Self-adaptive anti-attack method and device

An anti-attack and self-adaptive technology, applied in the field of communication security, can solve problems such as weak ability to identify abnormal business messages, lack of ability to identify and analyze business types, etc.

Active Publication Date: 2015-09-30
HUAWEI TECH CO LTD
View PDF4 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And because the firewall unit is independent of the business unit, it does not have the ability to identify and analyze business types. Therefore, the ability to identify abnormal business packets disguised by "exquisite design" is relatively weak. For this type of attack, the firewall will Behavioral, fragmented message identification and other technologies can only achieve partial protection capabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-adaptive anti-attack method and device
  • Self-adaptive anti-attack method and device
  • Self-adaptive anti-attack method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0105] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0106] In the prior art, the firewall unit is independent from the network element system, and does not have the ability to identify and analyze service types. Therefore, the ability to identify abnormal messages disguised as "exquisitely designed" is relatively weak. The adaptive anti-attack device involved in the present invention It is set inside the network element system to monitor the packets processed by each node in the network element system. The message p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a self-adaptive anti-attack method and device. The self-adaptive anti-attack method comprises the steps of matching nodes passed by a message received from a port in a network element system according to time order with a node passed through by a second message of which the business type is the same as that of the message, thus acquiring matching degree of a path, wherein the second message passes the network element system for the first time; determining whether the received message is an abnormal message or not according to the matching degree, reducing the allowed access flow of the port from which the message is received if the message is the abnormal message, so as to realize the self-adaptive anti-attack to the abnormal message, thereby eliminating the trouble operation step of firewall artificial configuration, and effectively improving the dynamic identification and intercept effects on network attack.

Description

technical field [0001] The invention relates to the technical field of communication security, in particular to an adaptive attack defense method and device. Background technique [0002] In telecommunication equipment, different network elements are realized through devices / ports such as routers, switches, Fast Ethernet (English: Fast Ethernet, FE for short), and Gigabit Ethernet (English: Gigabit Ethernet, GE for short) interfaces. Interconnection, to provide users with a variety of telecommunications services. With the continuous integration of IT and CT networking, the telecom network encounters external abnormal packet attacks, causing problems such as board reset and service congestion. [0003] A common network attack defense solution is to deploy a firewall at the network element entrance. The incoming data packets are screened through the preset policies of the firewall. The packets that meet the preset policies are allowed to access the network, and the packets ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1466H04L9/40
Inventor 惠卫锋
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products