Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Automatic defense system and method of ddos ​​attack

An automatic defense and automatic technology, applied in the field of network security, can solve problems such as timeliness cannot meet the high service level, and achieve the effect of rapid identification and automatic defense, fast automatic recovery, and avoid manual operation

Active Publication Date: 2019-09-24
SHANGHAI CTRIP COMMERCE CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is to provide an automatic defense system and method for DDoS attacks in order to overcome the defects that the methods of defending against DDoS attacks in the prior art need to be manually executed, resulting in that the timeliness cannot meet the requirements of a high service level

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic defense system and method of ddos ​​attack
  • Automatic defense system and method of ddos ​​attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention is further illustrated below by means of examples, but the present invention is not limited to the scope of the examples.

[0026] Such as figure 1 As shown, the DDoS attack automatic defense system of the present invention includes a monitoring module 1 , a CNAME switching module 2 and a black hole routing processing module 3 .

[0027] Wherein, the monitoring module 1 receives the message of the network security analysis system in real time, collects the data in the network system in real time, and resolves the site and the IP address of the website attacked by DDoS from the network system data;

[0028] Preferably, the monitoring module 1 also analyzes the attack type, attack magnitude and attack time of the DDoS attack at the same time, and displays it through a webpage, and can also send it to relevant staff such as security engineers by email or SMS.

[0029] The monitoring module 1 also sends the site and IP address, DDoS attack attack type...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a DDos attack automatic defense system and method. The automatic defense system comprises a monitoring module, a CNAME switching module and a black hole routing processing module. The monitoring module is used for collecting network system data in real time, and obtaining sites and IP addresses under DDos attack by analyzing the network system data; the monitoring module is also used for sending the obtained sites and IP addresses to the CNAME switching module; the CNAME switching module is used for switching CNAME of the sites automatically, and sending the IP addresses to the black hole routing processing module; and the black hole routing processing module is used for sending the IP addresses to routing black hole of a network operator automatically. Through network monitoring, automatic CNAME switching and automatic black hole routing processing can be realized, thereby realizing automatic monitoring, fast recognition and automatic defense of the DDos attack.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an automatic defense system and method for DDoS attacks. Background technique [0002] Distributed Denial of Service (DDoS, Distributed Denial of Service) attacks have long been separated from the scope of early pure hacker behavior with the development and evolution of IT (Internet technology) and networks, and then formed a complete black industry chain, and its harm is even more far-reaching. In recent years, the frequency of attacks and the magnitude of attacks have become larger than before. The traditional method of defending against DDoS attacks is to implement policy control on border devices, manually switch CNAME (alias records), and manually create routing black holes. This method requires a lot of manual operations in discovering DDoS attacks and responding to DDoS attacks, resulting in unsatisfactory timeliness High service level requirements. Contents of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 楚孝龙田国华朱志博雷兵
Owner SHANGHAI CTRIP COMMERCE CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products