Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for message attack protection

A technology of messages and message characteristics, applied in the field of communication, can solve the problems of poor technical versatility and achieve the effect of good versatility and protection

Active Publication Date: 2019-12-06
HANGZHOU DPTECH TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the present application provides a method and device for packet attack protection to solve the problem of poor versatility of the existing technology due to different filtering rules corresponding to different application types in the prior art, so as to better realize attack packet protection. text protection

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for message attack protection
  • Method and device for message attack protection
  • Method and device for message attack protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0023] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a message attack protection method and device. The method comprises the steps of matching Sockets according to a received message; detecting whether the Socket is equipped with a preset identifier or not when the received message matches with any one Socket in the local; and calling a protection rule corresponding to the preset identifier to carry out security protection on the message when the Socket is equipped with the preset identifier. According to the method and the device, the problem that in the prior art, the universality of the prior art is low due to the fact that filtering rules corresponding to different application types are different is solved, and the message attack protection is realized better.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a method and device for message attack protection. Background technique [0002] At present, most processes communicate through sockets. When a network device receives a message, if the message is sent to the network device, the network device will perform Socket matching on the message. And send the message into the buffer of the matched Socket, and then notify the corresponding process to read the message from the buffer of the Socket. [0003] With the rapid development of the network, network security issues are also increasing. Common network attack methods are data packet attacks and SYN Flood (Synchronous Flood, SYN flood) attacks on TCP (Transmission Control Protocol, Transmission Control Protocol) connections. Among them, the data packet attack sends a large number of attack packets to the opposite end by imitating the client or server, so that the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0227H04L63/0263H04L63/1408
Inventor 王富涛
Owner HANGZHOU DPTECH TECH
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More