Challenging black hole attack defense method and device

A technology that challenges black holes and defense functions. It is applied in the field of network security and can solve problems such as resource waste and inability to filter by attackers, so as to avoid waste and improve CPU utilization.

Active Publication Date: 2009-03-11
CHENGDU HUAWEI TECH
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the process of realizing the present invention, the inventor found that there are at least the following problems in the prior art: although the existing CC attack defense method can detect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Challenging black hole attack defense method and device
  • Challenging black hole attack defense method and device
  • Challenging black hole attack defense method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the present invention.

[0024] Please refer to figure 2 , is a schematic flow chart of Embodiment 1 of the present invention, and its steps include:

[0025] Step 201, judging whether the requested page is a dynamic page according to the captured data packet, if so, proceed to step 202;

[0026] Step 202, judging whether the user requesting the dynamic page is a new user, if so, proceed to step 203, otherwise proceed to step 204;

[0027] Step 203, create a suspicious data table for the new user, the data table includes two entries: the source IP address of the user and the suspicious degree of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a method for defending challenge collapsar attack, which comprises the following steps: whether the WEB page requested by a client is a dynamic page is judged according to obtained data packets; if the WEB page requested by the client is a dynamic page, every client corresponds to a client request distrustful degree; and the dynamic page requests of the client is filtered according to the client request distrustful degree. In addition, the embodiment of the invention also provides a device for defending challenge collapsar attack. With the technical proposal of the embodiment of the invention, the challenge collapsar attack can be accurately identified, and corresponding defending measurements can be dynamically adopted to realize effective protection for a target host.

Description

technical field [0001] This invention relates to network security technology, in particular to a method and device for defending against black hole attacks. Background technique [0002] With the rapid development of information technology, computer network technology has been widely popularized and promoted in all walks of life around the world. However, the rapid development of network applications and the rapid expansion of network scale bring production and operation efficiency to enterprises. Make the security loopholes in the network everywhere. These security holes provide a breeding ground for network attacks. The popular CC (Challenge Collapsar, also known as challenge black hole) attack in recent years is one of the network attacks. [0003] CC attack is a page-based distributed denial of service (DDoS, Distributed Denial of Service) attack, which consumes server resources by sending a performance-consuming Hypertext Transfer Protocol (HTTP, Hypertext Transfer Pro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 谷勇浩张烜杨莉辛阳杨亚涛
Owner CHENGDU HUAWEI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products