Unlock instant, AI-driven research and patent intelligence for your innovation.

CC attack prevention method and device

A ratio, target host technology, applied in the field of network security, can solve problems such as inability to accurately identify CC attacks and inability to protect target hosts

Inactive Publication Date: 2008-03-26
NEW H3C TECH CO LTD
View PDF0 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since the traffic of CC attacks is exactly the same as the access traffic of legitimate users, ordinary DDoS detection (such as GET packet rate detection or detection using HTTP protocol characteristics) cannot accurately identify CC attacks and effectively protect the target host.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CC attack prevention method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0032] The invention provides a CC attack prevention method, the basic idea of ​​which is: count the ratio between the number of response messages (RESPONSE) sent by the target host and the number of request messages (GET) received by the target host, and according to the change of the ratio To determine whether the target host is attacked by CC. For example, calculate the value of the number of response packets sent by the target host divided by the number of request packets received by the target host (hereinafter referred to as the RESPONSE / GET value of the target host), and pre-set a ratio threshold (the ratio threshold is less than 1) , and then, it is judged whether the calculated ratio is smaller than a preset ratio threshold, and if it is smalle...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for defensing CC attack, the method comprises: calculating the ratio between the number of response messages sent by a target host computer and that of request messages received by the target host computer; according to the relation of the calculated ratio and a predetermined ration threshold, determining the target host computer being whether or not attack by CC. Moreover, the invention also provides a device for defensing CC attack. The technique proposal provided by the invention can identify CC attack accurately, realizes effective protection to the target host computer.

Description

technical field [0001] The invention relates to network security technology, in particular to a challenge black hole (CC, Challenge Collapsar) attack prevention method and device. Background technique [0002] With the rapid development of information technology, computer network technology has been widely popularized and promoted in all walks of life around the world. However, the rapid development of network applications and the rapid expansion of network scale bring production and operation efficiency to enterprises. Make the security loopholes in the network everywhere. These security holes provide a breeding ground for network attacks, and the popular CC attack in recent years is one of the network attacks. [0003] CC attack is a page-based distributed denial of service (DDoS, Distributed Denial of Service) attack, which consumes server resources by sending a performance-consuming Hypertext Transfer Protocol (HTTP, HypertextTransfer Protocol) request HTTP GET. Figure...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L12/24
Inventor 高宇
Owner NEW H3C TECH CO LTD