Unlock instant, AI-driven research and patent intelligence for your innovation.

A method of defending against udp connectionless flood attack

A flood attack and firewall technology, applied in the field of cloud computing management, can solve the problems of low automation, high cost, UDP flood attack, etc., and achieve the effect of strong versatility, low cost and high automation

Active Publication Date: 2019-06-21
G CLOUD TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1. The cost is high, and ordinary small and medium-sized enterprises will not easily purchase advanced firewalls
[0007] 2. The degree of automation is low. iptables and APF can only be blocked manually after the operation and maintenance personnel discover abnormal traffic. At the same time, they cannot automatically monitor the connectionless attacks.
A UDP flood attack can occur when the attacker randomly sends UDP packets to the ports of the victim system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of defending against udp connectionless flood attack
  • A method of defending against udp connectionless flood attack
  • A method of defending against udp connectionless flood attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] There are multiple implementations of the present invention, here will be based on the iptables firewall mode under Linux, the specific implementation process is as follows:

[0032] Such as figure 1 As shown, the process is as follows:

[0033] Step 1: Set the log detection cycle and defend against the number of network packets.

[0034] #vi / uer / local / udpflood.conf

[0035] #NO_OF_CONNECTIONS=600 / / Number of defensive network packets

[0036] #CHECK_CYCLE=60 / / Check cycle, unit s

[0037] Step 2: Use the UDP flood attack tool to attack the target server address.

[0038] The tool here uses LOIC, which is a flood tool that generates a lot of traffic.

[0039] Step 3: The target server detects the access traffic through the software firewall, and records the access information to the log.

[0040] Add a rule in the iptables firewall to record all UDP access logs:

[0041] #-A INPUT -p UDP -j LOG-log-prefix 'UDP-DDOS:' --log-ip-options

[0042] Step 4: Analyze the l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of cloud computation management, and in particular relates to a method for defending UDP connectionless flood attack. The method comprises the following steps: first setting a log detection period and a defending network data packet number; a target server detecting the traffic through a software firewall and recording access information in the log when a UDP flood attack tool is used for attacking a target server address; analyzing the log, reversely listing the contract number of each IP in the same detection period; comparing with an IP white list if the contract number of each IP exceeds the defending packet number; if the IP is in the white list, not doing any processing; if the IP is not in the white list, an automation script calling the software firewall to forbid the IP; if the contract number of each IP does not exceed the defending packet number, not doing any processing. The method disclosed by the invention is low in cost, high in automation degree, strong in universality and independent of the single software firewall.

Description

technical field [0001] The invention relates to the technical field of cloud computing management, in particular to a method for defending against UDP connectionless flood attacks. Background technique [0002] With the development of cloud computing, its influence on the information technology industry has expanded from the field of IT infrastructure to hardware and equipment manufacturing, software development platform, software deployment, software sales, and IT services, covering almost all IT hardware and software. , Service area. As more companies move to virtualized data centers and cloud services, new vulnerabilities have emerged in cloud infrastructure platforms. Cloud computing denial of service attacks have also begun to change from brute force attacks using large amounts of data flows to technical attacks on basic applications. In recent years, DDOS attack methods and methods have become more and more varied. Among them, UDP connectionless flood attacks are mor...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/1425H04L63/1458H04L69/164
Inventor 刘勇彬杨松季统凯
Owner G CLOUD TECH