CPU-protecting mass-flow attack identification method and device

Inactive Publication Date: 2013-12-11
PHICOMM (SHANGHAI) CO LTD
View PDF6 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a method and device for identifying large traffic attacks to protect the CPU, which is used to solve the problem that the CPU protection scheme in the prior art is not flexible enough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CPU-protecting mass-flow attack identification method and device
  • CPU-protecting mass-flow attack identification method and device
  • CPU-protecting mass-flow attack identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] This embodiment provides a method for identifying large traffic attacks for protecting the CPU, such as figure 1 As shown, the large flow attack identification method for protecting the CPU includes:

[0053] Packets that need to be processed by the CPU are classified into types, and the typed packets are called typed packets. Further, the basis for classifying the message type includes the protocol type of the message, the port number through which the message is input to the CPU, or / and the VLAN number of the message. The definition basis of the message type comes from the message that the CPU needs to process. The invention defines its type for the message that needs to be processed by the CPU, and stipulates the rate at which the CPU allows receiving and processing; for messages that do not need to be clearly classified, the present invention can unify Defined as "other" type, such as the following definition:

[0054]

[0055] The scope of protection of the pr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a CPU-protecting mass-flow attack identification method and device. The method includes: dividing messages which need to be processed by a CPU into different types; acquiring a real-time rate at which messages of each type are uploaded to the CPU; judging whether the real-time rate of the messages of each type exceeds a filtering rate of the messages of the type; if the real-time rate exceeds the filtering rate, abandoning the messages of the type exceeding the filtering rate and adjusting the filtering rate of the messages of the type into a preset minimum rate; and if the real-time rate does not exceed the filtering rate, allowing the messages of the type to be uploaded to the CPU. The CPU-protecting mass-flow attack identification method and device enable the messages to be classified into different types and the real-time rates of the messages to be calculated, rates of the messages of different types to be limited, and an alarm to be sent for messages with overly high speeds and reception rates to be automatically adjusted so that the CPU is protected from attacks by mass flow and affects of an overly high speed of messages of a specific type on messages of other types are prevented.

Description

technical field [0001] The invention belongs to the technical field of electronic communication, relates to a method and a device for protecting a CPU, in particular to a method and a device for identifying a large flow attack for protecting a CPU. Background technique [0002] With the development of network technology, various network devices, especially the access layer devices, have to process more and more types of packets, and as a result, the pressure on the CPU is increasing, and the CPU may also be affected. Malicious large-traffic attacks, for this reason, the identification of large-traffic attacks to protect the CPU is particularly important. [0003] There are mainly two types of existing protection technologies. One is the method and device for protecting CPU such as the application number 201110251229.9. The number of packets sent by the port to the CPU within the preset time period T1; 2) compare the number of packets with the maximum number of packets allow...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/811
Inventor 廖俊杰
Owner PHICOMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products