Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for defending CC attack

A server and indicator technology, applied in the field of information security, can solve problems such as unfavorable continuous and effective operation of the server, and failure to consider the actual situation of various indicators of the server, so as to achieve the effect of avoiding downtime and effective operation

Active Publication Date: 2017-08-11
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The technical problem to be solved by the present invention is: to propose a method for defending against CC attacks, which solves the problem that in the traditional technology, only the access frequency of the request source is limited, without considering the actual conditions of the various indicators of the server, which is not conducive to ensuring the continuous and effective operation of the server The problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for defending CC attack
  • Method for defending CC attack
  • Method for defending CC attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The purpose of the present invention is to propose a method for defending against CC attacks, which solves the problem that in the traditional technology, only the access frequency of the request source is limited, and the actual conditions of various indicators of the server are not considered, which is not conducive to ensuring the continuous and effective operation of the server. In the present invention, before the official business goes online, the limit of the server is obtained through the performance test, and two thresholds are set on this basis, and different strategies are implemented at different stages, so as to ensure the continuous and effective operation of the server. Avoid unnecessary losses caused by server downtime.

[0024] Below in conjunction with accompanying drawing and embodiment the scheme of the present invention will be further described:

[0025] 1) Before the business goes online, obtain the maximum processing capacity of the server throug...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of information safety and discloses a method for defending CC attack. The invention aims to solve the problems of the prior art that the access frequency of a request source is limited, the practical conditions of various indexes of a server are not considered and the guaranteeing for the continuous and effective running of the server is not benefited. The method comprises the following steps: confirming various indexes for monitoring the server and setting two threshold values, namely, a cleaning threshold value and an abandoning threshold value, for each index; performing weighting operation or logical operation on the cleaning threshold value of each index, thereby acquiring an overall cleaning threshold value of the server; performing weighting operation or logical operation on the abandoning threshold value of each index, thereby acquiring an overall abandoning threshold value of the server; performing real-time monitoring on the confirmed monitoring indexes in the running process of the server; calculating an overall load condition of the server according to the monitoring data; correspondingly treating according to the overall load condition in a normal treating stage, a cleaning flow stage and an abandoning request stage.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method for defending against CC attacks. Background technique [0002] CC attack is to simulate multiple users (each thread represents a user) to continuously access the server, and usually access requests that require a large amount of data operations and a large amount of CPU time to process, causing the server to crash. Attackers can achieve a large number of concurrent simulated users through general performance testing software. [0003] At present, the more common way to defend against CC attacks in traditional technologies is to restrict access according to the access frequency of the request source ip, that is, within a certain period of time, when the number of requests from a certain ip is higher than After a threshold, the request after this ip directly returns an error; otherwise, the server processes the request normally. [0004] This processing method only l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
CPCH04L43/16H04L63/1458
Inventor 付强
Owner SICHUAN CHANGHONG ELECTRIC CO LTD