CN107370754A - A kind of website guard technology of the IP credit worthiness Rating Models based on cloud protection - Google Patents
A kind of website guard technology of the IP credit worthiness Rating Models based on cloud protection Download PDFInfo
- Publication number
- CN107370754A CN107370754A CN201710730912.8A CN201710730912A CN107370754A CN 107370754 A CN107370754 A CN 107370754A CN 201710730912 A CN201710730912 A CN 201710730912A CN 107370754 A CN107370754 A CN 107370754A
- Authority
- CN
- China
- Prior art keywords
- target
- attack
- mrow
- website
- msub
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Cosmetics (AREA)
Abstract
The present invention relates to cloud guard technology, it is desirable to provide a kind of website guard technology of the IP credit worthiness Rating Models based on cloud protection.The website guard technology for the IP credit worthiness Rating Models that this kind is protected based on cloud includes step:Target IP access target trustship website, cloud protective platform obtain the Target IP of this access;Calculate the IP credit worthinesses of Target IP itself;The average credit worthiness of IP sections where calculating Target IP;Calculate the weighted sum of the two Target IP credit worthiness factors of influence, that is, obtain the final credit worthiness of Target IP, when Target IP final credit worthiness be less than 0.7, then allow cloud protective platform directly to intercept access of the Target IP to target trustship website by Real-time Feedback mechanism.Malice IP can be fed back to cloud protective platform by the present invention in time, allow cloud protective platform directly to intercept this kind of attack source in a manner of blacklist.
Description
Technical field
The present invention be on cloud protection technology field, more particularly to a kind of IP credit worthiness Rating Models based on cloud protection
Website guard technology.
Background technology
Portal website's image important as government and enterprises and institutions and public media are extremely important, when in cyberspace
Substantial amounts of attack all occurs quarter and the outburst of intrusion behavior, especially some 0day leaks can be big to cause in the extremely short time
Batch website is severely impacted.Website guard technology based on cloud protection can be asked safely with large batch of alleviate existing for website
Topic.But cloud protects substantial amounts of protection action to be all based on prevention policies, often cross one layer of strategy and all mean to the flat cloud of cloud protection
More one layer of expense, the increase that response time of website can also respond.
Many websites, large-scale data center and cloud protection center can all introduce the content of an IP blacklist, flow
When amount comes, the filtering of one layer of IP blacklist mechanism is first passed through, reduces the expense layer by layer in defence policies.At present
More than comparing is exactly the IP blacklists storehouse that some are increased income on internet, but this IP like blacklist storehouse is often too late in the presence of updating
When, source confidence level is not high enough, the problems such as lacking clear and definite blacklist criterion.
The content of the invention
It is a primary object of the present invention to overcome deficiency of the prior art, there is provided a kind of access based on cloud protective platform
Daily record and attack logs, the low IP address of credit worthiness is analyzed by way of off-line analysis, and allowed by Real-time Feedback mechanism
The website guard technology that cloud protective platform is directly intercepted to this IP like.In order to solve the above technical problems, the solution of the present invention
Scheme is:
A kind of website guard technology of the IP credit worthiness Rating Models based on cloud protection is provided, cloud protective platform can intercept pin
Attack to target trustship website, the website guard technology based on cloud protection IP credit worthiness Rating Models include following
Step:
Step A:Target IP access target trustship website, cloud protective platform obtain the Target IP of this access;
Step B:The IP credit worthinesses of Target IP itself are calculated, the factor of influence of IP credit worthinesses itself there are 3, respectively attacked
Frequency, target of attack, attack time section are hit, specific calculation procedure is as follows:
Step B1) attack frequency refer to:V11=NT/(NT+NV);
Wherein, the V11Refer to attack frequency, V11Bigger explanation is aggressive more obvious, i.e., credit worthiness is poorer;NTRefer to by
The attack number that Target IP is initiated target trustship website;NVRefer to the normal access initiated by Target IP target trustship website
Number;
Attack frequency is as the marking formula of factor of influence:C11=1-V11;
Wherein, C11Refer to the impact fraction for attacking frequency;V11Refer to attack frequency;
Step B2) cloud protective platform access trustship website, be divided into following 5 class:Government websites, Educational website, Network and Finance Network
Stand, enterprise web site, news media website, use V respectively121、V122、V123、V124、V125Represent per a kind of trustship website as attack
The score value of target;
Target of attack is as the marking formula of factor of influence:
Wherein, C12Refer to the impact fraction of target of attack;λ12iRefer to the weight of different targets of attack, and(we set it to 4:3:4:2:2);V12iRefer to such website by the attack time as target of attack
Number/all trustship websites are by the general offensive number as target of attack;
Step B3) according to people come off duty and sleep be accustomed to, one day (we need to be to IP-based geographical position within 24 hours
Feature is processed by different time zone to attack time) it is divided into the following period and counts respectively:
Attack time section 1:Period is 22:00~08:00, score as V131, attack number/general attack of the scoring=period
Hit number;
Attack time section 2:Period is 08:00~18:00, score as V132, attack number/general attack of the scoring=period
Hit number;
Attack time section 3:Period is 18:00~22:00, score as V133, attack number/general attack of the scoring=period
Hit number;
Attack time section is as the marking formula of factor of influence:
Wherein, C13Refer to the impact fraction of attack time section;λ13iRefer to the weight of different attack time sections, and(we set it to 5:1:2);V13iRefer to the scoring of different attack time sections;
Step B4) impact fractions of IP credit worthinesses itself is:
Wherein, λ1iRefer to that (we set it to 1 for the weight of each factor of influence:2:2);
Step C:The average credit worthiness of IP sections where calculating Target IP, other IP of IP sections credit worthiness where Target IP
Score value can influence final IP credit worthiness scoring;
If there is N number of IP to initiate attack to the trustship website on cloud protective platform in same C sections with Target IP, then target
The average credit worthiness impact fraction of IP sections is where IP:
Wherein, CSThe average credit worthiness impact fraction of IP sections where referring to Target IP;CFiIn IP sections where referring to Target IP
The IP each to be launched a offensive to target trustship website credit worthiness impact fraction;IP sections are to target trustship where N refers to Target IP
The IP number that website is launched a offensive;
Step D:The factor of influence of Target IP credit worthiness includes IP sections where IP credit worthinesses in itself, the IP to its letter
The scoring of reputation degree influences, and calculates the weighted sum of the two factors of influence, that is, obtains the final credit worthiness of Target IP, and formula is as follows:C=
λ1CF+λ2CS;
Wherein, CFFor the impact fraction of IP credit worthinesses itself;CSThe average credit worthiness of IP sections where Target IP influences to divide
Value;λiFor the calculating weight of each dimension, and λ1+λ2=1 (we set it to 7:3);
When the final credit worthiness of Target IP is less than 0.7, then allowing cloud protective platform directly to intercept by Real-time Feedback mechanism should
Access of the Target IP to target trustship website.
Compared with prior art, the beneficial effects of the invention are as follows:
Substantial amounts of portal website has been accessed in cloud protective platform, has attracted that there is natural advantage for flow, for after us
Continuous analysis model brings the data sample of magnanimity;
Malice IP can be fed back to cloud protective platform by the present invention in time, make cloud protective platform straight in a manner of blacklist
Connect and intercept this kind of attack source;
The present invention can will threaten information data to be supplied to other security firms, realize intelligence sharing.
Brief description of the drawings
Fig. 1 is the credit worthiness scoring flow chart of the present invention.
Embodiment
Firstly the need of explanation, the present invention is one kind application of the computer technology in field of information security technology.At this
In the implementation process of invention, the application of multiple software function modules can be related to.It is applicant's understanding that such as reading over application text
After part, accurate understanding realization principle and goal of the invention of the invention, in the case where combining existing known technology, this area skill
Art personnel can use the software programming technical ability of its grasp to realize the present invention completely.
The present invention is described in further detail with embodiment below in conjunction with the accompanying drawings:
The cloud computing that cloud protective platform refers to network attack and intrusion behavior can effectively be analyzed, calculate and intercepted is put down
Platform.Cloud protective platform can clean to the flowing of access of trustship website, intercept attack behavior, align frequentation and ask clearance to ensure
The safe operation of rear website, and access and attack record are have recorded by way of real-time stream process.
A kind of website guard technology of IP credit worthiness Rating Models based on cloud protection as shown in Figure 1, including following steps
Suddenly:
Step A:Target IP access target trustship website, cloud protective platform obtain the Target IP of this access.
Step B:The IP credit worthinesses of Target IP itself are calculated, the factor of influence of IP credit worthinesses itself there are 3, respectively attacked
Frequency, target of attack, attack time section are hit, specific calculation procedure is as follows:
Step B1) attack frequency refer to:V11=III/ (III+IIIII);
Wherein, III refers to the attack number initiated by Target IP target trustship website;IIIII refers to by Target IP to mesh
Mark the normal access number that trustship website is initiated;V11Bigger explanation is aggressive more obvious, while also means that credit worthiness is poorer.
Attack frequency is as the marking formula of factor of influence:C11=1-V11;
Wherein, C11Refer to the impact fraction for attacking frequency;V11Refer to the attack frequency of Target IP.
Step B2) cloud protective platform access trustship website, be divided into following 5 class:Government websites, Educational website, Network and Finance Network
Stand, enterprise web site, news media website, use V respectively121、V122、V123、V124、V125Represent per a kind of trustship website as attack
The score value of target.
Target of attack is as the marking formula of factor of influence:
Wherein, C12Refer to the impact fraction of target of attack;λ12iRefer to the weight of different targets of attack, and(we set it to 4:3:4:2:2);V12iRefer to such website by the attack time as target of attack
Number/all trustship websites are by the general offensive number as target of attack;Wherein i refers to 1,2,3,4,5.
Step B3) according to people come off duty and sleep be accustomed to, one day (we need to be to IP-based geographical position within 24 hours
Feature is processed by different time zone to attack time) it is divided into the following period and counts respectively:
Table 1
Sequence number | Period | Scoring=(attack number/general offensive number of the period) |
1 | 22:00~08:00 | V131 |
2 | 08:00~18:00 | V132 |
3 | 18:00~22:00 | V133 |
Long-term follow and research by us, it is found that hacker is more preferred in the quitting time to launching a offensive, and one
As for user can be substantially partially slow to the response speed of accident in the quitting time.Therefore attack time section is as factor of influence
Marking formula be:
Wherein, C13Refer to the impact fraction of attack time section;λ13iRefer to the weight of different attack time sections, and(we set it to 5:1:2);V13iRefer to the scoring of different attack time sections.
Step B4) impact fractions of IP credit worthinesses itself is:
Wherein, λ1iIt is the weight of each factor of influence, we set it to 1:2:2.
Step C:Hacker is frequently not with a machine, but controls a collection of broiler chicken, this batch of meat when launching a offensive
Also it is no lack of in chicken in same C sections, therefore other IP of IP sections credit worthiness score value can influence final IP where Target IP
Credit worthiness scores.
If there is N number of IP to initiate attack to the trustship website on cloud protective platform in same C sections with Target IP, then target
The average credit worthiness impact fraction of IP sections is where IP:
Wherein, CSThe average credit worthiness impact fraction of IP sections where referring to Target IP;CFiIn IP sections where referring to Target IP
The IP each to be launched a offensive to target trustship website credit worthiness impact fraction;IP sections are to target trustship where N refers to Target IP
The IP number that website is launched a offensive.
Step D:The factor of influence of Target IP credit worthiness includes IP sections where IP credit worthinesses in itself, the IP to its letter
The scoring of reputation degree influences, and calculates the weighted sum of the two factors of influence, that is, obtains the final credit worthiness of Target IP, and formula is as follows:
C=λ1CF+λ2CS
Wherein, CFFor the impact fraction of IP credit worthinesses itself;CSThe average credit worthiness of IP sections where Target IP influences to divide
Value;λiFor the calculating weight of each dimension, and λ1+λ2=1, we set it to 7:3.
When the final credit worthiness of Target IP is less than 0.7, then allowing cloud protective platform directly to intercept by Real-time Feedback mechanism should
Access of the Target IP to target trustship website.
After the cleaning of cloud protective platform and prevention policies, substantial amounts of access log and attack logs are recorded flow
Get off.
Finally it should be noted that listed above is only specific embodiment of the invention.It is clear that the invention is not restricted to
Above example, there can also be many variations.One of ordinary skill in the art can directly lead from present disclosure
All deformations for going out or associating, are considered as protection scope of the present invention.
Claims (1)
1. a kind of website guard technology of the IP credit worthiness Rating Models based on cloud protection, cloud protective platform can be intercepted for target
The attack of trustship website, it is characterised in that the website guard technology bag based on cloud protection IP credit worthiness Rating Models
Include following step:
Step A:Target IP access target trustship website, cloud protective platform obtain the Target IP of this access;
Step B:The IP credit worthinesses of Target IP itself are calculated, the factor of influence of IP credit worthinesses itself there are 3, respectively attack frequency
Rate, target of attack, attack time section, specific calculation procedure are as follows:
Step B1) attack frequency refer to:V11=NT/(NT+NV);
Wherein, the V11Refer to attack frequency, V11Bigger explanation is aggressive more obvious, i.e., credit worthiness is poorer;NTRefer to by target
The attack number that IP is initiated target trustship website;NVRefer to the normal access number initiated by Target IP target trustship website;
Attack frequency is as the marking formula of factor of influence:C11=1-V11;
Wherein, C11Refer to the impact fraction for attacking frequency;V11Refer to attack frequency;
Step B2) cloud protective platform access trustship website, be divided into following 5 class:Government websites, Educational website, financial web site, enterprise
Industry website, news media website, use V respectively121、V122、V123、V124、V125Represent per a kind of trustship website as target of attack
Score value;
Target of attack is as the marking formula of factor of influence:
Wherein, C12Refer to the impact fraction of target of attack;λ12iRefer to the weight of different targets of attack, andV12i
Refer to such website by the number of times of attack as target of attack/all trustships website by the general offensive number as target of attack;
Step B3) according to people come off duty and sleep is accustomed to, counted respectively the following period is divided within 24 hours of one day:
Attack time section 1:Period is 22:00~08:00, score as V131, attack number/general offensive number of the scoring=period;
Attack time section 2:Period is 08:00~18:00, score as V132, attack number/general offensive number of the scoring=period;
Attack time section 3:Period is 18:00~22:00, score as V133, attack number/general offensive number of the scoring=period;
Attack time section is as the marking formula of factor of influence:
<mrow>
<msub>
<mi>C</mi>
<mn>13</mn>
</msub>
<mo>=</mo>
<mn>1</mn>
<mo>-</mo>
<munderover>
<mi>&Sigma;</mi>
<mrow>
<mi>i</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mn>3</mn>
</munderover>
<msub>
<mi>&lambda;</mi>
<mrow>
<mn>13</mn>
<mi>i</mi>
</mrow>
</msub>
<msub>
<mi>V</mi>
<mrow>
<mn>13</mn>
<mi>i</mi>
</mrow>
</msub>
<mo>;</mo>
</mrow>
Wherein, C13Refer to the impact fraction of attack time section;λ13iRefer to the weight of different attack time sections, andV13iRefer to the scoring of different attack time sections;
Step B4) impact fractions of IP credit worthinesses itself is:
<mrow>
<msub>
<mi>C</mi>
<mi>F</mi>
</msub>
<mo>=</mo>
<munderover>
<mi>&Sigma;</mi>
<mrow>
<mi>i</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mn>3</mn>
</munderover>
<msub>
<mi>&lambda;</mi>
<mrow>
<mn>1</mn>
<mi>i</mi>
</mrow>
</msub>
<msub>
<mi>C</mi>
<mrow>
<mn>1</mn>
<mi>i</mi>
</mrow>
</msub>
</mrow>
Wherein, λ1iRefer to the weight of each factor of influence;
Step C:The average credit worthiness of IP sections where calculating Target IP, other IP of IP sections credit worthiness score value where Target IP
Final IP credit worthiness scoring can be influenceed;
If there is N number of IP to initiate attack to the trustship website on cloud protective platform in same C sections with Target IP, then Target IP institute
It is in the average credit worthiness impact fraction of IP sections:
<mrow>
<msub>
<mi>C</mi>
<mi>S</mi>
</msub>
<mo>=</mo>
<mover>
<msub>
<mi>C</mi>
<mi>F</mi>
</msub>
<mo>&OverBar;</mo>
</mover>
<mo>=</mo>
<mfrac>
<mrow>
<msubsup>
<mi>&Sigma;</mi>
<mrow>
<mi>i</mi>
<mo>=</mo>
<mn>1</mn>
</mrow>
<mi>N</mi>
</msubsup>
<msub>
<mi>C</mi>
<mrow>
<mi>F</mi>
<mi>i</mi>
</mrow>
</msub>
</mrow>
<mi>N</mi>
</mfrac>
</mrow>
Wherein, CSThe average credit worthiness impact fraction of IP sections where referring to Target IP;CFiIt is each in IP sections where referring to Target IP
The IP to be launched a offensive to target trustship website credit worthiness impact fraction;IP sections are to target trustship website where N refers to Target IP
The IP number launched a offensive;
Step D:The factor of influence of Target IP credit worthiness includes IP sections where IP credit worthinesses in itself, the IP to its credit worthiness
Scoring influences, and calculates the weighted sum of the two factors of influence, that is, obtains the final credit worthiness of Target IP, and formula is as follows:C=λ1CF+
λ2CS;
Wherein, CFFor the impact fraction of IP credit worthinesses itself;CSThe average credit worthiness impact fraction of IP sections where Target IP;λi
For the calculating weight of each dimension, and λ1+λ2=1;
When Target IP final credit worthiness be less than 0.7, then allow cloud protective platform directly to intercept the target by Real-time Feedback mechanism
Access of the IP to target trustship website.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710730912.8A CN107370754B (en) | 2017-08-23 | 2017-08-23 | Website protection method based on IP credit rating scoring model of cloud protection |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710730912.8A CN107370754B (en) | 2017-08-23 | 2017-08-23 | Website protection method based on IP credit rating scoring model of cloud protection |
Publications (2)
Publication Number | Publication Date |
---|---|
CN107370754A true CN107370754A (en) | 2017-11-21 |
CN107370754B CN107370754B (en) | 2020-04-07 |
Family
ID=60312398
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710730912.8A Active CN107370754B (en) | 2017-08-23 | 2017-08-23 | Website protection method based on IP credit rating scoring model of cloud protection |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107370754B (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109376537A (en) * | 2018-11-06 | 2019-02-22 | 杭州安恒信息技术股份有限公司 | A kind of assets methods of marking and system based on multiple-factor fusion |
CN109617914A (en) * | 2019-01-15 | 2019-04-12 | 成都知道创宇信息技术有限公司 | A kind of cloud security means of defence based on IP reference |
CN109873811A (en) * | 2019-01-16 | 2019-06-11 | 光通天下网络科技股份有限公司 | Network safety protection method and its network security protection system based on attack IP portrait |
CN109962905A (en) * | 2018-11-02 | 2019-07-02 | 证通股份有限公司 | Protect current system from the method for network attack |
CN110135711A (en) * | 2019-04-28 | 2019-08-16 | 成都亚信网络安全产业技术研究院有限公司 | A kind of information management method and device |
CN110717179A (en) * | 2018-07-13 | 2020-01-21 | 马上消费金融股份有限公司 | Risk assessment method of IP address and related device |
CN111600853A (en) * | 2020-04-29 | 2020-08-28 | 浙江德迅网络安全技术有限公司 | Website protection system of IP credit rating model based on cloud protection |
CN112491869A (en) * | 2020-11-25 | 2021-03-12 | 上海七牛信息技术有限公司 | Application layer DDOS attack detection and protection method and system based on IP credit |
CN112839014A (en) * | 2019-11-22 | 2021-05-25 | 北京数安鑫云信息技术有限公司 | Method, system, device and medium for establishing model for identifying abnormal visitor |
CN115208647A (en) * | 2022-07-05 | 2022-10-18 | 南京领行科技股份有限公司 | Attack behavior handling method and device |
CN115659324A (en) * | 2022-09-21 | 2023-01-31 | 国网山东省电力公司 | Multi-device security management method and system for data security |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090240769A1 (en) * | 2002-02-25 | 2009-09-24 | Ascentive Llc | Method and system for screening remote site connections and filtering data based on a community trust assessment |
CN102656587A (en) * | 2009-08-13 | 2012-09-05 | 赛门铁克公司 | Using confidence metrics of client devices in a reputation system |
CN104506356A (en) * | 2014-12-24 | 2015-04-08 | 网易(杭州)网络有限公司 | Method and device for determining credibility of IP (Internet protocol) address |
CN106790292A (en) * | 2017-03-13 | 2017-05-31 | 摩贝(上海)生物科技有限公司 | The web application layer attacks detection and defence method of Behavior-based control characteristic matching and analysis |
-
2017
- 2017-08-23 CN CN201710730912.8A patent/CN107370754B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20090240769A1 (en) * | 2002-02-25 | 2009-09-24 | Ascentive Llc | Method and system for screening remote site connections and filtering data based on a community trust assessment |
CN102656587A (en) * | 2009-08-13 | 2012-09-05 | 赛门铁克公司 | Using confidence metrics of client devices in a reputation system |
CN104506356A (en) * | 2014-12-24 | 2015-04-08 | 网易(杭州)网络有限公司 | Method and device for determining credibility of IP (Internet protocol) address |
CN106790292A (en) * | 2017-03-13 | 2017-05-31 | 摩贝(上海)生物科技有限公司 | The web application layer attacks detection and defence method of Behavior-based control characteristic matching and analysis |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110717179A (en) * | 2018-07-13 | 2020-01-21 | 马上消费金融股份有限公司 | Risk assessment method of IP address and related device |
CN109962905A (en) * | 2018-11-02 | 2019-07-02 | 证通股份有限公司 | Protect current system from the method for network attack |
CN109376537A (en) * | 2018-11-06 | 2019-02-22 | 杭州安恒信息技术股份有限公司 | A kind of assets methods of marking and system based on multiple-factor fusion |
CN109376537B (en) * | 2018-11-06 | 2020-09-15 | 杭州安恒信息技术股份有限公司 | Asset scoring method and system based on multi-factor fusion |
CN109617914A (en) * | 2019-01-15 | 2019-04-12 | 成都知道创宇信息技术有限公司 | A kind of cloud security means of defence based on IP reference |
CN109873811A (en) * | 2019-01-16 | 2019-06-11 | 光通天下网络科技股份有限公司 | Network safety protection method and its network security protection system based on attack IP portrait |
CN110135711A (en) * | 2019-04-28 | 2019-08-16 | 成都亚信网络安全产业技术研究院有限公司 | A kind of information management method and device |
CN110135711B (en) * | 2019-04-28 | 2021-10-08 | 成都亚信网络安全产业技术研究院有限公司 | Network security information management method and device |
CN112839014A (en) * | 2019-11-22 | 2021-05-25 | 北京数安鑫云信息技术有限公司 | Method, system, device and medium for establishing model for identifying abnormal visitor |
CN112839014B (en) * | 2019-11-22 | 2023-09-22 | 北京数安鑫云信息技术有限公司 | Method, system, equipment and medium for establishing abnormal visitor identification model |
CN111600853A (en) * | 2020-04-29 | 2020-08-28 | 浙江德迅网络安全技术有限公司 | Website protection system of IP credit rating model based on cloud protection |
CN112491869A (en) * | 2020-11-25 | 2021-03-12 | 上海七牛信息技术有限公司 | Application layer DDOS attack detection and protection method and system based on IP credit |
CN115208647A (en) * | 2022-07-05 | 2022-10-18 | 南京领行科技股份有限公司 | Attack behavior handling method and device |
CN115659324A (en) * | 2022-09-21 | 2023-01-31 | 国网山东省电力公司 | Multi-device security management method and system for data security |
CN115659324B (en) * | 2022-09-21 | 2023-07-18 | 国网山东省电力公司 | Multi-device security management method and system for data security |
Also Published As
Publication number | Publication date |
---|---|
CN107370754B (en) | 2020-04-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107370754A (en) | A kind of website guard technology of the IP credit worthiness Rating Models based on cloud protection | |
Fornaro et al. | Covid-19 coronavirus and macroeconomic policy | |
CN108234462A (en) | A kind of method that intelligent intercept based on cloud protection threatens IP | |
CN105897714B (en) | Botnet detection method based on DNS traffic characteristics | |
Laurance | A crisis in the making: responses of Amazonian forests to land use and climate change | |
Luitel et al. | The revenue impact of repeated tax amnesties | |
CN110134876B (en) | Network space population event sensing and detecting method based on crowd sensing sensor | |
CN107888571A (en) | A kind of various dimensions webshell intrusion detection methods and detecting system based on HTTP daily records | |
WO2012097171A3 (en) | Systems and methods for using online social footprint for affecting lending performance and credit scoring | |
WO2008046338A1 (en) | Method and system of determining garbage information | |
Siddiqui et al. | Bots and Gender Profiling on Twitter. | |
Michalopoulos et al. | Utilizing document classification for grooming attack recognition | |
Chatchalermpun et al. | Improving cybersecurity awareness using phishing attack simulation | |
Grow et al. | Hacker hunters. | |
Ro et al. | Detection Method for Distributed Web‐Crawlers: A Long‐Tail Threshold Model | |
Kireev | Raiding and the Market for Corporate Control: The Evolution of Strong-Arm Entrepreneurship | |
Nte et al. | Cyber Crime Management among Students: An Evaluation of Legal Correlates of Cyber Crime Management among Tertiary Institutions Students in Nigeria (a Case Study of Delta State) | |
Hook et al. | Multinational corporations and ethnic conflict: theory and experience | |
Chukuigwe et al. | Socioeconomic effects of kidnapping on the development of Ogba/Egbema/Ndoni local government area of Rivers State. Nigeria | |
De la Cruz Arboleda | Climate Change in the Era of Post-Truth | |
Weitz | Moscow’s gray zone toolkit | |
Gangwal et al. | A Study Relating to Cyber Crimes in India During Covid-19 and the Regulations | |
Krause | The persistent consequences of the energy transition in Appalachia’s coal country | |
He et al. | Influence analysis of media supervision in corporate governance | |
Yang et al. | A novel approach for bots detection in sina microblog |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information | ||
CB02 | Change of applicant information |
Address after: Zhejiang Zhongcai Building No. 68 Binjiang District road Hangzhou City, Zhejiang Province, the 310051 and 15 layer Applicant after: Hangzhou Annan information technology Limited by Share Ltd Address before: Zhejiang Zhongcai Building No. 68 Binjiang District road Hangzhou City, Zhejiang Province, the 310051 and 15 layer Applicant before: Dbappsecurity Co.,ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |