Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Firewall and the method of preventing network attack

A network attack and firewall technology, applied in the field of communication, can solve problems such as message failure to send, firewall cannot perform business forwarding normally, processing chip resource exhaustion, etc., to achieve the effect of ensuring business forwarding

Active Publication Date: 2015-09-30
HUAWEI TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, since the packets received by the switching chip must be sent to the processing chip, when a network attack is received, a large number of attack packets are sent to the processing chip one by one, which will cause the resources of the processing chip to be exhausted. The packets cannot be sent to the destination through the processing chip, resulting in the firewall not being able to forward business normally

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Firewall and the method of preventing network attack
  • Firewall and the method of preventing network attack
  • Firewall and the method of preventing network attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In the following description, for purposes of illustration rather than limitation, specific details, such as specific system architectures, interfaces, and techniques, are set forth in order to provide a thorough understanding of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments without these specific details. In other instances, detailed descriptions of well-known devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.

[0023] refer to figure 1 , figure 1 It is a flowchart of an embodiment of the method for preventing network attacks in this application. The method for preventing network attacks in this embodiment includes:

[0024] S101: The switching chip in the firewall receives a message from the Internet, and determines whether the length of the message is greater than a threshold.

[002...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a firewall and a method for preventing network attack. The method comprises the following steps of: receiving messages from an internet and judging whether the lengths of the messages are larger than a threshold; if the lengths of the messages are larger than the threshold, mirroring the messages with the lengths larger than the threshold to a slave processing chip; judging whether the messages are attached according to the quantity and the frequency of the messages which are mirrored to the slave processing chip and the lengths of which are larger than the threshold; and if the messages are attached, processing the messages with the lengths larger than the threshold. By the method, a great of attach messages can be prevented from being sent to a master processing chip, so that the master processing chip is guaranteed to have enough sources for processing normal messages, and the normal service forwarding of the firewall is ensured.

Description

technical field [0001] The application relates to the communication field, in particular to a firewall and a method for preventing network attacks. Background technique [0002] With the rapid development of the network today, network security has become an increasingly important issue. Hackers usually use botnets to send a large amount of data flow to the victim, causing link congestion and resource exhaustion of the victim, making it unable to operate normally. Among various attack methods, bandwidth-based attack is one of the commonly used attack methods. Bandwidth-based attack mainly blocks the link of the victim by sending large packets of stateless protocols. Large packets refer to lengths much larger than Special telegram with normal telegram length. [0003] The prior art provides a firewall. The firewall includes a switch chip and a processing chip. After receiving the message, the switch chip sends the message to the processing chip. After receiving the message, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 李雯
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products