A ddos ​​attack detection method and device

An attack detection and packet technology, applied in the field of communication, can solve problems such as unacceptable, hysteresis, and NetFlow analysis equipment cannot find it quickly, and achieve the effect of less sampling data, high accuracy, and guaranteeing network transmission and services.

Active Publication Date: 2020-03-03
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the NetFlow solution can be used for more accurate analysis of various protocols, because NetFlow sampling, storage, and calculation all take a certain amount of time, when a DDoS attack comes, the NetFlow analysis device cannot quickly detect it.
That is, there is a delay in the detection of DDoS attacks by NetFlow analysis equipment, and sometimes this delay can reach several minutes, which is unacceptable for some sensitive businesses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A ddos ​​attack detection method and device
  • A ddos ​​attack detection method and device
  • A ddos ​​attack detection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0029] Words such as "exemplary" or "for example" in the embodiments of the present invention are used as examples, illustrations or illustrations. Any embodiment or design solution described as "exemplary" or "for example" in the embodiments of the present invention shall not be construed as being more preferred or more advantageous than other embodiments or design solutions. Rather, the use of words such as "exemplary" or "such as" is intended to present rel...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An embodiment of the invention provides a DDoS (distributed denial of service) attack detection method and device and relates to the technical field of communications for detecting DDoS attack rapidlyand accurately. The method includes: making statistics on the total number of target messages received within various periods; calculating variation of the total number of current messages; taking the variation of the total number of the current messages as an absolute value of the difference of the total number of the target massages received in the current period and the previous period; judging whether the variation of the total number of the current massages meets a first preset condition or not, and if yes, making statistics on the proportion of the target massages sent by autonomous systems in the target massages received in the periods; calculating the variation in distribution of the current massages; taking the variation in distribution of the current massages as the sum of an absolute value of the difference of the proportion of the target massages sent in the current period or the previous period by the autonomous systems; judging whether the variation in distribution of the current massages meets a second preset condition or not, and if yes, determining existence of the DDoS attack. The DDoS attack detection method and device is applied to DDoS attack detection.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a DDoS attack detection method and device. Background technique [0002] At present, Distributed Denial of Service (English name: Distributed Denial of Service, referred to as: DDoS) is one of the most common and most harmful forms of attack in the domain network of the autonomous system AS (English name: Autonomous System, referred to as: AS) . DDoS attack is a covert denial of service attack. The general DDoS attack process is as follows: first, the attacker will control a large number of puppet computers in the source AS domain network, and combine multiple puppet computers as an attack platform, and some of the puppet computers can be set to Then, the attacker sends the attack command to all the puppet computers through the main control terminal, and finally, all the puppet computers send data streams to the destination AS domain network, and carry out DDoS attacks on ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1458
Inventor 刘子建彭锐周婧莹刘思勤陈孟尝叶新斌潘俊斌
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products