Method and system for defending ddos attacks

A transfer server and second-level domain name technology, which is applied in a method of defending ddos ​​attacks and its system field, can solve the problems of ddos ​​attack defense, increased costs, limited server bandwidth, etc., and achieves significant defense effects and reduced costs Effect

Inactive Publication Date: 2017-07-11
成都迈瑞科科技有限公司
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, it is generally believed that there is no way to defend against ddos ​​attacks. The only solution to alleviate it is to continuously increase the bandwidth according to the size of the attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for defending ddos attacks
  • Method and system for defending ddos attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] A kind of method of defense ddos ​​attack of the present invention is characterized in that comprising the following steps:

[0019] Step 1: Generate a second-level domain name in a specific sequence, and bind the second-level domain name to b transit server IPs, where a≧b;

[0020] The second-level domain name is generated by seed random number, MD5 or SHA algorithm.

[0021] After b second-level domain names are bound to b transit servers one by one, the remaining a-b second-level domain names are set with wrong interference ip addresses.

[0022] Step 2: The client starts from the nth second-level domain name and visits the transfer server to request services in the specific order of finding the second-level domain name. If it fails, it accesses the next transfer server until the request for service succeeds, where n

[0023] The transit server receives the request from the client, judges the identity information of the client and decides whether to respond to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and system for defending ddos attacks. The method comprises the following steps: in a first step, a secondary domain names of a specific sequence are generated and tied to b transit server ips, and a is greater than or equal to b; in a second step, a client end accesses a transit server for requesting service according to the specific sequence from a nth secondary domain name; if the access fails, the client end accesses a next transit server till the requested service is obtained, and n is smaller than a. According to the method and system disclosed in the invention, cost can be greatly lowered, and the method and system hold more marked effects for defending the ddos attacks than conventional technologies.

Description

technical field [0001] The present invention relates to a method and system for defending against attacks, in particular to a method and system for defending against ddos ​​attacks. Background technique [0002] Distributed Denial of Service (DDoS: Distributed Denial of Service) attack refers to the use of client / server technology to combine multiple computers as an attack platform to launch DDoS attacks on one or more targets, thereby multiplying the probability of denial of service attacks. power. Usually, an attacker uses a stolen account to install a DDoS master program on a computer. At a set time, the master program will communicate with a large number of agents, which have been installed on many computers on the network. The agent launches an attack when instructed to do so. Using client / server technology, the master control program can activate hundreds of thousands of agent program runs in seconds. [0003] In the existing technology, it is generally believed tha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12H04L9/08H04L9/06
CPCH04L9/0643H04L9/0869H04L63/1458H04L61/4511
Inventor 李如超郑平徐明宇
Owner 成都迈瑞科科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products