Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method, system and equipment for judging network attack

A technology for network attack and detection equipment, which is applied in the field of communication and can solve the problems of long delay in attack discovery, inability to customize, and customized benchmark values.

Active Publication Date: 2009-01-28
HUAWEI TECH CO LTD
View PDF0 Cites 46 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] When carrying out large-scale protection, there are hundreds of thousands of protection targets, and the traffic characteristics of each target are different, so it is impossible to customize the benchmark value for each target
However, it is impossible to define a unified benchmark value, which will cause false positives and false negatives of attacks
Since the baseline value is different at different time periods, setting a baseline value will lead to a long delay in attack detection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and equipment for judging network attack
  • Method, system and equipment for judging network attack
  • Method, system and equipment for judging network attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention. An embodiment of the present invention provides a method for judging a network attack, and its application network schematic diagram is as follows figure 1 As shown, it includes a processing device and at least one detection device. Specifically, the method for judging a network attack in the embodiment of the present invention is as follows figure 2 shown, including the following steps:

[0025] Step s201, the processing device receives traffic characteristic inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a judgment method for network attack, which comprises the following steps: flow characteristic information sent by detection equipment is received; and whether the attack appears is judged by comparing the flow characteristic information sent by detection equipment with a local flow baseline which is dynamically adjusted according to history data. The embodiment of the invention also discloses a judgment system and judgment equipment for the network attack. With the embodiment of the invention, whether the attack appears is judged through the flow baseline which is dynamically adjusted, whether a host group in a large range is attacked can be promptly and effectively judged, and the timely alarm is performed to start corresponding defensive measures. The judgment method for the network attack overcomes the defect that the misreporting and the missing report of the attack are easy to appear when a unified static benchmark value is adopted for alarm protection of the network attack.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method, system and equipment for judging a network attack. Background technique [0002] With the development of the network, the attacks on the network are becoming more and more diverse and complex. Among them, the most harmful attacks are DoS (Denial of Service, denial of service) attacks and DDoS (Distributed Denial of Service, distributed denial of service) attacks. This kind of attack consumes the resources and bandwidth of the target by sending large-scale attack packets, paralyzing the network and causing a lot of losses. [0003] In order to defend against DDos attacks, more and more network devices have begun to support the detection and defense of abnormal traffic and attack traffic. The current DDos attack detection measures usually set different static benchmark values ​​according to different attack characteristics, and judge whether the target is attacke...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/26H04L12/56H04L29/06
Inventor 于锋
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products