DDOS-attack-based prevention method and device

A DDOS, detection method technology, applied in the field of communication, can solve problems such as low efficiency and insufficient resource utilization, and achieve the effect of solving security threats

Inactive Publication Date: 2017-05-24
ZTE CORP
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the method of dealing with DDOS attacks in the traditional network environment will have many shortcomings wh

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DDOS-attack-based prevention method and device
  • DDOS-attack-based prevention method and device
  • DDOS-attack-based prevention method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0049] The main solution of the embodiment of the present invention is: detect the terminal in the cloud environment by a preset detection method, and obtain the detection result; when the detection result indicates that the terminal is attacked by DDOS, establish a server copy; calculating the trust value of the data packet, and redirecting the terminal under DDOS attack to the server copy according to the calculation result of the trust value. By detecting that a terminal in the cloud environment is attacked by a DDOS, a server copy is established, the trust value of the data packet is calculated for the terminal, and the terminal subjected to the DDOS attack is redirected to the server copy according to the calculated trust value, Separate benign endpoints from attackers. Solve the security threat of DDOS attack t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed-denial-of-service(DDOS)-based prevention method. The method comprises: a terminal in a cloud environment is detected by a preset detection method to obtain a detection result; when the detection result demonstrates that the terminal is under a DDOS attack, a server transcript is established; and data packet trust value calculation is carried out on the terminal and the terminal under the DDOS attack is redirected into the server transcript based on the trust value calculation result. In addition, the invention also discloses a DDOS-attack-based prevention device. Therefore, a security threat caused by a DDOS attack in a cloud environment can be eliminated.

Description

technical field [0001] The invention relates to the technical field of communications, in particular to a method and device for preventing DDOS attacks. Background technique [0002] DDOS (Distributed Denial of Service) attack is one of the most important threats to the Internet today. A denial of service attack means that the attacker finds a way to make the target machine stop providing services or resource access. These resources include disk space, memory, processes, and even network bandwidth, preventing normal terminal access. [0003] Compared with the traditional network platform, the current cloud computing platform is developing very rapidly. Most cloud computing systems use the Hadoop platform as the basic framework of cloud computing. As the current mainstream cloud platform, it is also facing the threat of DDOS attacks. In the cloud platform, the effective integration of resources is carried out through the network. There are many computer cluster centers dist...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L9/40
Inventor 罗圣美金怡爱谷华孙知信
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products