H04L2463/146

Method and apparatus for obtaining user account

The present disclosure relates to the field of network technologies, and discloses a method and apparatus for obtaining a user account. A real-name account of a user is obtained according to user information, and then a first anonymous account similar to the real-name account is obtained based on at least login device information of the real-name account. The user may use an anonymous account to log in on a device on which the real-name account was once used to log in. Therefore, the anonymous account of the user can be obtained by using this hidden association.

Method for processing an intrusion into a wireless communication network, related device and computer program

A method for processing an intrusion in a communication network including a plurality of node equipment, including a current node, which: discovers of a neighborhood of the current node, including assigning a resilience group to the neighboring node, according to at least one piece of information representative of a resilience level of the neighboring node to at least one type of attack; detecting an intrusion affecting at least one suspect node of the neighborhood of the current node; establishing a consensus concerning the at least one suspect node in a neighborhood by counting a number of resilience groups having detected the intrusion in the neighborhood of the suspect node and a total number of resilience groups represented in the neighborhood of the suspect node; and deciding to change a status of the suspect node based on a result of the consensus by comparison of both numbers.

Method and system for detecting abnormal online user activity
10419460 · 2019-09-17 · ·

The present teaching generally relates to detecting abnormal user activity associated with an entity. In a non-limiting embodiment, baseline distribution data representing a baseline distribution characterizing normal user activities for an entity may be obtained. Information related to online user activities with respect to the entity may be received, distribution data representation a dynamic distribution may be determined based, at least in part, on the information. One or more measures characterizing a difference between the baseline distribution and the dynamic distribution may be computed, and in real-time it may be assessed whether the information indicates abnormal user activity. If the first information indicates abnormal user activity, then output data including the distribution data and the one or more measures may be generated.

Malicious Attack Detection Method and Apparatus
20190281081 · 2019-09-12 ·

A malicious attack detection method includes receiving, by a controller, a packet-in message sent by a switch, sending, by the controller, an abnormal flow entry to the switch, receiving, by the controller, a triggering count sent by the switch, where the triggering count is a quantity of times that the abnormal flow entry is triggered, and determining, according to the triggering count, whether a malicious attack is initiated.

SYSTEM AND METHOD FOR RESTRICTING ACCESS TO WEB RESOURCES

Systems, methods, and apparatuses are provided for restricting access to a web resource. Website access information is obtained by monitoring accesses to a plurality of websites for each access, which may include a network identifier of an access requestor, a website identifier, and an access time for each request. Based on at least the website access information, it may be determined that a particular access requestor has accessed a number of different websites in a given time period. As a result, the particular access requestor may be classified as a web robot. A request to permit access to a web resource is received by the particular access requestor. In response to receiving the request to permit access to the web resource, the particular access requestor is prevented from accessing the web resource and/or a notification is generated that the particular access requestor is attempting to access the web resource.

COMBINING INTERNET ROUTING INFORMATION WITH ACCESS LOGS TO ASSESS RISK OF USER EXPOSURE
20190260801 · 2019-08-22 ·

The present disclosure is directed towards systems and methods for evaluating or mitigating a network attack. A device determines one or more client internet protocol addresses associated with the attack on the service. The device assigns a severity score to the attack based on a type of the attack. The device identifies a probability of a user account accessing the service during an attack window based on the type of attack. The device generates an impact score for the user account based on the severity score and the probability of the user account accessing the service during the attack window. The device selects a mitigation policy for the user account based on the impact score.

Systems and methods of responding to cyber security threats
20190260769 · 2019-08-22 ·

A comprehensive security operation platform with artificial intelligence capabilities which may collaborate and/or automate tasks, including complex and/or redundant security tasks. An automated system may assist security analysts and security operations center managers in discovering security incidents. A comprehensive security operations platform may combine intelligent automation scale and collaborative human social learning, wisdom and experience. An automated system may empower security analysts to resolve incidents faster and reduce redundancy through collaboration with peers in virtual war rooms. An automated system may automate security analyst work by executing tasks from the war room or by following playbooks defined by the security analysts.

BUS-OFF ATTACK PREVENTION CIRCUIT

Various systems and methods for bus-off attack detection are described herein. An electronic device for bus-off attack detection and prevention includes bus-off prevention circuitry coupled to a protected node on a bus, the bus-off prevention circuitry to: detect a transmitted message from the protected node to the bus; detect a bit mismatch of the transmitted message on the bus; suspend further transmissions from the protected node while the bus is analyzed; determine whether the bit mismatch represents a bus fault or an active attack against the protected node; and signal the protected node indicating whether a fault has occurred.

Blockchain tracking of virtual universe traversal results

An exemplary computer-implemented method includes obtaining at least one teleportation invite block that records a virtual universe teleportation invite marked by at least one parameter. The teleportation invite identifies a virtual universe user as an invitee. Responsive to the parameter, assess whether the virtual universe teleportation invite is potentially malicious, and alert the invitee in case the virtual universe teleportation invite is potentially malicious. Another exemplary computer-implemented method includes obtaining at least one complaint block that records a complaint made against a virtual universe user; obtaining a plurality of traversal blocks that record virtual universe traversal events by the virtual universe user; identifying a pattern of harassment by analyzing a first plurality of traversal blocks that precede the complaint block; identifying a risk of future harassment by analyzing a second plurality of traversal blocks that follow the complaint block; and issuing an alert regarding the risk of future harassment.

Attack source tracing in SFC overlay network

Embodiments of the present disclosure relate to methods, devices and computer readable storage medium for tracing an attack source in a service function chain overlay network. In example embodiments, a request for tracing an attack source of an attacking data is sent at the attack tracer to a first service function chain domain of a plurality of service function chain domains through which the attacking data flow passes subsequently. The request includes flow characteristics of the attacking data flow. Then, the attack tracer receives a first set of results of flow matching based on the flow characteristics from the first service function chain domain. The attack tracer identifies the attack source in the plurality of service function chain domains at least in part based on the first set of results. In this way, the attack source may be traced efficiently in the service function chain overlay network.