Method of defense against DDoS attacks in P2P stream media system

A streaming media and media server technology, applied in communication and information security, and computer network fields, can solve the problems of single DoS attack, without considering the distribution of P2P system, and unable to prevent server and system DDoS attack at the same time

Inactive Publication Date: 2008-07-02
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Existing solutions are only to study the traditional DoS attacks in the P2P streaming media system, without considering the distribution of the P2P system and DDoS attacks are more likely to occur, and all of them are single for one of the DoS attacks, cannot Simult

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of defense against DDoS attacks in P2P stream media system
  • Method of defense against DDoS attacks in P2P stream media system
  • Method of defense against DDoS attacks in P2P stream media system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The specific implementation of the method for defending against DDoS attacks in a P2P streaming media system of the present invention will be described in detail below with reference to the accompanying drawings.

[0027] Figure 1 is a system topology diagram of the method for defending DDoS attacks in a P2P streaming media system implementing the present invention. As shown in Figure 1, in the method of defending DDoS attacks in the P2P streaming media system of the present invention, the nodes are divided into three levels according to the reputation of the nodes: reputation nodes, control nodes, and ordinary nodes. The reputation node has the highest reputation level. , It will dynamically check the reputation of ordinary nodes, control nodes, and reputation nodes, mark nodes with reputation levels up to the reputation node as reputation nodes, and mark nodes with reputation levels up to the control node as control nodes Nodes, others are ordinary nodes.

[0028]Figure 2...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims at providing a method for defending a DDoS aggression in a P2P media stream system, which includes the following steps: the step that the node sends a joining requirement information to the media stream server is included and in the step, after receiving the joining requirement information, the server informs the joining requirement information of the node to the reputation node and the controlling node and return the partial nodes and a initial reputation value; a step that the reputation nodes calculate the node reputation value is included and in the step, after receiving the notices, the reputation node and the controlling node store the information of the node into own node list in order to evaluate and control the action of the node; the step that the node requires a data from the media server or local network is included, which is used for requesting the needed media data by the node; a step that the controlling node judges the node requirement rate is included, which is used for calculating the node requirement rate; a step that whether the requirement rate exceeds the limiting value is judged is also included, which is used for judging whether the requirement rate of the requirement node exceeds the limiting value or not; if the rate exceeds the limiting value, the requirement is stopped, otherwise, the request of the node is permitted.

Description

Technical field [0001] The present invention relates to the fields of computer network, communication and information security, in particular to a method for defending DDoS attacks in a P2P streaming media system. Background technique [0002] Distributed Denial of Service (DDoS: Distributed Denial of Service) attack is a brand new DoS (Denial of Service) attack that has emerged in recent years. A single DoS attack generally uses a one-to-one approach. When the target's CPU speed is low, memory is small, or network bandwidth is low, its effect is obvious. With the development of computer and network technology, the processing power of computers has increased rapidly, and the memory has greatly increased. At the same time, dry-megabit networks have also appeared, which makes DoS attacks more difficult. At this time, distributed denial of service attacks came into being. Due to its distributed nature, DDoS attacks have more attack resources than traditional DoS attacks, have more p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/36H04L12/56H04L29/08
Inventor 黄本雄王芙蓉杨军莫益军明久强卢正新
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products