Application layer slow-speed attack detection method and correlation apparatus

A slow attack, application layer technology, applied in the field of image processing, can solve the problem of high false alarm rate

Active Publication Date: 2016-05-18
TENCENT DIGITAL TIANJIN
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The inventors of the present invention found in the course of research and practice that the existing application layer slow attack detection algorithm generally only judges whether the server currently suffers from application layer slow attack by statistical results of the public gateway interface in the HTTP request. However, the practice has found that the false positive rate of this detection algorithm is quite high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application layer slow-speed attack detection method and correlation apparatus
  • Application layer slow-speed attack detection method and correlation apparatus
  • Application layer slow-speed attack detection method and correlation apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The embodiment of the present invention provides an application layer slow attack detection method and a related device, in order to improve the accuracy of the application layer slow attack alarm.

[0031] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0032] Each will be described in detail below.

[0033] The terms "first", "second", "third" and "fourth" in the specification...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiments of the invention disclose an application layer slow-speed attack detection method and a correlation apparatus. The application layer slow-speed attack detection method comprises the following steps: obtaining a flow entering a server; based on the obtained flow entering the server, counting the quantity of transmission layer empty chains initiated to the server within preset duration; and if the counted quantity of the transmission layer empty chains is greater than or equal to a first threshold and the quantity of application layer data packets carrying a destination internetworking protocol address i and a public network gateway interface identification j in the flow entering the server within k periods accords with a preset threshold condition, performing application layer slow-speed attack alarm on the destination internetworking protocol address i and the public network gateway interface identification j, wherein the destination internetworking protocol address i is one of internetworking protocol addresses of the server. According to the technical scheme provided by the embodiments of the invention, the accuracy of the application layer slow-speed attack alarm is improved.

Description

technical field [0001] The invention relates to the technical field of image processing, in particular to an application layer slow attack detection method and a related device. Background technique [0002] At present, cyber attacks appear frequently and can be said to be ubiquitous. There are a large number of hackers and various computer viruses hidden in the Internet. For some servers that provide network services, it is often difficult to provide services normally when they are attacked by the network. [0003] Application layer slow attack is a common network attack method. This attack method has caused great obstacles to the normal operation of the server. Therefore, how to slowly and accurately detect whether the server is currently suffering from application layer slow attack becomes Very important. [0004] The inventors of the present invention found in the course of research and practice that the existing application layer slow attack detection algorithm gener...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/06
Inventor 闫帅帅周志彬
Owner TENCENT DIGITAL TIANJIN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products