Method and device for preventing malicious traffic attack
A technology of malicious traffic and traffic limitation, applied in the field of traffic transmission, can solve the problem of being unable to prevent the attack of changing source and target
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.
[0028] figure 1 The flow chart of the method for preventing malicious traffic attacks provided by the embodiment of the present invention, such as figure 1 As shown, the specific steps are as follows:
[0029] Step 100: Preset a shared token bucket on the network device.
[0030] Wherein, the size of the shared token bucket and the adding rate of tokens can be determined according to experience.
[0031] Step 101: When a network device receives a packet, it is determined whether the packet satisfies the semi-connected state or the fully-connected state, and if the semi-connected state is satisfied, step 102 is performed; if the full-connected state is satisfied, step 103 is executed.
[0032] Step 102: The network device uses the shared token bucket to restrict the flow of the message, and this process ends.
[0033] Step 103: The...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


