CN108566394A - A kind of information processing method and device - Google Patents
A kind of information processing method and device Download PDFInfo
- Publication number
- CN108566394A CN108566394A CN201810337962.4A CN201810337962A CN108566394A CN 108566394 A CN108566394 A CN 108566394A CN 201810337962 A CN201810337962 A CN 201810337962A CN 108566394 A CN108566394 A CN 108566394A
- Authority
- CN
- China
- Prior art keywords
- message
- log
- sent
- login
- address
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1491—Countermeasures against malicious traffic using deception as countermeasure, e.g. honeypots, honeynets, decoys or entrapment
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The embodiment of the present application provides a kind of information processing method and device.The method includes:After the determining login message satisfaction from the first source address is preset and hits library rule, when receiving each login message from the first source address, the authentication failed information for each login message is sent to the first source address;Obtain the log-on message in each login message;Log-on message to be verified is received, judges in the log-on message obtained whether to include log-on message to be verified, and send a warning message when comprising log-on message to be verified;And/or, the log-on message of acquisition is sent to each preset address, so that the corresponding equipment of verifying of each preset address determines that the first log-on message is to have revealed log-on message when in verifying log-on message including the first log-on message of itself storage, it includes the log-on message for logging in first server to log in message.Using scheme provided by the embodiments of the present application, information security can be improved.
Description
Technical field
This application involves fields of communication technology, more particularly to a kind of information processing method and device.
Background technology
With popularizing for computer and network, information technology is changing, is affecting the life style of the mankind.Various nets
Network application emerges one after another, and security threat and net abuse are also growing day by day, and new demand is proposed to website webmaster.User name and
These log-on messages of password are as the key for logging in each Website server, even more by strict protection, once leakage consequence is not
It may imagine.
Attacker is by collecting the username and password revealed in internet, batch Website login server, to obtain
To a series of username and passwords that can log in the Website server.Many users use identical user name in different web sites
And password, therefore attacker can be by obtaining user in the username and password of the websites A so that logon attempt B network address, this is just
It is to hit library attack.
The network equipment can detect (Deep Packet Inspection, DPI) technology to sending by deep layer data packet
Login message to Website server carries out hitting library rule match, and then detects to hit library attack.For example, can be according to unit when
Whether the quantity of the login message of interior reception or the login failure number in the unit interval are more than threshold value, to determine whether in the presence of
Hit library attack.
It is generally only to block this attack, and attacker is prevented to continue to attack website service when detecting that hitting library attacks
Device.Processing can prevent attack of the attacker to the Website server in this way.But the log-on message revealed still may be used
It is utilized again by attacker, to log in other network servers, therefore information security is not high.
Invention content
The embodiment of the present application has been designed to provide a kind of information processing method and device, to improve information security.
In order to achieve the above object, the embodiment of the present application provides a kind of information processing method, is applied to the network equipment, should
Method includes:
Determine login message from the first source address meet it is default hit library rule after, receiving from described the
When each login message of one source address, sent to first source address for each authentication failed information for logging in message;
Wherein, the message that logs in includes the log-on message for logging in first server;
Obtain the log-on message in each login message;
Log-on message to be verified is received, judges in the log-on message obtained whether to include the log-on message to be verified, and
It sends a warning message when comprising the log-on message to be verified;And/or the log-on message of acquisition is sent to each default
Location, so that the corresponding verification equipment of each preset address first login letter comprising itself storage in verifying the log-on message
Determine that first log-on message is to have revealed log-on message when breath.
The embodiment of the present application provides another information processing method, is applied to second server, and this method includes:
Receive the log-on message that each network equipment is sent;Wherein, the log-on message is:The network equipment comes from determination
The login message of first source address meet it is default hit library rule after, from from each login message of first source address
It acquires;
The log-on message that each network equipment of reception is sent, is sent to each preset address so that it is each defaultly
The corresponding verification equipment in location determines described first in the first log-on message comprising itself storage in verifying the log-on message
Log-on message is to have revealed log-on message.
The embodiment of the present application provides a kind of information processing unit, is applied to the network equipment, which includes:
First sending module, after presetting in the determining login message satisfaction from the first source address and hitting library rule,
When receiving each login message from first source address, sends to first source address and reported for each log in
The authentication failed information of text;Wherein, the message that logs in includes the log-on message for logging in first server;
Acquisition module, for obtaining the log-on message in each login message;
Authentication module is additionally operable to receive log-on message to be verified, judges whether waited for comprising described in the log-on message obtained
Log-on message is verified, and is sent a warning message when comprising the log-on message to be verified;And/or by the log-on message of acquisition
It is sent to each preset address, so that the corresponding verification equipment of each preset address includes itself in verifying the log-on message
Determine that first log-on message is to have revealed log-on message when the first log-on message of storage.
The embodiment of the present application provides another information processing unit, is applied to second server, which includes:
Second receiving module, the log-on message sent for receiving each network equipment;Wherein, the log-on message is:
The network equipment is after the determining login message satisfaction from the first source address is preset and hits library rule, from from first source
It is acquired in each login message of location;
Second sending module, for will receive each network equipment transmission log-on message, be sent to it is each defaultly
Location, so that the corresponding verification equipment of each preset address first login letter comprising itself storage in verifying the log-on message
Determine that first log-on message is to have revealed log-on message when breath.
The embodiment of the present application provides a kind of network equipment, which includes:Processor and machine readable storage are situated between
Matter, the machine readable storage medium are stored with the machine-executable instruction that can be executed by the processor, the processor
Promoted by the machine-executable instruction:Realize information processing method provided by the embodiments of the present application.This method includes:
Determine login message from the first source address meet it is default hit library rule after, receiving from described the
When each login message of one source address, sent to first source address for each authentication failed information for logging in message;
Wherein, the message that logs in includes the log-on message for logging in first server;
Obtain the log-on message in each login message;
Log-on message to be verified is received, judges in the log-on message obtained whether to include the log-on message to be verified, and
It sends a warning message when comprising the log-on message to be verified;And/or the log-on message of acquisition is sent to each default
Location, so that the corresponding verification equipment of each preset address first login letter comprising itself storage in verifying the log-on message
Determine that first log-on message is to have revealed log-on message when breath.
The embodiment of the present application provides a kind of server, which includes:Processor and machine readable storage medium, institute
It states machine readable storage medium and is stored with the machine-executable instruction that can be executed by the processor, the processor is described
Machine-executable instruction promotes:Realize another information processing method provided by the embodiments of the present application.This method includes:
Receive the log-on message that each network equipment is sent;Wherein, the log-on message is:The network equipment comes from determination
The login message of first source address meet it is default hit library rule after, from from each login message of first source address
It acquires;
The log-on message that each network equipment of reception is sent, is sent to each preset address so that it is each defaultly
The corresponding verification equipment in location determines described first in the first log-on message comprising itself storage in verifying the log-on message
Log-on message is to have revealed log-on message.
The embodiment of the present application provides a kind of computer readable storage medium, is stored in the computer readable storage medium
Computer program, computer program information processing method provided by the embodiments of the present application when being executed by processor.This method
Including:
Determine login message from the first source address meet it is default hit library rule after, receiving from described the
When each login message of one source address, sent to first source address for each authentication failed information for logging in message;
Wherein, the message that logs in includes the log-on message for logging in first server;
Obtain the log-on message in each login message;
Log-on message to be verified is received, judges in the log-on message obtained whether to include the log-on message to be verified, and
It sends a warning message when comprising the log-on message to be verified;And/or the log-on message of acquisition is sent to each default
Location, so that the corresponding verification equipment of each preset address first login letter comprising itself storage in verifying the log-on message
Determine that first log-on message is to have revealed log-on message when breath.
The embodiment of the present application provides a kind of computer readable storage medium, is stored in the computer readable storage medium
Computer program, the computer program realize information processing method provided by the embodiments of the present application when being executed by processor.It should
Method includes:
Receive the log-on message that each network equipment is sent;Wherein, the log-on message is:The network equipment comes from determination
The login message of first source address meet it is default hit library rule after, from from each login message of first source address
It acquires;
The log-on message that each network equipment of reception is sent, is sent to each preset address so that it is each defaultly
The corresponding verification equipment in location determines described first in the first log-on message comprising itself storage in verifying the log-on message
Log-on message is to have revealed log-on message.
Information processing method and device provided by the embodiments of the present application can detect the first source address to first service
After what device was initiated hits library attack, each login message from first source address is continued to, and send out to the first source address
Authentication failed information is sent, continues to send log-on message to trap attacker, collects more log-on messages that attacker grasps.Network
Equipment sends a warning message when can include log-on message to be verified in log-on message.In this way, sending log-on message to be verified
Equipment leak data can be handled according to warning information.And/or the network equipment can be by the log-on message of acquisition
It is sent to each preset address, the corresponding verification equipment of each preset address can determine that itself is stored according to above-mentioned log-on message
The first log-on message whether be to have revealed log-on message.In this way, each verification equipment can be determining the first log-on message
When having revealed log-on message, corresponding defensive measure is executed to own system.Therefore the embodiment of the present application can improve information peace
Quan Xing.Certainly, any product or method for implementing the application do not necessarily require achieving all the advantages described above at the same time.
Description of the drawings
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below
There is attached drawing needed in technology description to be briefly described.It should be evident that the accompanying drawings in the following description is only this
Some embodiments of application for those of ordinary skill in the art without creative efforts, can be with
Obtain other attached drawings according to these attached drawings.
Fig. 1 is a kind of flow diagram of information processing method provided by the embodiments of the present application;
Fig. 2 is the flow diagram of another information processing method provided by the embodiments of the present application;
Fig. 3 is a kind of application scenarios schematic diagram provided by the embodiments of the present application;
Fig. 4 is a kind of structural schematic diagram of information processing unit provided by the embodiments of the present application;
Fig. 5 is the structural schematic diagram of another information processing unit provided by the embodiments of the present application;
Fig. 6 is a kind of structural schematic diagram of the network equipment provided by the embodiments of the present application;
Fig. 7 is a kind of structural schematic diagram of server provided by the embodiments of the present application.
Specific implementation mode
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Whole description.Obviously, described embodiment is only a part of the embodiment of the application, instead of all the embodiments.Base
Embodiment in the application, those of ordinary skill in the art are obtained all without making creative work
Other embodiment shall fall in the protection scope of this application.
In order to improve information security, the embodiment of the present application provides a kind of information processing method and device.Below by
The application is described in detail in specific embodiment.
Fig. 1 is a kind of flow diagram of information processing method provided by the embodiments of the present application, is applied to the network equipment, should
The network equipment can be router or interchanger etc..The present embodiment includes the following steps S101~step S103.
Step S101:After the determining login message satisfaction from the first source address is preset and hits library rule, receiving
When each login message from the first source address, sent to the first source address for each authentication failed letter for logging in message
Breath.
Wherein, above-mentioned login message includes the log-on message for logging in first server, and first server can be one
It is a or multiple.First server can be understood as Website server.First source address can be Internet protocol (Internet
Protocol, IP) address.
It is default to hit library rule and may include:The taking for logging in first from the first source address received in preset duration
The quantity of the login message of business device is more than preset quantity threshold value;And/or received in preset duration from the first source address
The login failure number logged in message for logging in first server is more than preset times threshold value.
For example, 200 login messages from address 1.1.1.1 are received in 10 minutes, if preset quantity threshold value
It is 50, it may be considered that the login message from address 1.1.1.1, which meets to preset, hits library rule;If this 200 login messages
In have 180 login message login failures, i.e., login failure number be 180, when preset times threshold value be 50 when, then it is believed that come
Meet to preset from the login message of address 1.1.1.1 and hits library rule.
It is above-mentioned default to hit library rule and be obtained from associated cloud server in advance.Above-mentioned preset duration, present count
It measures threshold value and preset times threshold value all can be previously according to empirical value determination.
In the present embodiment, the message for carrying specific characteristic can be determined as by the network equipment after receiving each message
Log in message.For example, specific characteristic may include login, userid, password etc..
After the determining login message satisfaction from the first source address is preset and hits library rule, it is believed that detected equipment profit
Library is hit with the first source address to first server initiation to attack.After detecting that hitting library attacks, the present embodiment is not blocked and is attacked
The person's of hitting hits library attack, but continues to each login message from the first source address, and is sent to the first source address
For each authentication failed information for logging in message.Attacker also will continue to after receiving authentication failed information to the first clothes
Business device, which is sent, logs in message.Attacker can be traped in this way to continue to send login message, attacked to which the network equipment can be collected into
The more information that the person of hitting grasps.
Wherein, authentication failed page when authentication failed information can be authentication failed page info, i.e. network address login failure
Face information.Authentication failed information can be obtained from the response message that first server is sent for login message in advance.
In the present embodiment, after the determining login message satisfaction from the first source address is preset and hits library rule, if network
Equipment receives each login message from the first source address, and each login message is no longer forwarded to the first clothes by the network equipment
Business device.
Step S102:Obtain the log-on message in each login message.
When getting the log-on message that each login message carries, each log-on message can be stored.Wherein, letter is logged in
Breath includes username and password.The log-on message of acquisition is a plurality of.
Step S103:Log-on message to be verified is received, judges whether believe comprising login to be verified in the log-on message obtained
Breath, and send a warning message when comprising log-on message to be verified;And/or the log-on message of acquisition is sent to each default
Address, so that the corresponding verification equipment of each preset address includes the first log-on message of itself storage in verifying log-on message
When determine the first log-on message be revealed log-on message.
Above-mentioned log-on message to be verified can be that user equipment is sent, and can also be what network server was sent.
When sending a warning message, send a warning message to the equipment for sending log-on message to be verified.The warning information can
For indicating that log-on message to be verified is to have revealed log-on message.
Above-mentioned preset address can be:Mail address, client address, host address etc..Host address can for IP
Location and/or the address media access control (Media Access Control, MAC) etc..
One preset address can correspond to a verification equipment.Verification equipment can be understood as the equipment in network, this is tested
It can be Website server itself to demonstrate,prove equipment, or belong to the other equipment in same Intranet with Website server.It is each
The enterprise or tissue for verifying equipment belonging network can be the member of anti-leak alliance organization.
Above-mentioned each verification equipment may include the corresponding verification equipment of first server.
It, can be according to mail protocol corresponding with mail address, by the login of acquisition when preset address is mail address
Information through mail protocol massages are sent to each default mail address.For example, when mail protocol is smtp protocol, Ke Yigen
According to message format as defined in the smtp protocol, the mail protocol message for carrying log-on message is generated, which is sent out
It send to default mail address.
When preset address is client address, can will be obtained according to client protocol corresponding with client address
Log-on message each default client address is sent to by client protocol message.
The corresponding equipment of verifying of each preset address can be verified when receiving the log-on message of network equipment transmission
It states in log-on message and whether includes the first log-on message of itself storage, if it is present determining that the first log-on message is to have let out
Reveal log-on message.Wherein, the first log-on message of verification equipment itself storage can be obtained from corresponding network server.
For example, verification equipment itself is stored with 1000 the first log-on messages, verification equipment receives log-on message and includes
5000, then can be directed to the first log-on message of each, by first log-on message respectively with 5000 log-on messages into
Row matching, if successful match, is determined as the first log-on message of this to have revealed log-on message.
As shown in the above, the present embodiment can be sent out using the first source address to first server detecting attacker
After that rises hits library attack, each login message from first source address is continued to, and test to the transmission of the first source address
Failure information is demonstrate,proved, continues to send log-on message to trap attacker, collects more log-on messages that attacker grasps.The network equipment
It sends a warning message when can include log-on message to be verified in log-on message.In this way, sending setting for log-on message to be verified
It is standby leak data to be handled according to warning information.And/or the network equipment can send the log-on message of acquisition
To each preset address, the corresponding verification equipment of each preset address can determine the of itself storage according to above-mentioned log-on message
Whether one log-on message is to have revealed log-on message.In this way, each verification equipment can determine that the first log-on message is to have let out
When revealing log-on message, corresponding defensive measure is executed to own system.Therefore the present embodiment can improve information security.
In another embodiment of the application, it is based on embodiment illustrated in fig. 1, in step S103, by the log-on message of acquisition
When being sent to each preset address, may include:
The log-on message of acquisition is sent to second server, so that second server sends out each network equipment of reception
The log-on message sent is sent to each preset address.
Wherein, second server can be the server being associated in advance with the above-mentioned network equipment.Second server can
Think cloud server.Second server can be associated with multiple network equipments, and can receive each network equipment
The log-on message of transmission.
Optionally, the log-on message that second server can send each network equipment received within a preset period of time
It is sent to each preset address.
Above-mentioned preset time period can be using the period of current time as start time or finish time, and current time is
At the time of when receiving the log-on message that the above-mentioned network equipment is sent.The time span of preset time period can be fixed duration or
Variable duration.
Second server is sent to the log-on message of each preset address, it can be understood as what is received in preset time period is each
The summary information for the log-on message that a network equipment is sent.Second server can be stepped on to what each network equipment of reception was sent
It records information and carries out deduplication operation, the log-on message after duplicate removal is sent to each preset address, verification equipment can be improved in this way
Processing speed.Wherein, deduplication operation can be understood as the operation that removal repeats.
Since the log-on message quantity determined in the above-mentioned network equipment is still than relatively limited, in order to make verification equipment obtain more
More log-on messages, and then more leak datas are identified, the scheme of the present embodiment can be executed.
When the log-on message of acquisition is sent to second server, if there are the password of plaintext in log-on message,
The clear-text passwords can also be converted to ciphertext password, transformed log-on message is sent to second server.In this way can
The privacy of user data is improved as far as possible.It, can be by the Kazakhstan of clear-text passwords when the clear-text passwords is converted to ciphertext password
Uncommon (hash) value is as ciphertext password corresponding with the clear-text passwords.
To sum up, log-on message can be sent to second server by the present embodiment, and second server is by each net of reception
The log-on message that network equipment is sent is sent to each preset address, is sent to the corresponding verification equipment of each preset address in this way
Log-on message is summarizing for the log-on message of each network equipment, log-on message it is more, information is more rich, therefore can be with
So that verification equipment more accurately determines whether log-on message is to have revealed log-on message.
In another embodiment of the application, the network equipment by log-on message after being sent to each preset address, also
The verification result from the first preset address can be received, which includes the second log-on message.First preset address can
Think one in each preset address.
When verification result indicates that above-mentioned second log-on message is to have revealed log-on message, the network equipment presets ground to other
Location sends notice message.
Wherein, other preset address are the preset address in addition to the first preset address in each preset address.It is above-mentioned logical
Know that message carrying is used to indicate cancellation and verifies whether above-mentioned second log-on message is the instruction for having revealed log-on message.
In the present embodiment, when one, which is verified equipment, has verified that above-mentioned second log-on message is to have revealed log-on message,
Notice message is sent to other preset address, other verification equipment no longer need to verify above-mentioned second log-on message in this way,
The calculation amount of verification equipment is reduced as far as possible.
In another embodiment of the application, it is based on embodiment illustrated in fig. 1, the network equipment can also believe the login of acquisition
Breath is sent to verification platform, when so that verification platform including log-on message input by user in above-mentioned log-on message, determines and uses
The log-on message of family input is to have revealed log-on message.
Wherein, verification platform can be understood as server.Verification platform can receive log-on message input by user, and will
Log-on message input by user is matched with above-mentioned log-on message, if successful match, can determine input by user step on
Record information is to have revealed log-on message.Verification platform can export prompt message to user, to prompt user's Modify password etc..
Can include stepping on for user name and ciphertext password when the log-on message of acquisition is sent to verification platform by the network equipment
Record information is sent to verification platform.The privacy of user data can be improved as far as possible in this way.
Password input by user can be converted to ciphertext password, after conversion by verification platform when matching log-on message
Ciphertext password and user name matched with above-mentioned log-on message.
After successful match, verification platform can also be labeled the log-on message of successful match.Receiving other
When log-on message input by user, the log-on message of other users input is verified from unlabelled log-on message.In this way can
Improve the computational efficiency of verification platform.
The present embodiment can provide a user verification platform, can when verification being obtained the log-on message of user being leaked
To prompt user's Modify password, the influence of leak data can be reduced in this way, improves the safety of information.
In another embodiment of the application, above-mentioned authentication failed information includes the login failure page for first server
Face information.The present embodiment may be used following manner and obtain authentication failed page info:
Any log-on message is generated, any log-on message of generation, which is sent to first server, to be verified, and receives the
The login failure page info that one server is sent when to any of the above-described log-on message authentication failed.
The authentication failed page info of first server can be more accurately obtained in this way.By the authentication failed page info
When being sent to the first source address, the corresponding equipment of the first source address is not easy to detect that network equipment side has determined the equipment
For attacker, concealment is more preferable.
In the present embodiment, when generating any log-on message, can within the scope of preset characters range and/or preset number with
Machine selects preset quantity element as username and password.
When any log-on message is proved to be successful in first server, any log-on message can be regenerated, is continued
Any log-on message of generation is sent to first server to verify, until authentication failed, receives the authentication failed page
Information.
Fig. 2 is the flow diagram of another information processing method provided by the embodiments of the present application.This method embodiment is answered
For second server.The method of the present embodiment includes step S201~step S202.
Step S201:Receive the log-on message that each network equipment is sent.
Wherein, above-mentioned log-on message is:The network equipment meets default hit in the determining login message from the first source address
After the rule of library, acquired from from each login message of first source address.
Wherein, second server can be the server being associated in advance with the above-mentioned network equipment.Second server can
Think cloud server.Second server can be associated with multiple network equipments, and can receive each network equipment
The log-on message of transmission.
Step S202:The log-on message that each network equipment of reception is sent, is sent to each preset address, so that respectively
The corresponding equipment of verifying of a preset address is determined in the first log-on message comprising itself storage in verifying above-mentioned log-on message
First log-on message is to have revealed log-on message.
This step is specifically as follows, and the log-on message that each network equipment received in preset time period is sent is sent
To each preset address.
Wherein, each verification equipment includes the corresponding verification equipment of first server.
Above-mentioned preset time period can be using the period of current time as start time or finish time, and current time is
At the time of when receiving the log-on message that the above-mentioned network equipment is sent.The time span of preset time period can be fixed duration or
Variable duration.
To sum up, the present embodiment can receive the log-on message that each network equipment is sent, and log-on message is sent to each
Preset address, the corresponding equipment of verifying of each preset address can determine that the first of itself storage logs according to above-mentioned log-on message
Whether information is to have revealed log-on message.In this way, each verification equipment can determine that the first log-on message is to have revealed login
When information, corresponding defensive measure is executed to own system, therefore the present embodiment can improve information security.Meanwhile this reality
It applies in example since the log-on message of each network equipment is sent to preset address, the comprehensive of log-on message can be improved in this way
Property, it detects more fully to have revealed information.
In another embodiment of the application, it is based on embodiment illustrated in fig. 2, step S202 sets each network of reception
The log-on message that preparation is sent when being sent to each preset address, may include:The login that each network equipment of reception is sent
Information carries out deduplication operation, and the log-on message after duplicate removal is sent to each preset address.
In the present embodiment, removal duplicate data can improve the processing speed of verification equipment.
In another embodiment of the application, it is based on embodiment illustrated in fig. 2, second server may also receive from first
The verification result of preset address.The verification result includes the second log-on message.First preset address can be each preset address
In one.
When verification result indicates that above-mentioned second log-on message is to have revealed log-on message, second server can be to other
Preset address sends notice message.
Wherein, other preset address are the preset address in addition to the first preset address in each preset address.Notice report
Text, which carries, is used to indicate whether cancellation the second log-on message of verification is the instruction for having revealed log-on message.
In the present embodiment, when one, which is verified equipment, has verified that above-mentioned log-on message is to have revealed log-on message, Xiang Qi
He sends notice message by preset address, other verification equipment no longer need to verify above-mentioned log-on message in this way, subtract as far as possible
The calculation amount of equipment is verified less.
In another embodiment of the application, second server can also be by the login of each network equipment of acquisition transmission
Information is sent to verification platform, is used so that verification platform determines when in above-mentioned log-on message including log-on message input by user
The log-on message of family input is to have revealed log-on message.The log-on message that the present embodiment can obtain user in verification has been let out
When dew, user's Modify password is prompted, the influence of leak data can be reduced in this way, improve the safety of information.
Second server can also count each and log in letter when receiving the log-on message that each network equipment is sent
The occurrence number of breath.When the log-on message that verification obtains user is to have revealed log-on message, can also be prompted according to the number
To user, such as the log-on message safety of user can be prompted very low etc. when the number is more than preset value, so that user
Modify password as early as possible improves the safety of user information.
Fig. 1 and embodiment illustrated in fig. 2 are the embodiments obtained based on same inventive concept, and description can mutually join
According to.
It elaborates again to the application with reference to specific example.
Fig. 3 is a kind of concrete application scene schematic diagram provided by the embodiments of the present application.Fig. 3 includes first in network 1
Server A and network equipment A, the first server B in network 2 and network equipment B.It network equipment A and network equipment B and tests
Card platform is connect with second server.User equipment can access verification platform.Network equipment A, network equipment B and the second clothes
Business device is the equipment of manufacturer M.Manufacturer M sets up anti-leak alliance organization, and the enterprise or tissue in network can select to be added and be somebody's turn to do
Anti-leak alliance organization becomes the member of the anti-leak alliance organization.First server A, second server B and third server
C is respectively the network server of network 1, network 2 and network 3.
Member in anti-leak alliance organization can be the company for the network equipment for buying manufacturer M, can also be not purchase
Buy the company of the network equipment of manufacturer M.Having purchased the company of the network equipment of manufacturer M can both select that anti-leak alliance group is added
It knits, can not also be added.
For example, network 1 and network 2 use the network equipment of manufacturer M, network 3 that the network of manufacturer M is not used to set
It is standby;Network 2 and network 3 are the members in anti-leak alliance organization, and network 1 is not the member in anti-leak alliance organization.
Network equipment A can obtain log-on message dataA, and network equipment B can obtain log-on message dataB.Network is set
DataA and dataB can be sent to second server by standby A and network equipment B.
DataA and dataB is carried out duplicate removal by second server, obtains log-on message DATA, and log-on message DATA is equal
The verification equipment being sent in anti-leak alliance organization is sent to 3 middle pipe of the mail address of administrator B and network in network 2
The mail address of reason person C.Since network 1 is not the member in anti-leak alliance organization, second server is not to network 1
Middle administrator A sends log-on message DATA.The host of administrator B can verify DATA after receiving log-on message DATA
In whether the log-on message dataxx of present networks comprising itself storage determines the log-on message of present networks when it is present
Dataxx is to have revealed log-on message.
Second server, can be to the postal of administrator C when receiving the verification result of the mail address from administrator B
Part address sends notice message, to notify administrator C cancels to verify whether above-mentioned dataxx is to have revealed log-on message.
DATA can also be sent to verification platform by second server.Verification platform can receive stepping on for user equipment transmission
Information is recorded, which is matched with DATA, if successful match, then it is assumed that the log-on message that the user equipment is sent
To have revealed log-on message.Verification platform can send the prompt of Modify password to user equipment.
Fig. 4 is a kind of structural schematic diagram of information processing unit provided by the embodiments of the present application.The device is applied to network
Equipment, the network equipment can be router or interchanger etc..The device embodiment is corresponding with embodiment of the method shown in Fig. 1,
Described device includes:
First sending module 401 hits library rule for meeting to preset in the determining login message from the first source address
Afterwards, it when receiving each login message from first source address, sends to be directed to first source address and each step on
Record the authentication failed information of message;Wherein, the message that logs in includes the log-on message for logging in first server;
Acquisition module 402, for obtaining the log-on message in each login message;
Whether authentication module 403 is additionally operable to receive log-on message to be verified, judge in the log-on message obtained comprising described
Log-on message to be verified, and send a warning message when comprising the log-on message to be verified;And/or the login of acquisition is believed
Breath is sent to each preset address, so that the corresponding verification equipment of each preset address includes certainly in verifying the log-on message
Determine that first log-on message is to have revealed log-on message when the first log-on message of body storage.
In another embodiment of the application, the first sending module 401 in Fig. 4 embodiments is specifically used for:
The log-on message of acquisition is sent to second server, so that the second server will be in preset time period
The log-on message that each network equipment of interior reception is sent is sent to each preset address.
In another embodiment of the application, the device in Fig. 4 embodiments further includes:
First receiving module (not shown), for receiving the verification result from the first preset address, the verification
As a result include the second log-on message;
First sending module (not shown) is additionally operable to indicate that second log-on message is when the verification result
When revealing log-on message, notice message is sent to other preset address;
Wherein, other described preset address be each preset address in addition to first preset address defaultly
Location, the notice message carrying are used to indicate whether cancellation the second log-on message of verification is the instruction for having revealed log-on message.
In another embodiment of the application, the authentication module 403 in Fig. 4 embodiments is additionally operable to:
The log-on message of acquisition is sent to verification platform, so that the verification platform includes use in the log-on message
When the log-on message of family input, determine that log-on message input by user is to have revealed log-on message.
In another embodiment of the application, in Fig. 4 embodiments, the authentication failed information includes to be directed to the server
Login failure page info;The acquisition module 402 is additionally operable to obtain the login failure page letter using following operation
Breath:
Any log-on message is generated, any log-on message of generation, which is sent to the first server, to be tested
Card;
Receive the login failure page letter that the first server is sent when to any log-on message authentication failed
Breath.
Since above-mentioned apparatus embodiment is obtained based on embodiment of the method, and this method technique effect having the same,
Therefore details are not described herein for the technique effect of device embodiment.For device embodiments, since it is substantially similar to method
Embodiment, so describing fairly simple, the relevent part can refer to the partial explaination of embodiments of method.
Fig. 5 is a kind of structural schematic diagram of information processing unit provided by the embodiments of the present application.The device embodiment application
In second server.The device embodiment is corresponding with embodiment of the method shown in Fig. 2.The device includes:
Second receiving module 501, the log-on message sent for receiving each network equipment;Wherein, the log-on message
For:The network equipment is after the determining login message satisfaction from the first source address is preset and hits library rule, from from described first
It is acquired in each login message of source address;
Second sending module 502, the log-on message that each network equipment for that will receive is sent are sent to each default
Address, so that first login comprising itself storage in verifying the log-on message of the corresponding verification equipment of each preset address
Determine that first log-on message is to have revealed log-on message when information.
In another embodiment of the application, the second sending module 502 in Fig. 5 embodiments is specifically used for:
The log-on message that each network equipment of reception is sent carries out deduplication operation, and the log-on message after duplicate removal is sent
To each preset address.
In another embodiment of the application, the second receiving module 501 in Fig. 5 embodiments is additionally operable to receive from the
The verification result of one preset address, the verification result include the second log-on message;
Second sending module 502 is additionally operable to indicate that the second log-on message is to have revealed log-on message when the verification result
When, send notice message to other preset address;
Wherein, other described preset address be each preset address in addition to first preset address defaultly
Location, the notice message carrying are used to indicate whether cancellation the second log-on message of verification is the instruction for having revealed log-on message.
Fig. 6 is a kind of structural schematic diagram of the network equipment provided by the embodiments of the present application.The device includes:Processor 601
With machine readable storage medium 602, machine readable storage medium 602, which is stored with, can be held by the machine that processor 601 executes
Row instruction, processor 601 are promoted by machine-executable instruction:Realize a kind of information processing method of the embodiment of the present application.The party
Method includes:
Determine login message from the first source address meet it is default hit library rule after, receiving from described the
When each login message of one source address, sent to first source address for each authentication failed information for logging in message;
Wherein, the message that logs in includes the log-on message for logging in first server;
Obtain the log-on message in each login message;
Log-on message to be verified is received, judges in the log-on message obtained whether to include the log-on message to be verified, and
It sends a warning message when comprising the log-on message to be verified;And/or the log-on message of acquisition is sent to each default
Location, so that the corresponding verification equipment of each preset address first login letter comprising itself storage in verifying the log-on message
Determine that first log-on message is to have revealed log-on message when breath.
To sum up, the present embodiment can be attacked detecting attacker using the library of hitting that the first source address is initiated to first server
After hitting, each login message from first source address is continued to, and authentication failed information is sent to the first source address,
Continue to send log-on message to trap attacker, collects more log-on messages that attacker grasps.The network equipment can log in
It sends a warning message when in information including log-on message to be verified.In this way, the equipment for sending log-on message to be verified can basis
Warning information handles leak data.And/or the log-on message of acquisition can be sent to each preset by the network equipment
Address, the corresponding equipment of verifying of each preset address can determine the first log-on message of itself storage according to above-mentioned log-on message
Whether it is to have revealed log-on message.In this way, each verification equipment can determine that the first log-on message is to have revealed log-on message
When, corresponding defensive measure is executed to own system.Therefore the present embodiment can improve information security.
Fig. 7 is a kind of structural schematic diagram of server provided by the embodiments of the present application.The server includes:Processor 701
With machine readable storage medium 702, machine readable storage medium 702 is stored with the machine that can be executed by the processor 701
Executable instruction, processor 701 are promoted by machine-executable instruction:Realize another information processing side of the embodiment of the present application
Method.This method includes:
Receive the log-on message that each network equipment is sent;Wherein, the log-on message is:The network equipment comes from determination
The login message of first source address meet it is default hit library rule after, from from each login message of first source address
It acquires;
The log-on message that each network equipment of reception is sent, is sent to each preset address so that it is each defaultly
The corresponding verification equipment in location determines described first in the first log-on message comprising itself storage in verifying the log-on message
Log-on message is to have revealed log-on message.
To sum up, the present embodiment can receive the log-on message that each network equipment is sent, and log-on message is sent to each
Preset address, the corresponding equipment of verifying of each preset address can determine that the first of itself storage logs according to above-mentioned log-on message
Whether information is to have revealed log-on message.In this way, each verification equipment can determine that the first log-on message is to have revealed login
When information, corresponding defensive measure is executed to own system, therefore the present embodiment can improve information security.Meanwhile this reality
It applies in example since the log-on message of each network equipment is sent to preset address, the comprehensive of log-on message can be improved in this way
Property, it detects more fully to have revealed information.
The embodiment of the present application provides a kind of computer readable storage medium, is stored in the computer readable storage medium
Computer program, the computer program realize a kind of information processing method of the embodiment of the present application when being executed by processor.It should
Method includes:
Determine login message from the first source address meet it is default hit library rule after, receiving from described the
When each login message of one source address, sent to first source address for each authentication failed information for logging in message;
Wherein, the message that logs in includes the log-on message for logging in first server;
Obtain the log-on message in each login message;
Log-on message to be verified is received, judges in the log-on message obtained whether to include the log-on message to be verified, and
It sends a warning message when comprising the log-on message to be verified;And/or the log-on message of acquisition is sent to each default
Location, so that the corresponding verification equipment of each preset address first login letter comprising itself storage in verifying the log-on message
Determine that first log-on message is to have revealed log-on message when breath.
To sum up, the present embodiment can be attacked detecting attacker using the library of hitting that the first source address is initiated to first server
After hitting, each login message from first source address is continued to, and authentication failed information is sent to the first source address,
Continue to send log-on message to trap attacker, collects more log-on messages that attacker grasps.The network equipment can log in
It sends a warning message when in information including log-on message to be verified.In this way, the equipment for sending log-on message to be verified can basis
Warning information handles leak data.And/or the log-on message of acquisition can be sent to each preset by the network equipment
Address, the corresponding equipment of verifying of each preset address can determine the first log-on message of itself storage according to above-mentioned log-on message
Whether it is to have revealed log-on message.In this way, each verification equipment can determine that the first log-on message is to have revealed log-on message
When, corresponding defensive measure is executed to own system.Therefore the present embodiment can improve information security.
The embodiment of the present application provides a kind of computer readable storage medium, is stored in the computer readable storage medium
Computer program realizes another information processing method of the embodiment of the present application when computer program is executed by processor.The party
Method includes:
Receive the log-on message that each network equipment is sent;Wherein, the log-on message is:The network equipment comes from determination
The login message of first source address meet it is default hit library rule after, from from each login message of first source address
It acquires;
The log-on message that each network equipment of reception is sent, is sent to each preset address so that it is each defaultly
The corresponding verification equipment in location determines the first login in the first log-on message comprising itself storage in verifying the log-on message
Information is to have revealed log-on message.
To sum up, the present embodiment can receive the log-on message that each network equipment is sent, and log-on message is sent to each
Preset address, the corresponding equipment of verifying of each preset address can determine that the first of itself storage logs according to above-mentioned log-on message
Whether information is to have revealed log-on message.In this way, each verification equipment can determine that the first log-on message is to have revealed login
When information, corresponding defensive measure is executed to own system, therefore the present embodiment can improve information security.Meanwhile this reality
It applies in example since the log-on message of each network equipment is sent to preset address, the comprehensive of log-on message can be improved in this way
Property, it detects more fully to have revealed information.
It should be noted that herein, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or any other variant be intended to it is non-
It is exclusive to include, so that the process, method, article or equipment including a series of elements includes not only those elements,
But also include other elements that are not explicitly listed, or further include solid by this process, method, article or equipment
Some elements.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including
There is also other identical elements in the process, method, article or equipment of the element.
Each embodiment in this specification is all made of relevant mode and describes, identical similar portion between each embodiment
Point just to refer each other, and each embodiment focuses on the differences from other embodiments.
The foregoing is merely the preferred embodiments of the application, are not intended to limit the protection domain of the application.It is all
Any modification, equivalent substitution, improvement and etc. done within spirit herein and principle are all contained in the protection domain of the application
It is interior.
Claims (15)
1. a kind of information processing method, which is characterized in that it is applied to the network equipment, the method includes:
After the determining login message satisfaction from the first source address is preset and hits library rule, first source is come from receiving
When each login message of address, sent to first source address for each authentication failed information for logging in message;Wherein,
The message that logs in includes the log-on message for logging in first server;
Obtain the log-on message in each login message;
Log-on message to be verified is received, judges in the log-on message obtained whether to include the log-on message to be verified, and wrapping
It sends a warning message when containing the log-on message to be verified;And/or the log-on message of acquisition is sent to each preset address,
So that corresponding the first log-on message verified equipment and include itself storage in verifying the log-on message of each preset address
When determine first log-on message be revealed log-on message.
2. according to the method described in claim 1, it is characterized in that, it is described the log-on message of acquisition is sent to it is each default
The step of location, including:
The log-on message of acquisition is sent to second server, so that the second server sets each network of reception
The log-on message that preparation is sent is sent to each preset address.
3. according to the method described in claim 1, it is characterized in that, the method further includes:
The verification result from the first preset address is received, the verification result includes the second log-on message;
When the verification result indicates that second log-on message is to have revealed log-on message, sent to other preset address logical
Know message;
Wherein, other described preset address are the preset address in addition to first preset address, institute in each preset address
It states notice message carrying and is used to indicate whether cancellation verification second log-on message is the instruction for having revealed log-on message.
4. according to the method described in claim 1, it is characterized in that, the method further includes:
The log-on message of acquisition is sent to verification platform, so that the verification platform is defeated comprising user in the log-on message
When the log-on message entered, determine that log-on message input by user is to have revealed log-on message.
5. according to the method described in claim 1, it is characterized in that, the authentication failed information includes to be directed to the first service
The login failure page info of device;The login failure page info is then obtained in the following ways:
Any log-on message is generated, any log-on message of generation, which is sent to the first server, to be verified;
Receive the login failure page info that the first server is sent when to any log-on message authentication failed.
6. a kind of information processing method, which is characterized in that it is applied to second server, the method includes:
Receive the log-on message that each network equipment is sent;Wherein, the log-on message is:The network equipment is being determined from first
The login message of source address meet it is default hit library rule after, obtained from from each login message of first source address
It obtains;
The log-on message that each network equipment of reception is sent, is sent to each preset address, so that each preset address pair
The verification equipment answered determines that described first logs in the first log-on message comprising itself storage in verifying the log-on message
Information is to have revealed log-on message.
7. according to the method described in claim 6, it is characterized in that, the login that each network equipment by reception is sent is believed
The step of ceasing, being sent to each preset address, including:
The log-on message that each network equipment of reception is sent carries out deduplication operation, and the log-on message after duplicate removal is sent to respectively
A preset address.
8. according to the method described in claim 6, it is characterized in that, the method further includes:
The verification result from the first preset address is received, the verification result includes the second log-on message;
When the verification result indicates that second log-on message is to have revealed log-on message, sent to other preset address logical
Know message;
Wherein, other described preset address are the preset address in addition to first preset address, institute in each preset address
It states notice message carrying and is used to indicate whether cancellation verification second log-on message is the instruction for having revealed log-on message.
9. a kind of information processing unit, which is characterized in that be applied to the network equipment, described device includes:
First sending module is connecing after presetting in the determining login message satisfaction from the first source address and hitting library rule
When receiving each login message from first source address, sent to first source address for each login message
Authentication failed information;Wherein, the message that logs in includes the log-on message for logging in first server;
Acquisition module, for obtaining the log-on message in each login message;
Authentication module judges in the log-on message obtained whether to be verified to be stepped on comprising described for receiving log-on message to be verified
Information is recorded, and is sent a warning message when comprising the log-on message to be verified;And/or the log-on message of acquisition is sent to
Each preset address, so that the corresponding verification equipment of each preset address includes itself storage in verifying the log-on message
Determine that first log-on message is to have revealed log-on message when the first log-on message.
10. device according to claim 9, which is characterized in that first sending module is specifically used for:
The log-on message of acquisition is sent to second server, so that the second server will connect within a preset period of time
The log-on message that each network equipment received is sent is sent to each preset address.
11. device according to claim 9, which is characterized in that described device further includes:
First receiving module, for receiving the verification result from the first preset address, the verification result includes the second login
Information;
First sending module is additionally operable to when the verification result indicates that second log-on message is to have revealed log-on message,
Notice message is sent to other preset address;
Wherein, other described preset address are the preset address in addition to first preset address, institute in each preset address
It states notice message carrying and is used to indicate whether cancellation verification second log-on message is the instruction for having revealed log-on message.
12. device according to claim 9, which is characterized in that the authentication module is additionally operable to:
The log-on message of acquisition is sent to verification platform, so that the verification platform is defeated comprising user in the log-on message
When the log-on message entered, determine that log-on message input by user is to have revealed log-on message.
13. a kind of information processing unit, which is characterized in that be applied to second server, described device includes:
Second receiving module, the log-on message sent for receiving each network equipment;Wherein, the log-on message is:Network
Equipment is after the determining login message satisfaction from the first source address is preset and hits library rule, from from first source address
It is acquired in each login message;
Second sending module, the log-on message that each network equipment for that will receive is sent, is sent to each preset address, with
Make the corresponding verification equipment of each preset address in the first log-on message comprising itself storage in verifying the log-on message
Determine that first log-on message is to have revealed log-on message.
14. a kind of network equipment, which is characterized in that including:Processor and machine readable storage medium, the machine readable storage
Media storage has the machine-executable instruction that can be executed by the processor, and the processor is by the machine-executable instruction
Promote:Realize any method and steps of claim 1-5.
15. a kind of server, which is characterized in that including:Processor and machine readable storage medium, the machine readable storage are situated between
Matter is stored with the machine-executable instruction that can be executed by the processor, and the processor is promoted by the machine-executable instruction
Make:Realize any method and steps of claim 6-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810337962.4A CN108566394B (en) | 2018-04-16 | 2018-04-16 | Information processing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810337962.4A CN108566394B (en) | 2018-04-16 | 2018-04-16 | Information processing method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108566394A true CN108566394A (en) | 2018-09-21 |
CN108566394B CN108566394B (en) | 2020-10-02 |
Family
ID=63535144
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810337962.4A Active CN108566394B (en) | 2018-04-16 | 2018-04-16 | Information processing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108566394B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109446789A (en) * | 2018-10-22 | 2019-03-08 | 武汉极意网络科技有限公司 | Anticollision library method, equipment, storage medium and device based on artificial intelligence |
CN109815689A (en) * | 2018-12-28 | 2019-05-28 | 北京奇安信科技有限公司 | A kind of website cipher safety guard method and device |
CN112153052A (en) * | 2020-09-25 | 2020-12-29 | 北京微步在线科技有限公司 | Method and system for monitoring database collision attack |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102006271A (en) * | 2008-09-02 | 2011-04-06 | F2威尔股份有限公司 | IP address secure multi-channel authentication for online transactions |
US20140298038A1 (en) * | 2013-03-26 | 2014-10-02 | Tata Consultancy Services Limited | Generation of randomized messages for cryptographic hash functions |
CN104811449A (en) * | 2015-04-21 | 2015-07-29 | 深信服网络科技(深圳)有限公司 | Base collision attack detecting method and system |
CN105577670A (en) * | 2015-12-29 | 2016-05-11 | 南威软件股份有限公司 | Warning system of database-hit attack |
CN105939326A (en) * | 2016-01-18 | 2016-09-14 | 杭州迪普科技有限公司 | Message processing method and device |
CN106209907A (en) * | 2016-08-30 | 2016-12-07 | 杭州华三通信技术有限公司 | A kind of method and device detecting malicious attack |
CN107770112A (en) * | 2016-08-15 | 2018-03-06 | 娄奥林 | A kind of method for preventing that account is stolen and server |
-
2018
- 2018-04-16 CN CN201810337962.4A patent/CN108566394B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102006271A (en) * | 2008-09-02 | 2011-04-06 | F2威尔股份有限公司 | IP address secure multi-channel authentication for online transactions |
US20140298038A1 (en) * | 2013-03-26 | 2014-10-02 | Tata Consultancy Services Limited | Generation of randomized messages for cryptographic hash functions |
CN104811449A (en) * | 2015-04-21 | 2015-07-29 | 深信服网络科技(深圳)有限公司 | Base collision attack detecting method and system |
CN105577670A (en) * | 2015-12-29 | 2016-05-11 | 南威软件股份有限公司 | Warning system of database-hit attack |
CN105939326A (en) * | 2016-01-18 | 2016-09-14 | 杭州迪普科技有限公司 | Message processing method and device |
CN107770112A (en) * | 2016-08-15 | 2018-03-06 | 娄奥林 | A kind of method for preventing that account is stolen and server |
CN106209907A (en) * | 2016-08-30 | 2016-12-07 | 杭州华三通信技术有限公司 | A kind of method and device detecting malicious attack |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109446789A (en) * | 2018-10-22 | 2019-03-08 | 武汉极意网络科技有限公司 | Anticollision library method, equipment, storage medium and device based on artificial intelligence |
CN109815689A (en) * | 2018-12-28 | 2019-05-28 | 北京奇安信科技有限公司 | A kind of website cipher safety guard method and device |
CN112153052A (en) * | 2020-09-25 | 2020-12-29 | 北京微步在线科技有限公司 | Method and system for monitoring database collision attack |
Also Published As
Publication number | Publication date |
---|---|
CN108566394B (en) | 2020-10-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Thomas et al. | Protecting accounts from credential stuffing with password breach alerting | |
Hu et al. | {End-to-End} measurements of email spoofing attacks | |
US8819769B1 (en) | Managing user access with mobile device posture | |
Cui et al. | A quantitative analysis of the insecurity of embedded network devices: results of a wide-area scan | |
Brugger et al. | An assessment of the DARPA IDS evaluation dataset using snort | |
CN103067385B (en) | The method of defence Hijack Attack and fire compartment wall | |
CN105939326A (en) | Message processing method and device | |
CN107624238A (en) | To the safe access control of the application based on cloud | |
CN108566394A (en) | A kind of information processing method and device | |
Fraunholz et al. | Defending web servers with feints, distraction and obfuscation | |
CN104363240A (en) | Unknown threat comprehensive detection method based on information flow behavior validity detection | |
CN106209907B (en) | Method and device for detecting malicious attack | |
Dai et al. | The hijackers guide to the galaxy:{Off-Path} taking over internet resources | |
Vykopal et al. | Network-based dictionary attack detection | |
Gavazzi et al. | A Study of {Multi-Factor} and {Risk-Based} Authentication Availability | |
CN106790073B (en) | Blocking method and device for malicious attack of Web server and firewall | |
Harsha et al. | Bicycle attacks considered harmful: Quantifying the damage of widespread password length leakage | |
CN110502896B (en) | Leakage monitoring method and system for website information and related device | |
CN104252598B (en) | A kind of method and device detected using loophole | |
Brindtha et al. | Identification and detecting of attacker in a purchase portal using honeywords | |
Rajab et al. | Peeking through the cloud: Client density estimation via dns cache probing | |
Vo et al. | Protecting web 2.0 services from botnet exploitations | |
CN108600209A (en) | A kind of information processing method and device | |
JP2018142266A (en) | Illegal access detector, program and method | |
Cimaszewski et al. | How Effective is {Multiple-Vantage-Point} Domain Control Validation? |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |