Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

37results about How to "Avoid Denial of Service Attacks" patented technology

A method and device for enhancing Ad hoc network security and cooperation mechanism

The invention is to provide a method to enhance Ad hoc net security and cooperation mechanism. The method comprises the following stages: an initializing stage which is used to distribute a pair of keys and set initial reputation values for new nodes jointing in the net; a note request stage which is used to send a note request to a neighboring node broadcast when the current note of the node can not pay for the activity transaction; an identity investigation stage which is used for the neighboring node to monitor the behavior of the node, evaluate the different behaviors, calculate the local reputation value and divide the nodes into credible and incredible ones according to the reputation value; a note management stage which is used for the neighboring node to firstly search the node reputation value in a respective reputation table thereof when receiving the node note request and to issue a plurality of notes to the requesting node if the node reputation value is above the threshold value, wherein, in the activity, the node note would have corresponding changes and updates according to the requirement; and a routing and data transferring stage which is used to select routing according to the node reputation.
Owner:HUAZHONG UNIV OF SCI & TECH

Optical network terminal, port speed limiting attribute configuration method and packet process method

The invention relates to an optical network terminal ONT, a method for configuring port rate limit attribute and a method for processing a message thereof. The optical network terminal comprises a passive optical network (PON) protocol processing module and a user network interface functional module which are connected through an internal interface. The optical network terminal also comprises a port rate limit module connected with the user network interface, wherein the port rate limit attribute is stored in the port rate limit module. The method for configuring the port rate limit attributeof the ONT comprises the following steps: A, a configuring terminal transmits a port rate limit attribute configuring command to the ONT; and B, the ONT stores the port rate limit attribute in a management entity. The method for processing the message of the ONT comprises the following steps: determining whether data velocity transmitted by the user network interface exceeds a set value in the port rate limit attribute of the user network interface or not, if so, a step of flow control is carried out on the user network interface. The invention ensures that the ONT can realize the function ofport rate limit, can prevent overflowing of a receiving buffer inside the ONT, and prevent an illegal user from initiating denial of service attack.
Owner:HUAWEI TECH CO LTD

Method for realizing safety model of access authentication in mobile internet

InactiveCN102256252APrevent Malicious RegistrationReduce Authentication LatencyWireless network protocolsSecurity arrangementService flowEngineering
The invention relates to a method for realizing a safety model of access authentication in the mobile internet. In the method provided by the invention, an authentication server with a P2P (Peer 2 Peer) framework is arranged in the mobile internet; the access authentication safety of the mobile internet is solved by utilizing an AKA (Also Known As) authentication mechanism; the concrete flow of AKA in the mobile internet is described; the whole authentication course is realized through C knowledge programming by utilizing socket; the core framework of the mobile internet is realized by combining the distributed techniques such as a P2P technique and the like; an operator can establish a carrier-class network capacity platform capable of being expanded and providing multimedia applications and content applications; the framework based on the P2P technique can still provide the service for users under the condition of actual effects of a single node; the mobile internet can collect network bandwidth resources for the service through the P2P technique, thereby improving the throughput capacity of the service flow; and the P2P technique is the development direction of the mobile internet, thus the realization of the research for the AKA authentication mechanism based on the P2P framework extremely has reality significances.
Owner:NANJING UNIV OF POSTS & TELECOMM

Internet of Things security access control method based on blockchain and fog node reputation

The invention discloses an Internet of Things security access control method based on a blockchain and fog node reputation. The method specifically comprises the following steps: carrying out fog node and cloud node registration, cloud service and Internet of Things equipment registration; enabling the Internet of Things equipment to initiate a request signal for accessing the cloud service to the proxy fog node; enabling the fog node to verify the identities of the Internet of Things equipment, the cloud node and the fog node after receiving the request signal of the Internet of Things equipment; detecting whether the reputation value of the fog node is qualified or not and whether the request behavior is legal or not, and if yes, sending a request of the fog node with a digital signature to the cloud node; enabling the cloud node to transmit the cloud service data to the server of the proxy fog node after verification; and enabling the server of the proxy fog node to transmit the data to the Internet of Things equipment. According to the invention, the Ethereum intelligent contract technology realizes decentration and expandable Internet of Things access control in a blockchain network, and the security of access control of Internet of Things equipment is ensured through a reputation mechanism and a behavior detection mechanism.
Owner:厦门吉快科技有限公司

Novel method for proofing 802.11 wireless deauthentication frame flood DoS

ActiveCN105282144AEffective protectionImprove performance against denial-of-service attacksTransmissionSecurity arrangementRogue access pointWireless
The invention relates to a novel method for proofing 802.11 wireless deauthentication frame flood DoS, and provides a queuing model based on a 802.11 wireless client. The queuing model includes a TCP / IP upper-layer module, an MMS-MDS module, an STA_Air_TX module, and an STA_Air_RX module. The TCP / IP upper-layer module of the wireless client sends TCP data frames to an MDS queue to successively wait for the processing of the MMS-MDS module; when the wireless client prepares to send the data frames for communication, the MMS-MDS module processes the TCP data frames and then forwards the TCP data frames to a TX queue, the STA_Air_TX module sends the TCP data frames to an access point AP; a Rogue Access Point (RAP) sends a deauthentication frame to the wireless client at a speed rate of lambda2, the STA_Air_TX module receives, verifies the deauthentication frame, and determines whether the deauthentication frame should be forwarded to an MMS queue or be directly and immediately abandoned; the STA_Air_TX module receives TCP-ACK and forwards the TCP-ACK to an MDS queue; and the MMS-MDS module completes the verification of the deauthentication frame within the time of S2. The method can prevent a Wireless Local Area Network (WLAN) from deauthentication DoS under low-attack and high-attack speed rates.
Owner:SANMING UNIV

A Novel Anti-802.11 Wireless Deauthentication Frame Flood Denial of Service Attack Method

ActiveCN105282144BEffective protectionImprove performance against denial-of-service attacksTransmissionSecurity arrangementWireless lanWireless access point
The invention relates to a novel anti-802.11 wireless deauthentication frame flood denial-of-service attack method, and provides a queuing model based on 802.11 wireless clients, including a TCP / IP upper layer module, an MMS‑MDS module, a STA_Air_TX module, and a STA_Air_RX module; the TCP of the wireless client The / IP upper layer module sends the TCP data frame to the MDS queue and waits for the MMS‑MDS module to process in turn; when the wireless client is ready to send the data frame for communication, the MMS‑MDS module processes the TCP data frame and forwards it to the TX queue, STA_Air_TX The module sends TCP data frames to a wireless access point AP; an attacker RAP sends a deauthentication frame to the wireless client at a rate of λ2, and the STA_Air_RX module receives and checks the deauthentication frame and decides whether to forward it to the MMS queue Or directly discard it immediately; the STA_Air_RX module forwards it to the MDS queue after receiving a TCP-ACK; the MMS-MDS module completes the verification and deauthentication frame within the time S2. The invention can prevent the wireless local area network from the deauthentication and denial of service attack under low attack rate and high attack rate.
Owner:SANMING UNIV

Optical network terminal, port speed limiting attribute configuration method and packet process method

The invention relates to an optical network terminal ONT, a method for configuring port rate limit attribute and a method for processing a message thereof. The optical network terminal comprises a passive optical network (PON) protocol processing module and a user network interface functional module which are connected through an internal interface. The optical network terminal also comprises a port rate limit module connected with the user network interface, wherein the port rate limit attribute is stored in the port rate limit module. The method for configuring the port rate limit attributeof the ONT comprises the following steps: A, a configuring terminal transmits a port rate limit attribute configuring command to the ONT; and B, the ONT stores the port rate limit attribute in a management entity. The method for processing the message of the ONT comprises the following steps: determining whether data velocity transmitted by the user network interface exceeds a set value in the port rate limit attribute of the user network interface or not, if so, a step of flow control is carried out on the user network interface. The invention ensures that the ONT can realize the function ofport rate limit, can prevent overflowing of a receiving buffer inside the ONT, and prevent an illegal user from initiating denial of service attack.
Owner:HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products