TCP (Transmission Control Protocol) bypass blocking method and device

A message and client technology, applied in the field of communication, can solve the problem of low success rate of bypass blocking, and achieve the effect of solving the low success rate of blocking

Inactive Publication Date: 2016-09-14
HANGZHOU DPTECH TECH
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present application provides a method and device for TCP ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • TCP (Transmission Control Protocol) bypass blocking method and device
  • TCP (Transmission Control Protocol) bypass blocking method and device
  • TCP (Transmission Control Protocol) bypass blocking method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0022] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a TCP (Transmission Control Protocol) bypass blocking method and device. The method comprises the steps of obtaining a negotiation maximum segment size MSS value based on an obtained TCP handshake message transmitted between a client and a server; constructing reset RST messages according to a suspicious message and the negotiation MSS value when the suspicious message is monitored; and sending the reset RST messages to the client and the server, thereby blocking the suspicious message, wherein when the suspicious message is the message sent by the client, the RST messages sent to the client comprise multiple RST messages of which SEQ values are successively increased by at least one negotiation MSS value, and when the suspicious message is the message sent by the server, the RST messages sent to the client comprise multiple RST messages of which SEQ values successively is increased by at least one negotiation MSS value. According to the method and the device, the multiple RST messages can be sent to the client and the server, and therefore, the problem that in the prior art, the blocking success rate is low can be solved.

Description

technical field [0001] The present application relates to the field of communication technologies, and in particular to a method and device for TCP (Transmission Control Protocol, Transmission Control Protocol) bypass blocking. Background technique [0002] In related technologies, after a TCP connection is established between the server and the client, a monitoring device may be deployed between the server and the client. When the monitoring device detects a suspicious message, it can send a constructed blocking message——RST (Reset, reset reconnection) message to the client or server. When the client or server receives the constructed RST message, it will disconnect the established TCP connection, thereby achieving the purpose of blocking suspicious message attacks. [0003] In the prior art, when a monitoring device detects a suspicious message, it will send a constructed RST message to a client or a server. Since the RST message is likely to be sent to the client or ser...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L67/143H04L69/163H04L69/16H04L69/22H04L63/1466H04L63/1425H04L63/166H04L63/1416H04L67/01
Inventor 朱梁
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products