Method and apparatus for preventing DDos attack
A technology for equipment and connection requests, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems that network equipment cannot respond to new service network equipment crashes, inconvenience and complexity, and achieve effective security defense and facilitate promotion. Easy to apply and operate
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] In the embodiment of the present invention, before the protected network device (i.e., the server) receives the TCP connection request SYN message, it needs to complete the verification of the validity of the TCP connection request SYN message, and only forward the legal and valid TCP connection request SYN message For the server side, the aggressive TCP connection request SYN message that occupies system resources is discarded, thereby reducing the risk that the server bears due to the exhaustion of system resources caused by TCP semi-connections.
[0032] First, it introduces how to verify the validity of the TCP connection request SYN message from the client, and how to realize the process of forwarding the legal and valid TCP connection message to the server.
[0033] In the embodiment of the present invention, when the client sends a TCP connection request SYN message to the server, that is, when the first handshake request is made, it is detected whether the user n...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 