Processing method for network attacks and device

A network attack and processing method technology, which is applied in the field of processing methods and devices for network attacks, can solve the problems of low DDOS attack detection accuracy, poor defense effect, and poor detection efficiency, so as to improve detection efficiency and defense effect, improve The effect of detection accuracy

Active Publication Date: 2016-02-17
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF3 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides a processing method and device for network attacks, which are used to solve the problems of low detection accuracy, poor detection efficiency and poor defense effect of DDOS attacks in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method for network attacks and device
  • Processing method for network attacks and device
  • Processing method for network attacks and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0052] figure 1 A flowchart of an embodiment of the processing method for network attacks provided by the present invention, such as figure 1 As shown, it specifically includes the following steps:

[0053] 101. Acquire relevant information about access requests received within a time period to be monitored.

[0054] The execution subject ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a processing method for network attacks and a device. The method comprises steps of by obtaining related information of received access requests in a to-be-monitored period, judging whether the network has been attacked in the to-be-monitored period; if the network has been attacked, obtaining times of the access requests corresponding to identifications of client ends and/or size of access data packages in the access requests in the to-be-monitored period; and obtaining client ends which are suspected to be attacked and abandoning the access requests sent by the client ends according to the times of the access requests corresponding to identifications of client ends and/or size of access data packages in the access requests in the to-be-monitored period. Thus, whether the network has been attacked can be determined by combining the received access requests of all client ends in the to-be-monitored period; the attacks can be precisely identified and defense can be performed; detection precision degree of DDOS attacks is improved; and detection efficiency and defense effects are improved.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a processing method and device for network attacks. Background technique [0002] Flooding distributed denial of service attack (Distributed Denial of Service, DDOS) is the most common attack method among the network attacks against the Internet Data Center (IDC) of operators, especially the DDOS attack against the application layer, such as HTTP flooding attack or hypertext Transmission protocol (HyperTextTransferProtocol, HTTP) host resource exhaustion attack. HTTP flooding attack refers to that the attack side sends a large number of requests to the attacked side, including normal requests, redirected pages, header information and other content to attack. The HTTP host resource exhaustion attack refers to that the attacking side sends a response packet requesting a large amount of data or a request requesting a high-complexity computing capability to the attack...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1458H04L63/1466
Inventor 朱峰
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products