Method and device for defensing DDoS (Distributed Denial of Service) and CC (Connections Flood) attacks

A protection strategy and information configuration technology, applied in the field of network security, can solve the problems of scattered, difficult server resources to use, and difficult to achieve the effect of defense attacks, so as to achieve the effect of good attack protection and full utilization

Active Publication Date: 2011-02-09
CHINA TELECOM CORP LTD
View PDF3 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

CC attacks are difficult to prevent by general hardware firewalls, because: the IP addresses of CC attacks are real and scattered; the data packets of CC attacks are all normal data packets; the requests of CC attacks are all valid requests. undeniable request
Therefore, it is difficult to achieve a good defense attack effect by relying solely on hardware or software. A defense method that combines hardware and software and can effectively defend against various DDoS and CC attacks is needed.
[0005] In addition, the current protection method is not specific to the protected server, and it is usually difficult to maximize the use of server resources

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for defensing DDoS (Distributed Denial of Service) and CC (Connections Flood) attacks
  • Method and device for defensing DDoS (Distributed Denial of Service) and CC (Connections Flood) attacks
  • Method and device for defensing DDoS (Distributed Denial of Service) and CC (Connections Flood) attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the invention are illustrated. The exemplary embodiments of the present invention and their descriptions are used to explain the present invention, but do not constitute an improper limitation of the present invention.

[0023] The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0024] figure 1 is a schematic flow diagram of an embodiment of the method of the present invention.

[0025] figure 2 It is a schematic diagram of a network in which the present invention uses web crawlers to collect server information to defend against DDoS and CC attacks.

[0026] Such as figure 1 and figure 2 As shown, this embodiment may include the following steps:

[0027] S102, use web crawlers to collect server processing i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for defensing DDoS (Distributed Denial of Service) and CC (Connections Flood) attacks. The method comprises the following steps of: collecting the processing information of a server from the server needing to be protected by utilizing a web crawler; recording the collected processing information of the server in gateway equipment connected with the server; configuring an attack protecting strategy of DDoS and CC according to the processing information of the server; and preventing the server from attacking by DDoS and CC by utilizing the configured attack protecting strategy of DDoS and CC. The invention can carry out detailed resource analysis on the protected server by using the web crawler and defense the attacks of DDoS and CC according to an analysis result and a safety strategy and is more accurate and intelligent than the traditional protecting way. In addition, the invention can also customize the safety protecting strategy for the protected server, not only can more favorably carry out DDoS and CC attack protection, but also can fully utilize resources of the server.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method and device for defending against DDoS and CC attacks. Background technique [0002] With the increase of Internet bandwidth and the continuous release of various distributed denial of service attack (Distributed Denial of Service, DDoS) hacking tools, DDoS attack incidents are on the rise. Various factors such as business competition, retaliation, and network extortion have caused many network service providers such as Internet Data Center (IDC) hosting rooms, commercial sites, game servers, and chat networks to be plagued by DDoS attacks for a long time. What followed was a series of problems such as customer complaints, involvement with virtual host users, legal disputes, and business losses. Therefore, solving the problem of DDoS attacks has become a top priority for network service providers. [0003] At present, there is no particularly effective way to prevent DDoS...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 张连营
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products