Systems and methods for IP-based intrusion detection
First Claim
1. A method comprising:
- identifying, using one or more processors of a server computer analyzing a login history comprising login request data for the server computer, a plurality of usernames, wherein each username of the plurality of usernames is associated with a corresponding login request from a first internet protocol (IP) address within a threshold time period of a first request time of a first login request, and wherein the number of usernames associated with the total number of login requests is determined by comparing each username with each other username to determine a difference value for each username pair, wherein the difference value for each username pair comprises a sum of each character change, character addition, and character subtraction required to transform a first username of each username pair into a second username of each username pair, and for each username pair identified as similar usernames having a difference value less than a threshold difference value, counting the similar usernames as a single username for the number of usernames as compared to a username threshold;
determining that a total number of login requests from the first IP address within the threshold time period is above a credential security threshold;
determining that a number of usernames associated with the total number of login requests is above the username threshold;
determining that a login success ratio is below a threshold login success ratio after determining that the total number of login requests from the first IP address is above the credential security threshold; and
in response to determining the login success ratio is below the threshold login success ratio and determining that the number of unique usernames is above the username threshold, automatically performing a security action using the server computer.
2 Assignments
0 Petitions
Accused Products
Abstract
Systems and methods for account security are provided. In one example embodiment, a first login request including a username and a password is analyzed to identify a first internet protocol (IP) address and a first request time associated with the first login request. A login history comprising login request data for the server computer is analyzed to identify a plurality of usernames, wherein each username of the plurality of usernames is associated with a corresponding login request from the first IP address within a threshold time period of the first request time. In response to determining a login success ratio is below a threshold login success ratio and a number of unique usernames in the analyzed data is above the unique username threshold, the system automatically performs a security action.
-
Citations
20 Claims
-
1. A method comprising:
-
identifying, using one or more processors of a server computer analyzing a login history comprising login request data for the server computer, a plurality of usernames, wherein each username of the plurality of usernames is associated with a corresponding login request from a first internet protocol (IP) address within a threshold time period of a first request time of a first login request, and wherein the number of usernames associated with the total number of login requests is determined by comparing each username with each other username to determine a difference value for each username pair, wherein the difference value for each username pair comprises a sum of each character change, character addition, and character subtraction required to transform a first username of each username pair into a second username of each username pair, and for each username pair identified as similar usernames having a difference value less than a threshold difference value, counting the similar usernames as a single username for the number of usernames as compared to a username threshold; determining that a total number of login requests from the first IP address within the threshold time period is above a credential security threshold; determining that a number of usernames associated with the total number of login requests is above the username threshold; determining that a login success ratio is below a threshold login success ratio after determining that the total number of login requests from the first IP address is above the credential security threshold; and in response to determining the login success ratio is below the threshold login success ratio and determining that the number of unique usernames is above the username threshold, automatically performing a security action using the server computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A device comprising:
-
a memory configured to store a login history comprising login request data for a server computer; and one or more processors coupled to the memory and configured to; identify, using the login request data for the server computer, a plurality of usernames, wherein each username of the plurality of usernames is associated with a corresponding login request from a first internet protocol (IP) address within a threshold time period of a first request time of a first login request, and wherein the number of usernames associated with the total number of login requests is determined by comparing each username with each other username to determine a difference value for each username pair, wherein the difference value for each username pair comprises a sum of each character change, character addition, and character subtraction required to transform a first username of each username pair into a second username of each username pair, and for each username pair identified as similar usernames having a difference value less than a threshold difference value, counting the similar usernames as a single username for the number of usernames as compared to a username threshold; determine that a total number of login requests from the first IP address within the threshold time period is above a credential security threshold; determine that a number of usernames associated with the total number of login requests is above the username threshold; determine that a login success ratio is below a threshold login success ratio after determining that the total number of login requests from the first IP address is above the credential security threshold; and automatically performing a security action in response to a determination that both the login success ratio is below the threshold login success ratio and the number of unique usernames is above the username threshold. - View Dependent Claims (13, 14)
-
-
15. A non-transitory computer readable medium comprising instructions that, when executed by one or more processors of a server computer, cause the server computer to perform operations comprising:
-
identifying, using the login request data for the server computer, a plurality of usernames, wherein each username of the plurality of usernames is associated with a corresponding login request from a first internet protocol (IP) address within a threshold time period of a first request time of a first login request, and wherein the number of usernames associated with the total number of login requests is determined by comparing each username with each other username to determine a difference value for each username pair, wherein the difference value for each username pair comprises a sum of each character change, character addition, and character subtraction required to transform a first username of each username pair into a second username of each username pair, and for each username pair identified as similar usernames having a difference value less than a threshold difference value, counting the similar usernames as a single username for the number of usernames as compared to the username threshold; determining that a total number of login requests from the first IP address within the threshold time period is above a credential security threshold; determining that a number of usernames associated with the total number of login requests is above a username threshold; determining that a login success ratio is below a threshold login success ratio after determining that the total number of login requests from the first IP address is above the credential security threshold; and automatically performing a security action using the server computer in response to the determining that the login success ratio is below the threshold login success ratio and the determining that the number of unique usernames is above the unique username threshold. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification