Anti-attack processing method and device

A processing method and anti-attack technology, applied in the field of network communication, can solve problems such as CPU impact, and achieve the effect of reducing resource consumption and enhancing anti-attack capability

Active Publication Date: 2019-12-06
NEW H3C TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the ACL resources of the BRAS equipment are limited. When the attacking user scale is huge and the ACL resources of the BRAS equipment are exhausted, the attack packets are sent to the CPU (Central Processing Unit, central processing unit) for processing, causing an impact on the CPU.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-attack processing method and device
  • Anti-attack processing method and device
  • Anti-attack processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0026] The terminology used in the present invention is for the purpose of describing particular embodiments only and is not intended to limit the invention. As used herein and in the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attack prevention processing method and device. The attack prevention processing method comprises the steps of locally sending ACL (Access Control List) by a superior device based on an obtained MAC (Media Access Control) address of an attacking terminal; when the number of the ACL used by the superior device per se reaches a preset ACL threshold value and a subordinate device exists at the interface where an attack message is received, sending the MAC address of the attacking terminal to the subordinate device; and after the subordinate device receives the MAC address of the attacking terminal, sending the ACL at the interface where the MAC address of the attacking terminal is learned, and filtering the attack message sent by the attacking terminal. The attack prevention processing method and device can enhance the attack prevention capability of the network and can reduce resource consumption of a BRAS (Broadband Remote Access) device.

Description

technical field [0001] The present invention relates to the technical field of network communication, in particular to an attack prevention processing method and device. Background technique [0002] PPPoE (Point-to-Point Protocol over Ethernet, point-to-point protocol based on Ethernet) is a technology for rebroadcasting PPP (Point-to-Point Protocol, point-to-point protocol) frames in Ethernet. With the increasingly widespread application of PPPoE, attacks against PPPoE networks are also becoming more frequent. [0003] At present, the anti-attack technology mainly utilizes BRAS (Broadband Remote Access Server, Broadband Remote Access Server) equipment in the PPPoE network for defense. The BRAS device is responsible for attack message detection, and sends the attack user information of the attack message to the hardware ACL (Access Control List, access control list), and filters the attack message through ACL matching. However, the ACL resources of the BRAS equipment are ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0281H04L63/1416H04L63/20
Inventor 李非
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products