Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and system for actively defending distributed denial of service attacks

A distributed denial and active defense technology, applied in the field of Internet security, can solve the problems of high traceability cost and slow response speed.

Inactive Publication Date: 2016-07-20
CHINA TELECOM CORP LTD
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

These two methods have the problems of slow response and high cost of traceability
Only when a large-scale DDoS attack occurs, can we discover and take defensive measures, which is a passive defense; at the same time, because the source IP (Internet Protocol, the protocol for interconnection between networks) addresses of the attack data packets are usually forged, sending attack data packets The host is usually a puppet machine, so it is difficult to achieve real traceability by analyzing attack data packets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for actively defending distributed denial of service attacks
  • Method and system for actively defending distributed denial of service attacks
  • Method and system for actively defending distributed denial of service attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0037] The relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0038] figure 1 It is a schematic diagram of an embodiment of a method for act...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for actively defending distributed denial of service attacks; wherein an abnormal traffic monitoring device monitors the DDoS (distributed denial of service) attacks appearing in a network, generates a real-time attack list and sends the attack list to a centralized analysis platform; wherein the real-time attack list comprises the IP (Internet Protocol) addresses of DDoS attack sources; a DPI (Deep Packet Inspection) device tracks Botnets, generates a Botnet history list and sends the history list to the centralized analysis platform; wherein the Botnet history list comprises Botnet identifiers and Botnet controlled end IP addresses associated with the Botnet identifiers; the centralized analysis platform determines the Botnets to which the DDoS attack sources belong according to the real-time attack list and the Botnet history list; and the DDoS attacks from the Botnets are warned early, thus actively defending the DDoS attacks. According to the method and the system, the Botnets to which the DDoS attack sources belong can be located rapidly and accurately, thus actively defending the DDoS attacks.

Description

technical field [0001] The invention relates to the technical field of Internet security, in particular to a method and system for actively defending against distributed denial-of-service attacks. Background technique [0002] Distributed Denial of Service (Distributed Denial of Service, referred to as: DDoS) attack is a common attack method on the Internet. Hackers use multiple puppet machines to send a large number of "legal" requests to the attack target, resulting in network congestion or server resource exhaustion and denial of service. . [0003] At present, methods for defending against DDoS attacks mainly include traffic restriction technology and traffic sampling and analysis technology. These two methods have the problems of slow response and high cost of traceability. Only when a large-scale DDoS attack occurs, can we discover and take defensive measures, which is a passive defense; at the same time, since the source IP (Internet Protocol, the protocol for inter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 罗志强沈军史国水张雄毕喜军
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products