Processing method, waf, router and system for denial of service attack

A denial of service attack and processing method technology, applied in the Internet field, can solve problems such as threats to target website security and target website attacks, and achieve the effect of ensuring security and preventing denial-of-service attacks.

Active Publication Date: 2020-07-10
BEIJING QIHOO TECH CO LTD +1
View PDF15 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the present invention provides a processing method, WAF, router and system for denial of service attacks, the main purpose of which is to solve the problem that the target website is attacked and threatens the target website within the time interval when the cloud server performs cloud protection in the prior art. safety issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method, waf, router and system for denial of service attack
  • Processing method, waf, router and system for denial of service attack
  • Processing method, waf, router and system for denial of service attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0047] Before describing the methods shown in the embodiments of the present invention. For ease of understanding, first of all, a schematic diagram of the B / S structure (Browser / Server, browser / server mode) provided by the embodiment of the present invention is given. The actual application scenarios and device deployment methods of the embodiments are not limited.

[0048] Such as figure 1 As shown, when the customer sends the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a processing method and system of a denial of service attack, a Web application firewall (WAF), and a router, is mainly applied to a CC attack process, and relates to the technical field of Internet, mainly for the purpose of solving the problem of threatening security of a target website when the target website is attacked in a time interval of cloud protection performed by a cloud server in the prior art. The method provided by the technical scheme comprises the following steps: a WAF obtaining access information of the target website; performing superposing processing on the access information and performing real-time monitoring on the superposed access information; and if it is monitored that the superposed access information exceeds a preset access threshold, performing interception processing on the access information.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a processing method for denial of service attacks, a WAF, a router and a system. Background technique [0002] Distributed Denial of Service (DDoS) attack refers to the use of client / server technology to combine multiple computers as an attack platform to launch a Denial of Service (DOS) attack on one or more targets. Thereby improving the damage degree of DOS attack. With the development of the Internet, DDoS attacks also develop, and there are more and more types of DDoS attacks. Among them, CC (Challenge Collapsar) attack is a type of DDoS attack. CC attacks are mainly used to attack website pages, simulating multiple Users keep visiting a target website, occupying a large amount of central processing unit (Central Processing Unit, CPU), causing the server resources to be exhausted until it crashes. [0003] At present, CC attacks can be prevented through cloud protecti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0218H04L63/1408H04L63/1458
Inventor 任海王照旗
Owner BEIJING QIHOO TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products