Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A self-adaptive attack defense method and device

An anti-attack and self-adaptive technology, applied in the field of communication security, which can solve the problems of weak ability to identify abnormal business packets, and lack of ability to identify and parse business types.

Active Publication Date: 2018-03-06
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

And because the firewall unit is independent of the business unit, it does not have the ability to identify and analyze business types. Therefore, the ability to identify abnormal business packets disguised by "exquisite design" is relatively weak. For this type of attack, the firewall will Behavioral, fragmented message identification and other technologies can only achieve partial protection capabilities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A self-adaptive attack defense method and device
  • A self-adaptive attack defense method and device
  • A self-adaptive attack defense method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0105] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0106] In the prior art, the firewall unit is independent from the network element system, and does not have the ability to identify and analyze service types. Therefore, the ability to identify abnormal messages disguised as "exquisitely designed" is relatively weak. The adaptive anti-attack device involved in the present invention It is set inside the network element system to monitor the packets processed by each node in the network element system. The message p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an adaptive attack defense method and device. By matching the nodes that the message received from the port passes through in the network element system in chronological order with the nodes that have the same service type as the message and that pass through the network element system for the first time, Obtain the matching degree of the path, determine whether the received message is an abnormal message according to the matching degree, and if the message is an abnormal message, reduce the allowable access flow of the port receiving the message, so as to achieve The self-adaptive defense against abnormal packets eliminates the cumbersome operation of manual firewall configuration and effectively improves the dynamic identification and interception of network attacks.

Description

technical field [0001] The invention relates to the technical field of communication security, in particular to an adaptive attack defense method and device. Background technique [0002] In telecommunications equipment, different network elements are interconnected through devices / ports such as routers, switches, Fast Ethernet (English: FastEthernet, abbreviated: FE) interfaces, and Gigabit Ethernet (English: Gigabit Ethernet, abbreviated: GE) interfaces. Interoperability, to provide users with a variety of telecommunications services. With the continuous integration of IT and CT networking, the telecom network encounters external abnormal packet attacks, causing problems such as board reset and service congestion. [0003] A common network attack defense solution is to deploy a firewall at the network element entrance. The incoming data packets are screened through the preset policies of the firewall. The packets that meet the preset policies are allowed to access the n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1466H04L9/40
Inventor 惠卫锋
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products