Method and system for achieving DDoS defense based on technology of dynamic tunnels

A tunneling and dynamic technology, applied in the field of computer networks, can solve problems such as inability to defend against large traffic attacks, unsuitable for sensitive services, etc., to achieve the effect of ensuring reliability and reducing redundancy

Active Publication Date: 2015-08-26
北京云杉世纪网络科技有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above-mentioned DDoS defense methods have been widely used, but there are also the following defects: (1) Equipment cleaning: professional security equipment is required, and sufficient bandwidth resources are available
For data centers or business systems that have invested a lot of resources, they cannot resist attacks with large traffic; (2) DNS takeover and cleaning: This method has less investment cost, but the services that can be cleaned are generally http, and because the traffic passes through the first Three parties, not suitable for sensitive business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for achieving DDoS defense based on technology of dynamic tunnels
  • Method and system for achieving DDoS defense based on technology of dynamic tunnels
  • Method and system for achieving DDoS defense based on technology of dynamic tunnels

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] Such as figure 1 As shown, it is a schematic flow diagram of a method for implementing DDoS defense based on dynamic tunneling technology provided by an embodiment of the present invention. The method includes the following steps:

[0043] S1: The access terminal sends a tunnel candidate request message to the service controller, where the tunnel candidate request message includes the attribute of the access terminal and a preset priority rule.

[0044...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method for achieving DDoS defense based on the technology of dynamic tunnels, and the method comprises the steps: an access terminal transmits a tunnel candidate request message to a service controller; the service controller feeds back a plurality of candidate tunnel gateways, which are arranged according to a preset priority rule, to the access terminal according to the property of the access terminal after the service controller receives the tunnel candidate request message; the access terminal selects one tunnel gateway from the plurality of received candidate tunnel gateways according to the sequence of the plurality of candidate tunnel gateways, and is connected with an access object through the tunnel gateway. The invention also provides a system for achieving DDoS defense based on the technology of dynamic tunnels, and the system comprises the access terminal, the service controller, a source controller, and a plurality of tunnel gateways. The method and system achieves the security defense against attack, can reduce the link redundancy, and guarantee the reliability of core business.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a method and system for realizing DDoS defense based on dynamic tunnel technology. Background technique [0002] Distributed Denial of Service (Distributed Denial of Service, referred to as DDoS), is a common attack behavior in the network, specifically refers to the use of client / server technology to combine multiple computers as an attack platform to launch attacks on one or more targets DDoS attacks, thus doubling the power of denial of service attacks. However, due to the uncertainty of the source of the attack, the traffic is too large when the attack occurs, which will cause the service of the business to be unreachable. [0003] In the existing technology, common DDoS defense has the following two methods: (1) equipment cleaning: cleaning through traffic cleaning equipment, generally deployed at the entry point of the data center or business system; (2) DNS ta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/029H04L63/1458
Inventor 张天鹏朱旗宋贞
Owner 北京云杉世纪网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products