Method and device for allocating resources
A resource allocation and resource technology, applied in the field of network communication, can solve the problem that the attacked server cannot provide normal services
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0072] In Embodiment 1 of the present invention, a resource allocation method is provided. The resource allocation method provided in Embodiment 1 of the present invention solves the problem that the attacked server cannot Problems with providing normal service. Such as Image 6 As shown, it specifically includes the following steps:
[0073] S601. When receiving a SYN data packet sent by the client, assign a sequence number that is used to characterize the TCP connection to the TCP connection to which the SYN data packet belongs and that is not repeated with the assigned sequence number.
[0074] In this step, since no half-connection resources will be allocated for this TCP connection, the IP address and port number of the client corresponding to this TCP connection will not be recorded. When the ACK data packet and the first business data packet sent by the client cannot be used to represent the TCP connection through the client's IP address and port number, then the seri...
Embodiment 2
[0106] In Embodiment 2 of the present invention, a resource allocation method is provided. The resource allocation method provided in Embodiment 1 of the present invention solves the problem that the attacked server cannot Problems with providing normal service. Compared with the resource allocation method provided in Embodiment 1, it can further ensure the security of the TCP connection and prevent full connection attacks. Such as Figure 8 As shown, it specifically includes the following steps:
[0107] S801. When receiving a SYN data packet sent by the client, perform a preset operation on the value of the SEQ field in the SYN data packet.
[0108] S802. Allocate the identification value obtained by the preset calculation in S801 to an idle entry of the connection request table to store the identification value, and use the sequence number of the allocated idle entry to indicate the TCP connection to which the SYN packet belongs.
[0109] In this step, a preset calculati...
Embodiment approach
[0145] The first type: when the number of entries stored with the identification value in the connection request table reaches the preset maximum number of entries, and a new SYN packet is received, the entry that stores the identification value first is cleared and used The cleared idle entry stores the identification value corresponding to the TCP connection to which the new SYN data packet belongs.
[0146] In the first embodiment, the maximum number of entries can be set for the connection request table. When the connection request table is not full (that is, the number of entries used in the connection request table does not reach the maximum number of entries), it can follow the preset order Fill in the identification value into the connection request table. When the connection request table is full (that is, the number of entries used in the connection request table reaches the maximum number of entries), you can determine the first The entry of the identification value...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
