Unlock instant, AI-driven research and patent intelligence for your innovation.

System used for detecting and preventing attack to server in computer network and method thereof

A network server and server system technology, applied in the field of data exchange in computer networks, can solve the problem that network servers are vulnerable to malicious attacks, etc.

Active Publication Date: 2012-09-12
重庆云流未来科技有限公司
View PDF13 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, web servers may be vulnerable to malicious attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System used for detecting and preventing attack to server in computer network and method thereof
  • System used for detecting and preventing attack to server in computer network and method thereof
  • System used for detecting and preventing attack to server in computer network and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] Reference will now be made in detail to embodiments of the invention, examples of which are illustrated in the accompanying drawings. While specific embodiments have been shown, it should be understood that the invention is not meant to be limited to those specific embodiments. On the contrary, the invention includes alternatives, modifications and equivalents within the spirit and scope of the appended claims. Numerous specific details are set forth in order to provide a thorough understanding of the subject matter presented herein. It will be apparent, however, to one of ordinary skill in the art that the subject matter may be practiced without these specific details. In other instances, well-known methods, procedures, components, and circuits have not been described in detail so as not to unnecessarily obscure aspects of the present embodiments.

[0027] Although the terms first, second etc. may be used herein to describe various elements, these elements should not...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a computer enforcement method. The method is executed by a server system possessing one or more servers and a memory. The memory stores one or more programs which is executed through the one or more servers. The method comprises the following steps: in the server system, receiving an access request from terminal equipment to the network server; determining whether the access request matches with a cache record stored in an alternative server; if the matched cache record is found, returning the cache record to the terminal equipment; if the matched cache record is not found, processing the access request for safety inspection; forwarding the processed access request to the network server; receiving a response from the network server; optimizing the response from the network server; forwarding the optimized response to the terminal equipment.

Description

technical field [0001] The present invention relates generally to the field of data exchange in computer networks and, in particular, to a system and method for improving network security during data exchange using alternative server systems to detect and prevent attacks on network servers based on a set of protection rules malicious attacks. Background technique [0002] A computer network (eg, the Internet) involves the exchange of data between terminal devices (eg, laptops, tablets, or smartphones) and network servers (eg, web servers). The terminal device sends an access request to access a piece of day (for example, a web page) hosted by the web server. A Domain Name Server (DNS) receives an access request, determines the Internet Protocol (IP) address of the web server, and forwards the access request to the web server. When the web server receives the access request, it returns the information of the accessed web page to the terminal device. In many cases, the sour...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
Inventor 马杰冯景辉
Owner 重庆云流未来科技有限公司