CC (Communication Center) attack protective method and system thereof

A legal, pre-set time technology, applied in the field of network security, can solve problems such as difficult protection systems and affecting domain name access, and achieve the effect of improving protection capabilities

Inactive Publication Date: 2010-09-15
BEIJING LAIAN TECH
View PDF2 Cites 64 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It is easy to block the user's normal access request. If the attacker sets an appropriate attack speed, it will be difficult for the protection system to effectively detect the CC attack behavior, thereby affecting the access of the domain name.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CC (Communication Center) attack protective method and system thereof
  • CC (Communication Center) attack protective method and system thereof
  • CC (Communication Center) attack protective method and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In order to describe the purpose and technical solution of the present invention in more detail, the present invention will be further described below in conjunction with the accompanying drawings.

[0033] The following is attached figure 1 The CC attack protection method of the present invention and the modules of the system for completing each step of the method are described.

[0034] Step 1: Set the corresponding working parameters by controlling the management module, the WEB server receives the HTTP request, and the CC attack detection module judges whether the visiting IP is the first visit.

[0035] Step 2-1: If it is the first visit, the CC random script generation module generates a client script and sends it to the client, requests the client to verify the script, and uses the verified script as a security token for the second visit .

[0036] Step 2-2: If it is not the first visit, the CC attack detection module judges whether it is the second visit; if i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to CC (Communication Center) attack protective method and system thereof. The method comprises the steps of: 1, judging whether an access is a first access; 2-1, if the access is the first access, generating a client script and sending to a client end, requiring a client to verify the script, using the verified script as a safety mark and carrying out a second access; 2-2, if the access is not the first access, analyzing HTTP head information, judging whether the safety mark exists in the access request and is legal or not, if the access does not have the safety mark or the safety mark is illegal, executing the step 3, and if the access has the legal safety mark, allowing the client end to access a WEB server; and 3, marking the access as one attack, and rejecting the client end to access the WEB server. The system comprises a CC attack detection module, a CC random script generating module, a filter module and a control management module. The method can be used for rapidly detecting a CC attack object and avoids shielding a normal access request of a user.

Description

technical field [0001] The invention relates to network security technology, in particular to a CC (Challenge Collapsar) protection method and system for a WEB server. Background technique [0002] With the rapid development of the Internet, various forms of network application products continue to emerge, and the field of Internet applications continues to expand. People's market demand for professional IDC and CDN services is increasing day by day. When a user visits a website that has joined the CDN service, the domain name resolution request will be finally handed over to the global load balancing DNS for processing. The global load balancing DNS provides users with the address of the node cache server with the fastest system access speed and closest to the user through a set of pre-defined policies at that time, so that the user can get fast service, and the cache server returns the local address corresponding to the request. Resources, or data stored on the origin ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 汤霜辉
Owner BEIJING LAIAN TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products