Network attack detection method and device thereof

A network attack and detection method technology, applied in the field of network security, can solve the problems of easy forgery, difficulty in setting the threshold of access frequency, difficult deployment and operation and maintenance, etc., and achieve the effect of accurate detection

Active Publication Date: 2014-10-22
ALIBABA GRP HLDG LTD
View PDF4 Cites 75 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 2. It is difficult to detect, because HTTP is a standard open protocol, the protocol format is simple, and it is easy to forge. The HTTP request initiated during the attack can be forged to be exactly the same as the request of a normal user, and the Web Server cannot distinguish
[0007] 3. It is very harmful to the website. Once the website is attacked by HTTP-Flood, it will affect the user experience (the website access speed will be slowed down) if it is small, and it may cause the website to be paralyzed and unable to provide external services. For hosting websites charged by traffic, it may need to pay high fees
[0010] 1. It is highly coupled with the business, and needs to specify a specific URL or cookie for statistics. For websites with a relatively large business volume (number of URLs), it is not easy to deploy and maintain
[0011] 2. It is difficult to set the threshold of access frequency. Different URLs carry different services, have different visits, and cause different pressures on the website server. Therefore, it is difficult to set the access threshold of different URLs uniformly, and under normal circumstances It is difficult to have a clear threshold to set the access frequency and the access frequency when the attack occurs
[0012] 3. Simple IP address access frequency statistics, for NAT (Network Address Translation, Network Address Translation) users sharing IP outlets and independent IP address users, it is easy to cause NAT users to be killed by mistake
[0013] 4. It is impossible to detect distributed HTTP-Flood attacks, because the access frequency of a single attacking IP address (broiler) is not high, which cannot reach the attack frequency threshold, but hundreds of thousands of IP addresses (broilers) initiate requests at the same time. will result in a denial of service for the site

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack detection method and device thereof
  • Network attack detection method and device thereof
  • Network attack detection method and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The main idea of ​​the present application is to calculate the relevant access information of the IP address according to the access request information in the preset time period by counting the access request information in the preset time period, so as to judge the attacking IP address. This application does not require too much intervention by security operation and maintenance personnel, and is completely decoupled from the business to achieve accurate detection of HTTP-Flood attacks.

[0029] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0030] According to an embodiment of the present application, a method for detecting a network attack is provided, which is used for detecting an HTTP-Flood attack on a website.

[0031] figure 1 is a flowchart of a network attack detectio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a network attack detection method and a device thereof. The network attack detection method of the embodiment of the application comprises the steps that access request information of an access website server is acquired; statistics is performed on the access request information within a preset time period; and related access information of an IP address is calculated according to the access request information within the preset time period, and if the related access information corresponding to the IP address is less than a preset value, the IP address is an attack IP address through judgment. Over intervention of operation and maintenance personnel is not needed, and the method is completely decoupled from services so that accurate detection of HTTP-Flood attack is realized.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a network attack detection method and device thereof. Background technique [0002] The basic attributes of network security are mainly confidentiality, integrity, legality and availability, and attackers use all possible methods and means to destroy these attributes. The purpose of Distributed Denial of Service (DDoS for short) is to destroy the availability of the network. In the Internet business, Web services have already occupied a considerable proportion, and more and more people obtain and publish information through the services provided by the Web, so Web security is also a research hotspot in today's network security. Hypertext Transfer Protocol (HTTP for short), as a key protocol of web applications, is often used by hackers to implement DDoS attacks, and it is very difficult to detect and defend against. [0003] The main target of HTTP-Flood atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 张峰张玉东
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products