CN104618328A - Network security protection method and device - Google Patents

Network security protection method and device Download PDF

Info

Publication number
CN104618328A
CN104618328A CN201410834975.4A CN201410834975A CN104618328A CN 104618328 A CN104618328 A CN 104618328A CN 201410834975 A CN201410834975 A CN 201410834975A CN 104618328 A CN104618328 A CN 104618328A
Authority
CN
China
Prior art keywords
network address
access
log
incredible
access number
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201410834975.4A
Other languages
Chinese (zh)
Inventor
黄翔
林志超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
XIAMEN CNCN INFORMATION Co Ltd
Original Assignee
XIAMEN CNCN INFORMATION Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by XIAMEN CNCN INFORMATION Co Ltd filed Critical XIAMEN CNCN INFORMATION Co Ltd
Priority to CN201410834975.4A priority Critical patent/CN104618328A/en
Publication of CN104618328A publication Critical patent/CN104618328A/en
Pending legal-status Critical Current

Links

Abstract

The invention discloses a network security protection method and device. the method comprises recording a web access log through a server, wherein the web access log comprises accessed network addresses of the server each time; obtaining the log content in the access log within preset period; calculating the access number corresponding to network addresses identical in at least part of fields in the log content and determining the network addresses with the access number larger than the reference number are incredible network addresses, wherein the reference number is the Nth value after sequencing the access number corresponding to the network addresses identical in at least part of identical fields, and N is a preset value; sealing the determined incredible network addresses. By means of the method and the device, the accessed network addresses which do not meet the specification are sealed automatically, and the stability and the safety of websites are guaranteed.

Description

Network safety protection method and device
Technical field
The present invention relates to computer network security technology field, particularly relate to a kind of network safety protection method and device.
Background technology
Computer network is the of paramount importance information facility of society, and the development of network service has promoted the development of entire society greatly, and industry-by-industry adopts network to carry out information communication all to some extent.But the network service of current address ip Network Based does not take into full account safety factor at the beginning of design, and therefore the network equipment is often subject to the attack of automatic network, and these attacks cause very large harm.Because do not take into full account safety factor at the beginning of IP network Protocol Design, network IP packet self does not have believable mark, easily occurs by forging or distort IP packet to escape network security defence installation, and then reaches the phenomenon of attacking object.
Summary of the invention
The technical problem that the present invention mainly solves is to provide a kind of network safety protection method and device, and automatic sealing package falls the address, the network address of access against regulation, ensures stability and the fail safe of website.
For solving the problems of the technologies described above, the technical scheme that the present invention adopts is: provide a kind of network safety protection method, described method comprises: the daily record of server record web page access; Wherein, described access log comprises the network address at every turn accessing described server; Obtain the log content in predetermined amount of time in described access log; Calculate the access number that the network address that in the described log content obtained, at least partly field is identical is corresponding, and determine that the network address that access number is greater than benchmark quantity is the incredible network address; Wherein, described benchmark quantity is the N number of value after the access number corresponding to the network address that described at least part of field is identical sorts, and N is the value preset; And seal the described incredible network address falling to determine.
Wherein, the access number that the network address that in the described log content that described calculating obtains, field is identical is at least partly corresponding, and determine that the network address that access number is greater than benchmark quantity is that the step of the incredible network address is specially: classified according to field in the overall network address in the described log content obtained, identical for the field network address is classified as a class, and the access number that the network address adding up each classification is corresponding; Access number corresponding for the network address adding up each classification obtained is arranged according to descending order; Determine that access number corresponding to the network address of N number of classification is described benchmark quantity; And determine that the network address that access number is greater than described benchmark quantity is the incredible network address.
Wherein, describedly determine that access number corresponding to the network address of N number of classification is that the step of described benchmark quantity is specially: according to following formulae discovery N to determine the access number that the network address of described N number of classification is corresponding: R/m × 50=N; Wherein, R is the daily record total number comprised in the described log content obtained, and m is the sum of described network address classification.
Wherein, before the step of the described incredible network address that described envelope is fallen to determine, described method also comprises: judge whether the described incredible network address determined is included in a network address white list; Wherein, described network address white list is used for recording the believable network address; If so, then bag filter is contained in the incredible network address in described white list, otherwise does not deal with the described incredible network address; The step of the described incredible network address that described envelope is fallen to determine is specially: seal the described incredible network address falling not deal with.
Wherein, the step of the log content in the described access log of described acquisition in predetermined amount of time is specially: the interval very first time checks described access log, and obtain with the log content checked in the second time that the current time of described access log is terminal, to obtain the log content in described access log in predetermined amount of time.
Wherein, after the step of the log content in the described access log of described acquisition in predetermined amount of time, described method also comprises: judge whether comprise the access with believable search engine mark in the described access log obtained; If so, then filter the access with described believable search engine mark, otherwise described access is not dealt with; Wherein, described access log comprises described search engine mark; The access number that the network address that in the described log content that described calculating obtains, field is identical is at least partly corresponding, and determine that the network address that access number is greater than benchmark quantity is that the step of the incredible network address is specially: calculate the access number that the network address that in not processed described log content, at least part of field is identical is corresponding, to determine that the network address that access number is greater than benchmark quantity is the incredible network address.
For solving the problems of the technologies described above, another technical solution used in the present invention is: provide a kind of network safety prevention device, described device comprises: logging modle, for recording web page access daily record; Wherein, described web page access daily record comprises the network address at every turn accessing described server; Acquisition module, for obtain described logging modle record described access log in log content in predetermined amount of time; Computing module, for calculating access number corresponding to the network address that in described log content that described acquisition module obtains, at least partly field is identical, and determines that the network address that access number is greater than benchmark quantity is the incredible network address; Wherein, described benchmark quantity is the N number of value after the access number corresponding to the network address that described at least part of field is identical sorts, and N is the value preset; And Executive Module, for sealing the described incredible network address determined.
Wherein, described computing module comprises: statistics submodule, classify according to field for the overall network address in the described log content that obtains described acquisition module, identical for the field network address is classified as a class, and the access number that the network address adding up each classification is corresponding; Sorting sub-module, access number corresponding to the network address for described statistics submodule being added up each classification obtained arranges according to descending order; Determining submodule, for determining that according to the sequence of described sorting sub-module to access number access number corresponding to the network address of N number of classification is described benchmark quantity, and determining that access number is greater than the network address of described benchmark quantity.
Wherein, described device also comprises: the first filtering module, and for judging whether the described incredible network address is included in a network address white list, and bag filter is contained in the incredible network address in described white list; Wherein, described network address white list is used for recording the believable network address; Described Executive Module does not also make the described incredible network address of filtration treatment for sealing described first filtering module.
Wherein, described device also comprises: the second filtering module, for judging whether to comprise in the described access log that described acquisition module obtains the access with believable search engine mark, and filters the access with described believable search engine mark; Wherein, described access log comprises described search engine mark; Described computing module also for calculating the quantity of not corresponding by the network address that field at least part of in the access of described second filtering module process is identical access, to determine that the network address that access number is greater than described benchmark quantity is the incredible network address.
The invention has the beneficial effects as follows: the present invention is by the daily record of server record web page access, and calculate access number corresponding to the network address that in the log content in predetermined amount of time, at least part of field is identical, and determine that the network address that access number is greater than benchmark quantity is the incredible network address, seal this incredible network address falling to determine.This benchmark quantity is the N number of value after the access number corresponding to the network address that this at least part of field is identical sorts, and N is the value preset.In this way, the address, the network address of access against regulation can be fallen by automatic sealing package, ensure stability and the fail safe of website.
Accompanying drawing explanation
Fig. 1 is the flow chart of network safety protection method first execution mode of the present invention;
Fig. 2 is the flow chart of network safety protection method second execution mode of the present invention;
Fig. 3 is the flow chart of network safety protection method of the present invention 3rd execution mode;
Fig. 4 is the flow chart of network safety protection method of the present invention 4th execution mode;
Fig. 5 is the structural representation that the first execution mode is put in network safety prevention of the present invention;
Fig. 6 is the structural representation that the second execution mode is put in network safety prevention of the present invention;
Fig. 7 is the structural representation that the 3rd execution mode is put in network safety prevention of the present invention;
Fig. 8 is the structural representation that the 4th execution mode is put in network safety prevention of the present invention.
Embodiment
Below in conjunction with drawings and embodiments, the present invention is described in detail.
Refer to Fig. 1, be the flow chart of network safety protection method first execution mode of the present invention, the method comprises:
Step S10: server record web page access daily record.This access log comprises the network address at every turn accessing this server.
Server can in all web page access daily record of assigned catalogue record, comprise to I haven't seen you for ages in this access log accessed this server at every turn the network address (User IP), the webpage of request access, request access time, access the browser mark of this server.
Step S11, obtains the log content in predetermined amount of time in this access log.
Particularly, this access log of server regular check, and the log content in a period of time is extracted randomly when checking access log, or extract the log content in predetermined amount of time.Such as, server checked once this access log every 5 minutes, and before extracting from the access log of record record a period of time (10: 20 assign to 10: 30) in log content, this time point and time period length can be random and without specific rule.Server can also extract the log content in predetermined amount of time, and such as, with current time forward 5 minutes for predetermined amount of time, this time can be that monitor staff is pre-set, can also modify according to the visit capacity of server.Such as, be the rush hour of access to netwoks between usual 8 o'clock to 11 o'clock evening, then this predetermined amount of time is then set to 2 minutes.
Step S12, calculates the access number that the network address that in this log content obtained, at least partly field is identical is corresponding, and determines that the network address that access number is greater than benchmark quantity is the incredible network address.
Wherein, this benchmark quantity is the N number of value after the access number corresponding to the network address that this at least part of field is identical sorts, and N is the value preset.
Particularly, each network address has corresponding field, and field form is generally xxx.xxx.xxx.xxx.So, can judge that whether the network address is identical according to field.
In the present embodiment, whole field is identical, determines that the network address is identical, that is, consolidated network address.
In other embodiments, can set field portions identical, determine that the network address is identical, such as, the network address that the first two field is identical is defined as the identical network address.The quantity of same field and position can set accordingly according to the access log of record.
By adding up the visit capacity of the network address identical within a predetermined period of time and sorting, thus elect N number of value as this benchmark quantity according to ranking results.Wherein, N is the value preset.After benchmark quantity is determined, total amount and this benchmark quantity of the access same network address calculated initiated compare, and determine that the network address that access total amount is greater than this benchmark quantity is the incredible network address.
Due to, some Viruses are usually initiated a large amount of access to server at short notice and take server resource, and server is paralysed at short notice.Therefore, whether the network address of determining to initiate this access by judging the access number initiated the network address identical in the scheduled time whether to be greater than certain threshold value is malice, unsafe.
Step S13, seals this incredible network address falling to determine.
Utilize embodiment of the present invention, by adding up the access number of the identical network address of field at least part of in the web page access daily record of recording in the scheduled time, and determine that whether corresponding access is abnormal according to benchmark quantity, thus determine whether the network address of initiating this access is the incredible network address, and envelope falls the incredible network address further.
Refer to Fig. 2, be the flow chart of the second execution mode of network safety protection method of the present invention, the method comprises:
Step S20, the daily record of server record web page access.This access log comprises the network address at every turn accessing this server.
Wherein, comprise to I haven't seen you for ages in this access log accessed this server at every turn the network address (User IP), the webpage of request access, request access time, access the browser mark of this server.
Step S21: obtain the log content in predetermined amount of time in this access log.
Particularly, the interval very first time checks this access log, and obtains with the log content checked in the second time that the current time of this access log is terminal, to obtain the log content in this access log in predetermined amount of time.
Such as, server checks once this access log every 5 minutes (very first time), and with current time 5 minutes (the second times) forward for predetermined amount of time, this time can be that monitor staff is pre-set, can also modify according to the visit capacity of server.
In other embodiments, server extracts the log content in a period of time randomly when checking access log, or extracts the log content in predetermined amount of time.Such as, server checked once this access log every 5 minutes, and before extracting from the access log of record record a period of time (10: 20 assign to 10: 30) in log content, this time point and time period length can be random and without specific rule.
Step S22, classifies according to field to the overall network address in this log content obtained, identical for the field network address is classified as a class, and the access number that the network address adding up each classification is corresponding.
Each network address has corresponding field, and field form is generally xxx.xxx.xxx.xxx.In the present embodiment, whole field is identical, determines that whether the network address is identical.
In other embodiments, can set field portions identical, determine that the network address is identical, such as, the network address that the first two field is identical is defined as the identical network address.
Such as, the identical network address conducted interviews after quantitative statistics obtain following result:
Access total amount The network address
5 192.168.0.1
150 218.17.162.153
55 202.100.10.9
200 202.168.110.120
Table 1
Step S23, arranges access number corresponding for the network address adding up each classification obtained according to descending order.
Further, the visit capacity of the network address identical within a predetermined period of time added up and sort, such as, the visit capacity of the network address in table one being carried out sequence and obtains following result:
Access total amount The network address
200 202.168.110.120
150 218.17.162.153
55 202.100.10.9
5 192.168.0.1
Table two
Therefore, the ranking results of the visit capacity that the network address is corresponding can be found out clearly from table two.
Step S24, determines that access number corresponding to the network address of N number of classification is this benchmark quantity.
Particularly, according to following formulae discovery N to determine the access number that the network address of described N number of classification is corresponding:
R/m×50=N;
Wherein, R is the daily record total number comprised in the described log content obtained, and m is the sum of described network address classification.
Such as, daily record number is 20000, and the quantity of network address classification is 5000, then can calculate N=20000/5000 × 50=200, therefore determines that access number corresponding to the network address of the 200th classification after sorting is this benchmark quantity.
Above-mentionedly determine that the method for this benchmark quantity uses usually in the very large situation of visit capacity, dynamically determine benchmark quantity according to above-mentioned formula.Under visit capacity is not very large situation, the value of N can also be considered normal visit capacity by monitor staff and preset, and such as, sets everyone access per second element, then people's access per minute 60 elements, a people 5 minutes (predetermined amount of time) accesses 300 points of elements.Therefore, the access number can initiated within a predetermined period of time according to normal condition people determines the value of N, such as, and N=50.In such cases, because visit capacity is not very large, it is too large that the value of N not easily sets, and prevents the data of taking out too many and that the too much network address is judged as is incredible, occurred the situation of erroneous judgement.
In other embodiments, monitor staff directly arranges the value of this benchmark quantity according to network access quantity, such as, is the rush hour of access to netwoks, then this benchmark quantity is set to 500 times between usual 8 o'clock to 11 o'clock evening.Before 5 o'clock to 7 o'clock morning, network access quantity is lower, then this benchmark quantity is set to 30 times.
Step S25, determines that the network address that access number is greater than this benchmark quantity is the incredible network address.
Step S26, seals the incredible network address falling to determine.
Please refer to Fig. 3, before step S13, that is, before sealing the step of this incredible network address falling to determine, the method also comprises:
Step S33, judges whether the incredible network address determined is included in a network address white list.If so, step S34 is entered, otherwise, enter step S35, that is, perform the step of this incredible network address sealing to fall to determine.
Wherein, this network address white list is used for recording the believable network address, such as, and the network address of server oneself or be configured to the network address of the trust not limiting visit capacity in advance.
Step S34, bag filter is contained in the incredible network address in this white list.Then, step S35 is entered.
When determining that the incredible network address is in this network address white list, then bag filter is contained in the incredible network address in this white list, then do not deal with for not being included in the network address in this white list, therefore after filtering, the remaining network address is just the real incredible network address, then perform step S35, the incredible network address envelope that these are real is fallen.
Further, also record the remaining network address after filtering, and check the network address that these network address request are accessed, and a fairly large number of for request access network address is recorded.After incredible network address envelope being fallen, according to the network address of request, monitor staff by checking the network address of these incredible network address request access, and can also judge whether that the network address to having sealed is recovered.Such as, web ticket reselling website has user in peak time festivals or holidays and accesses this website at short notice continually to rush to purchase ticket.Now, when determining that this network address is the network address of ticket reselling website, if fall according to the network address envelope of method as above by the user of this network address of access, the network address that this envelope is fallen can also be recovered after checking, thus the situation reducing erroneous judgement occurs.
Other step in Fig. 3 refers to Fig. 1 and corresponding explanatory note.
In other embodiments, other step in Fig. 3 can also refer to Fig. 2 and corresponding explanatory note, does not add repeat at this.
Refer to Fig. 4, step S11, that is, after obtaining the step of the log content in this access log in predetermined amount of time, the method also comprises:
Step S42, judges whether comprise the access with believable search engine mark in the access log obtained.If, then enter step S43, otherwise enter step S44, namely, perform the access number that the network address that in this log content calculating and obtain, at least partly field is identical is corresponding, and determine that the network address that access number is greater than benchmark quantity is the step of the incredible network address.
Wherein, comprise to I haven't seen you for ages in this access log accessed this server at every turn the network address (User IP), the webpage of request access, request access time, access the browser mark of this server and access the search engine mark of this server.
Step S43, filters the access with this believable search engine mark.
When the access determining to record in access log has this search engine mark, then filter the access with this search engine mark, the access not comprising this search engine mark is not then dealt with.
Step S12, namely, calculate the access number that the network address that in this log content obtained, at least partly field is identical is corresponding, and determine that the network address that access number is greater than benchmark quantity is the step of the incredible network address, can also realize especially by following steps:
Step S44, calculates the corresponding access number in the network address that in not processed log content, at least part of field is identical, to determine that the network address that access number is greater than benchmark quantity is the incredible network address.
Other step in Fig. 4 refers to Fig. 1 and corresponding explanatory note.
In other embodiments, other step in Fig. 4 can also refer to Fig. 2 or Fig. 3 and corresponding explanatory note, does not add repeat at this.
Refer to Fig. 5, be the structural representation of the first execution mode of network safety prevention device of the present invention, this device 50 comprises: logging modle 51, acquisition module 52, computing module 53 and Executive Module 54.
This logging modle 51 is for recording web page access daily record.Wherein, this web page access daily record comprises the network address at every turn accessing this server.
Further, comprise to I haven't seen you for ages in this access log accessed this server at every turn the network address (User IP), the webpage of request access, request access time, access the browser mark of this server.
This acquisition module 52 for obtain this logging modle record this access log in log content in predetermined amount of time.
Particularly, the interval very first time checks this access log, and obtains with the log content checked in the second time that the current time of this access log is terminal, to obtain the log content in this access log in predetermined amount of time.Such as, server checks once this access log every 5 minutes (very first time), and with current time 5 minutes (the second times) forward for predetermined amount of time, this time can be that monitor staff is pre-set, can also modify according to the visit capacity of server.
In other embodiments, server extracts the log content in a period of time randomly when checking access log, or extracts the log content in predetermined amount of time.Such as, server checked once this access log every 5 minutes, and before extracting from the access log of record record a period of time (10: 20 assign to 10: 30) in log content, this time point and time period length can be random and without specific rule.
This computing module 53 for access number corresponding to the network address that in this log content of calculating this acquisition module and obtaining, at least partly field is identical, and determines that the network address that access number is greater than benchmark quantity is the incredible network address.
Wherein, this benchmark quantity is the N number of value after the access number corresponding to the network address that this at least part of field is identical sorts, and N is the value preset.
In the present embodiment, whole field is identical, determines that the network address is identical, that is, consolidated network address.
In other embodiments, can set field portions identical, determine that the network address is identical, such as, the network address that the first two field is identical is defined as the identical network address.
This Executive Module 54 is for sealing this incredible network address determined.
Utilize embodiment of the present invention, by adding up the access number of the identical network address of field at least part of in the web page access daily record of recording in the scheduled time, and determine that whether corresponding access is abnormal according to benchmark quantity, thus determine whether the network address of initiating this access is the incredible network address, and envelope falls the incredible network address further.
Refer to Fig. 6, this computing module 63 comprises: add up submodule 630, sorting sub-module 631 and determine submodule 632.
This statistics submodule 630 is classified according to field for the overall network address in this log content of obtaining this acquisition module 62, and identical for the field network address is classified as a class, and the access number that the network address adding up each classification is corresponding.
This sorting sub-module 631 arranges according to descending order for the access number that the network address of this statistics submodule 630 being added up each classification obtained is corresponding.
This determines that submodule 632 is for determining that according to the sequence of this sorting sub-module 631 pairs of access numbers access number corresponding to the network address of N number of classification is this benchmark quantity, and determines that access number is greater than the network address of this benchmark quantity.
Particularly, this determines submodule 632 according to following formulae discovery N to determine the access number that the network address of described N number of classification is corresponding:
R/m×50=N;
Wherein, R is the daily record total number comprised in the described log content obtained, and m is the sum of described network address classification.
Such as, daily record number is 20000, and the quantity of network address classification is 5000, then can calculate N=20000/5000 × 50=200, therefore determines that access number corresponding to the network address of the 200th classification after sorting is this benchmark quantity.
In other embodiments, monitor staff directly arranges the value of this benchmark quantity according to network access quantity, such as, is the rush hour of access to netwoks, then this benchmark quantity is set to 500 times between usual 8 o'clock to 11 o'clock evening.Before 5 o'clock to 7 o'clock morning, network access quantity is lower, then this benchmark quantity is set to 30 times.
Other module in Fig. 6 refers to Fig. 5 and corresponding explanatory note.
Refer to Fig. 7, this device 70 also comprises the first filtering module 75, and for judging whether this incredible network address is included in a network address white list, and bag filter is contained in the incredible network address in this white list.Wherein, this network address white list is used for recording the believable network address.For not to be included in this white list the network address then this first filtering module 75 do not deal with, after therefore filtering, the remaining network address is just the real incredible network address,
This Executive Module 74 does not also make this incredible network address of filtration treatment for sealing this first filtering module 75.
Other module in Fig. 7 refers to Fig. 5 and corresponding explanatory note.
In other embodiments, other module in Fig. 7 can also refer to Fig. 6 and corresponding explanatory note, does not add repeat at this.
Refer to Fig. 8, this device 80 also comprises the second filtering module 86, for judging whether to comprise in this access log that this acquisition module 82 obtains the access with believable search engine mark, and filters the access with this believable search engine mark.Wherein, this access log comprises this search engine mark.For do not comprise this search engine mark access then this second filtering module 86 do not deal with.
This computing module 84 also for calculating the quantity of access corresponding to the network address that in the access that do not processed by this second filtering module 86, field is identical at least partly, to determine that the network address that access number is greater than this benchmark quantity is the incredible network address.
Other module in Fig. 8 refers to Fig. 5 and corresponding explanatory note.
In other embodiments, other module in Fig. 8 can also refer to Fig. 6 or Fig. 7 and corresponding explanatory note, does not add repeat at this.
Network safety protection method provided by the invention and device, by the daily record of server record web page access, and calculate access number corresponding to the network address that in the log content in predetermined amount of time, at least part of field is identical, and determine that the network address that access number is greater than benchmark quantity is the incredible network address, seal this incredible network address falling to determine.This benchmark quantity is the N number of value after the access number corresponding to the network address that this at least part of field is identical sorts, and N is the value preset.In this way, the address, the network address of access against regulation can be fallen by automatic sealing package, ensure stability and the fail safe of website.
The foregoing is only embodiments of the present invention; not thereby the scope of the claims of the present invention is limited; every utilize specification of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (10)

1. a network safety protection method, is characterized in that, described method comprises:
The daily record of server record web page access; Wherein, described access log comprises the network address at every turn accessing described server;
Obtain the log content in predetermined amount of time in described access log;
Calculate the access number that the network address that in the described log content obtained, at least partly field is identical is corresponding, and determine that the network address that access number is greater than benchmark quantity is the incredible network address; Wherein, described benchmark quantity is the N number of value after the access number corresponding to the network address that described at least part of field is identical sorts, and N is the value preset; And
Seal the described incredible network address falling to determine.
2. network safety protection method according to claim 1, it is characterized in that, describedly calculate access number corresponding to the network address that in the described log content obtained, at least partly field is identical, and determine that the network address that access number is greater than benchmark quantity is that the step of the incredible network address is specially:
Classified according to field in overall network address in the described log content obtained, identical for the field network address is classified as a class, and the access number that the network address adding up each classification is corresponding;
Access number corresponding for the network address adding up each classification obtained is arranged according to descending order;
Determine that access number corresponding to the network address of N number of classification is described benchmark quantity; And
Determine that the network address that access number is greater than described benchmark quantity is the incredible network address.
3. network safety protection method according to claim 2, is characterized in that, describedly determines that access number corresponding to the network address of N number of classification is that the step of described benchmark quantity is specially:
According to following formulae discovery N to determine the access number that the network address of described N number of classification is corresponding:
R/m×50=N;
Wherein, R is the daily record total number comprised in the described log content obtained, and m is the sum of described network address classification.
4. network safety protection method according to claim 1 and 2, is characterized in that, before the step of the described incredible network address that described envelope is fallen to determine, described method also comprises:
Judge whether the described incredible network address determined is included in a network address white list; Wherein, described network address white list is used for recording the believable network address; If so, then bag filter is contained in the incredible network address in described white list, otherwise does not deal with the described incredible network address;
The step of the described incredible network address that described envelope is fallen to determine is specially: seal the described incredible network address falling not deal with.
5. network safety protection method according to claim 1 and 2, is characterized in that, the step of the log content in the described access log of described acquisition in predetermined amount of time is specially:
The interval very first time checks described access log, and obtains with the log content checked in the second time that the current time of described access log is terminal, to obtain the log content in described access log in predetermined amount of time.
6. network safety protection method according to claim 1 and 2, is characterized in that, after the step of the log content in the described access log of described acquisition in predetermined amount of time, described method also comprises:
Judge in the described access log obtained, whether to comprise the access with believable search engine mark; If so, then filter the access with described believable search engine mark, otherwise described access is not dealt with; Wherein, described access log comprises described search engine mark;
The access number that the network address that in the described log content that described calculating obtains, field is identical is at least partly corresponding, and determine that the network address that access number is greater than benchmark quantity is that the step of the incredible network address is specially: calculate the access number that the network address that in not processed described log content, at least part of field is identical is corresponding, to determine that the network address that access number is greater than benchmark quantity is the incredible network address.
7. a network safety prevention device, is characterized in that, described device comprises:
Logging modle, for recording web page access daily record; Wherein, described web page access daily record comprises the network address at every turn accessing described server;
Acquisition module, for obtain described logging modle record described access log in log content in predetermined amount of time;
Computing module, for calculating access number corresponding to the network address that in described log content that described acquisition module obtains, at least partly field is identical, and determines that the network address that access number is greater than benchmark quantity is the incredible network address; Wherein, described benchmark quantity is the N number of value after the access number corresponding to the network address that described at least part of field is identical sorts, and N is the value preset; And
Executive Module, for sealing the described incredible network address determined.
8. network safety prevention device according to claim 7, is characterized in that, described computing module comprises:
Statistics submodule, classifies according to field for the overall network address in the described log content that obtains described acquisition module, identical for the field network address is classified as a class, and the access number that the network address adding up each classification is corresponding;
Sorting sub-module, access number corresponding to the network address for described statistics submodule being added up each classification obtained arranges according to descending order;
Determining submodule, for determining that according to the sequence of described sorting sub-module to access number access number corresponding to the network address of N number of classification is described benchmark quantity, and determining that access number is greater than the network address of described benchmark quantity.
9. the network safety prevention device according to claim 7 or 8, is characterized in that, described device also comprises:
First filtering module, for judging whether the described incredible network address is included in a network address white list, and bag filter is contained in the incredible network address in described white list; Wherein, described network address white list is used for recording the believable network address;
Described Executive Module does not also make the described incredible network address of filtration treatment for sealing described first filtering module.
10. the network safety prevention device according to claim 7 or 8, is characterized in that, described device also comprises:
Second filtering module, for judging whether to comprise in the described access log that described acquisition module obtains the access with believable search engine mark, and filters the access with described believable search engine mark; Wherein, described access log comprises described search engine mark;
Described computing module also for calculating the quantity of not corresponding by the network address that field at least part of in the access of described second filtering module process is identical access, to determine that the network address that access number is greater than described benchmark quantity is the incredible network address.
CN201410834975.4A 2014-12-29 2014-12-29 Network security protection method and device Pending CN104618328A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410834975.4A CN104618328A (en) 2014-12-29 2014-12-29 Network security protection method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410834975.4A CN104618328A (en) 2014-12-29 2014-12-29 Network security protection method and device

Publications (1)

Publication Number Publication Date
CN104618328A true CN104618328A (en) 2015-05-13

Family

ID=53152604

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410834975.4A Pending CN104618328A (en) 2014-12-29 2014-12-29 Network security protection method and device

Country Status (1)

Country Link
CN (1) CN104618328A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254092A (en) * 2016-07-14 2016-12-21 浪潮电子信息产业股份有限公司 A kind of method for early warning, Apparatus and system
CN108255868A (en) * 2016-12-29 2018-07-06 北京国双科技有限公司 Check the method and apparatus linked in website
CN112165466A (en) * 2020-09-16 2021-01-01 杭州安恒信息技术股份有限公司 Method and device for false alarm identification, electronic device and storage medium
CN113094250A (en) * 2021-05-12 2021-07-09 成都新希望金融信息有限公司 Log early warning method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102891829A (en) * 2011-07-18 2013-01-23 航天信息股份有限公司 Method and system for detecting and defending distributed denial of service attack
CN103379099A (en) * 2012-04-19 2013-10-30 阿里巴巴集团控股有限公司 Hostile attack identification method and system
CN103581180A (en) * 2013-10-28 2014-02-12 深信服网络科技(深圳)有限公司 Method and device for adjusting target hitting characteristics according to attacking logs
CN103701793A (en) * 2013-12-20 2014-04-02 北京奇虎科技有限公司 Method and device for identifying server broiler chicken
CN104065644A (en) * 2014-05-28 2014-09-24 北京知道创宇信息技术有限公司 Method and apparatus for recognizing CC attacks based on log analysis

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102891829A (en) * 2011-07-18 2013-01-23 航天信息股份有限公司 Method and system for detecting and defending distributed denial of service attack
CN103379099A (en) * 2012-04-19 2013-10-30 阿里巴巴集团控股有限公司 Hostile attack identification method and system
CN103581180A (en) * 2013-10-28 2014-02-12 深信服网络科技(深圳)有限公司 Method and device for adjusting target hitting characteristics according to attacking logs
CN103701793A (en) * 2013-12-20 2014-04-02 北京奇虎科技有限公司 Method and device for identifying server broiler chicken
CN104065644A (en) * 2014-05-28 2014-09-24 北京知道创宇信息技术有限公司 Method and apparatus for recognizing CC attacks based on log analysis

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106254092A (en) * 2016-07-14 2016-12-21 浪潮电子信息产业股份有限公司 A kind of method for early warning, Apparatus and system
CN108255868A (en) * 2016-12-29 2018-07-06 北京国双科技有限公司 Check the method and apparatus linked in website
CN112165466A (en) * 2020-09-16 2021-01-01 杭州安恒信息技术股份有限公司 Method and device for false alarm identification, electronic device and storage medium
CN112165466B (en) * 2020-09-16 2022-06-17 杭州安恒信息技术股份有限公司 Method and device for false alarm identification, electronic device and storage medium
CN113094250A (en) * 2021-05-12 2021-07-09 成都新希望金融信息有限公司 Log early warning method and device, electronic equipment and storage medium
CN113094250B (en) * 2021-05-12 2023-08-18 成都新希望金融信息有限公司 Log early warning method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN104391979B (en) Network malice reptile recognition methods and device
US9894094B2 (en) Method, server, and system for automatically rating reputation of a web site
CN105577608B (en) Network attack behavior detection method and device
CN105357195B (en) Go beyond one's commission leak detection method and the device of web access
CN106295349B (en) Account stolen risk identification method, identification device and prevention and control system
CN104618328A (en) Network security protection method and device
CN101834846B (en) Minor health website authentication system and method
CN104301302A (en) Unauthorized attack detection method and device
CN110851839B (en) Risk-based asset scoring method and system
CN109274632B (en) Website identification method and device
CN111600865B (en) Abnormal communication detection method and device, electronic equipment and storage medium
CN106453403B (en) A kind of determining method and system of loophole rectification sequence based on attack chain
US9021085B1 (en) Method and system for web filtering
CN106657057A (en) Anti-crawler system and method
RU2017105709A (en) DETECTION OF BEHAVIOR OF AGENTS OF Malicious Software
CN103905372A (en) Method and device for removing false alarm of phishing website
CN107682341A (en) The means of defence and device of CC attacks
CN109428857A (en) A kind of detection method and device of malice detection behavior
CN110875907A (en) Access request control method and device
CN102185788A (en) Method and system for searching vice accounts on basis of temporary mailbox
CN103905421A (en) Suspicious event detection method and system based on URL heterogeneity
CN107172033B (en) WAF misjudgment identification method and device
CN106572056A (en) Risk monitoring method and device
CN104219219B (en) A kind of method of data processing, server and system
CN101901307B (en) Method and device for detecting whether database is attacked by cross-site script

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20150513