Network defense method and device

A technology for network and business requests, applied in the field of network security, can solve the problems of single protection method, long-lasting effect, manslaughter, etc., and achieve the effect of improving the scope and level of security defense, and preventing robot access and malicious access.

Inactive Publication Date: 2014-09-03
TRAVELSKY
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, currently on the market, the protection methods adopted for various types of business are single, the protection of business functions is not thorough, and the effect cannot last long; high-frequency access users cannot be treated differently, and there is a possibility of manslaughter

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network defense method and device
  • Network defense method and device

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0091] 10.6.183.75(Client)->10.6.183.96(Server)

example 2

[0093] 10.6.183.75(Client)->10.6.183.95(Proxy)->10.6.183.96(Server)

[0094] 2) The client accesses the server through the external network

example 3

[0097] 202.106.139.5(Client)->10.6.183.96(Server)

[0098] 3) The client accesses the server through a proxy

[0099] It is also a more access method for the client to access the server through the proxy. When the client accesses the server through the proxy, it only obtains the IP of the proxy using request.getRemoteAddr(). Therefore, to accurately locate the actual IP of the client, it needs to be obtained from the request. getHeader("x-forwarded-for") to get the original proxied ip (that is, the first ip in the ip list), that is, to get the proxy information from the http header to locate the client ip, use this The method can also prevent the client from accessing the server by frequently switching agents. The following example 4-6 is an example of accessing the server by frequently switching agents:

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network defense method and device. The network defense method includes the steps of (1) conducting front end verification on a service request, executing the step (2) after verification is successfully carried out, or rejecting the service request; (2) conducting client terminal location on the service request to obtain an IP address of a client terminal to which the service request belongs; (3) based on the IP address of the client terminal, conducting access control over the service request. By means of the method and device, a client terminal locating module, an access control module and a front end verification module are combined, step-by-step pointed control strategies are accordingly achieved, and a defense system for various network applications is comprehensively achieved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a network defense method and device. Background technique [0002] With the continuous development of various industries and Internet technology, various network applications emerge in an endless stream, especially the online sales of various products have become the mainstream model. Taking ticket sales as an example, flight inquiry is the first step in ticket sales, and it is also the Institutional data entry. However, there are not many institutions in the market that obtain flight data through formal channels. Most institutions use robot crawler technology to capture data from formal channels, disrupting the market and affecting system stability. [0003] Similar situations also occur in other network applications, such as e-commerce sales sites, various forums, etc. However, currently on the market, the protection methods adopted for various services are single, t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 何飞陈涌均代勇张叶华
Owner TRAVELSKY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products