in the flowchart, in some cases, the steps illustrated or described may be performed in an order different from that in the flowchart. The terms first, second and the like in the description and in the claims and in the above-described figures, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
The invention provides a method for identifying a mining behavior of a cryptocoin, a cryptocoin detection device and a storage medium, wherein the method for identifying the mining behavior of the cryptocoin comprises the following steps: acquiring a first private network address through a preset mode, wherein the first private network address is the private network address corresponding to a user node suspected to have the encrypted coin mining behavior; sending a coin detection message to a first private network address; obtaining the response information of the encrypted coin sent by the first private network address; and determining a second private network address from the first private network address according to the encrypted coin response information, wherein the second private network address is the private network address with the encrypted coin mining behavior. In the technical scheme of the embodiment, the encrypted coin detection device can obtain the first private network address with the suspected encrypted coin behavior through the core network, and then send the encrypted coin detection message aiming at the first private network address to confirm the second private network address with the encrypted coin behavior, so that the problem that a specific user cannot be accurately positioned through public network address information can be solved, and the accuracy of identifying the encrypted coin mining behavior can be effectively improved.
Embodiments of the present invention will be further described below with reference to the accompanying drawings.
Referring to fig. 1, fig. 1 is a schematic diagram of a system architecture platform for performing a method for identifying a cryptographic coin mining behavior according to an embodiment of the present invention.
In the example of fig. 1, the system architecture platform is disposed in a core network, where the core network includes a cryptocoin detecting device 110, a network detail recording module 120 connected to the cryptocoin detecting device, and a user database module 130 connected to the cryptocoin detecting device, where the network detail recording module is used for providing a query interface of a user, and is used for querying a public network address and a private network address of the user corresponding to the public network address, and the user database module is used for querying a private network address capability of the user, and is also used for obtaining a private network address and port information of a specified user.
It should be noted that, the cryptocoin detecting device is a node containing each popular cryptocoin, and the modification is that for the P2P network of the active connection designated address port, for example, the bit coin is constructed based on TCP, and the default communication port of the main network is 8333; for another example, ethernet provides two connection modes, UDP and TCP, and the main network defaults to TCP port 30303, recommending UDP discovery port 30301. If the handshake with the designated node is successful, the opposite end host is proved to run the coin-in-process; if the passive monitoring mode is adopted, the system is equivalent to a node integrating the function of the main stream encryption coin node, is accessed to a network and receives the account book broadcast message.
It should be noted that the cryptocoin detecting device may include a cryptocoin sniffer, and other devices for discovering the user with mining behavior may be provided, which is not limited only in this embodiment.
It will be appreciated by those skilled in the art that the system architecture platform may be applied to 2G, 3G, 4G, 5G communication network systems, subsequent evolution mobile communication network systems, and the like, and the system architecture platform may also be applied to a fixed network communication network system, which is not particularly limited in this embodiment.
It should be noted that, when the system architecture platform is applied to the 5G mobile communication network system, the network detailed record module is a network detailed record (Internet Protocol Detail Record, IPDR), the user database module is a session management function (Session Management Function, SMF), and the encrypted coin detecting device can obtain the private network address of the specified user through the capability provided by the SMF for inquiring the private network address of the user; arranging a cryptographic coin sniffing device in the cryptographic coin detection device for discovering users with mining behaviors; meanwhile, the encrypted coin detection device can query the user corresponding to the public network address and the private network address by accessing the public network address query interface of the user provided by the IPDR.
When the system architecture platform is applied to a fixed network communication network system, the network detail record module is network detail record (Internet Protocol Detail Record, IPDR), the user database module is an authentication, authorization and accounting (Authentication, authorization, accounting, AAA) server, and the encrypted coin detection device can acquire the private network address and port of the appointed user through the private network address inquiring capability provided by the AAA; the encrypted coin detecting device is used for finding out the user with mining behavior; meanwhile, the encrypted coin detection device can access a query interface of the user provided by the IPDR, and query the public network address and the private network address of the user corresponding to the public network address.
Those skilled in the art will appreciate that the system architecture platform shown in fig. 1 is not limiting of the embodiments of the invention, and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
Based on the system architecture platform, various embodiments of the encrypted coin mining behavior recognition method of the present invention are presented below.
As shown in fig. 2, fig. 2 is a flowchart of a method for recognizing a cryptographic coin mining behavior according to an embodiment of the present invention, which is applied to a cryptographic coin detecting apparatus. The encrypted coin mining behavior recognition method includes, but is not limited to, step S100, step S200, step S300 and step S400.
Step S100, a first private network address is obtained through a preset mode, wherein the first private network address is the private network address corresponding to a user node suspected to have the encrypted coin mining behavior.
Specifically, the encrypted coin detection device can find the user node suspected to have encrypted coin mining behavior through different preset modes, so that a first private network address corresponding to the user node can be obtained.
Note that, the suspected encrypted coin mining behavior may include abnormal electricity behavior, or may include behavior that information sent by the public network address includes encrypted coin broadcast information, and the implementation is not limited specifically to the suspected encrypted coin mining behavior.
It should be noted that, the preset mode may be a first preset mode, where the first preset mode is an active detection mode, and the first preset mode is used to obtain a private network address corresponding to a user node of the abnormal electricity consumption behavior; the preset mode may also be a second preset mode, where the second preset mode is a passive detection mode, and the second preset mode is used to obtain a private network address corresponding to a user node in a public network address including the encrypted coin broadcasting information in the sent information.
Step S200, sending the encrypted coin detection message to the first private network address.
Specifically, after determining a first private network address corresponding to a user node suspected of having a cryptographic coin mining behavior, the cryptographic coin detection device sends a cryptographic coin detection message to the first private network address.
Step S300, obtaining the encrypted coin response information sent from the first private network address.
Specifically, after the encrypted coin detection device sends the encrypted coin detection message to the first private network address, the encrypted coin detection device receives the encrypted coin response information sent from part of the first private network address.
Step S400, determining a second private network address from the first private network address according to the encrypted coin response information, wherein the second private network address is the private network address with the encrypted coin mining behavior.
Specifically, the encrypted coin detection device can determine a second private network address from the first private network address according to the encrypted coin response information, wherein the second private network address is the private network address with encrypted coin mining behaviors, and the encrypted coin detection device can obtain the first private network address with encrypted coin suspected behaviors through the core network and then send an encrypted coin detection message aiming at the first private network address to confirm the second private network address with encrypted coin behaviors, so that the problem that specific users cannot be accurately positioned through public network address information can be solved, and the accuracy of identifying the encrypted coin mining behaviors can be effectively improved.
In an embodiment, the encrypted coin detection device acquires a first private network address through a preset mode, wherein the first private network address is a private network address corresponding to a user node suspected of having encrypted coin mining behavior; sending a coin detection message to a first private network address; obtaining the response information of the encrypted coin sent by the first private network address; and determining a second private network address from the first private network address according to the encrypted coin response information, wherein the second private network address is the private network address with the encrypted coin mining behavior. In the technical scheme of the embodiment, the encrypted coin detection device can obtain the first private network address with the suspected encrypted coin behavior through the core network, and then send the encrypted coin detection message aiming at the first private network address to confirm the second private network address with the encrypted coin behavior, so that the problem that a specific user cannot be accurately positioned through public network address information can be solved, and the accuracy of identifying the encrypted coin mining behavior can be effectively improved.
In some embodiments, as shown in fig. 3, in the case where the preset mode is the first preset mode, step S100 includes, but is not limited to, the following steps S310, S320 and S330.
Step S310, obtaining address information of abnormal electricity utilization user information through a first preset mode;
step S320, obtaining the subscription user information corresponding to the address information from the user database module according to the address information;
step S330, the first private network address is determined according to the subscription information.
Specifically, the encrypted coin detection device can acquire address information of abnormal electricity user information from the electric operator through a first preset mode, actively acquire subscriber information corresponding to the address information from the user database module according to the address information, and then determine a first private network address according to the subscriber information. The encrypted coin detection device can acquire a first private network address corresponding to the abnormal electricity utilization user information through a first preset mode, and can actively detect the user node suspected of the encrypted coin mining behavior.
In an embodiment, when the electric operator finds a user using abnormal electricity, the address information of the user is provided to the telecom operator, the address information is acquired by the cryptocoin detecting device, the subscriber information corresponding to the address information is acquired from the AAA according to the address information, and the first private network address is determined according to the subscriber information. The encrypted coin detection device can acquire a first private network address corresponding to the abnormal electricity utilization user information through a first preset mode, and can actively detect the user node suspected of the encrypted coin mining behavior.
It should be noted that, in an embodiment, an industry application device is newly added to the core network of the fixed network, and a cryptographic coin detection device is deployed in the industry application device, where the cryptographic coin detection device may include a plurality of mining protocols of a simplified version of cryptographic coin, such as P2P functions of only reserving monitoring, querying nodes, establishing links, and the like.
It should be noted that, the first preset mode of the embodiment has the advantages of real-time detection capability, short detection time and high efficiency, the first preset mode does not need to introduce IPDR, can effectively protect user privacy, and does not need to deploy deep packet inspection technology (Deep Packet Inspection, DPI) to analyze the user internet code stream, so that the deployment cost is low.
In one embodiment, as shown in fig. 4, step S330 includes, but is not limited to, the following steps S410, S420 and S430.
Step S410, determining user number information from the subscriber information;
step S420, access information corresponding to the user number information is obtained according to the user number information;
step S430, determining a first private network address according to the access information.
The AAA provides an external interface inquiring capability, has the capability of inquiring user access information of the user through user number information, including an allocated private network address and the like, the encrypted coin detecting device has the capability of accessing an AAA open interface, acquiring the private network address and port information of the user through the interface, determining the user number information from subscription user information, then obtaining access information corresponding to the user number information from the AAA according to the user number information, and then determining a first private network address according to the access information.
In one embodiment, as shown in fig. 5, step S400 is followed by, but not limited to, step S510 below.
And S510, determining target user information from the abnormal electricity utilization user information according to the second private network address, wherein the target user information represents the user with the encrypted coin mining behavior.
Specifically, after the second private network address is determined, the encrypted coin detection device can determine target user information from abnormal electricity user information according to the second private network address, and because the second private network address is confirmed by the encrypted coin detection device through checking the first private network address and sending the encrypted coin detection message, the user node where the encrypted coin mining behavior really occurs can be accurately determined, and the efficiency of striking the mining behavior is improved.
In an embodiment, as shown in fig. 6, in the case that the preset mode is a second preset mode for acquiring a private network address corresponding to a user node in a public network address including the encrypted coin broadcasting information in the transmitted information, step S100 includes, but is not limited to, the following steps S610, S620 and S630.
Step S610, obtaining the encrypted coin broadcasting information through a second preset mode;
step S620, determining a public network address corresponding to the encrypted coin broadcasting information according to the encrypted coin broadcasting information;
step S630, a first private network address corresponding to the public network address is determined according to the public network address.
Specifically, the encrypted coin detecting device can acquire all the encrypted coin broadcasting information in the core network through a second preset mode, then determine a public network address corresponding to the encrypted coin broadcasting information according to the encrypted coin broadcasting information, and then determine one or more first private network addresses corresponding to the public network address according to the public network address. Namely, the encrypted coin detection device can acquire a first private network address corresponding to a user node in a public network address containing encrypted coin broadcasting information in the transmitted information through a second preset mode, so that the user node suspected of having encrypted coin mining behavior is passively detected, the suspicious user node is not required to be provided, and all mining nodes can be found.
In an embodiment, a cryptographic coin detection device is arranged in a core network, the cryptographic coin detection device is started in operation, all popular cryptographic coin broadcasting information in the core network is received through the cryptographic coin detection device, public network addresses and ports of message sources corresponding to the cryptographic coin broadcasting information are recorded, the cryptographic coin detection device inquires a first private network address and ports arranged under the public network addresses from an IPDR (network detail record module), namely, the cryptographic coin detection device can passively detect user nodes suspected to have cryptographic coin mining behaviors.
The step of obtaining the encrypted coin broadcasting information through the second preset mode may be that the area range to be detected is determined from the core network through the second preset mode, and then all the encrypted coin broadcasting information in the area range is obtained for the area range, so that the information of other areas outside the area range is not received; or may be obtained from all the encrypted coin broadcasting information in the core network, which is not particularly limited in this embodiment.
In one embodiment, as shown in fig. 7, step S400 is followed by steps S710 and S720, which are not limited to the following.
Step S710, obtaining user number information corresponding to the second private network address from the user database module according to the second private network address;
step S720, a user list with mining behaviors is generated according to the user number information.
Specifically, after the second private network address is determined, the encrypted coin detection device can acquire user number information corresponding to the second private network address from the user database module according to the second private network address, and then generate a user list with mining actions according to the user number information.
In addition, an embodiment of the present invention also provides a device for identifying a cryptographic coin mining behavior, the cryptographic coin mining behavior comprising:
the first acquisition module is used for acquiring a first private network address through a preset mode, wherein the first private network address is a private network address corresponding to a user node suspected of having a cryptographic coin mining behavior;
the sending module is used for sending the encrypted coin detection message to the first private network address;
the second acquisition module is used for acquiring the encrypted coin response information sent by the first private network address;
and the determining module is used for determining a second private network address from the first private network address according to the encrypted coin response information, wherein the second private network address is the private network address with the encrypted coin mining behavior.
In an embodiment, when the preset mode is a first preset mode for acquiring a private network address corresponding to a user node of the abnormal electricity consumption behavior, the first acquisition module is further configured to acquire address information of abnormal electricity consumption user information through the first preset mode; acquiring subscription user information corresponding to the address information from the user database module according to the address information; and determining a first private network address according to the subscription information.
In an embodiment, the first obtaining module is further configured to determine user number information from the subscriber information; obtaining access information corresponding to the user number information according to the user number information; and determining a first private network address according to the access information.
In an embodiment, the determining module is further configured to determine, according to the second private network address, target user information from the abnormal electricity utilization user information, where the target user information characterizes a user having a cryptographic coin mining behavior.
In an embodiment, the first obtaining module is further configured to obtain the encrypted coin broadcasting information through a second preset mode when the preset mode is a second preset mode for obtaining a private network address corresponding to a user node in the public network address including the encrypted coin broadcasting information in the transmitted information; determining a public network address corresponding to the encrypted coin broadcasting information according to the encrypted coin broadcasting information; and determining a first private network address corresponding to the public network address according to the public network address.
In an embodiment, the first obtaining module is further configured to query, from the network detailed record module, all first private network addresses corresponding to the public network address according to the public network address.
In an embodiment, the determining module is further configured to obtain, from the user database module according to the second private network address, user number information corresponding to the second private network address; and generating a user list with mining behaviors according to the user number information.
In an embodiment, the first obtaining module is further configured to determine, from the core network, a region range to be detected through a second preset mode; and acquiring all the encrypted coin broadcasting information in the area range.
It should be noted that the embodiments of the above-mentioned encrypted coin mining behavior recognition device and the encrypted coin mining behavior recognition method all belong to the same inventive concept, so that these embodiments have the same implementation principle and technical effects, and will not be described in detail herein.
In addition, an embodiment of the present invention also provides a cryptographic coin detecting apparatus including: memory, a processor, and a computer program stored on the memory and executable on the processor.
The processor and the memory may be connected by a bus or other means.
The memory, as a non-transitory computer readable storage medium, may be used to store non-transitory software programs as well as non-transitory computer executable programs. In addition, the memory may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory optionally includes memory remotely located relative to the processor, the remote memory being connectable to the processor through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
Note that the cryptocoin detecting apparatus in this embodiment may be applied to, for example, the cryptocoin detecting apparatus 110 in the embodiment shown in fig. 1, and the cryptocoin detecting apparatus in this embodiment can form a part of a system architecture in, for example, the embodiment shown in fig. 1, and these embodiments all belong to the same inventive concept, so these embodiments have the same implementation principle and technical effect, and will not be described in detail herein.
The non-transitory software program and instructions required to implement the cryptographic coin mining behavior recognition method of the above-described embodiment are stored in the memory, and when executed by the processor, the cryptographic coin mining behavior recognition method of the above-described embodiment is executed, for example, the method steps S100 to S400 in fig. 2, the method steps S310 to S330 in fig. 3, the method steps S410 to S430 in fig. 4, the method step S510 in fig. 5, the method steps S610 to S630 in fig. 6, and the method steps S710 to S720 in fig. 7 described above are executed.
Furthermore, an embodiment of the present invention provides a computer-readable storage medium storing computer-executable instructions that are executed by a processor or controller, for example, by one of the processors in the above-described communication device embodiments, and that cause the processor to perform the method of identifying the mining behavior of the above-described embodiment, for example, to perform the method steps S100 to S400 in fig. 2, the method steps S310 to S330 in fig. 3, the method steps S410 to S430 in fig. 4, the method steps S510 to S630 in fig. 5, and the method steps S710 to S720 in fig. 7 described above.
Those of ordinary skill in the art will appreciate that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as known to those skilled in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can be accessed by a computer. Furthermore, as is well known to those of ordinary skill in the art, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media.
While the preferred embodiment of the present invention has been described in detail, the present invention is not limited to the above embodiment, and various equivalent modifications and substitutions can be made by those skilled in the art without departing from the spirit of the present invention, and these equivalent modifications and substitutions are intended to be included in the scope of the present invention as defined in the appended claims.

Claims (11)

1. A method for identifying a cryptographic coin mining behavior, which is applied to a cryptographic coin detection device, wherein the cryptographic coin detection device is arranged on a core network, and the method comprises the following steps:
acquiring a first private network address through a preset mode, wherein the first private network address is a private network address corresponding to a user node suspected to have a coin mining behavior;
sending a coin detection message to the first private network address;
obtaining the response information of the encrypted coin sent by the first private network address;
and determining a second private network address from the first private network address according to the encrypted coin response information, wherein the second private network address is the private network address with the encrypted coin mining behavior.
2. The method of claim 1, wherein the suspected presence of a crypto-coin mining action comprises at least one of:
abnormal electrical behavior;
the public address sends information including the behavior of the coin broadcasting information.
3. The method for identifying a cryptographic coin mining behavior according to claim 2, wherein the core network includes a user database module, and when the preset pattern is a first preset pattern of private network addresses corresponding to user nodes for acquiring abnormal electricity consumption behaviors, the acquiring the first private network addresses through the preset pattern includes:
acquiring address information of abnormal electricity user information through the first preset mode;
acquiring subscription user information corresponding to the address information from the user database module according to the address information;
and determining a first private network address according to the subscription information.
4. A method of identifying a cryptographic coin mining behavior according to claim 3, wherein said determining a first private network address based on said subscriber information comprises:
determining user number information from the subscriber information;
obtaining access information corresponding to the user number information according to the user number information;
and determining a first private network address according to the access information.
5. A method of identifying a cryptographic coin mining behavior according to claim 3, wherein after determining a second private network address from the first private network addresses based on the cryptographic coin response information, the method further comprises:
and determining target user information from the abnormal electricity utilization user information according to the second private network address, wherein the target user information represents a user with the encrypted coin mining behavior.
6. The method for recognizing a cryptographic coin mining behavior according to claim 2, wherein when the preset pattern is a second preset pattern for acquiring a private network address corresponding to a user node in the public network address including cryptographic coin broadcasting information in the transmitted information, the acquiring the first private network address through the preset pattern includes:
obtaining the encrypted coin broadcasting information through a second preset mode;
determining a public network address corresponding to the encrypted coin broadcasting information according to the encrypted coin broadcasting information;
and determining a first private network address corresponding to the public network address according to the public network address.
7. The method for identifying a cryptographic coin mining behavior according to claim 6, wherein the core network includes a network detail recording module, and the determining a first private network address corresponding to the public network address according to the public network address includes:
and inquiring all first private network addresses corresponding to the public network address from the network detailed recording module according to the public network address.
8. The method of claim 7, wherein the core network includes a subscriber database module, the method further comprising, after the determining a second private network address from the first private network address based on the cryptographic response information:
acquiring user number information corresponding to the second private network address from the user database module according to the second private network address;
and generating a user list with mining behaviors according to the user number information.
9. The method of claim 6, wherein the obtaining the encrypted coin broadcast information in the second preset mode comprises:
determining the region range to be detected from the core network through a second preset mode;
and acquiring all the encrypted coin broadcasting information in the area range.
10. A cryptographic coin detection device comprising: a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method for identifying a cryptographic coin mining behavior according to any one of claims 1 to 9 when executing the computer program.
11. A computer-readable storage medium storing computer-executable instructions for performing the encrypted coin mining behavior recognition method according to any one of claims 1 to 9.
CN202111290067.XA 2021-11-02 2021-11-02 Encrypted coin mining behavior recognition method, encrypted coin detection device and storage medium Pending CN116071057A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202111290067.XA CN116071057A (en) 2021-11-02 2021-11-02 Encrypted coin mining behavior recognition method, encrypted coin detection device and storage medium
PCT/CN2022/121416 WO2023077993A1 (en) 2021-11-02 2022-09-26 Crypto coin mining behavior recognition method, crypto coin detection apparatus, and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111290067.XA CN116071057A (en) 2021-11-02 2021-11-02 Encrypted coin mining behavior recognition method, encrypted coin detection device and storage medium

Publications (1)

Publication Number Publication Date
CN116071057A true CN116071057A (en) 2023-05-05

Family

ID=86179108

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111290067.XA Pending CN116071057A (en) 2021-11-02 2021-11-02 Encrypted coin mining behavior recognition method, encrypted coin detection device and storage medium

Country Status (2)

Country Link
CN (1) CN116071057A (en)
WO (1) WO2023077993A1 (en)

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11188899B2 (en) * 2015-04-07 2021-11-30 Dmg Blockchain Solutions Inc. Off network identity tracking in anonymous cryptocurrency exchange networks
CN108563946A (en) * 2018-04-17 2018-09-21 广州大学 A kind of browser digs method, browser plug-in and the system of mine behavioral value
CN108829829A (en) * 2018-06-15 2018-11-16 深信服科技股份有限公司 Detect method, system, device and storage medium that ideal money digs mine program
CN110839088A (en) * 2018-08-16 2020-02-25 深信服科技股份有限公司 Detection method, system, device and storage medium for dug by virtual currency
CN111212039A (en) * 2019-12-23 2020-05-29 杭州安恒信息技术股份有限公司 Host mining behavior detection method based on DNS flow
CN111600850B (en) * 2020-04-26 2021-09-07 武汉思普崚技术有限公司 Method, equipment and storage medium for detecting mine digging virtual currency

Also Published As

Publication number Publication date
WO2023077993A1 (en) 2023-05-11

Similar Documents

Publication Publication Date Title
CN108737430B (en) Encryption communication method and system for block chain node
CN108306893B (en) Distributed intrusion detection method and system for ad hoc network
KR100959459B1 (en) Group judgment device
CN107800678B (en) Method and device for detecting abnormal registration of terminal
CN107483419B (en) Method, device and system for authenticating access terminal by server, server and computer readable storage medium
CN103313429A (en) Processing method for recognizing fabricated WIFI (Wireless Fidelity) hotspot
JP4129216B2 (en) Group judgment device
TW201405354A (en) Method and Apparatus of Identifying User Risk
CN111447245A (en) Authentication method, authentication device, electronic equipment and server
CN108664395A (en) Applied program testing method, device, equipment and storage medium
KR102323712B1 (en) Wips sensor and method for preventing an intrusion of an illegal wireless terminal using wips sensor
US20080141369A1 (en) Method, Device and Program for Detecting Address Spoofing in a Wireless Network
BR102019020060A2 (en) method for detecting access point characteristics using machine learning
CN110768948A (en) Vulnerability detection method and device, storage medium and electronic device
CN114449064B (en) Application identification method and device for TLS encrypted traffic and application identification equipment
CN106790073B (en) Blocking method and device for malicious attack of Web server and firewall
CN107135190B (en) Data flow attribution identification method and device based on transport layer secure connection
CN108282551B (en) Message identification processing method and device, monitoring equipment and readable storage medium
CN107623916B (en) Method and equipment for WiFi network security monitoring
CN112422486B (en) SDK-based safety protection method and device
CN111405548B (en) Fishing wifi detection method and device
CN114697945B (en) Method and device for generating discovery response message and method for processing discovery message
CN116071057A (en) Encrypted coin mining behavior recognition method, encrypted coin detection device and storage medium
CN109587134B (en) Method, apparatus, device and medium for secure authentication of interface bus
CN111611574A (en) Information acquisition method, device, equipment and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication