Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and firewall for preventing HTTP POST flooding attacks

A flooding attack and firewall technology, applied in the field of communication, can solve problems such as attacks that cannot be used to process POST requests, and achieve the effect of protecting security

Inactive Publication Date: 2010-07-28
HUAWEI DIGITAL TECH (CHENGDU) CO LTD
View PDF4 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the limitations of the HTTP specification, this method is only applicable to the prevention of GET request attacks, and cannot be used to deal with POST request attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and firewall for preventing HTTP POST flooding attacks
  • Method and firewall for preventing HTTP POST flooding attacks
  • Method and firewall for preventing HTTP POST flooding attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0017] Embodiment 1. A method for preventing HTTP POST flood attacks, such as figure 1 shown, including:

[0018] A1. The firewall receives the hypertext transfer protocol HTTP request sent by the client.

[0019] In the embodiment of the present invention, the firewall can be deployed in a bypass or direct way. In the bypass deployment mode, the HTTP traffic of the upstream network is diverted to the firewall, and the firewall prevents HTTP attacks according to the method of the embodiment of the present invention. After cleaning and filtering the attack traffic, the normal HTTP access traffic is injected back to the downstream network. In the in-line deployment mode, the firewall directly defends against HTTP attack traffic from the upstream network. After filtering out the attack traffic, normal HTTP traffic enters the downstream network through the firewall.

[0020] The firewall can continue to use the method of this embodiment to defend against POST Flood attacks. Pref...

Embodiment 2

[0040] Embodiment 2. On the basis of Embodiment 1, this embodiment describes in detail the specific implementation process of using the cookie injection mechanism for prevention. In this embodiment, after the firewall detects that a POST Flood attack occurs, it starts the following defense process, wherein The signaling flow between the client and the firewall is as follows: figure 2 shown, including:

[0041] B1. The firewall receives the HTTP request sent by the client. The source IP of the client is not in the white list. The firewall replaces the web server with the client for three handshakes. After the TCP connection is successful, it is written into the source IP monitoring table, recording the number of verifications of the source IP and timestamp.

[0042] B2. The firewall receives the HTTP POST request sent by the client. The request carries the requested URL and data. Since it is the first time that the client sends the POST request, no authentication information ...

Embodiment 3

[0066] Embodiment 3. This embodiment provides an example in which the method of Embodiment 1 adopts the HTML page form (Form) automatic submission technology.

[0067] The specific execution process of this embodiment is similar to that of Embodiment 2, the difference is that:

[0068] When the firewall responds to the HTTP POST request sent by the client for the first time, it uses "200 success" as the first response (corresponding to step B3), and carries the verification information through a simple form page in the message part of the 200 response.

[0069] Specifically, the form page may include a text box and an auto-submit button, the content of the text box is a random verification code used as verification information, and the auto-submit button is used to make the client re-initiate the form that carries the text box. POST request, the automatic submission button can use the HTML onload method and Javascript scripting language to make the client browser automatically...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses method and firewall for preventing HTTP POST flooding attacks. The embodiment responses verification information to a primary hypertext transfer protocol HTTP POST request of a user client, carries the verification information when the user client requests again, effectively prevents HTTP POST flooding attacks by detecting the correctness of the verification information and effectively guides the safety of a network server.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method and a firewall for preventing HTTP POST flooding attacks, and is suitable for preventing Hypertext Transfer Protocol (HTTP, HyperText Transfer Protocol) POST flooding (Flood) attacks. Background technique [0002] A network (Web) server plays an extremely important role in current Internet applications, such as providing services such as web page browsing, email sending and receiving, resource downloading, etc. These services are usually based on the HTTP protocol. In an open network environment, web servers are vulnerable to HTTP Flood attacks, which is a denial of service (DOS: Denial of Service) attack, that is, attackers use a large number of service requests or system vulnerabilities to occupy service resources, causing the server to overload , an attack method that cannot respond to requests from other normal users. HTTP Flood attacks are mainly designed for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 肖洪亮毛世峰吴波
Owner HUAWEI DIGITAL TECH (CHENGDU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products