Method and apparatus for defending against network attacks

A network attack and device technology, applied in the computer field, can solve problems such as limited defense strategies, affecting normal user access, and difficulty in general use, and achieve the effect of improving user experience

Inactive Publication Date: 2015-12-16
SHANGHAI YUNDUN INFORMATION TECH
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the existing technologies for defending against CC attacks generally have the following problems: (1) they cannot be implemented in real time, and most web servers only print relevant logs when the request processing ends. When CC attacks are detected through log analysis, Maybe the website has been down and paralyzed; (2) The defense strategy is limited and difficult to use universally; (3) The operation is complicated and not intuitive and flexible, which is easy to cause accidental killing and affect normal user access; (4) Some HTTP variables (such as user-agent, http -x_forwarded-for, etc.) are easily forged by attackers, and attackers only need to slightly modify the attack program to deceive the server, which does not play a defensive role; (5) the verification method is easy to be penetrated by attackers, and attacks cannot be prevented ; (6) Real-time attack data cannot be counted (such as the number of attacks, attack time, etc.)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for defending against network attacks
  • Method and apparatus for defending against network attacks
  • Method and apparatus for defending against network attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] The application will be further described in detail below in conjunction with the drawings.

[0051] In a typical configuration of this application, the terminal, the equipment of the service network, and the trusted party all include one or more processors (CPU), input / output interfaces, network interfaces, and memory.

[0052] The memory may include non-permanent memory in computer readable media, random access memory (RAM) and / or non-volatile memory, such as read only memory (ROM) or flash memory (flashRAM). Memory is an example of computer readable media.

[0053] Computer-readable media includes permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology. The information can be computer-readable instructions, data structures, program modules, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic rand...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention aims at providing a method and an apparatus for defending against network attacks. The method comprises the steps of obtaining an access request of a user device to a target page, detecting whether the access request triggers defensive strategy information corresponding to the target page, performing verification processing on the user device corresponding to the access request triggering the defensive strategy information and returning the target page to the user device passing the verification processing. Compared with the prior art, the defensive strategy information involved in the method comprises a plurality of flexibly configurable defensive strategies and the verification processing can be implemented in a plurality of flexibly configurable verification modes to meet the requirements under different circumstances and enhance the experience of users. Furthermore, the method is capable of visually displaying the running conditions and providing support for the optimization of the defensive strategy information by collecting various running indices in real time, displaying attack logs in real time and generating a graphic report according to the collection result, thereby further enhancing he experience of the users.

Description

Technical field [0001] This application relates to the computer field, and in particular to a technology for defending against network attacks. Background technique [0002] With the advent of the Web2.0 era, a series of new Internet products such as social networking, e-commerce, and online games were born. Internet applications based on the Web environment are becoming more and more extensive. In the process of enterprise informatization, various applications are set up on the Web. on the platform. However, the rapid development of Web services has also attracted strong attention from hackers, and network security issues have become increasingly prominent. DDoS (Distributed Denial of Service, Distributed Denial of Service) attacks are developing toward larger, stronger, faster, and smarter trends. [0003] As a DDoS attack against Web server resources, CC (Challenge Collapsar, challenge black hole) attacks have received more and more attention in recent years. The principle of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1458H04L63/0236H04L63/08
Inventor 陈震
Owner SHANGHAI YUNDUN INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products