Method and device for defensing CC (Challenge Collapsar) attack

An address and traffic technology, applied in the field of network communication, can solve the problem of not supporting redirection technology and verification code technology, affecting user experience, unable to access the target page normally, etc., to achieve the effect of preventing CC attacks and avoiding the impact

Active Publication Date: 2016-09-14
HANGZHOU DPTECH TECH
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, both of the above two schemes require user participation, and the user needs to re-authenticate every once in a while, and can continue to visit the target page only after the re-authentication is passed, thereby affecting the use

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for defensing CC (Challenge Collapsar) attack
  • Method and device for defensing CC (Challenge Collapsar) attack
  • Method and device for defensing CC (Challenge Collapsar) attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0054] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and device for defensing a CC (Challenge Collapsar) attack. The method comprises the steps of carrying out statistics on accumulated accessed quantity of a URL address in a preset statistic period, and accumulated access quantity of a source IP address in an HTTP request message to the URL address in the preset statistic period when the HTTP request message requesting to access the URL (Uniform Resource Locator) address is received, wherein the preset statistic period is not smaller than a preset lowest threshold value; and affirming that there is the CC attack, and discarding the HTTP request message when it is determined that the amplitude of the accumulated accessed quantity exceeding the maximum accessed quantity of the URL address in the corresponding time period satisfies a first fluctuation relationship, and the amplitude of the accumulated access quantity exceeding the maximum access quantity of the source IP address to the URL address in the corresponding time period satisfies a second fluctuation relationship. Through application of the method, the CC attack can be effectively avoided without participation of a user, and the user experience is not influenced.

Description

technical field [0001] The present application relates to the technical field of network communication, in particular to a method and device for defending against CC (Challenge Collapsar, challenge black hole) attacks. Background technique [0002] CC attack is a page-based DDoS (Distributed Denial of Service, distributed denial of service) attack. The principle of CC attack is: the attacking machine can use multiple proxy servers to send a large number of request packets to the target server, causing the target server to perform a large number of calculations, consuming a large amount of its own performance and resources, and affecting the experience of normal users. In the prior art, in order to defend against CC attacks, there are generally two solutions. Solution 1: When the security device receives the request message, it redirects the requested URL (UniformResource Locator, Uniform Resource Locator) address, and the redirection address carries a cookie value. When the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1458
Inventor 邢涛
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products