ACK Flood attack protection method and intermediate protection device

A protective device and illegal technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of consuming processing resources, performance degradation and impact of intermediate protective devices, and achieve the effect of improving user experience and ensuring normal operation

Inactive Publication Date: 2017-01-04
NSFOCUS INFORMATION TECHNOLOGY CO LTD +1
View PDF8 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] (1) For the above-mentioned first protection method, although the illegal client is identified, the connection between the legitimate client and the target server is also interrupted, which affects most services of the legitimate client (such as games, calls, etc.) normal business), which in turn affects the user experience
[0010] (2) For the above-mentioned second protection method, the illegal client is likely to break through the TCP retransmission mechanism. If the retransmission of the ACK message is realized within a fixed time range, the intermediate protection device will not be able to identify the illegal client , the target server will still be attacked
[0011] (3) For the above-mentioned third protection method, after receiving the second ACK message, it is necessary to search the session table for a speculative message that matches the second message information carried by the second ACK message In this way, because there are too many ACK messages received, when the intermediate protection device processes these ACK messages, it will not only occupy a large amount of memory to record these speculative message information, but also consume a large amount of processing resources for matching, thus The performance of the intermediate protective device is reduced, which in turn affects the protective effect

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ACK Flood attack protection method and intermediate protection device
  • ACK Flood attack protection method and intermediate protection device
  • ACK Flood attack protection method and intermediate protection device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] The following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0052] In order to ensure that the connection between each legal client and the corresponding target server is not interrupted, improve the accuracy of identifying illegal clients, and provide effective protection for the target server, in the embodiment of the present invention, the intermediate protection device receives each client After sending the ACK message, it will use the TCP retransmission mechanism to conduct preliminary detection on ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an ACK Flood attack protection method and an intermediate protection device for improving the ACK Flood attack protection effect while ensuring a non-interrupted connection between clients and target servers. The method comprises the steps that the intermediate protection device generates corresponding detection messages based on to-be-processed ACK messages respectively, discards the to-be-processed ACK messages, respectively returns the detection messages to corresponding clients, whether the clients returning detection response messages are legal clients, and to-be-processed ACK messages retransmitted by the legal clients are sent to corresponding target servers; and the clients that do not return the detection response messages are determines as illegal clients. In this way, the intermediate protection device can identify the illegal clients while ensuring the non-interrupted connection between clients and target servers so as to improve the ACK Flood attack protection effect.

Description

technical field [0001] The invention relates to the technical field of attack defense, in particular to a protection method and an intermediate protection device for ACK Flood attacks. Background technique [0002] Before transmitting data, a connection needs to be established between the client and the target server, which is the so-called three-way handshake. After the three-way handshake is completed, the client and the target server can transmit data through an Acknowledgment (ACK) message. . During data transmission, after the target server receives the ACK message sent by the client, it will judge whether the source Internet Protocol (Internet Protocol, IP) address and source port carried in the ACK message are stored in the local session table, and determine If it is not stored in the local session table, it is determined that the ACK message is an illegal ACK message, and the illegal ACK message is directly discarded. [0003] Usually, the attacker will attack the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1466
Inventor 杨旭李洋
Owner NSFOCUS INFORMATION TECHNOLOGY CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products