Application level DDoS defense method and system
A defense system and application layer technology, applied in the network field, can solve problems such as accidental injury of legitimate users, failure to achieve defense effects, failure to establish models, etc., to achieve the effect of ensuring normal operation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0024] Illustrative examples of the invention will now be described with reference to the accompanying drawings. The same reference numerals denote the same elements. The embodiments described below are intended to help those skilled in the art to fully understand the present invention, and are intended to be illustrative rather than limiting. Unless defined otherwise, the terms (including scientific, technical and industry terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. In addition, the sequence of the steps in the flowchart is not limited to the sequence shown in the illustration.
[0025] figure 1 It is a flowchart of an application layer DDoS defense method according to an example of the present invention. The method is performed in an application environment including a client and a server, wherein the client and the server are communicatively connected. The client can initiate a requ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com