-
公开(公告)号:US11444861B2
公开(公告)日:2022-09-13
申请号:US16676028
申请日:2019-11-06
Inventor: Yajing Chen , Bing Huang , Qingzhi Zhou , Shaoyan Wang
IPC: H04L43/0876 , H04L43/062
Abstract: Embodiments of the present disclosure relate to a method and apparatus for detecting traffic. The method includes: acquiring traffic information of at least two dimensions of a target IP; determining whether the traffic information of the at least two dimensions contains traffic information exceeding an abnormal traffic threshold of a corresponding dimension of the target IP; and in response to determining that the traffic information of the at least two dimensions contains the traffic information exceeding the abnormal traffic threshold of the corresponding dimension, determining that the traffic of the target IP is abnormal.
-
公开(公告)号:US11470043B2
公开(公告)日:2022-10-11
申请号:US17165737
申请日:2021-02-02
Inventor: Chang Liu , Shaoyan Wang , Li Mi
IPC: H04L9/40
Abstract: An anti-cracking method and system for a cloud host, as well as a terminal device are provided according to the disclosure. The method includes: obtaining system logs of the cloud host; determining an IP which fails to log in the cloud host according to the system logs as a suspicious IP; tracking and determining the suspicious IP to be an attacker IP according to the number of times of consecutive login failure of the suspicious IP; and adding a first blocking rule to firewall settings of the cloud host; wherein the first blocking rule instructs to block a login operation of the attacker IP during a first preset blocking time. With the anti-cracking method for a cloud host of the disclosure, the brute-force cracking can be prevented proactively in a timely manner with only very few system resources occupied.
-
公开(公告)号:US20190182214A1
公开(公告)日:2019-06-13
申请号:US16129778
申请日:2018-09-12
Inventor: Chang Liu , Shaoyan Wang , Li Mi
IPC: H04L29/06
Abstract: An anti-cracking method and system for a cloud host, as well as a terminal device are provided according to the disclosure. The method includes: obtaining system logs of the cloud host; determining an IP which fails to log in the cloud host according to the system logs as a suspicious IP; tracking and determining the suspicious IP to be an attacker IP according to the number of times of consecutive login failure of the suspicious IP; and adding a first blocking rule to firewall settings of the cloud host; wherein the first blocking rule instructs to block a login operation of the attacker IP during a first preset blocking time. With the anti-cracking method for a cloud host of the disclosure, the brute-force cracking can be prevented proactively in a timely manner with only very few system resources occupied.
-
公开(公告)号:US20210160216A1
公开(公告)日:2021-05-27
申请号:US17165737
申请日:2021-02-02
Inventor: Chang Liu , Shaoyan Wang , Li Mi
IPC: H04L29/06
Abstract: An anti-cracking method and system for a cloud host, as well as a terminal device are provided according to the disclosure. The method includes: obtaining system logs of the cloud host; determining an IP which fails to log in the cloud host according to the system logs as a suspicious IP; tracking and determining the suspicious IP to be an attacker IP according to the number of times of consecutive login failure of the suspicious IP; and adding a first blocking rule to firewall settings of the cloud host; wherein the first blocking rule instructs to block a login operation of the attacker IP during a first preset blocking time. With the anti-cracking method for a cloud host of the disclosure, the brute-force cracking can be prevented proactively in a timely manner with only very few system resources occupied.
-
公开(公告)号:US10944718B2
公开(公告)日:2021-03-09
申请号:US16129778
申请日:2018-09-12
Inventor: Chang Liu , Shaoyan Wang , Li Mi
IPC: H04L29/06
Abstract: An anti-cracking method and system for a cloud host, as well as a terminal device are provided according to the disclosure. The method includes: obtaining system logs of the cloud host; determining an IP which fails to log in the cloud host according to the system logs as a suspicious IP; tracking and determining the suspicious IP to be an attacker IP according to the number of times of consecutive login failure of the suspicious IP; and adding a first blocking rule to firewall settings of the cloud host; wherein the first blocking rule instructs to block a login operation of the attacker IP during a first preset blocking time. With the anti-cracking method for a cloud host of the disclosure, the brute-force cracking can be prevented proactively in a timely manner with only very few system resources occupied.
-
公开(公告)号:US20200280580A1
公开(公告)日:2020-09-03
申请号:US16677026
申请日:2019-11-07
Inventor: Qingzhi Zhou , Shaoyan Wang
Abstract: Embodiments of the present disclosure relate to a method and apparatus for processing data. The method can include: receiving a SYN message with a destination address being a target IP; establishing a session based on a quadruple of the SYN message; and forwarding the SYN message to a server corresponding to the target IP.
-
公开(公告)号:US11689564B2
公开(公告)日:2023-06-27
申请号:US16677026
申请日:2019-11-07
Inventor: Qingzhi Zhou , Shaoyan Wang
IPC: H04L29/06 , H04L9/40 , H04L5/00 , H04L69/163
CPC classification number: H04L63/1458 , H04L5/0053 , H04L63/0236 , H04L63/1408 , H04L69/163 , H04L63/0254
Abstract: Embodiments of the present disclosure relate to a method and apparatus for processing data. The method can include: receiving a SYN message with a destination address being a target IP; establishing a session based on a quadruple of the SYN message; and forwarding the SYN message to a server corresponding to the target IP.
-
公开(公告)号:US20200296022A1
公开(公告)日:2020-09-17
申请号:US16676028
申请日:2019-11-06
Inventor: Yajing Chen , Bing Huang , Qingzhi Zhou , Shaoyan Wang
IPC: H04L12/26
Abstract: Embodiments of the present disclosure relate to a method and apparatus for detecting traffic. The method includes: acquiring traffic information of at least two dimensions of a target IP; determining whether the traffic information of the at least two dimensions contains traffic information exceeding an abnormal traffic threshold of a corresponding dimension of the target IP; and in response to determining that the traffic information of the at least two dimensions contains the traffic information exceeding the abnormal traffic threshold of the corresponding dimension, determining that the traffic of the target IP is abnormal.
-
公开(公告)号:US20200274897A1
公开(公告)日:2020-08-27
申请号:US16676935
申请日:2019-11-07
Inventor: Benjun Ye , Shaoyan Wang , Bing Huang
Abstract: Embodiments of the present disclosure relate to a method and apparatus for processing data. A method may include: receiving an access request to access a target domain name; converting the target domain name into a preset high defense domain name;querying an IP corresponding to the high defense domain name in a domain name system; and sending the access request according to the IP corresponding to the high defense domain name; where in a case that an EIP corresponding to the target domain name enables a black hole, the IP corresponding to the high defense domain name in the domain name system is a preset high defense IP, and in a case that the EIP corresponding to the target domain name closes the black hole, the IP corresponding to the high defense domain name in the domain name system is the EIP of the target domain name.
-
-
-
-
-
-
-
-