A network node monitoring method and device

A network node and monitoring device technology, applied in the computer field, can solve the problems of reduced number of access requests and inability to distinguish them, so as to improve the ability to defend against attacks and ensure normal operation

Active Publication Date: 2019-04-23
NEUSOFT CORP
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, once a hacker uses tens of thousands of network nodes to send a large number of access requests, since the number of access requests equally distributed to each network node is greatly reduced, the corresponding rate of deleting tokens is more than r per second. Low, because under normal circumstances, the rate of access requests sent by ordinary users is less than r per second, so it is often impossible to distinguish which are normal network nodes used by ordinary users and which are abnormal network nodes controlled by hackers

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network node monitoring method and device
  • A network node monitoring method and device
  • A network node monitoring method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0074] see figure 1 , which is a flow chart of Embodiment 1 of a network node monitoring method provided by the present invention.

[0075] The network node monitoring method provided in this embodiment includes the following steps:

[0076] Step S101: Receive an access request sent by a network node, and obtain a first identifier that distinguishes the network node from other network nodes.

[0077] In the present invention, the first identifier is an identifier that distinguishes the network node from other network nodes, such as an IP (International Protocol, a protocol for interconnection between networks) address, a website cookie, a unique identifier of a network node physical device, etc. etc., or consist of a combination of at least two of the above-mentioned identifiers. Among them, the use of IP address as the first identifier is suitable for network nodes in non-local area networks; the use of website cookies as the first identifier requires the website to have th...

Embodiment 2

[0099] see figure 2 , which is a flow chart of Embodiment 2 of a network node monitoring method provided by the present invention.

[0100] The network node monitoring method provided in this embodiment includes the following steps:

[0101] Step S201: Receive an access request sent by a network node, and obtain a first identifier that distinguishes the network node from other network nodes.

[0102] In the first method embodiment, the first identifier may include the IP address of the network node, a website cookie and / or a unique identifier of a physical device of the network node, and the like. However, since the first identification composed of the IP address, the website cookie and / or the unique identification of the physical device of the network node is often relatively complicated, it is time-consuming to find the first identification in the first table or the second table in the following steps In order to overcome this problem, in this embodiment, the IP address, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method for monitoring a network node. The method comprises the steps as follows: receiving an access request transmitted by the network node; obtaining a first identification of the network node different from other network node; calculating a Hash value corresponding to the first identification according to a Hash algorithm, wherein a first form is stored with the first identification and a corresponding relation of position of the first identification in a second form; judging whether an item of the first form corresponding to the Hash value has the first identification, searching the first identification in the second form according to the corresponding relation if the item of the first form corresponding to the Hash value has the first identification, and adding one on the basis of current access request quantity corresponding to the first identification; judging whether the added access request quantity is more than or equal to a preset request quantity, and confirming the network node is an abnormal network node if the added access request quantity is more than or equal to a preset request quantity. The embodiment of the invention further discloses a device for monitoring network node. The method and the device of the invention achieve the goal of monitoring abnormal network node used by a cracker to perform misapplication and attack of resources in real time.

Description

technical field [0001] The invention relates to the computer field, in particular to a network node monitoring method and device. Background technique [0002] At present, the most basic attack method of network hackers on network servers is resource abuse attack, that is, using network nodes (also known as "broilers" or "puppet machines" in the industry, referring to machines that can be remotely controlled by hackers) to send a large number of legitimate access requests To occupy too many server resources, so that the normal user's legitimate request fails, or the page loading speed becomes extremely slow, causing the user to be unable to use the website. Moreover, this kind of attack process is often very short. For an unprotected web server, this attack is almost unstoppable, and the web server will crash in a short time, causing huge losses to the enterprise. Therefore, finding out the network nodes controlled by hackers from the numerous network nodes sending access r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/1441H04L63/1466
Inventor 于杨
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products