A method, detection device and monitoring equipment for preventing server from being attacked

A detection device and monitoring equipment technology, applied in the field of communication, can solve the problems of blocking agent access, unable to defend against attacks, etc., and achieve the effect of defending against attacks

Inactive Publication Date: 2012-02-22
HUAWEI DIGITAL TECH (CHENGDU) CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In the process of realizing the present invention, the inventor finds that the prior art has at least the following disadvantages: the prior art can block normal agent access, and cannot defend against attacks from anonymous agents (without agent information fields) or puppet hosts

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method, detection device and monitoring equipment for preventing server from being attacked
  • A method, detection device and monitoring equipment for preventing server from being attacked
  • A method, detection device and monitoring equipment for preventing server from being attacked

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Step S100, get HTTP packets sent to the server request, and obtain the uniform resource positioning of the data packet (URL).

[0038] Step S102, determine whether the URL is a URL that needs to be verified.In this embodiment, the URL that needs to be verified by default or according to the load of the URL.In this embodiment, the load of the URL is determined by the short interval between the request and the response of the URL.In this embodiment, if the time interval between the request and the response of the URL and the response is greater than that of a certain door limit, the time interval between the request and the response of the URL is consideredThe time interval between the response is not greater than the limit value, then the time interval between the request and the response of the URL and the response is determined that the URL is not overloaded. Among themset up.When the URL is an overload, the URL needs to be verified, and the URL does not need to be verifie...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the present invention discloses a method for preventing a server from being attacked, including: determining that the destination URL in the data packet sent to the server requesting access is a URL that needs to be verified; The number of URL visits after the normalized processing of the period corresponding to the arrival time of the statistical data packet; whether the number of visits of the URL after the normalization processing of the judgment period exceeds the normalized processing of the period The threshold value of the URL being accessed; if it exceeds, the access request of the data packet will be blocked. The embodiments of the present invention also provide a monitoring device and a detection device, which limit the number of connections to the visited URL. The threshold value for a certain period of time means that the server is under attack, which can prevent attacks from anonymous proxy or puppet hosts, and will not block the access of normal proxy hosts.

Description

Technical field [0001] Examples of the present invention involve the field of communication technology, especially to prevent the server from being attacked, detecting devices and monitoring equipment. Background technique [0002] With the rapid development of the Internet, the security of network security has attracted more and more attention.Under normal circumstances, the security issues of the network mainly involve how to prevent the server in the network from being attacked, and the general server is attacked, which mainly manifested as to occupy too much service resources through the service request, which leads to overloading the server, which cannot respond to other others.The request finally caused the server resources to be exhausted to achieve the purpose of rejecting services.At the same time, more and more merchants provide services through servers. If the server is constantly attacked, it will inevitably affect the economic benefits of the merchant. [0003] Under...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/26
Inventor 钟登峰尧少敏
Owner HUAWEI DIGITAL TECH (CHENGDU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products