Unlock instant, AI-driven research and patent intelligence for your innovation.

A distributed denial of service attack defense method, device and system

A distributed denial and attack packet technology, applied in the field of communications, can solve the problems of bandwidth resource consumption, network congestion, and difficulty in meeting DDoS defense requirements, saving bandwidth resources and reducing attack packets.

Active Publication Date: 2020-09-08
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the inventor found through research that during the DDoS attack process, the attack message sent by the attacking host connected to the network node E5 attacks the target host through the network node C4, the network node C1, the network node C2 and the network node E1. ; The attack message sent by the attacking host connected to the network node E2 passes through the network node E2, the network node C2 and the network node E1 to attack the target host; if traffic cleaning is performed, the cleaning device will divert the attack message to itself , then when the traffic of the attack packets is large, it is easy to cause a large amount of bandwidth resources between the network node C1 and the network node C4, and the network node C1 and the network node C2 to be consumed, thereby causing the network near the network node C1 to Congestion, difficult to meet DDoS defense requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A distributed denial of service attack defense method, device and system
  • A distributed denial of service attack defense method, device and system
  • A distributed denial of service attack defense method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] see figure 2 , which is a schematic diagram of the architecture of an operator network applied in the embodiment of the present invention:

[0033] figure 2 In the example, the operator network includes network nodes C1 to C4, and network nodes E1 to E5, and the above network nodes constitute the operator network. Among them, the network node C1 is located in the internal core layer of the operator network, and the network node C1 is the backbone of the operator network, which is responsible for core data interaction; the network nodes C2, C3 and C4 are connected to the network node C1 to form the branches of the operator network. To undertake the interaction of user data within the corresponding area; the network nodes E1, E2 and E3 are all connected to the network node C2, the network node E4 is connected to the network node C3, and the network node E5 is connected to the network node C4, and the above-mentioned network nodes E1 to E5 are located at The edge of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention disclose a method, a device and a system defending an attack of distributed denial-of-service (DDoS). The method comprises the steps of receiving, by a controller, first characteristic information attack information sent by an attack detection device and comprising a detected attack packet; acquiring, from each network node, second characteristic information node information comprising a packet forwarded by a corresponding network node; matching the first characteristic information and the second characteristic information so as to determine a network node, among reference network nodes, forwarding the attack packet and being closest to the source of the attack packet as an attack defend device; and finally, controlling the attack defend device to filter attackpackets. In the process, the controller executes a defending operation on a network node at an operator network edge, and blocks the attack packet at the operator network entrance, thereby effectively reducing attack packets entering the operator network, saving bandwidth resources, and keeping the internal network of the operator network smooth.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to a distributed denial-of-service (English: distributed denial-of-service, DDoS for short) attack defense method, device and system. Background technique [0002] DDoS is an attack behavior that uses multiple hosts to send attack packets to a target host, causing the target host to deny service to normal service requests. DDoS creates a high flow of useless data, flooding the network where the target host is located with a large number of useless data packets, causing network congestion and making the target host unable to communicate with the outside world normally. [0003] Such as figure 1 The shown operator network includes network nodes C1 to C4 located inside the operator network, and network nodes E1 to E5 located at the edge of the operator network. Among them, network node C1 is located at the core layer of the operator's network and is used to undertake c...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0227H04L63/1416H04L63/1441H04L63/1458H04L2463/141
Inventor 黄志钢汪洋陈光夏靓
Owner HUAWEI TECH CO LTD