SYN flood defence method and device

A flood attack and purpose technology, applied in the field of data processing, can solve problems such as reflection attacks, and achieve the effect of reducing usage, improving performance, and saving memory

Active Publication Date: 2009-12-09
NEUSOFT CORP
View PDF0 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In reality, compared with a single attacker with the same hardware configuration and a defense device, the attacker's ability to generate a SYN flood attack is far stronger than the defender's processing capacity, that is, the attacker can still overload the processing capa...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SYN flood defence method and device
  • SYN flood defence method and device
  • SYN flood defence method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0056] figure 1 It is a flow chart of a defense method against a SYN flood attack according to an embodiment of the present invention. Since this embodiment provides a defense method when the destination address device is under a SYN flood attack state, the implementation premise of this embodiment is the purpose The address device is in the state of being attacked by SYN flood, specifically, including:

[0057] Step 101, for the received SYN packet, judge whether...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an SYN flood defence method and a device thereof. The method comprises: after a destination address device is determined in the state of SYN flood, the source IP address of a received SYN package is judged to be in contract issuing the first time or not within the first preset time period; if the source IP address is in contract issuing the first time, the SYN package is discarded, but if not, normal follow-up treatment continues to carry out. The invention can effectively defence SYN flood. Experiments prove that the invention can greatly improve SYN flood defence performance; if practically used under operator client environment, the invention has favourable effect in defencing SYN flood.

Description

technical field [0001] The invention relates to the technical field of data processing, in particular to a SYN flood attack (SYNFlood) defense method and device. Background technique [0002] Denial of Service (DOS, Denial of Service) attack is an attack on servers, gateways and other equipment on the existing Internet. For normal business purposes of the device. Flood attack (also called flood attack, which is a type of denial-of-service attack) is a typical DOS attack, which uses the form of sending a large number of packets in a short period of time to exhaust the device memory resources and CPU resources of the device to achieve the attack. Purpose. This attack has a strong destructive power and includes various forms, such as SYN flood attack (SYN Flood, Synchronize sequence numbers Flood) is one of the forms. [0003] Usually, a computer first needs to establish a Transmission Control Protocol (TCP, Transmission Control Protocol) handshake before communicating in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L1/18H04L1/16H04L1/00
Inventor 曹斌杜强
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products