CN1421772A - New system safety guarding method of observing invading scan behavior - Google Patents

New system safety guarding method of observing invading scan behavior Download PDF

Info

Publication number
CN1421772A
CN1421772A CN 01129120 CN01129120A CN1421772A CN 1421772 A CN1421772 A CN 1421772A CN 01129120 CN01129120 CN 01129120 CN 01129120 A CN01129120 A CN 01129120A CN 1421772 A CN1421772 A CN 1421772A
Authority
CN
China
Prior art keywords
port
scan
monitoring
new
invasion
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 01129120
Other languages
Chinese (zh)
Inventor
王云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ANMENG SCIENCE AND TECHNOLOGY CO LTD SICHUAN
Original Assignee
ANMENG SCIENCE AND TECHNOLOGY CO LTD SICHUAN
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ANMENG SCIENCE AND TECHNOLOGY CO LTD SICHUAN filed Critical ANMENG SCIENCE AND TECHNOLOGY CO LTD SICHUAN
Priority to CN 01129120 priority Critical patent/CN1421772A/en
Publication of CN1421772A publication Critical patent/CN1421772A/en
Pending legal-status Critical Current

Links

Abstract

The present invention proposes one new method of observing invasion scan behavior and prevent port invasion. The method includes of establishing port monitoring, accepting, client side data request, closing monitoring scan connecting port and other execution programs. The method features the judgement of whether or not invasion scanning exists through closing monitoring scan port, altering port, etc; monitoring and recording scan information via the port; and blocking invasion scan behavior via continuous close of scan port and altering monitoring port. The method has the advantages of accurate judgment of invasion behavior, reliable scan information record, etc.

Description

A kind of new method of discovering inbreak scan behavior protection system safety
Technical field:
The present invention relates to a kind of guard method of network security, definitely say so to relate to and a kind ofly can discover a kind of technical method that the invador is scanned behavior protection system safety effectively.
Background technology:
There is not a kind of instrument can as Internet, change the world in the world today, duty is sought in shopping from network, online transaction, online investment on the net, from the broadcasting bulletin system to E-mail, from the news report to the preview, sports and amusement, no matter minor matter or global major issue, almost all knowledge since the dawn of human civilization can obtain on the net, people more and more dependency network change oneself life, enjoy the huge facility that it brings.But,, come the threat on the automatic network also to increasingly sharpen in the behind of this prosperity; total some people puts law and gives and ignoring in the society for playing one's own game; utilize network to spy on other people secret, even be engaged in illegal activity, so network security protection has become the important topic of current network security work.Inbreak scan is the first step before the invador implements to attack, and also is the gimmick that they habitually practise.Because the service of each website all is disclosed, system must respond all requests, therefore generally can't judge whether the port of people in scanning oneself, like this, detection to port scanning also just becomes a great problem, the invador utilizes this point just, by using scanner that network objectives is carried out port scanning, the distribution of various tcp ports of target remote server and the service that provides can be provided with leaving no trace, be which kind of operating system, there is any known leak, their software versions, some information of service, also just can be indirectly or recognize the existing safety problem of distance host intuitively, for next step attack is prepared.If we can have the inbreak scan stage of a kind of way before intruder attack, just can perceive the scanning behavior of port invasion effectively, and the system manager sent warning information, just can take the precautionary measures timely and effectively, simultaneously also can be by the port scanning record, judge assailant's the source position of coming,, the track of offender of public security department is had very big help system manager's recovery system after attack.
Summary of the invention:
The objective of the invention is to: solve the difficult problem that the port scanning that exists at present detects, for the user provide a kind of can discover effectively the invasion scan line for and the source and the new method of taking precautions against, be that network security protection increases new technical measures.
The new method of discovering inbreak scan behavior protection system safety of the present invention; monitor by set up port at this machine; receive client data request; closing the executive routines such as scanning connectivity port of monitoring forms; it is characterized in that: after having closed the scanning connectivity port of monitoring; rebuild a new listening port; after new port is scanned connection again; close this port again; change a new listening port again, like this, be scanned and connect a port; just close this port at once; build new port again, so circulate, and note the information that is scanned at listening port; and send warning information to the system manager, recover initial listening port then.
The invention has the advantages that: 1. monitor, can judge the port that is scanned and note scanning information, provide preparation, also follow the trail of the invador and offer help for relevant department for the system manager takes precautions against the invasion attack by setting up port; 2. the change listening port by continuously is connected with the continuous scanning that is subjected to, and can judge the inbreak scan behavior exactly; 3. by constantly closing port and the new listening port of change that is scanned connection, can stop the port scanning intrusion behavior effectively.
Description of drawings:
The present invention has given the executive routine process flow diagram of discovering inbreak scan behavior protection system safety new method.
Embodiment:
Discovering the core of inbreak scan behavior protection system safety method, is to monitor by setting up port, for the continuous invasion port scanning that occurs, takes constantly to change the measure of listening port, stops up contingent port intrusion behavior.
Its concrete implementing measure is finished by following executive routine:
1, utilizing the serverSocket technology to set up a plurality of ports at this machine monitors.
Partial code: int port=5; ServerSocket ss=new ServerSocket (port);
2, wait for client (Client) request of data (Accept).
Partial code: Socket s=ss.accept ();
3, receive client-requested.
Partial code: if (s!=null) ...;
4, close serverSocket (port monitoring).
Partial code: ss.close ();
5, utilizing the serverSocket technology to add 5 algorithm by original port sets up new port and monitors.
Partial code: port+=5; ServerSocket ss=new ServerSocket (port);
6, judge whether the port numbers of monitoring has at present satisfied the program requirement.
Partial code: if (port==50) ...;
7, writing scan information.
Partial code: insertLog (IP);
8, send a warning message.
Partial code: sendAlert (EMAIL);
9, recovering initial port monitors.
Partial code: port=5; ServerSocket ss=new ServerSocket (port);

Claims (1)

1; a kind of new method of discovering inbreak scan behavior protection system safety; monitor by set up port at this machine; receive client data request; closing executive routines such as monitoring the scanning connectivity port forms; it is characterized in that: after having closed the scanning connectivity port of monitoring; rebuild a new listening port; after new port is scanned connection again; close this port again; reconstruct a new listening port again, like this, be scanned and connect a port; just close this port at once; build new port again, so circulate, and note the information that is scanned at listening port; and send warning information to the system manager, recover initial listening port then.
CN 01129120 2001-11-27 2001-11-27 New system safety guarding method of observing invading scan behavior Pending CN1421772A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN 01129120 CN1421772A (en) 2001-11-27 2001-11-27 New system safety guarding method of observing invading scan behavior

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 01129120 CN1421772A (en) 2001-11-27 2001-11-27 New system safety guarding method of observing invading scan behavior

Publications (1)

Publication Number Publication Date
CN1421772A true CN1421772A (en) 2003-06-04

Family

ID=4668915

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 01129120 Pending CN1421772A (en) 2001-11-27 2001-11-27 New system safety guarding method of observing invading scan behavior

Country Status (1)

Country Link
CN (1) CN1421772A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1917426B (en) * 2005-08-17 2010-12-08 国际商业机器公司 Port scanning method and device, port scanning detection method and device, port scanning system
CN101272286B (en) * 2008-05-15 2010-12-15 上海交通大学 Network inbreak event association detecting method
CN101902349B (en) * 2009-05-27 2012-10-31 北京启明星辰信息技术股份有限公司 Method and system for detecting scanning behaviors of ports
CN104967609A (en) * 2015-04-28 2015-10-07 腾讯科技(深圳)有限公司 Intranet development server access method, intranet development server access device and intranet development server access system
CN109951368A (en) * 2019-05-07 2019-06-28 百度在线网络技术(北京)有限公司 Anti-scanning method, device, equipment and the storage medium of controller LAN
CN109995727A (en) * 2017-12-30 2019-07-09 中国移动通信集团河北有限公司 Penetration attack behavior active protection method, device, equipment and medium

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1917426B (en) * 2005-08-17 2010-12-08 国际商业机器公司 Port scanning method and device, port scanning detection method and device, port scanning system
CN101272286B (en) * 2008-05-15 2010-12-15 上海交通大学 Network inbreak event association detecting method
CN101902349B (en) * 2009-05-27 2012-10-31 北京启明星辰信息技术股份有限公司 Method and system for detecting scanning behaviors of ports
CN104967609A (en) * 2015-04-28 2015-10-07 腾讯科技(深圳)有限公司 Intranet development server access method, intranet development server access device and intranet development server access system
CN104967609B (en) * 2015-04-28 2018-11-06 腾讯科技(深圳)有限公司 Intranet exploitation server access method, apparatus and system
CN109995727A (en) * 2017-12-30 2019-07-09 中国移动通信集团河北有限公司 Penetration attack behavior active protection method, device, equipment and medium
CN109995727B (en) * 2017-12-30 2021-11-09 中国移动通信集团河北有限公司 Active protection method, device, equipment and medium for penetration attack behavior
CN109951368A (en) * 2019-05-07 2019-06-28 百度在线网络技术(北京)有限公司 Anti-scanning method, device, equipment and the storage medium of controller LAN
CN109951368B (en) * 2019-05-07 2021-07-30 百度在线网络技术(北京)有限公司 Anti-scanning method, device, equipment and storage medium for controller local area network

Similar Documents

Publication Publication Date Title
CN109729180B (en) Whole system intelligent community platform
Liu Architectures for intrusion tolerant database systems
Sundaram An introduction to intrusion detection
Geer Security technologies go phishing
CN105391729A (en) Web loophole automatic mining method based on fuzzy test
CN110460611B (en) Machine learning-based full-flow attack detection technology
CN110443031A (en) A kind of two dimensional code Risk Identification Method and system
CN113032793A (en) Intelligent reinforcement system and method for data security
Goldstein et al. Enhancing Security Event Management Systems with Unsupervised Anomaly Detection.
CN111181918A (en) TTP-based high-risk asset discovery and network attack tracing method
CN101719846A (en) Security monitoring method, device and system
CN1421772A (en) New system safety guarding method of observing invading scan behavior
CN113794276A (en) Power distribution network terminal safety behavior monitoring system and method based on artificial intelligence
CN110022305A (en) Web portal security guard system and method
KR100736540B1 (en) Web defacement checker and checking method thereof
Masri et al. Using dynamic information flow analysis to detect attacks against applications
CN107509200A (en) Equipment localization method and device based on wireless network invasion
Valeur et al. An anomaly-driven reverse proxy for web applications
CN113065026A (en) Intelligent abnormal event detection system, method and medium based on security micro-service architecture
CN113132370A (en) Universal integrated safety pipe center system
Herrerias et al. A log correlation model to support the evidence search process in a forensic investigation
CN104143064A (en) Website data security system based on association analysis of database activity and web access
Zhang A comparative study on sanction system of cyber aider from perspectives of German and Chinese criminal law
CN112491875B (en) Intelligent tracking safety detection method and system based on account system
Lin et al. Automated analysis of multi-source logs for network forensics

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C02 Deemed withdrawal of patent application after publication (patent law 2001)
WD01 Invention patent application deemed withdrawn after publication