Method of defense against DDoS attacks in P2P stream media system

A streaming media, media server technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve problems such as benign node service impact, single DoS attack, and inability to prevent server and system DDoS attacks at the same time

Inactive Publication Date: 2012-09-12
HUAZHONG UNIV OF SCI & TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Existing solutions are only to study the traditional DoS attacks in the P2P streaming media system, without considering the distribution of the P2P system and DDoS attacks are more likely to occur, and all of them are single for one of the DoS attacks, cannot Simultaneously prevent DDoS attacks on servers and local systems
At the same time, it fails to comprehensively consider the different performances of nodes in the P2P streaming media system, which limits the behavior of malicious nodes and also affects the services of benign nodes.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of defense against DDoS attacks in P2P stream media system
  • Method of defense against DDoS attacks in P2P stream media system
  • Method of defense against DDoS attacks in P2P stream media system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The specific implementation of the method for defending against DDoS attacks in the P2P streaming media system of the present invention will be described in detail below with reference to the accompanying drawings.

[0027] figure 1 It is a system topology diagram implementing the method for defending against DDoS attacks in the P2P streaming media system of the present invention. like figure 1 Shown, in the method for defending against DDoS attack in the P2P streaming media system of the present invention, the node is divided into three grades according to the node reputation situation, reputation node, control node, common node, reputation node is because the reputation grade is the highest, it can dynamically Check the reputation status of ordinary nodes, control nodes, and reputation nodes, mark nodes whose reputation level reaches reputation nodes as reputation nodes, and mark nodes whose reputation level reaches control nodes as control nodes, and others as ordin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims at providing a method for defending a DDoS aggression in a P2P media stream system, which includes the following steps: the step that the node sends a joining requirement information to the media stream server is included and in the step, after receiving the joining requirement information, the server informs the joining requirement information of the node to the reputation node and the controlling node and return the partial nodes and a initial reputation value; a step that the reputation nodes calculate the node reputation value is included and in the step, after receiving the notices, the reputation node and the controlling node store the information of the node into own node list in order to evaluate and control the action of the node; the step that the node requires a data from the media server or local network is included, which is used for requesting the needed media data by the node; a step that the controlling node judges the node requirement rate is included, which is used for calculating the node requirement rate; a step that whether the requirement rate exceeds the limiting value is judged is also included, which is used for judging whether the requirement rate of the requirement node exceeds the limiting value or not; if the rate exceeds the limiting value, the requirement is stopped, otherwise, the request of the node is permitted.

Description

technical field [0001] The invention relates to the fields of computer network, communication and information security, in particular to a method for defending against DDoS attacks in a P2P streaming media system. Background technique [0002] Distributed Denial of Service (DDoS: Distributed Denial of Service) attack is a new denial of service (DoS: Denial of Service) attack that has emerged in recent years. A single DoS attack generally adopts a one-to-one method, and its effect is obvious when the performance indicators of the attack target such as low CPU speed, small memory or small network bandwidth are not high. With the development of computer and network technology, the processing power of the computer has increased rapidly, the memory has increased greatly, and there has also been a gigabit network, which makes DoS attacks more difficult. At this time, distributed denial-of-service attacks came into being. Due to its distributed nature, DDoS attacks have more atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/36H04L12/56H04L29/08
Inventor 黄本雄王芙蓉杨军莫益军明久强卢正新
Owner HUAZHONG UNIV OF SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products