Access request filtering method, device and facility

A technology of access request and filtering method, applied in the field of network security, can solve the problems of limited hardware firewall hardware processing capacity, increased labor cost and maintenance complexity, poor access request filtering ability, etc., to achieve reduced maintenance complexity and low cost , the effect of effective interception

Inactive Publication Date: 2014-10-08
XIAOMI INC
View PDF5 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Because the hardware firewall is not only expensive, but also needs professional security personnel to maintain it regularly, so the way of filtering access requests by hardware firewall not only increases the cost consumption, but also increases the labor cost and maintenance complexity
In addition, when the e-book website suffers from a large-scale DDoS attack, it is limited by the hardware processing capability of the hardware firewall, and the filtering ability of access requests is poor.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access request filtering method, device and facility
  • Access request filtering method, device and facility
  • Access request filtering method, device and facility

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050]Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0051] Before explaining the embodiments of the present disclosure in detail, the application scenarios of the present disclosure will be introduced first. As a common means of hacker attack, DDoS attack is to combine multiple computers as an attack platform to launch a DDoS attack on one or more targets, thereby multiplying the power of denial of service attacks. For e-book websites, when a DDo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an access request filtering method, device and facility and belongs to the technical field of network security. The access request filtering method comprises the steps of receiving an access request, wherein the access request carries access triggering information; judging whether the access request is an attack request or not according to the access triggering information; filtering the access request if the access request is the attack request; obtaining page contents corresponding to the access request and sending the page contents corresponding to the access request to a corresponding terminal if the access request is not the attack request. Due to the fact that identification information carried by the access triggering information can explicitly express the type of the access request, the attack request can be rapidly and effectively distinguished according to the access triggering information, and DDoS attack can be effectively intercepted in an access request filtering mode.

Description

technical field [0001] The present disclosure relates to the technical field of network security, in particular to an access request filtering method, device and equipment. Background technique [0002] The vigorous development of network technology has brought great convenience to people's work and life, but it has also caused a lot of security problems. After the computer is attacked by hackers, it may not work normally, and the personal information of the user may be leaked in severe cases. Therefore, network security issues have always been the focus of everyone's attention. For an independent website operating company whose business covers the operation of e-book websites, the hacker attack not only affects the normal operation of the company, but also poses a security risk of leaking users' personal information. Therefore, for e-book website operators, how to perform security filtering on massive access requests, so that e-book websites are protected from malicious at...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 聂春来
Owner XIAOMI INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products