Defense method aiming at DDoS attack
A technology of attacked and network equipment, which is applied in the direction of digital transmission system, electrical components, transmission system, etc., can solve the problems of ineffective defense against attacks, consumption of equipment resources, etc., achieve effective security defense, improve the ability to resist DDoS attacks, The effect that is conducive to the promotion of the application
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0021] The technical solution provided by this embodiment is: when the client sends the first handshake information to the server, it invokes the detection rules to determine whether the server is under attack. If there is no attack, the system accepts the first One handshake information, and send the second handshake information to the client, waiting for the arrival of the client's third handshake information; The set of information is processed, according to the discarding rules to judge all the first handshake information that belongs to the attack part, and then discard the first handshake information that is identified as a DDoS attack, so as to ensure that the system has enough resources to process the new incoming first handshake information. The second handshake information, and accept the newly entered first handshake information, send the second handshake information to the client, and wait for the arrival of the client's third handshake information.
[0022] See at...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 