DDoS (distributed denial of service) defending method based on Turing test

A technology of Turing test and graphics, applied in the field of DDoS defense

Inactive Publication Date: 2012-09-26
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] However, the development of DDoS defense m...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DDoS (distributed denial of service) defending method based on Turing test
  • DDoS (distributed denial of service) defending method based on Turing test

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The preferred embodiments of the present invention will be specifically described below in conjunction with the accompanying drawings.

[0022] The present embodiment is a kind of DDoS defense method based on the Turing test, comprising the following steps:

[0023] 1. Intercept user request data

[0024] In this embodiment, the NDIS (Network Driver Interface Specification, ie, network driver interface specification) middle layer driver intercepts all request data entering the server, and decides whether to release the data.

[0025] Using the NDIS middle layer driver to intercept user request data does not depend on the specific network implementation scheme, and can realize cross-platform and cross-language user request data interception and processing.

[0026] 2. User identity determination

[0027] as attached figure 1 , the user identity determination steps are:

[0028] (1) Obtain the trusted level corresponding to the current request source IP and MAC by int...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a DDoS (distributed denial of service) defending method based on the Turing test. The method includes the steps: firstly, receiving user request data; and secondly, interacting with users on basis of simulated questions and answers or pattern recognition, wherein the interaction process includes steps: putting forwarding simulated questions and answers or pattern recognition problems to the users, receiving data returned by the users; determining whether the users are normal human users or not according to the data returned by the users, if yes, allowing the users to access; and if not, refuse the users to access. The DDoS defending method adopts the Turing test to determine whether target senders are normal human users or requests sent to a server by simulated normal users by machines or software, so that sources of illegal requests can be cut off to enable attackers to be in the dock, DDoS defence grasps the situation initiative, and continuous updating along with updating variation of attack modes is not needed.

Description

technical field [0001] The invention relates to a defense method against network attacks, in particular to a DDoS defense method. Background technique [0002] With the rapid development of information technology, the Internet carries more and more important interactive services. As an open network, it is particularly important to ensure the normal operation of these services. However, today's network security environment is deteriorating, the scale of botnets is gradually expanding, and distributed denial of service attacks have become the biggest threat to the healthy development of the Internet. [0003] Distributed denial of service attack, also known as DDoS (the abbreviation of "Distributed Denial of Service"), is to use a compromised computer on the network to launch an intensive "denial of service" request to a specific target computer to Exhaust the network resources and system resources of the target computer, or make it congested, making it impossible to provide ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 陈杰浩钟鸣马辰何平凡陈博梁汉
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products