Method for preventing server from being attacked, detection device and monitoring device

A monitoring device and server technology, applied in the field of communication, can solve the problems of blocking agent access, unable to defend against attacks, etc., and achieve the effect of defending against attacks

Inactive Publication Date: 2009-05-20
HUAWEI DIGITAL TECH (CHENGDU) CO LTD
View PDF0 Cites 62 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of realizing the present invention, the inventor finds that the prior art has at least the following disadvantages: the prior art can block normal agent access, and cannot defend against attacks from anonymous agents (without agent information fields) or puppet hosts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing server from being attacked, detection device and monitoring device
  • Method for preventing server from being attacked, detection device and monitoring device
  • Method for preventing server from being attacked, detection device and monitoring device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0026] figure 1 It is a method for preventing a server from being attacked according to an embodiment of the present invention. In this embodiment, the detection method detects the access request data packet sent to the server, so as to prevent the server from being attacked.

[0027] Step S100, obtaining the HTTP data packet sent to the server requesting access, and obtaining the destination Uniform Resource Locator (Uniform Resource Locator, URL) o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method for preventing a server from being attacked. The method comprises the following steps: determining a target URL in a data packet for an access request sent to a server as an URL to be verified; performing normalization on the URL in the data packet and counting the number of access times to the normalized URL in a time period corresponding to the arrival time of the data packet; judging whether the number of the access times of the normalized URL in the time period exceeds a threshold of the number of the access times of the normalized URL in the time period; and if yes, the access request of the data packet is blocked. The embodiment of the invention also provides monitoring equipment and a detection device. The monitoring equipment and the detection device limit the number of connection times of the accessed URL and make a judgment that the server is attacked when the number of the access times exceeds a threshold in the time period no matter the connection of the accessed URL is from an anonymous proxy, a dummy host or a normal proxy host, thereby preventing attack from the anonymous proxy or the dummy host without blocking access of the normal proxy host.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of communications, and in particular, to a method for preventing a server from being attacked, a detection device, and a monitoring device. Background technique [0002] With the rapid development of the Internet, network security has attracted more and more attention. Under normal circumstances, network security issues mainly involve how to prevent servers in the network from being attacked, and general servers are attacked, which mainly manifests as occupying too many service resources of the server through service requests, causing the server to be overloaded and unable to respond to other services. requests, eventually causing the exhaustion of server resources, in order to achieve the purpose of denial of service. At the same time, more and more merchants obtain profits by providing services through servers. If the servers are continuously attacked, it will inevitably affect t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
Inventor 钟登峰尧少敏
Owner HUAWEI DIGITAL TECH (CHENGDU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products