CC (challenge collapsar) attack defending method, device and system

An attack detection and configuration file technology, applied in the field of network security, can solve the problems of difficult CC attack, exhaustion of server resources, inability to effectively resist CC attack, etc., and achieve the effect of reducing operating efficiency, reducing available system resources, and good defense effect

Active Publication Date: 2016-11-23
青松智慧(北京)科技有限公司
View PDF4 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] CC (Challenge Collapsar, literally translated as a challenge black hole, but usually directly expressed as a CC attack) attack is a DDoS (Distributed Denial of Service, distributed denial of service) attack on the application layer with the website page as the main attack target. The principle of CC attack It is the attacker who controls some hosts to continuously send a large number of data packets to the target server, causing the server resources to be exhausted and unable to continue normal services until it crashes
CC attack simulates that a large number of users keep visiting pages that consume a lot of server resources, exhausting server resources, making the server CPU at 100% for a long time, and there will always be endless requests, which makes the server unable to serve normal requests
[0003] CC attacks are highly camouflaged, and their access behavior simulates the characteristics of normal user access. A small number of zombie machines can cause the performance of the target server to be paralyzed and block normal user access. Therefore, CC attacks are difficult to detect. Traditional security defense methods Cannot effectively defend against CC attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CC (challenge collapsar) attack defending method, device and system
  • CC (challenge collapsar) attack defending method, device and system
  • CC (challenge collapsar) attack defending method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0072] Embodiments of the technical solutions of the present invention will be described in detail below in conjunction with the accompanying drawings. The following examples are only used to illustrate the technical solution of the present invention more clearly, so they are only examples, and should not be used to limit the protection scope of the present invention.

[0073] It should be noted that, unless otherwise specified, the technical terms or scientific terms used in this application shall have the usual meanings understood by those skilled in the art to which the present invention belongs.

[0074] The invention provides a method for defending against CC attacks, a device for defending against CC attacks and a system for defending against CC attacks. Embodiments of the present invention will be described below in conjunction with the accompanying drawings.

[0075] figure 1 A flow chart of a method for defending against CC attacks provided by the first embodiment o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a CC (challenge collapsar) attack defending method for a reverse proxy server; the method includes: first, receiving an access request to access a target server sent by a client; second, making a statistic of access characteristic data of the client for the target server according to the access request; third, detecting whether the access characteristic data is normal or not by using preset attack detection rules; forth, judging whether the client is a CC attack client or not according to the detection results, and if not, forwarding the access request to the target server. Since the client and the target server are isolated by using the reverse proxy server and the target server is completely concealed out of a range of attack power of the CC attack client, good defense is provided; meanwhile, the method is executed by the reverse proxy server, no system resource of the target server is used, and it possible to ensure that the target server never experiences reduced system resources and reduced operation efficiency due to CC attack defending.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for defending against CC attacks, a device for defending against CC attacks and a device for defending against CC attacks. Background technique [0002] CC (Challenge Collapsar, literally translated as a challenge black hole, but usually directly expressed as a CC attack) attack is a DDoS (Distributed Denial of Service, distributed denial of service) attack on the application layer with the website page as the main attack target. The principle of CC attack It is the attacker who controls some hosts to continuously send a large number of data packets to the target server, causing the server resources to be exhausted and unable to continue normal services until it crashes. CC attack simulates that a large number of users keep visiting pages that consume a lot of server resources, exhausting server resources, making the server CPU at 100% for a long time, and there...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 刘鹏郭洋
Owner 青松智慧(北京)科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products