Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for shunting reflective ddos ​​traffic

A DDOS and reflective technology, applied in the network field, can solve problems such as transmission congestion, congestion, and high complexity of network construction, and achieve the effect of avoiding transmission congestion

Active Publication Date: 2017-12-19
GUANGDONG EFLYCLOUD COMPUTING CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, whether it is to deal with ordinary DDOS attacks or reflective DDOS attacks, traffic cleaning equipment is deployed in front of the protected end, and the method of active detection and passive pulling and cleaning is used. This method has a very big defect, that is, once the traffic has formed , to the transmission link at the protected end, cleaning can only play a considerable role. If the traffic is not enough to congest the transmission, this cleaning method is still relatively effective, but once the traffic is large enough to congest the transmission, this The effect of this cleaning solution is quite limited, and the reflective DDOS attack traffic can generally reach tens of Gbps or more, and general data centers and small operators may not have sufficient bandwidth to transmit such a huge traffic
[0003] There is also a relatively new cleaning solution. Cleaning devices are deployed at the transmission source of each network to clean the attack traffic sent by each source. This method of cleaning the source can clean the attack traffic at the point where it is sent. It has a very obvious effect on preventing the formation of large attack traffic, but it also has a big disadvantage. The deployment cost of this cleaning method is very high, and the complexity of network construction is relatively large.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for shunting reflective ddos ​​traffic
  • A method and system for shunting reflective ddos ​​traffic

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and through specific implementation methods.

[0028] A method for diverting reflective DDOS traffic includes:

[0029] Step 1 S1: Obtain and detect the data flow of network node A, and obtain the attack source SIP and attack type set T;

[0030] Step 2 S2: Send the attack source SIP and attack type T to the traffic diversion device 12;

[0031] Step 3 S3: the diversion device 12 sends all requests of the attack type set T to the attack source SIP;

[0032] Step 4 S4: The attack traffic sent by the attack source SIP is diverted to the network node B, the T-type attack traffic generated by the attack type set T is cleaned, and the normal traffic is injected back.

[0033] The attack type set T in this embodiment includes ntp, ssdp and dns, which are relatively common attack types. Of course, in other embodiments, the attack type set T can be ot...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A method for shunting reflective DDOS traffic, comprising: acquiring and detecting the data flow of a network node A, obtaining an attack source SIP and an attack type set T; sending the attack source SIP and attack type T to a drainage device; the drainage The device sends all requests of the attack type set T to the attack source SIP; the attack traffic sent by the attack source SIP is diverted to network node B, and the attack traffic of type T generated by the attack type set T is cleaned , normal flow is reinjected. A system for shunting reflective DDOS traffic, including detection equipment, drainage equipment and cleaning equipment, wherein the attack source SIP is the IP of the basic server used by hackers; the invention actively sends requests to the basic server used to drain and Attract the traffic of the basic server, reduce the number of processed attack requests sent by the attacker to the basic server, and then indirectly reduce the traffic sent by the basic server to the attacked target.

Description

technical field [0001] The invention relates to network technology, in particular to a method and system for diverting reflective DDOS traffic. Background technique [0002] At present, whether it is to deal with ordinary DDOS attacks or reflective DDOS attacks, traffic cleaning equipment is deployed in front of the protected end, and the method of active detection and passive pulling and cleaning is used. This method has a very big defect, that is, once the traffic has formed , to the transmission link at the protected end, cleaning can only play a considerable role. If the traffic is not enough to congest the transmission, this cleaning method is still relatively effective, but once the traffic is large enough to congest the transmission, this The effect of this cleaning solution is quite limited, and the reflective DDOS attack traffic can generally reach tens of Gbps or more, and general data centers and small operators may not have sufficient bandwidth to transmit Such ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1441H04L63/1466H04L63/1475G06F21/554H04L63/1416H04L63/1425H04L63/1458
Inventor 梁润强张国文杨燕清叶梅霞关志来
Owner GUANGDONG EFLYCLOUD COMPUTING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products