Method and device for identifying attack source of denial of service attack
A denial-of-service attack and attack source technology, applied in the field of Internet security, can solve problems such as unproposed solutions, and achieve the effect of improving network security, protecting security, and identifying high accuracy
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] The algorithms and displays presented herein are not inherently related to any particular computer, virtual system, or other device. Various generic systems can also be used with the teachings based on this. The structure required to construct such a system is apparent from the above description. Furthermore, the present invention is not specific to any particular programming language. It should be understood that various programming languages can be used to implement the content of the present invention described herein, and the above description of specific languages is for disclosing the best mode of the present invention.
[0029] figure 1 It is a schematic diagram of the network application environment of the device 200 for identifying the source of a denial of service attack according to an embodiment of the present invention. In the figure, when the webpage client 110 accesses the target website, the input domain name is parsed by the domain name resolution...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


