Method and device for rapidly detecting SYN Flood attacks
A fast and quantitative technology, applied in the field of network information security, can solve the problem of high equipment prices
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0027]According to an embodiment of the present invention, an embodiment of a method for quickly detecting a SYN Flood attack is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions , and, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.
[0028] figure 2 is a flowchart of a method for quickly detecting a SYN Flood attack according to an embodiment of the present invention, such as figure 2 As shown, the method includes the following steps:
[0029] Step S102, acquiring TCP protocol session information, wherein the TCP protocol session information is at least one session information between the target IP and the monitoring host;
[0030] In the embodiment of the present invention, in order to quickly judge whether there is ...
Embodiment 2
[0093] The embodiment of the present invention also provides a device for quickly detecting a SYN Flood attack. The device for quickly detecting a SYN Flood attack is mainly used to implement the method for quickly detecting a SYN Flood attack provided in the above-mentioned content of the embodiment of the present invention. The following describes the embodiment of the present invention The provided device for quickly detecting SYN Flood attacks is introduced in detail.
[0094] Figure 5 is a schematic diagram of a device for quickly detecting SYN Flood attacks according to an embodiment of the present invention, such as Figure 5 As shown, the device for quickly detecting a SYN Flood attack mainly includes: an acquisition unit 51, a first analysis unit 52, a second analysis unit 53 and a determination unit 54, wherein:
[0095] An acquisition unit 51, configured to acquire TCP protocol session information, wherein the TCP protocol session information is at least one sessi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com