NL2033657A - Active defense system and method for network intrusion based on dynamic ip blacklist - Google Patents
Active defense system and method for network intrusion based on dynamic ip blacklist Download PDFInfo
- Publication number
- NL2033657A NL2033657A NL2033657A NL2033657A NL2033657A NL 2033657 A NL2033657 A NL 2033657A NL 2033657 A NL2033657 A NL 2033657A NL 2033657 A NL2033657 A NL 2033657A NL 2033657 A NL2033657 A NL 2033657A
- Authority
- NL
- Netherlands
- Prior art keywords
- attack
- address
- module
- dynamic
- blacklist
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 230000007123 defense Effects 0.000 title claims description 22
- 238000001514 detection method Methods 0.000 claims abstract description 51
- 230000000903 blocking effect Effects 0.000 claims abstract description 38
- 238000004364 calculation method Methods 0.000 claims abstract description 15
- 238000011045 prefiltration Methods 0.000 claims abstract description 11
- 230000009471 action Effects 0.000 claims description 28
- 230000000007 visual effect Effects 0.000 claims description 17
- 206010000117 Abnormal behaviour Diseases 0.000 claims description 7
- 238000004458 analytical method Methods 0.000 claims description 5
- 238000010586 diagram Methods 0.000 claims description 5
- 230000002159 abnormal effect Effects 0.000 claims description 4
- 230000001010 compromised effect Effects 0.000 claims 2
- 230000000694 effects Effects 0.000 abstract description 4
- 238000001914 filtration Methods 0.000 abstract description 2
- 230000006399 behavior Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000011161 development Methods 0.000 description 2
- 230000002238 attenuated effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
- 238000009828 non-uniform distribution Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012795 verification Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0227—Filtering policies
- H04L63/0236—Filtering by address, protocol, port number or service, e.g. IP-address or URL
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/568—Storing data temporarily at an intermediate stage, e.g. caching
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210645186.0A CN115102727A (zh) | 2022-06-08 | 2022-06-08 | 基于动态ip黑名单的网络入侵主动防御系统及方法 |
Publications (2)
Publication Number | Publication Date |
---|---|
NL2033657A true NL2033657A (en) | 2023-12-14 |
NL2033657B1 NL2033657B1 (en) | 2024-06-26 |
Family
ID=83289911
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
NL2033657A NL2033657B1 (en) | 2022-06-08 | 2022-12-02 | Active defense system and method for network intrusion based on dynamic ip blacklist |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN115102727A (zh) |
NL (1) | NL2033657B1 (zh) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116582366B (zh) * | 2023-07-12 | 2023-09-15 | 中国电信股份有限公司 | Web攻击防范方法、装置和系统、存储介质 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110035060A (zh) * | 2019-03-07 | 2019-07-19 | 北京华安普特网络科技有限公司 | 有效防黑客入侵的Web防火墙 |
CN110290148A (zh) * | 2019-07-16 | 2019-09-27 | 深圳乐信软件技术有限公司 | 一种web防火墙的防御方法、装置、服务器及存储介质 |
-
2022
- 2022-06-08 CN CN202210645186.0A patent/CN115102727A/zh active Pending
- 2022-12-02 NL NL2033657A patent/NL2033657B1/en active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110035060A (zh) * | 2019-03-07 | 2019-07-19 | 北京华安普特网络科技有限公司 | 有效防黑客入侵的Web防火墙 |
CN110290148A (zh) * | 2019-07-16 | 2019-09-27 | 深圳乐信软件技术有限公司 | 一种web防火墙的防御方法、装置、服务器及存储介质 |
Non-Patent Citations (1)
Title |
---|
NANCY AGARWAL ET AL: "A closer look at Intrusion Detection System for web applications", ARXIV.ORG, CORNELL UNIVERSITY LIBRARY, 201 OLIN LIBRARY CORNELL UNIVERSITY ITHACA, NY 14853, 16 March 2018 (2018-03-16), XP081259668 * |
Also Published As
Publication number | Publication date |
---|---|
CN115102727A (zh) | 2022-09-23 |
NL2033657B1 (en) | 2024-06-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111800395A (zh) | 一种威胁情报防御方法和系统 | |
US10735455B2 (en) | System for anonymously detecting and blocking threats within a telecommunications network | |
CN103701795B (zh) | 拒绝服务攻击的攻击源的识别方法和装置 | |
CN110071941B (zh) | 一种网络攻击检测方法、设备、存储介质及计算机设备 | |
CN114679338A (zh) | 一种基于网络安全态势感知的网络风险评估方法 | |
JP7204247B2 (ja) | 脅威対応自動化方法 | |
CN109962891A (zh) | 监测云安全的方法、装置、设备和计算机存储介质 | |
US20140047543A1 (en) | Apparatus and method for detecting http botnet based on densities of web transactions | |
CN114372286A (zh) | 数据安全管理方法、装置、计算机设备及存储介质 | |
CN107682345B (zh) | Ip地址的检测方法、检测装置及电子设备 | |
CN106850647B (zh) | 基于dns请求周期的恶意域名检测算法 | |
JP2004030286A (ja) | 侵入検知システムおよび侵入検知プログラム | |
CN113676449A (zh) | 网络攻击处理方法及装置 | |
NL2033657B1 (en) | Active defense system and method for network intrusion based on dynamic ip blacklist | |
CN109561097B (zh) | 结构化查询语言注入安全漏洞检测方法、装置、设备及存储介质 | |
CN115766235A (zh) | 一种网络安全预警系统及预警方法 | |
CN114257403B (zh) | 误报检测方法、设备及可读存储介质 | |
Yu et al. | TRINETR: an intrusion detection alert management systems | |
CN101453363A (zh) | 网络入侵检测系统 | |
Beigh et al. | Performance evaluation of different intrusion detection system: An empirical approach | |
Whyte et al. | Exposure Maps: Removing Reliance on Attribution During Scan Detection. | |
Gavrilovic et al. | Snort IDS system visualization interface for alert analysis | |
Lu et al. | An adaptive real-time intrusion detection system using sequences of system call | |
US11184369B2 (en) | Malicious relay and jump-system detection using behavioral indicators of actors | |
Sandosh et al. | A progressive intrusion detection system through event processing: challenges and motivation |