Attack positioning and assistant positioning device and method
A technology of positioning device and attacker, applied in the network field, can solve the problems of consumption, occupation of central processing unit processing resources, large network bandwidth, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0027] In practical applications, the gateway device usually recognizes attack packets based on the packet traffic and locally stored entries. Take the ARP (Address Resolution Protocol) attack as an example. Within 5 seconds, if the number of ARP packets sent by the same source MAC (Media Access Control) address exceeds a certain threshold, it is considered to have occurred Attack, at this time, the system will add this MAC address to the attack detection table, before the attack detection table aging, filter out all the ARP packets sent by the source MAC address to avoid attacks. However, in this solution, the gateway device cannot know which host in the local area network is sending the attack message, and accordingly, the network administrator cannot take corresponding blocking measures.
[0028] In view of the problems of the above solution, the present invention provides an attack location and assisted location method. The technical solutions of the present invention will b...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap