Method and device for preventing attack under transmission control protocol (TCP)

A transmission control protocol and attack packet technology, applied in the field of attack prevention under the transmission control protocol TCP, can solve problems such as consumption of session tables, normal users cannot connect to the server, etc., to prevent attacks, improve service experience, and ensure connections. Effect

Active Publication Date: 2012-11-14
XFUSION DIGITAL TECH CO LTD
View PDF7 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] But, adopt above-mentioned prior art, under the situation of a large amount of SYN Flood attacks, because when receiving each SYN message that attacker sends, proxy server all needs to establish session table, so can consume the session table resource of proxy server , causing normal users to be unable to connect to the server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing attack under transmission control protocol (TCP)
  • Method and device for preventing attack under transmission control protocol (TCP)
  • Method and device for preventing attack under transmission control protocol (TCP)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention; obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0015] A method for preventing attacks under the Transmission Control Protocol TCP protocol is provided in the embodiment of the present invention, such as figure 1 As shown, the method includes:

[0016] S110: Receive a request synchronization message requesting to initiate a dialogue from the client;

[0017] S120: Send a confirmation message to the client;

[0018] S130: Receive a client confirmation message from the client;

[0019] S140: Determine whet...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for preventing an attack under a transmission control protocol (TCP). The method comprises the following steps: receiving a request synchronization message which is sent by a client and requests to establish a session with a sever; sending a first confirmation message to the client; receiving a second confirmation message sent by the client; judging whether the request synchronization message belongs to an attack message based on the second confirmation message; if the request synchronization message is judged to belong to the attack message, abandoning the request synchronization message; and if the request synchronization message is judged to belong to a legal message, establishing a session table between the client and the server. By using the method and device disclosed by the embodiment of the invention, under the condition of a large number of SYN Flood attacks, the attacks can be effectively prevented, and normal connection between a user and the server can be guaranteed; and therefore, the service experience is enhanced.

Description

technical field [0001] The present invention relates to the technical field of communication, and more specifically, relates to a method and device for preventing attacks under the transmission control protocol TCP. Background technique [0002] With the development of the field of communication technology, the traffic volume of telecommunication data also increases rapidly. Undoubtedly, the network will also face various security challenges, and the attack of SYN flood traffic is a typical one. This attack uses a large number of data packets to attack the target system and consumes the resources of the target system so that legitimate users cannot use network services normally. [0003] In order to protect the server behind the network device, the TCP Proxy scheme is generally used, that is to say, the network device first establishes a connection with the proxy server, and only establishes a connection with the real server when the real data packet arrives. [0004] At p...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 任广涛
Owner XFUSION DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products