Check patentability & draft patents in minutes with Patsnap Eureka AI!

A CC attack detection method and its detection system

A detection method and detection system technology, which is applied in the field of network security, can solve the problems of CC attack difficulty and achieve effective detection effect

Active Publication Date: 2017-03-29
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, it is often difficult to detect CC attacks through IP request rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A CC attack detection method and its detection system
  • A CC attack detection method and its detection system
  • A CC attack detection method and its detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] First of all, it should be explained that the present invention relates to database technology, which is an application of computer technology in the field of information security technology. During the implementation of the present invention, the application of multiple software function modules will be involved. The applicant believes that, after carefully reading the application documents and accurately understanding the realization principle and purpose of the present invention, combined with existing known technologies, those skilled in the art can fully implement the present invention by using their software programming skills. The aforementioned software functional modules include but are not limited to: request rate statistics device, centralization degree calculation device, centralized request counting device, requested value recording device, CC attack judgment device, etc., all mentioned in the application documents of the present invention belong to this Th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network security technology and aims to provide a detection method and system for a CC attack. The detection method for the CC attack includes the steps that a request for getting access to a web page by a request IP is received, statistics are performed on the request rate of the request IP, the concentration ratio of the request is calculated, statistics are performed on the concentration request count, for the requested web page, of the request IP, and whether the request IP is the CC attack or not is judged according to the threshold value of the number of times of requests; the detection system for the CC attack comprises a request rate counting device, a concentration ratio calculation device, a concentration request count calculation device, a recording device for all numerical values of the request and a CC attack judging device. The detection method and system have the advantages of being sensitive and accurate and can be used for effectively detecting a distributed CC attack mode.

Description

technical field [0001] The invention relates to network security technology, in particular to a CC attack detection method and a detection system thereof. Background technique [0002] CC (Challenge Collapsar) attack is an attack method against application layer WEB services. It is essentially the same as a DDoS attack, both aiming to exhaust server resources and cause denial of service. [0003] The principle of CC attack is not complicated, it uses the weakness of the application layer to attack. Data queries with poor performance, poor program execution structure, and functions that consume resources in the website may all become the targets of CC attacks. For example, the search function of the forum needs to consume a lot of database query time and system resources. The attacker calls the search function frequently, so that the accumulation of query requests cannot be completed immediately, and resources cannot be released, resulting in too many database connection r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/26
Inventor 郭晓徐长明范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More