Method for identifying DDoS (Distributed Denial of Service) reflection amplification attack
An amplifier and message technology, applied in electrical components, transmission systems, etc., can solve the problems of inaccurate identification, high defense cost, inability to distinguish normal requests and illegal requests, etc., to achieve the effect of low impact
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0021] The present invention will be further described in detail through specific embodiments below. The present invention judges whether the request message is a forged illegal message by verifying the TTL of the request message at an amplifier (Amplifier), and discards the request message if it is, and no longer sends a response message to the victim. The details are as follows:
[0022] 1. After receiving the request message, the amplifier extracts the source IP address and TTL value in the IP header of the message.
[0023] 2. Judging the IP address extracted in step 1, if the IP address is in the blacklist, discard the request directly.
[0024] 3. If the IP address in step 1 is not in the blacklist, then use the IP address as the key (keyword) to save the TTL and request content in the cache in the form of HASH;
[0025] 4. Use the IP address extracted in step 1 as the destination address, and send a TCP connection request message to any port of the address;
[0026] ...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com