NL2033657A - Active defense system and method for network intrusion based on dynamic ip blacklist - Google Patents

Active defense system and method for network intrusion based on dynamic ip blacklist Download PDF

Info

Publication number
NL2033657A
NL2033657A NL2033657A NL2033657A NL2033657A NL 2033657 A NL2033657 A NL 2033657A NL 2033657 A NL2033657 A NL 2033657A NL 2033657 A NL2033657 A NL 2033657A NL 2033657 A NL2033657 A NL 2033657A
Authority
NL
Netherlands
Prior art keywords
attack
address
module
dynamic
blacklist
Prior art date
Application number
NL2033657A
Other languages
English (en)
Dutch (nl)
Other versions
NL2033657B1 (en
Inventor
Bao Jidong
Liu Yong
Zhao Xinhui
Meng Jie
Yang Shengju
Original Assignee
Gansu Institute Of Scientific And Technical Information Gansu Academy Of Science And Tech For Develo
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gansu Institute Of Scientific And Technical Information Gansu Academy Of Science And Tech For Develo filed Critical Gansu Institute Of Scientific And Technical Information Gansu Academy Of Science And Tech For Develo
Publication of NL2033657A publication Critical patent/NL2033657A/en
Application granted granted Critical
Publication of NL2033657B1 publication Critical patent/NL2033657B1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0236Filtering by address, protocol, port number or service, e.g. IP-address or URL
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/568Storing data temporarily at an intermediate stage, e.g. caching

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)
NL2033657A 2022-06-08 2022-12-02 Active defense system and method for network intrusion based on dynamic ip blacklist NL2033657B1 (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210645186.0A CN115102727A (zh) 2022-06-08 2022-06-08 基于动态ip黑名单的网络入侵主动防御系统及方法

Publications (2)

Publication Number Publication Date
NL2033657A true NL2033657A (en) 2023-12-14
NL2033657B1 NL2033657B1 (en) 2024-06-26

Family

ID=83289911

Family Applications (1)

Application Number Title Priority Date Filing Date
NL2033657A NL2033657B1 (en) 2022-06-08 2022-12-02 Active defense system and method for network intrusion based on dynamic ip blacklist

Country Status (2)

Country Link
CN (1) CN115102727A (zh)
NL (1) NL2033657B1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116582366B (zh) * 2023-07-12 2023-09-15 中国电信股份有限公司 Web攻击防范方法、装置和系统、存储介质

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110035060A (zh) * 2019-03-07 2019-07-19 北京华安普特网络科技有限公司 有效防黑客入侵的Web防火墙
CN110290148A (zh) * 2019-07-16 2019-09-27 深圳乐信软件技术有限公司 一种web防火墙的防御方法、装置、服务器及存储介质

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110035060A (zh) * 2019-03-07 2019-07-19 北京华安普特网络科技有限公司 有效防黑客入侵的Web防火墙
CN110290148A (zh) * 2019-07-16 2019-09-27 深圳乐信软件技术有限公司 一种web防火墙的防御方法、装置、服务器及存储介质

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
NANCY AGARWAL ET AL: "A closer look at Intrusion Detection System for web applications", ARXIV.ORG, CORNELL UNIVERSITY LIBRARY, 201 OLIN LIBRARY CORNELL UNIVERSITY ITHACA, NY 14853, 16 March 2018 (2018-03-16), XP081259668 *

Also Published As

Publication number Publication date
CN115102727A (zh) 2022-09-23
NL2033657B1 (en) 2024-06-26

Similar Documents

Publication Publication Date Title
CN111800395A (zh) 一种威胁情报防御方法和系统
US10735455B2 (en) System for anonymously detecting and blocking threats within a telecommunications network
CN103701795B (zh) 拒绝服务攻击的攻击源的识别方法和装置
CN110071941B (zh) 一种网络攻击检测方法、设备、存储介质及计算机设备
CN114679338A (zh) 一种基于网络安全态势感知的网络风险评估方法
JP7204247B2 (ja) 脅威対応自動化方法
CN109962891A (zh) 监测云安全的方法、装置、设备和计算机存储介质
US20140047543A1 (en) Apparatus and method for detecting http botnet based on densities of web transactions
CN114372286A (zh) 数据安全管理方法、装置、计算机设备及存储介质
CN107682345B (zh) Ip地址的检测方法、检测装置及电子设备
CN106850647B (zh) 基于dns请求周期的恶意域名检测算法
JP2004030286A (ja) 侵入検知システムおよび侵入検知プログラム
CN113676449A (zh) 网络攻击处理方法及装置
NL2033657B1 (en) Active defense system and method for network intrusion based on dynamic ip blacklist
CN109561097B (zh) 结构化查询语言注入安全漏洞检测方法、装置、设备及存储介质
CN115766235A (zh) 一种网络安全预警系统及预警方法
CN114257403B (zh) 误报检测方法、设备及可读存储介质
Yu et al. TRINETR: an intrusion detection alert management systems
CN101453363A (zh) 网络入侵检测系统
Beigh et al. Performance evaluation of different intrusion detection system: An empirical approach
Whyte et al. Exposure Maps: Removing Reliance on Attribution During Scan Detection.
Gavrilovic et al. Snort IDS system visualization interface for alert analysis
Lu et al. An adaptive real-time intrusion detection system using sequences of system call
US11184369B2 (en) Malicious relay and jump-system detection using behavioral indicators of actors
Sandosh et al. A progressive intrusion detection system through event processing: challenges and motivation