Method and apparatus for detecting traffic

    公开(公告)号:US11444861B2

    公开(公告)日:2022-09-13

    申请号:US16676028

    申请日:2019-11-06

    Abstract: Embodiments of the present disclosure relate to a method and apparatus for detecting traffic. The method includes: acquiring traffic information of at least two dimensions of a target IP; determining whether the traffic information of the at least two dimensions contains traffic information exceeding an abnormal traffic threshold of a corresponding dimension of the target IP; and in response to determining that the traffic information of the at least two dimensions contains the traffic information exceeding the abnormal traffic threshold of the corresponding dimension, determining that the traffic of the target IP is abnormal.

    Anti-cracking method and system for a cloud host, as well as terminal device

    公开(公告)号:US11470043B2

    公开(公告)日:2022-10-11

    申请号:US17165737

    申请日:2021-02-02

    Abstract: An anti-cracking method and system for a cloud host, as well as a terminal device are provided according to the disclosure. The method includes: obtaining system logs of the cloud host; determining an IP which fails to log in the cloud host according to the system logs as a suspicious IP; tracking and determining the suspicious IP to be an attacker IP according to the number of times of consecutive login failure of the suspicious IP; and adding a first blocking rule to firewall settings of the cloud host; wherein the first blocking rule instructs to block a login operation of the attacker IP during a first preset blocking time. With the anti-cracking method for a cloud host of the disclosure, the brute-force cracking can be prevented proactively in a timely manner with only very few system resources occupied.

    ANTI-CRACKING METHOD AND SYSTEM FOR A CLOUD HOST, AS WELL AS TERMINAL DEVICE

    公开(公告)号:US20190182214A1

    公开(公告)日:2019-06-13

    申请号:US16129778

    申请日:2018-09-12

    Abstract: An anti-cracking method and system for a cloud host, as well as a terminal device are provided according to the disclosure. The method includes: obtaining system logs of the cloud host; determining an IP which fails to log in the cloud host according to the system logs as a suspicious IP; tracking and determining the suspicious IP to be an attacker IP according to the number of times of consecutive login failure of the suspicious IP; and adding a first blocking rule to firewall settings of the cloud host; wherein the first blocking rule instructs to block a login operation of the attacker IP during a first preset blocking time. With the anti-cracking method for a cloud host of the disclosure, the brute-force cracking can be prevented proactively in a timely manner with only very few system resources occupied.

    ANTI-CRACKING METHOD AND SYSTEM FOR A CLOUD HOST, AS WELL AS TERMINAL DEVICE

    公开(公告)号:US20210160216A1

    公开(公告)日:2021-05-27

    申请号:US17165737

    申请日:2021-02-02

    Abstract: An anti-cracking method and system for a cloud host, as well as a terminal device are provided according to the disclosure. The method includes: obtaining system logs of the cloud host; determining an IP which fails to log in the cloud host according to the system logs as a suspicious IP; tracking and determining the suspicious IP to be an attacker IP according to the number of times of consecutive login failure of the suspicious IP; and adding a first blocking rule to firewall settings of the cloud host; wherein the first blocking rule instructs to block a login operation of the attacker IP during a first preset blocking time. With the anti-cracking method for a cloud host of the disclosure, the brute-force cracking can be prevented proactively in a timely manner with only very few system resources occupied.

    Anti-cracking method and system for a cloud host, as well as terminal device

    公开(公告)号:US10944718B2

    公开(公告)日:2021-03-09

    申请号:US16129778

    申请日:2018-09-12

    Abstract: An anti-cracking method and system for a cloud host, as well as a terminal device are provided according to the disclosure. The method includes: obtaining system logs of the cloud host; determining an IP which fails to log in the cloud host according to the system logs as a suspicious IP; tracking and determining the suspicious IP to be an attacker IP according to the number of times of consecutive login failure of the suspicious IP; and adding a first blocking rule to firewall settings of the cloud host; wherein the first blocking rule instructs to block a login operation of the attacker IP during a first preset blocking time. With the anti-cracking method for a cloud host of the disclosure, the brute-force cracking can be prevented proactively in a timely manner with only very few system resources occupied.

    METHOD AND APPARATUS FOR DETECTING TRAFFIC
    8.
    发明申请

    公开(公告)号:US20200296022A1

    公开(公告)日:2020-09-17

    申请号:US16676028

    申请日:2019-11-06

    Abstract: Embodiments of the present disclosure relate to a method and apparatus for detecting traffic. The method includes: acquiring traffic information of at least two dimensions of a target IP; determining whether the traffic information of the at least two dimensions contains traffic information exceeding an abnormal traffic threshold of a corresponding dimension of the target IP; and in response to determining that the traffic information of the at least two dimensions contains the traffic information exceeding the abnormal traffic threshold of the corresponding dimension, determining that the traffic of the target IP is abnormal.

    METHOD AND APPARATUS FOR PROCESSING DATA
    9.
    发明申请

    公开(公告)号:US20200274897A1

    公开(公告)日:2020-08-27

    申请号:US16676935

    申请日:2019-11-07

    Abstract: Embodiments of the present disclosure relate to a method and apparatus for processing data. A method may include: receiving an access request to access a target domain name; converting the target domain name into a preset high defense domain name;querying an IP corresponding to the high defense domain name in a domain name system; and sending the access request according to the IP corresponding to the high defense domain name; where in a case that an EIP corresponding to the target domain name enables a black hole, the IP corresponding to the high defense domain name in the domain name system is a preset high defense IP, and in a case that the EIP corresponding to the target domain name closes the black hole, the IP corresponding to the high defense domain name in the domain name system is the EIP of the target domain name.

Patent Agency Ranking