ip defense method

A technology of ip data and blacklist, applied in the field of IP defense, can solve problems such as malicious access attacks, crawling, website instability risks, etc., and achieve the effect of reducing rule settings and avoiding performance loss

Active Publication Date: 2019-03-08
TONGCHENG NETWORK TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] From the perspective of existing network technologies, domain names and interface addresses exposed on the public network are vulnerable to malicious access attacks or crawling by competitors' crawlers
It not only brings a bad experience to website services and interface services, but also brings instability risks to the website
To address the above problems, common firewalls use filtering and interception methods, which have a single method and are complicated to maintain. They also have a certain impact on access speed and other performance, and cannot meet the processing of large amounts of data.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] The IP defense method is characterized in that: non-invasive access data is collected. At the same time, the data is analyzed in minutes to establish a blacklist and whitelist mechanism. And, set the rules individually according to the http protocol. Ultimately, get blacklist data analysis and denial of service through a separate service.

[0014] As far as a preferred implementation of the present invention is concerned, in consideration of providing accurate data basis for the subsequent establishment of blacklist and whitelist mechanisms, the process of collecting non-invasive access data is to deploy a sniffing system independent of website services and interfaces. The sniffing service, the sniffing service obtains tcp / ip data from the server network card. Afterwards, the http request information is analyzed from the tcp / ip data and saved to the local cache. In order to carry out more accurate monitoring, the sniffing service used has an independent heartbeat pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an Ip defense method which is characterized by comprising the following steps: collecting non-invasive access data, analyzing the data every minute, establishing blacklist and white-list mechanisms, separately setting rules according to the HTTP protocol, acquiring blacklist data analysis through independent service, and denying service. Thus, data is captured by a network card sniffing service when an HTTP requests to enter a website server providing service, and after a certain amount of data is accumulated, the data is sent to an analysis queue. Meanwhile, an analysis service takes data out of the queue and processes the data to get a blacklist. Next time when the IP requests to access a website, a blacklist can be acquired in an Http Module of .net, and access is denied after judgment. More importantly, by adopting a processing method different from the traditional firewall, performance loss is avoided to the maximum, and tedious rule setting is reduced.

Description

technical field [0001] The invention relates to a network defense method, in particular to an Ip defense method. Background technique [0002] From the perspective of existing network technologies, domain names and interface addresses exposed on the public network are vulnerable to malicious access attacks or crawling by competitors' crawlers. It not only brings a bad experience to website services and interface services, but also brings instability risks to the website. To address the above problems, common firewalls use filtering and interception methods, which have a single method and are complicated to maintain. They also have a certain impact on access speed and other performance, and cannot meet the processing of large amounts of data. Contents of the invention [0003] The purpose of the present invention is to provide an Ip defense method in order to solve the above-mentioned problems in the prior art. [0004] The purpose of the present invention is achieved thr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 王专吴志祥吴剑张海龙马和平郭凤林沈健王纪虎靳彩娟
Owner TONGCHENG NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products