Method and apparatus for preventing reject access aggression

A technology of denying access and purpose, applied in the network field, can solve the problem of inability to accurately judge the legitimacy of the connection, and achieve the effect of low cost, high reliability and high speed.

Active Publication Date: 2009-03-04
RUIJIE NETWORKS CO LTD
View PDF1 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] The object of the present invention is also to provide a device for preventing denial of access attacks, which is used to solve the problem that the legit

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for preventing reject access aggression
  • Method and apparatus for preventing reject access aggression
  • Method and apparatus for preventing reject access aggression

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in further detail below in conjunction with the embodiments and accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0041] Embodiments of the present invention provide a method and device for preventing access denial attacks. The present invention will be described in detail below in conjunction with the accompanying drawings.

[0042] Such as figure 2 Shown is a schematic diagram of the trusted IP address table established in the first embodiment of the present invention. The trusted IP address table shown in the figure is configured on the server or relay device in the network. The IP addresses in the table are all for The trusted IP address of a certain service port, which restricts the source IP addre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the communication security field and provides a method and a device for preventing refusal access attack, aiming at solving the shortcomings of high cost and low accuracy of preventing SYN flood attack in the prior art. The method comprises the following steps: a believable IP address list is set in network equipment, which stores the believable IP address and a TCP port number; when a user initiates a connection request, the network equipment judges whether the target TCP port and the source IP address of the connection request are matched with the corresponding record in the believable IP address list, if so, the connection is allowed to be established, otherwise, the connection is refused to be established. The invention has the advantages of high reliability, low cost, and not being carried out on firewall, and the network equipment using the method has higher speed of processing connection compared with the method for preventing refusal access attack in the prior art.

Description

technical field [0001] The invention relates to the network field, in particular to network security access technology, specifically a method and device for preventing access denial attacks. Background technique [0002] With the continuous development of network technology, it has brought more and more convenience to people, and people have become more and more dependent on it, but this has also brought certain challenges to the security and reliability of the network. While experiencing the convenience brought by the network, people are beginning to pay more and more attention to the security and reliability of the network. [0003] As a reliable transmission protocol, TCP is implemented on almost all network devices. In addition, the WWW servers that people often visit also use the TCP protocol for transmission. Because of its widespread use, hackers often use denial-of-service attacks to destroy TCP services provided by network devices, and the most commonly used TCP de...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12H04L12/56
Inventor 王亮
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products