A method of defending against udp connectionless flood attack
A flood attack and firewall technology, applied in the field of cloud computing management, can solve the problems of low automation, high cost, UDP flood attack, etc., and achieve the effect of strong versatility, low cost and high automation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] There are multiple implementations of the present invention, here will be based on the iptables firewall mode under Linux, the specific implementation process is as follows:
[0032] Such as figure 1 As shown, the process is as follows:
[0033] Step 1: Set the log detection cycle and defend against the number of network packets.
[0034] #vi / uer / local / udpflood.conf
[0035] #NO_OF_CONNECTIONS=600 / / Number of defensive network packets
[0036] #CHECK_CYCLE=60 / / Check cycle, unit s
[0037] Step 2: Use the UDP flood attack tool to attack the target server address.
[0038] The tool here uses LOIC, which is a flood tool that generates a lot of traffic.
[0039] Step 3: The target server detects the access traffic through the software firewall, and records the access information to the log.
[0040] Add a rule in the iptables firewall to record all UDP access logs:
[0041] #-A INPUT -p UDP -j LOG-log-prefix 'UDP-DDOS:' --log-ip-options
[0042] Step 4: Analyze the l...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


