Network attack identification method and device
A network attack and identification method technology, applied in the field of network attack identification methods and devices, can solve problems such as data packets failing to pass, network data packets being easily forged, network security hidden dangers, etc., and achieving the effect of avoiding inability to communicate smoothly
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0047] Embodiment 1 of the present invention provides a method for identifying a network attack. Specifically, a network device for identifying a network attack is taken as an example for description. The steps of the method can be as follows image 3 shown, including:
[0048] Step 101, the router receives the data packet.
[0049] In this step, the router may receive the N+1th TCP data packet sent by the first device to the second device, where N is a positive integer. Wherein, the first device may be a client, and the second device may be a server. Of course, it is also possible that the first device is a server and the second device is a client.
[0050] Step 102, the router determines the serial number.
[0051] After the router receives the N+1th transmission control protocol data packet, before forwarding the data packet to the second device, the router may check the legality of the data packet.
[0052] In the process of using the TCP serial number to attack, the ...
Embodiment 2
[0075] Embodiment 2 of the present invention provides a network attack identification device, the device can be integrated in the firewall of the router, and the structure of the device can be as follows Figure 7 shown, including:
[0076] The receiving module 11 is used to receive the N+1th transmission control protocol TCP data packet sent by the first device to the second device, where N is a positive integer; the determination module 12 is used to receive the N+1th transmission control protocol at the receiving module When the data packet is sent, determine the difference between the acknowledgment sequence number returned by the second device receiving the Nth transmission control protocol data packet sent by the first device and the sending sequence number of the Nth transmission control protocol data packet sent by the first device; legitimacy The detection module 13 is used to determine whether the N+1th transmission control protocol data packet is a legal data packet...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 