Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for identifying attack source of denial of service attack

A denial-of-service attack and attack source technology, applied in the field of Internet security, can solve problems such as unproposed solutions, and achieve the effect of improving network security, protecting security, and identifying high accuracy

Active Publication Date: 2017-11-24
QI-ANXIN LEGENDSEC INFORMATION TECH (BEIJING) INC +1
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, for the problem that the attack source of the denial of service attack cannot be accurately identified in the prior art, no effective solution has been proposed so far

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying attack source of denial of service attack
  • Method and device for identifying attack source of denial of service attack
  • Method and device for identifying attack source of denial of service attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The algorithms and displays presented herein are not inherently related to any particular computer, virtual system, or other device. Various generic systems can also be used with the teachings based on this. The structure required to construct such a system is apparent from the above description. Furthermore, the present invention is not specific to any particular programming language. It should be understood that various programming languages ​​can be used to implement the content of the present invention described herein, and the above description of specific languages ​​is for disclosing the best mode of the present invention.

[0029] figure 1 It is a schematic diagram of the network application environment of the device 200 for identifying the source of a denial of service attack according to an embodiment of the present invention. In the figure, when the webpage client 110 accesses the target website, the input domain name is parsed by the domain name resolution...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an identification method and device for the attack source of the denial of service attack. The identification method for the attack source of the denial of service attack comprises the following steps of receiving an anomalous event triggering attack source identification; obtaining the total amount of access requests sent out to a target host within a first preset time slot; determining the maximum request source of the amount of the access requests sent out to the target host within the first preset time slot, and recoding the amount of request access emitted from the request source as a first page view; judging whether the rate of the first page view, which accounts for the total amount of the access request, exceeds a preset ratio; and if so, determining the request source as the attack source of the denial of service attack. According to the technical scheme disclosed by the invention, the identification accuracy is high when a single request source carries out denial of service attack to the target host, the attack mode of the single attack source in the denial of service attack can be effectively identified and protected, and the network safety is improved.

Description

technical field [0001] The invention relates to the field of Internet security, in particular to an identification method and device for an attack source of a denial of service attack. Background technique [0002] Denial of service attack means that the attacker finds a way to stop the target machine from providing services or accessing resources. It is one of the attack methods commonly used by hackers. A large number of requests that exceed the response capacity will consume a lot of resources of the target host, these resources include disk space, memory, processes and even network bandwidth, thereby preventing normal users from accessing. In severe cases, some services may be suspended or even the host may crash. [0003] As a type of denial of service attack, CC attack (Challenge Collapsar, challenge black hole attack) is a malicious attack method that uses continuous connection requests to websites to cause denial of service. Its principle is to simulate multiple us...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 蒋文旭
Owner QI-ANXIN LEGENDSEC INFORMATION TECH (BEIJING) INC