Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Detection method and device for CC (Challenge Collapsar) attack

A technology of attack flow and posterior probability, applied in the field of network information security, which can solve the problem of inability to detect CC attacks in a timely and effective manner and accurately

Active Publication Date: 2017-10-03
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the object of the present invention is to provide a CC attack detection method and device to alleviate the technical problems in the prior art that cannot detect CC attacks in a timely, effective and accurate manner

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method and device for CC (Challenge Collapsar) attack
  • Detection method and device for CC (Challenge Collapsar) attack
  • Detection method and device for CC (Challenge Collapsar) attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] According to an embodiment of the present invention, an embodiment of a CC attack detection method is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and , although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0027] figure 1 is a flowchart of a CC attack detection method according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0028] Step S102, calculating the first prior probability of the normal access traffic of the Web page and the second prior probability of the CC attack access traffic of the Web page, wherein the first prior probability indicates that the normal access traffic in the sample data matches the URL access probability Probability, ...

Embodiment 2

[0095]The embodiment of the present invention also provides a CC attack detection device, the CC attack detection device is mainly used to implement the CC attack detection method provided by the above content of the embodiment of the present invention, the CC attack provided by the embodiment of the present invention is as follows The detection device is introduced in detail.

[0096] image 3 is a schematic diagram of a CC attack detection device according to an embodiment of the present invention, such as image 3 As shown, the CC attack detection device mainly includes: a first calculation unit 31, a first acquisition unit 32, a second calculation unit 33, a third calculation unit 34 and a first determination unit 35, wherein:

[0097] The first calculation unit 31 is used to calculate the first prior probability of the normal access traffic of the Web page and the second prior probability of the CC attack traffic of the Web page, wherein the first prior probability repre...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a detection method and device for a CC (Challenge Collapsar) attack and relates to the technical field of network information security. The method comprises the steps of calculating a first prior probability of normal access traffic of a Web page and a second prior probability of CC attack access traffic of the Web page; obtaining a ratio of the normal access traffic and the ratio of the CC attack access traffic, wherein the ratio of the normal access traffic and the ratio of the CC attack access traffic are determined based on sample data; through adoption of a first posterior probability mode, calculating a first posterior probability of the normal access traffic based on the first prior probability and the ratio of the normal access traffic; through adoption of a second posterior probability mode, calculating a second posterior probability of the CC attack access traffic based on the second prior probability and the ratio of the CC attack access traffic; and determining whether the Web page bears the CC attack or not based on the first posterior probability and the second posterior probability. The technical problem that in the prior art, the CC attack cannot be detected timely, effectively and accurately is mitigated.

Description

technical field [0001] The invention relates to the technical field of network information security, in particular to a CC attack detection method and device. Background technique [0002] With the continuous development of Internet technology, computer network technology has been widely used in all walks of life. The rapid development of Internet applications has brought many security vulnerabilities. These loopholes will expose computers to virus and hacker attacks, which may lead to data loss, and may seriously lead to loss of user data or property damage. Therefore, the protection of Internet security is the focus of Internet technology. [0003] The full name of CC is Challenge Collapsar, which means "challenge black hole". CC attack is a kind of DDOS distributed denial of service. CC attack uses continuous connection requests to websites to cause denial of service, and CC attack has a certain degree of concealment. [0004] The current CC attack detection and defen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1458H04L2463/142
Inventor 范渊徐静郭晓龙文洁
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products