Unlock instant, AI-driven research and patent intelligence for your innovation.

Defense method and server for network attack

A network attack and server technology, which is applied in the field of communication, can solve problems such as server attack and server overload, and achieve the effect of defending against network attacks and saving data traffic

Active Publication Date: 2020-03-03
TENCENT TECH (SHENZHEN) CO LTD
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the above-mentioned process of defending against DDOS attacks, the server does not establish a connection with the client in the blacklist within a certain period of time. The frequency of sending packets again determines whether to join the blacklist, which will still expose the server to attacks and may cause the server to be overloaded

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Defense method and server for network attack
  • Defense method and server for network attack
  • Defense method and server for network attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The embodiment of the present invention provides a network attack defense method and a server, which are used to defeat illegal terminals by using reverse data traffic, and do not need to perform multiple network attack detections on illegal terminals, save the data traffic of the server, and ensure that the server will not appear In case of overload or crash.

[0029] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of practice in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "having", as well as any variations thereof, are intended to c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of the invention disclose a method for preventing a network attack. The method comprises the following steps: receiving a service connection request sent by a terminal, wherein the service connection request is used for indicating a server to send downlink data to the terminal; and when it is determined, according to the service connection request, that the terminal is an illegal terminal, sending a service feedback request to the terminal, wherein the service feedback request is used for indicating the terminal to send uplink data to the server. The embodiments of the invention further provide a server. According to the embodiments of the invention, an illegal terminal is defeated by use of reverse data traffic, it is unnecessary to perform network attack detection multiple times on the illegal terminal, the data traffic of the server is saved, and it is ensured that the server neither is overloaded nor crashes.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a network attack defense method and a server. Background technique [0002] With the development of the Internet, some lawbreakers have launched network attacks in order to interfere with normal server operations and conduct malicious competition. Among them, distributed denial of service (English full name: Distributed Denial of Service, English abbreviation: DDOS) attack is particularly prominent. DDOS uses client and server (English full name: Client / Server, English abbreviation: C / S) technology to combine multiple computers as an attack platform to launch DDOS attacks on one or more targets, thereby doubling the The power of denial of service attacks. Usually, the attacker uses a stolen account to install the DDOS main control program on one computer. The main control program will communicate with a large number of agent programs within a set period of time, and the a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441H04L63/1458
Inventor 任杰
Owner TENCENT TECH (SHENZHEN) CO LTD