Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for defending against cc attack

A technology of addresses and visits, applied in the field of network communication, can solve problems such as not supporting redirection technology and verification code technology, affecting user experience, and unable to normally access the target page, so as to achieve the effect of defending against CC attacks and avoiding impact

Active Publication Date: 2019-06-07
HANGZHOU DPTECH TECH
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, both of the above two schemes require user participation, and the user needs to re-authenticate every once in a while, and can continue to visit the target page only after the re-authentication is passed, thereby affecting the user experience; Some mobile terminals do not support redirection technology and verification code technology, so that when users use these mobile terminals, they will not be able to access the target page normally, which affects the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for defending against cc attack
  • Method and device for defending against cc attack
  • Method and device for defending against cc attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0053] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0054] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for defensing a CC (Challenge Collapsar) attack. The method comprises the steps of carrying out statistics on accumulated accessed quantity of a URL address in a preset statistic period, and accumulated access quantity of a source IP address in an HTTP request message to the URL address in the preset statistic period when the HTTP request message requesting to access the URL (Uniform Resource Locator) address is received, wherein the preset statistic period is not smaller than a preset lowest threshold value; and affirming that there is the CC attack, and discarding the HTTP request message when it is determined that the amplitude of the accumulated accessed quantity exceeding the maximum accessed quantity of the URL address in the corresponding time period satisfies a first fluctuation relationship, and the amplitude of the accumulated access quantity exceeding the maximum access quantity of the source IP address to the URL address in the corresponding time period satisfies a second fluctuation relationship. Through application of the method, the CC attack can be effectively avoided without participation of a user, and the user experience is not influenced.

Description

technical field [0001] The present application relates to the technical field of network communication, in particular to a method and device for defending against CC (Challenge Collapsar, challenge black hole) attacks. Background technique [0002] CC attack is a page-based DDoS (Distributed Denial of Service, distributed denial of service) attack. The principle of CC attack is: the attacking machine can use multiple proxy servers to send a large number of request packets to the target server, causing the target server to perform a large number of calculations, consuming a large amount of its own performance and resources, and affecting the experience of normal users. In the prior art, in order to defend against CC attacks, there are generally two solutions. Solution 1: When the security device receives the request message, it redirects the requested URL (UniformResource Locator, Uniform Resource Locator) address, and the redirection address carries a cookie value. When the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1458
Inventor 邢涛
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products