Method for preventing DOS attack by utilizing priority queue

A priority queue and priority technology, applied to electrical components, transmission systems, etc., can solve problems such as message loss

Inactive Publication Date: 2011-06-29
BEIJING SAFE CODE TECH
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0021] The embodiment of the present invention provides a method for preventing DOS attacks by

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing DOS attack by utilizing priority queue
  • Method for preventing DOS attack by utilizing priority queue
  • Method for preventing DOS attack by utilizing priority queue

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0031] The present invention is applied at the receiving end of a SIP server. When a data packet is received, it is first judged whether it is an INVITE data packet, and then it is determined which queue to enter. The queue is divided into a high priority queue and a low priority queue, and only the INVITE data packet enters a low priority queue. SIP packets that are not INVITE packets enter the high-priority queue, and the SIP server processes the data packets in the high-priority queue first, and only starts processing the low-priority queue when the high-priority queue is empty, and the low-priority queue It is designed as a circular queue, so that when it is attacked by INVITE DOS, it will automatically drop packets by pushing the head pointer forward through the tail pointer, so as to avoid congestion and reduce delay. like figure 1 As shown, the method for preventing copying of webpage text content provided by the embodiment of the present invention includes:

[0032] l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for preventing DOS (Denial of Service) attack by utilizing a priority queue. The specific protection points comprises the following steps: (1) a waiting queue adopts the priority queue method to store different data packet in a classified manner; (2) a server treats a high priority queue at first and then treats a low priority queue when the high priority queue is empty; and (3) the data packets are treated by adopting a circular queue method in the low priority queue, which is realized in the way that the circular queue of an INVITE data packet is stored, a tail pointer pushes a head pointer to advance, the data packet forwardly directed by the head pointer is rejected, and the data packet recently entering the queue is stored at the tail of the queue. The invention also discloses a device utilizing the circular queue to relieve, and solves the problem of resource consumption due to SIP (Session Initiation Protocol) DOS attack.

Description

technical field [0001] The invention relates to network defense technology, in particular to a method for preventing DOS attacks by utilizing priority queues. Background technique [0002] The SIP protocol as a multimedia session control signaling is designed based on the idea of ​​simplification and easy expansion, not based on the idea of ​​security. Therefore, in terms of application security, the protocol has its own special characteristics. The protocol is transmitted in text form. At the same time, since the intermediate server in the application needs to read some fields in the message to obtain information and transmit the packet to the correct destination, the transmission process of the message body between the intermediate servers is not allowed. Full encryption can also be modified at any time. And with the gradual rise of the protocol, more and more manufacturers and users hope to apply the extensive functions supported by the protocol to daily production and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 孙建文辛阳罗守山包一兵
Owner BEIJING SAFE CODE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products