Session control method and control device
A semi-connection and Internet technology, applied in the field of information security, can solve problems such as failure of IKE negotiation, occupation of the maximum number of connections, and failure of other users to establish IKE connections.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] The technical solutions of the present invention will be described in further detail below in conjunction with the accompanying drawings and embodiments.
[0025] In the prior art, the Internet Key Exchange Protocol (IKE for short) adopts the Cookie mechanism, uses the Cookie contained in the IKE message to identify an IKE session, and sets the total number of connections of the IKE session. Although this Cookie mechanism can effectively counter the denial-of-service attack that the attacker tries to exhaust system resources by sending a large number of IKE request messages including fixed Cookie values, it cannot effectively counter the attacker's attack by sending a large number of A denial-of-service attack that exhausts system resources by using IKE request packets with a large value. Moreover, because the timeout and aging time stipulated by the IKE protocol itself is too long, it is impossible to release resources in time for the semi-connection established by the...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com