CN107370754A - A kind of website guard technology of the IP credit worthiness Rating Models based on cloud protection - Google Patents

A kind of website guard technology of the IP credit worthiness Rating Models based on cloud protection Download PDF

Info

Publication number
CN107370754A
CN107370754A CN201710730912.8A CN201710730912A CN107370754A CN 107370754 A CN107370754 A CN 107370754A CN 201710730912 A CN201710730912 A CN 201710730912A CN 107370754 A CN107370754 A CN 107370754A
Authority
CN
China
Prior art keywords
target
attack
mrow
website
msub
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710730912.8A
Other languages
Chinese (zh)
Other versions
CN107370754B (en
Inventor
蒋海峰
范渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
DBAPPSecurity Co Ltd
Original Assignee
DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DBAPPSecurity Co Ltd filed Critical DBAPPSecurity Co Ltd
Priority to CN201710730912.8A priority Critical patent/CN107370754B/en
Publication of CN107370754A publication Critical patent/CN107370754A/en
Application granted granted Critical
Publication of CN107370754B publication Critical patent/CN107370754B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks

Abstract

The present invention relates to cloud guard technology, it is desirable to provide a kind of website guard technology of the IP credit worthiness Rating Models based on cloud protection.The website guard technology for the IP credit worthiness Rating Models that this kind is protected based on cloud includes step:Target IP access target trustship website, cloud protective platform obtain the Target IP of this access;Calculate the IP credit worthinesses of Target IP itself;The average credit worthiness of IP sections where calculating Target IP;Calculate the weighted sum of the two Target IP credit worthiness factors of influence, that is, obtain the final credit worthiness of Target IP, when Target IP final credit worthiness be less than 0.7, then allow cloud protective platform directly to intercept access of the Target IP to target trustship website by Real-time Feedback mechanism.Malice IP can be fed back to cloud protective platform by the present invention in time, allow cloud protective platform directly to intercept this kind of attack source in a manner of blacklist.

Description

A kind of website guard technology of the IP credit worthiness Rating Models based on cloud protection
Technical field
The present invention be on cloud protection technology field, more particularly to a kind of IP credit worthiness Rating Models based on cloud protection Website guard technology.
Background technology
Portal website's image important as government and enterprises and institutions and public media are extremely important, when in cyberspace Substantial amounts of attack all occurs quarter and the outburst of intrusion behavior, especially some 0day leaks can be big to cause in the extremely short time Batch website is severely impacted.Website guard technology based on cloud protection can be asked safely with large batch of alleviate existing for website Topic.But cloud protects substantial amounts of protection action to be all based on prevention policies, often cross one layer of strategy and all mean to the flat cloud of cloud protection More one layer of expense, the increase that response time of website can also respond.
Many websites, large-scale data center and cloud protection center can all introduce the content of an IP blacklist, flow When amount comes, the filtering of one layer of IP blacklist mechanism is first passed through, reduces the expense layer by layer in defence policies.At present More than comparing is exactly the IP blacklists storehouse that some are increased income on internet, but this IP like blacklist storehouse is often too late in the presence of updating When, source confidence level is not high enough, the problems such as lacking clear and definite blacklist criterion.
The content of the invention
It is a primary object of the present invention to overcome deficiency of the prior art, there is provided a kind of access based on cloud protective platform Daily record and attack logs, the low IP address of credit worthiness is analyzed by way of off-line analysis, and allowed by Real-time Feedback mechanism The website guard technology that cloud protective platform is directly intercepted to this IP like.In order to solve the above technical problems, the solution of the present invention Scheme is:
A kind of website guard technology of the IP credit worthiness Rating Models based on cloud protection is provided, cloud protective platform can intercept pin Attack to target trustship website, the website guard technology based on cloud protection IP credit worthiness Rating Models include following Step:
Step A:Target IP access target trustship website, cloud protective platform obtain the Target IP of this access;
Step B:The IP credit worthinesses of Target IP itself are calculated, the factor of influence of IP credit worthinesses itself there are 3, respectively attacked Frequency, target of attack, attack time section are hit, specific calculation procedure is as follows:
Step B1) attack frequency refer to:V11=NT/(NT+NV);
Wherein, the V11Refer to attack frequency, V11Bigger explanation is aggressive more obvious, i.e., credit worthiness is poorer;NTRefer to by The attack number that Target IP is initiated target trustship website;NVRefer to the normal access initiated by Target IP target trustship website Number;
Attack frequency is as the marking formula of factor of influence:C11=1-V11
Wherein, C11Refer to the impact fraction for attacking frequency;V11Refer to attack frequency;
Step B2) cloud protective platform access trustship website, be divided into following 5 class:Government websites, Educational website, Network and Finance Network Stand, enterprise web site, news media website, use V respectively121、V122、V123、V124、V125Represent per a kind of trustship website as attack The score value of target;
Target of attack is as the marking formula of factor of influence:
Wherein, C12Refer to the impact fraction of target of attack;λ12iRefer to the weight of different targets of attack, and(we set it to 4:3:4:2:2);V12iRefer to such website by the attack time as target of attack Number/all trustship websites are by the general offensive number as target of attack;
Step B3) according to people come off duty and sleep be accustomed to, one day (we need to be to IP-based geographical position within 24 hours Feature is processed by different time zone to attack time) it is divided into the following period and counts respectively:
Attack time section 1:Period is 22:00~08:00, score as V131, attack number/general attack of the scoring=period Hit number;
Attack time section 2:Period is 08:00~18:00, score as V132, attack number/general attack of the scoring=period Hit number;
Attack time section 3:Period is 18:00~22:00, score as V133, attack number/general attack of the scoring=period Hit number;
Attack time section is as the marking formula of factor of influence:
Wherein, C13Refer to the impact fraction of attack time section;λ13iRefer to the weight of different attack time sections, and(we set it to 5:1:2);V13iRefer to the scoring of different attack time sections;
Step B4) impact fractions of IP credit worthinesses itself is:
Wherein, λ1iRefer to that (we set it to 1 for the weight of each factor of influence:2:2);
Step C:The average credit worthiness of IP sections where calculating Target IP, other IP of IP sections credit worthiness where Target IP Score value can influence final IP credit worthiness scoring;
If there is N number of IP to initiate attack to the trustship website on cloud protective platform in same C sections with Target IP, then target The average credit worthiness impact fraction of IP sections is where IP:
Wherein, CSThe average credit worthiness impact fraction of IP sections where referring to Target IP;CFiIn IP sections where referring to Target IP The IP each to be launched a offensive to target trustship website credit worthiness impact fraction;IP sections are to target trustship where N refers to Target IP The IP number that website is launched a offensive;
Step D:The factor of influence of Target IP credit worthiness includes IP sections where IP credit worthinesses in itself, the IP to its letter The scoring of reputation degree influences, and calculates the weighted sum of the two factors of influence, that is, obtains the final credit worthiness of Target IP, and formula is as follows:C= λ1CF2CS
Wherein, CFFor the impact fraction of IP credit worthinesses itself;CSThe average credit worthiness of IP sections where Target IP influences to divide Value;λiFor the calculating weight of each dimension, and λ12=1 (we set it to 7:3);
When the final credit worthiness of Target IP is less than 0.7, then allowing cloud protective platform directly to intercept by Real-time Feedback mechanism should Access of the Target IP to target trustship website.
Compared with prior art, the beneficial effects of the invention are as follows:
Substantial amounts of portal website has been accessed in cloud protective platform, has attracted that there is natural advantage for flow, for after us Continuous analysis model brings the data sample of magnanimity;
Malice IP can be fed back to cloud protective platform by the present invention in time, make cloud protective platform straight in a manner of blacklist Connect and intercept this kind of attack source;
The present invention can will threaten information data to be supplied to other security firms, realize intelligence sharing.
Brief description of the drawings
Fig. 1 is the credit worthiness scoring flow chart of the present invention.
Embodiment
Firstly the need of explanation, the present invention is one kind application of the computer technology in field of information security technology.At this In the implementation process of invention, the application of multiple software function modules can be related to.It is applicant's understanding that such as reading over application text After part, accurate understanding realization principle and goal of the invention of the invention, in the case where combining existing known technology, this area skill Art personnel can use the software programming technical ability of its grasp to realize the present invention completely.
The present invention is described in further detail with embodiment below in conjunction with the accompanying drawings:
The cloud computing that cloud protective platform refers to network attack and intrusion behavior can effectively be analyzed, calculate and intercepted is put down Platform.Cloud protective platform can clean to the flowing of access of trustship website, intercept attack behavior, align frequentation and ask clearance to ensure The safe operation of rear website, and access and attack record are have recorded by way of real-time stream process.
A kind of website guard technology of IP credit worthiness Rating Models based on cloud protection as shown in Figure 1, including following steps Suddenly:
Step A:Target IP access target trustship website, cloud protective platform obtain the Target IP of this access.
Step B:The IP credit worthinesses of Target IP itself are calculated, the factor of influence of IP credit worthinesses itself there are 3, respectively attacked Frequency, target of attack, attack time section are hit, specific calculation procedure is as follows:
Step B1) attack frequency refer to:V11=III/ (III+IIIII);
Wherein, III refers to the attack number initiated by Target IP target trustship website;IIIII refers to by Target IP to mesh Mark the normal access number that trustship website is initiated;V11Bigger explanation is aggressive more obvious, while also means that credit worthiness is poorer.
Attack frequency is as the marking formula of factor of influence:C11=1-V11
Wherein, C11Refer to the impact fraction for attacking frequency;V11Refer to the attack frequency of Target IP.
Step B2) cloud protective platform access trustship website, be divided into following 5 class:Government websites, Educational website, Network and Finance Network Stand, enterprise web site, news media website, use V respectively121、V122、V123、V124、V125Represent per a kind of trustship website as attack The score value of target.
Target of attack is as the marking formula of factor of influence:
Wherein, C12Refer to the impact fraction of target of attack;λ12iRefer to the weight of different targets of attack, and(we set it to 4:3:4:2:2);V12iRefer to such website by the attack time as target of attack Number/all trustship websites are by the general offensive number as target of attack;Wherein i refers to 1,2,3,4,5.
Step B3) according to people come off duty and sleep be accustomed to, one day (we need to be to IP-based geographical position within 24 hours Feature is processed by different time zone to attack time) it is divided into the following period and counts respectively:
Table 1
Sequence number Period Scoring=(attack number/general offensive number of the period)
1 22:00~08:00 V131
2 08:00~18:00 V132
3 18:00~22:00 V133
Long-term follow and research by us, it is found that hacker is more preferred in the quitting time to launching a offensive, and one As for user can be substantially partially slow to the response speed of accident in the quitting time.Therefore attack time section is as factor of influence Marking formula be:
Wherein, C13Refer to the impact fraction of attack time section;λ13iRefer to the weight of different attack time sections, and(we set it to 5:1:2);V13iRefer to the scoring of different attack time sections.
Step B4) impact fractions of IP credit worthinesses itself is:
Wherein, λ1iIt is the weight of each factor of influence, we set it to 1:2:2.
Step C:Hacker is frequently not with a machine, but controls a collection of broiler chicken, this batch of meat when launching a offensive Also it is no lack of in chicken in same C sections, therefore other IP of IP sections credit worthiness score value can influence final IP where Target IP Credit worthiness scores.
If there is N number of IP to initiate attack to the trustship website on cloud protective platform in same C sections with Target IP, then target The average credit worthiness impact fraction of IP sections is where IP:
Wherein, CSThe average credit worthiness impact fraction of IP sections where referring to Target IP;CFiIn IP sections where referring to Target IP The IP each to be launched a offensive to target trustship website credit worthiness impact fraction;IP sections are to target trustship where N refers to Target IP The IP number that website is launched a offensive.
Step D:The factor of influence of Target IP credit worthiness includes IP sections where IP credit worthinesses in itself, the IP to its letter The scoring of reputation degree influences, and calculates the weighted sum of the two factors of influence, that is, obtains the final credit worthiness of Target IP, and formula is as follows:
C=λ1CF2CS
Wherein, CFFor the impact fraction of IP credit worthinesses itself;CSThe average credit worthiness of IP sections where Target IP influences to divide Value;λiFor the calculating weight of each dimension, and λ12=1, we set it to 7:3.
When the final credit worthiness of Target IP is less than 0.7, then allowing cloud protective platform directly to intercept by Real-time Feedback mechanism should Access of the Target IP to target trustship website.
After the cleaning of cloud protective platform and prevention policies, substantial amounts of access log and attack logs are recorded flow Get off.
Finally it should be noted that listed above is only specific embodiment of the invention.It is clear that the invention is not restricted to Above example, there can also be many variations.One of ordinary skill in the art can directly lead from present disclosure All deformations for going out or associating, are considered as protection scope of the present invention.

Claims (1)

1. a kind of website guard technology of the IP credit worthiness Rating Models based on cloud protection, cloud protective platform can be intercepted for target The attack of trustship website, it is characterised in that the website guard technology bag based on cloud protection IP credit worthiness Rating Models Include following step:
Step A:Target IP access target trustship website, cloud protective platform obtain the Target IP of this access;
Step B:The IP credit worthinesses of Target IP itself are calculated, the factor of influence of IP credit worthinesses itself there are 3, respectively attack frequency Rate, target of attack, attack time section, specific calculation procedure are as follows:
Step B1) attack frequency refer to:V11=NT/(NT+NV);
Wherein, the V11Refer to attack frequency, V11Bigger explanation is aggressive more obvious, i.e., credit worthiness is poorer;NTRefer to by target The attack number that IP is initiated target trustship website;NVRefer to the normal access number initiated by Target IP target trustship website;
Attack frequency is as the marking formula of factor of influence:C11=1-V11
Wherein, C11Refer to the impact fraction for attacking frequency;V11Refer to attack frequency;
Step B2) cloud protective platform access trustship website, be divided into following 5 class:Government websites, Educational website, financial web site, enterprise Industry website, news media website, use V respectively121、V122、V123、V124、V125Represent per a kind of trustship website as target of attack Score value;
Target of attack is as the marking formula of factor of influence:
Wherein, C12Refer to the impact fraction of target of attack;λ12iRefer to the weight of different targets of attack, andV12i Refer to such website by the number of times of attack as target of attack/all trustships website by the general offensive number as target of attack;
Step B3) according to people come off duty and sleep is accustomed to, counted respectively the following period is divided within 24 hours of one day:
Attack time section 1:Period is 22:00~08:00, score as V131, attack number/general offensive number of the scoring=period;
Attack time section 2:Period is 08:00~18:00, score as V132, attack number/general offensive number of the scoring=period;
Attack time section 3:Period is 18:00~22:00, score as V133, attack number/general offensive number of the scoring=period;
Attack time section is as the marking formula of factor of influence:
<mrow> <msub> <mi>C</mi> <mn>13</mn> </msub> <mo>=</mo> <mn>1</mn> <mo>-</mo> <munderover> <mi>&amp;Sigma;</mi> <mrow> <mi>i</mi> <mo>=</mo> <mn>1</mn> </mrow> <mn>3</mn> </munderover> <msub> <mi>&amp;lambda;</mi> <mrow> <mn>13</mn> <mi>i</mi> </mrow> </msub> <msub> <mi>V</mi> <mrow> <mn>13</mn> <mi>i</mi> </mrow> </msub> <mo>;</mo> </mrow>
Wherein, C13Refer to the impact fraction of attack time section;λ13iRefer to the weight of different attack time sections, andV13iRefer to the scoring of different attack time sections;
Step B4) impact fractions of IP credit worthinesses itself is:
<mrow> <msub> <mi>C</mi> <mi>F</mi> </msub> <mo>=</mo> <munderover> <mi>&amp;Sigma;</mi> <mrow> <mi>i</mi> <mo>=</mo> <mn>1</mn> </mrow> <mn>3</mn> </munderover> <msub> <mi>&amp;lambda;</mi> <mrow> <mn>1</mn> <mi>i</mi> </mrow> </msub> <msub> <mi>C</mi> <mrow> <mn>1</mn> <mi>i</mi> </mrow> </msub> </mrow>
Wherein, λ1iRefer to the weight of each factor of influence;
Step C:The average credit worthiness of IP sections where calculating Target IP, other IP of IP sections credit worthiness score value where Target IP Final IP credit worthiness scoring can be influenceed;
If there is N number of IP to initiate attack to the trustship website on cloud protective platform in same C sections with Target IP, then Target IP institute It is in the average credit worthiness impact fraction of IP sections:
<mrow> <msub> <mi>C</mi> <mi>S</mi> </msub> <mo>=</mo> <mover> <msub> <mi>C</mi> <mi>F</mi> </msub> <mo>&amp;OverBar;</mo> </mover> <mo>=</mo> <mfrac> <mrow> <msubsup> <mi>&amp;Sigma;</mi> <mrow> <mi>i</mi> <mo>=</mo> <mn>1</mn> </mrow> <mi>N</mi> </msubsup> <msub> <mi>C</mi> <mrow> <mi>F</mi> <mi>i</mi> </mrow> </msub> </mrow> <mi>N</mi> </mfrac> </mrow>
Wherein, CSThe average credit worthiness impact fraction of IP sections where referring to Target IP;CFiIt is each in IP sections where referring to Target IP The IP to be launched a offensive to target trustship website credit worthiness impact fraction;IP sections are to target trustship website where N refers to Target IP The IP number launched a offensive;
Step D:The factor of influence of Target IP credit worthiness includes IP sections where IP credit worthinesses in itself, the IP to its credit worthiness Scoring influences, and calculates the weighted sum of the two factors of influence, that is, obtains the final credit worthiness of Target IP, and formula is as follows:C=λ1CF+ λ2CS
Wherein, CFFor the impact fraction of IP credit worthinesses itself;CSThe average credit worthiness impact fraction of IP sections where Target IP;λi For the calculating weight of each dimension, and λ12=1;
When Target IP final credit worthiness be less than 0.7, then allow cloud protective platform directly to intercept the target by Real-time Feedback mechanism Access of the IP to target trustship website.
CN201710730912.8A 2017-08-23 2017-08-23 Website protection method based on IP credit rating scoring model of cloud protection Active CN107370754B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710730912.8A CN107370754B (en) 2017-08-23 2017-08-23 Website protection method based on IP credit rating scoring model of cloud protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710730912.8A CN107370754B (en) 2017-08-23 2017-08-23 Website protection method based on IP credit rating scoring model of cloud protection

Publications (2)

Publication Number Publication Date
CN107370754A true CN107370754A (en) 2017-11-21
CN107370754B CN107370754B (en) 2020-04-07

Family

ID=60312398

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710730912.8A Active CN107370754B (en) 2017-08-23 2017-08-23 Website protection method based on IP credit rating scoring model of cloud protection

Country Status (1)

Country Link
CN (1) CN107370754B (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109376537A (en) * 2018-11-06 2019-02-22 杭州安恒信息技术股份有限公司 A kind of assets methods of marking and system based on multiple-factor fusion
CN109617914A (en) * 2019-01-15 2019-04-12 成都知道创宇信息技术有限公司 A kind of cloud security means of defence based on IP reference
CN109873811A (en) * 2019-01-16 2019-06-11 光通天下网络科技股份有限公司 Network safety protection method and its network security protection system based on attack IP portrait
CN109962905A (en) * 2018-11-02 2019-07-02 证通股份有限公司 Protect current system from the method for network attack
CN110135711A (en) * 2019-04-28 2019-08-16 成都亚信网络安全产业技术研究院有限公司 A kind of information management method and device
CN110717179A (en) * 2018-07-13 2020-01-21 马上消费金融股份有限公司 Risk assessment method of IP address and related device
CN111600853A (en) * 2020-04-29 2020-08-28 浙江德迅网络安全技术有限公司 Website protection system of IP credit rating model based on cloud protection
CN112491869A (en) * 2020-11-25 2021-03-12 上海七牛信息技术有限公司 Application layer DDOS attack detection and protection method and system based on IP credit
CN112839014A (en) * 2019-11-22 2021-05-25 北京数安鑫云信息技术有限公司 Method, system, device and medium for establishing model for identifying abnormal visitor
CN115659324A (en) * 2022-09-21 2023-01-31 国网山东省电力公司 Multi-device security management method and system for data security

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090240769A1 (en) * 2002-02-25 2009-09-24 Ascentive Llc Method and system for screening remote site connections and filtering data based on a community trust assessment
CN102656587A (en) * 2009-08-13 2012-09-05 赛门铁克公司 Using confidence metrics of client devices in a reputation system
CN104506356A (en) * 2014-12-24 2015-04-08 网易(杭州)网络有限公司 Method and device for determining credibility of IP (Internet protocol) address
CN106790292A (en) * 2017-03-13 2017-05-31 摩贝(上海)生物科技有限公司 The web application layer attacks detection and defence method of Behavior-based control characteristic matching and analysis

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090240769A1 (en) * 2002-02-25 2009-09-24 Ascentive Llc Method and system for screening remote site connections and filtering data based on a community trust assessment
CN102656587A (en) * 2009-08-13 2012-09-05 赛门铁克公司 Using confidence metrics of client devices in a reputation system
CN104506356A (en) * 2014-12-24 2015-04-08 网易(杭州)网络有限公司 Method and device for determining credibility of IP (Internet protocol) address
CN106790292A (en) * 2017-03-13 2017-05-31 摩贝(上海)生物科技有限公司 The web application layer attacks detection and defence method of Behavior-based control characteristic matching and analysis

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110717179A (en) * 2018-07-13 2020-01-21 马上消费金融股份有限公司 Risk assessment method of IP address and related device
CN109962905A (en) * 2018-11-02 2019-07-02 证通股份有限公司 Protect current system from the method for network attack
CN109376537A (en) * 2018-11-06 2019-02-22 杭州安恒信息技术股份有限公司 A kind of assets methods of marking and system based on multiple-factor fusion
CN109376537B (en) * 2018-11-06 2020-09-15 杭州安恒信息技术股份有限公司 Asset scoring method and system based on multi-factor fusion
CN109617914A (en) * 2019-01-15 2019-04-12 成都知道创宇信息技术有限公司 A kind of cloud security means of defence based on IP reference
CN109873811A (en) * 2019-01-16 2019-06-11 光通天下网络科技股份有限公司 Network safety protection method and its network security protection system based on attack IP portrait
CN110135711A (en) * 2019-04-28 2019-08-16 成都亚信网络安全产业技术研究院有限公司 A kind of information management method and device
CN110135711B (en) * 2019-04-28 2021-10-08 成都亚信网络安全产业技术研究院有限公司 Network security information management method and device
CN112839014A (en) * 2019-11-22 2021-05-25 北京数安鑫云信息技术有限公司 Method, system, device and medium for establishing model for identifying abnormal visitor
CN112839014B (en) * 2019-11-22 2023-09-22 北京数安鑫云信息技术有限公司 Method, system, equipment and medium for establishing abnormal visitor identification model
CN111600853A (en) * 2020-04-29 2020-08-28 浙江德迅网络安全技术有限公司 Website protection system of IP credit rating model based on cloud protection
CN112491869A (en) * 2020-11-25 2021-03-12 上海七牛信息技术有限公司 Application layer DDOS attack detection and protection method and system based on IP credit
CN115659324A (en) * 2022-09-21 2023-01-31 国网山东省电力公司 Multi-device security management method and system for data security
CN115659324B (en) * 2022-09-21 2023-07-18 国网山东省电力公司 Multi-device security management method and system for data security

Also Published As

Publication number Publication date
CN107370754B (en) 2020-04-07

Similar Documents

Publication Publication Date Title
CN107370754A (en) A kind of website guard technology of the IP credit worthiness Rating Models based on cloud protection
Fornaro et al. Covid-19 coronavirus and macroeconomic policy
CN108234462A (en) A kind of method that intelligent intercept based on cloud protection threatens IP
Laurance A crisis in the making: responses of Amazonian forests to land use and climate change
CN103530367B (en) A kind of fishing website identification system and method
CN110134876B (en) Network space population event sensing and detecting method based on crowd sensing sensor
WO2008046338A1 (en) Method and system of determining garbage information
WO2012097171A3 (en) Systems and methods for using online social footprint for affecting lending performance and credit scoring
Michalopoulos et al. Utilizing document classification for grooming attack recognition
Siddiqui et al. Bots and Gender Profiling on Twitter.
Priya et al. Detection of phishing websites using C4. 5 data mining algorithm
Vaughan et al. Characteristics of Colorado forestry contractors and their role in current forest health issues
Hook et al. Multinational corporations and ethnic conflict: theory and experience
De la Cruz Arboleda Climate Change in the Era of Post-Truth
Schmidt et al. Variability in Silcrete Heat Treatment at Klein Kliphuis Shelter, South Africa, and Its Role in Core Reduction
CN104580234A (en) Protection method of behavior characteristics in social network
Lamoreux et al. Mammalian endemism, range size and conservation status in the southern temperate zone
Gangwal et al. A Study Relating to Cyber Crimes in India During Covid-19 and the Regulations
Krause The persistent consequences of the energy transition in Appalachia’s coal country
CN108710608A (en) A kind of malice domain name language material library generating method based on context semanteme
Weitz Moscow’s gray zone toolkit
Yang et al. A novel approach for bots detection in sina microblog
Habtamu et al. Improving the Performance of Botnet Detection Method Using Machine Learning Approaches
Guo et al. Big Data-based Network Forum Hotspot Monitoring
Agrawal et al. Discernment of search engine spamming and counter measure for it

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Zhejiang Zhongcai Building No. 68 Binjiang District road Hangzhou City, Zhejiang Province, the 310051 and 15 layer

Applicant after: Hangzhou Annan information technology Limited by Share Ltd

Address before: Zhejiang Zhongcai Building No. 68 Binjiang District road Hangzhou City, Zhejiang Province, the 310051 and 15 layer

Applicant before: Dbappsecurity Co.,ltd.

GR01 Patent grant
GR01 Patent grant