Hostile attack preventing method and network system

A malicious attack and network system technology, applied in the field of network communication, can solve problems such as aggravating the business processing capacity of business servers and the failure of websites to operate normally, and achieve the effect of reducing load pressure and preventing malicious attacks

Inactive Publication Date: 2015-12-30
NUBIA TECHNOLOGY CO LTD
View PDF6 Cites 38 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The above application scenario assumes that users use formal channels to view website information, and there are many hackers who carry out malicious attacks. They send different request messages to the website multiple times through scanning tools or DDOS and other software within a unit of time, maliciously aggravating the business of the business server. processing power to cause the website to not function properly

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hostile attack preventing method and network system
  • Hostile attack preventing method and network system
  • Hostile attack preventing method and network system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, the specific implementation manners of the present invention will now be described in detail with reference to the accompanying drawings.

[0042] In a communication network, an address is an identifier assigned to each device on the network. As applied to the Internet, a device's address is often referred to as its "Internet Protocol address" (IP address), which is a numerical representation of a device's virtual location on the Internet. If the device hosts a website, the host device's IP address is used to locate the host device and provide access to content from the website. For example, the web domain name google.com actually represents a numerical IP address, which may be, for example, 73.14.213.99. When a web client types a domain name into its web browser, the downstream DNS system matches or routes the entered domain name to an IP address, which i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hostile attack preventing method and a network system. The method comprises the steps that a second server receives first data sent by client sides, wherein the first data are connection request data from all the client sides; the second server obtains a filter rule, wherein the filter rule comprises a request address list and a parameter rule; the second server filters the first data through the filter rule, and the first data meeting the filter rule are sent to a first server. The network system comprises at least one client side, the first server and the second server. For illegal requests with request parameter filtering not meeting the rule, error information is directly returned at the second server, the information does not directly enter the first server for parameter legalization verification, the load pressure of the first server can be reduced, and some hostile attacks are prevented.

Description

technical field [0001] The invention relates to the technical field of network communication, and more specifically, relates to a method for preventing malicious attacks and a network system. Background technique [0002] With the vigorous development of the Internet, there are corresponding requirements or indicators for the security and concurrency of the website. Take the business scenario where a user visits a website as an example. The user views the website information and initiates a request to the backend business server. The business server reads the requested URL and request parameters, and performs parameter legalization verification. If it is illegal, it returns a corresponding error message. If it is legal Then return the business processing result. If a single business server cannot carry enough business, you can add a reverse proxy server between the user and the business server, and deploy multiple business servers. The reverse proxy server is based on diffe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 王福财
Owner NUBIA TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products