Flow processing method, equipment and system

A processing method and equipment technology, applied in the field of communication, can solve the problems affecting the normal business of users, unable to solve the problems of high cost and low efficiency, and achieve the effect of improving the experience and reducing the cost of use

Active Publication Date: 2017-03-22
ALIBABA GRP HLDG LTD
View PDF5 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the defect that high cost and low efficiency cannot be solved in the defense against DDoS in the prior art, thus affecting the normal business of users, this application proposes a traffic processing method, which is

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Flow processing method, equipment and system
  • Flow processing method, equipment and system
  • Flow processing method, equipment and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0057] As described in the background art, the defense method in the prior art cannot achieve a good defense effect, the use cost is too high, the effect is not good, and the user experience is not high. For this reason, a traffic processing method is proposed in the embodiment of this application. , Used in systems including primary defense equipment and advanced defense equipment, where the flow cleaning capability of advanced defense equipment is higher than that of primary defense equipment, such as figure 2 As shown, the method includes:

[0058] Step 201: The management and control device monitors whether the load of the primary defense device for cleaning user traffic is greater than a first threshold.

[0059] Specifically, when illegal traffic is detected, the primary defense device is first activated to clean the illegal traffic. The primary defense device can be an IDC (Internet Data Center, Internet Data Center) device, because it is not a specialized traffic cleaning d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a flow processing method, equipment and a system. The method is applied to the system comprising primary defense equipment and advanced defense equipment. The flow cleaning capacity of the advanced defense equipment is higher than that of the primary defense equipment. The method comprises steps: management and control equipment monitors whether the load of the primary defense equipment for cleaning the user flow is larger than a first threshold; if the monitoring result is positive, the management and control equipment transfers the flow processed by the primary defense equipment to the advanced defense equipment for cleaning; and the management and control equipment controls the flow with cleaning completed to be transferred to service processing equipment for processing, and thus, different defense equipment can be selected for flow cleaning according to a specific condition, and the using cost is reduced. Besides, the series of operation is carried out in a condition with no perception of the user, the user does not need to perform extra operation, and through dynamically scheduling the defense equipment, the user experience is improved.

Description

technical field [0001] The embodiments of the present application relate to the technical field of communications, and in particular, to a traffic processing method, device, and system. Background technique [0002] Such as figure 1 As shown, it is a schematic diagram of a DDoS (Distributed Denial of Service, Distributed Denial of Service) attack. The attacker uses a bot to launch a DDoS attack. The attack causes the resources of the business server to be exhausted, thereby denying the service of normal users; Some defenses include: [0003] 1. DDoS traffic cleaning, which is currently the most commonly used method of defense against DDoS, detects DDoS attacks through DDoS detection equipment and gives an early warning. When a DDoS attack is found, it notifies the bypass traffic cleaning equipment to pull the traffic of the attacked destination IP and clean the attack traffic. Reinject normal flow. [0004] 2. Publish black hole routes on the carrier network, that is, whe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08H04L29/12H04L12/803H04L12/853H04L47/2416
CPCH04L47/125H04L47/2416H04L63/1458H04L61/4511H04L67/61H04L9/40
Inventor 李阳董宝强赵洪日张毅
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products