Anti-attack data transmission method and device

A data transmission method and anti-attack technology, applied in the field of anti-attack data transmission methods and devices, can solve problems such as no solution, accidental injury, etc., and achieve the effects of avoiding being deciphered, avoiding data traffic, and improving security

Inactive Publication Date: 2018-04-20
高伟红
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the existing cleaning schemes, due to the different communication protocols, traffic cleaning is used to defend against attacks, which is likely to cause accidental damage, that is, to filter normal data traffic as attack traffic
For the above problems, no effective solution has been proposed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the embodiments of the present invention. Obviously, the described embodiments are part of the implementation of the present invention example, not all examples. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0026]According to an aspect of the embodiments of the present invention, there is provided an attack-proof data transmission method, including: obtaining a communication protocol message to be transmitted; Attack preprocessing, generating processing information; storing the above processing information in the extension bit of the above-mentioned communi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and device for anti-attack data transmission, which solves the problem that the prior art cannot solve the problem of anti-attack. This application obtains the communication protocol message to be transmitted; Anti-attack preprocessing is performed on the data on the information bit to generate processing information; the above processing information is stored in the extension bit of the above-mentioned communication protocol message in the above-mentioned message header, and the converted communication protocol message is obtained, wherein, The above-mentioned message header of the above-mentioned communication protocol message includes the above-mentioned information bits and the above-mentioned extension bits; the above-mentioned converted communication protocol message is sent to the receiving device; this application is applicable to the field of data attack defense.

Description

technical field [0001] The present invention relates to the field of data transmission, in particular to an attack prevention data transmission method and device. Background technique [0002] At present, in the existing technology, common communication attack methods include the following two types: [0003] 1. SYN attack, the attack principle is as follows: SYN attack is a kind of DOS attack, which uses the defect of TCP protocol and consumes CPU and memory resources by sending a large number of semi-connection requests. In addition to affecting hosts, SYN attacks can also harm network systems such as routers and firewalls. In fact, SYN attacks do not care what systems are targeted, as long as these systems enable TCP services. The server receives the connection request (syn=j), adds this information to the unconnected queue, and sends the request packet to the client (syn=k, ack=j+1), and enters the SYN_RECV state at this time. When the server does not receive the confi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/126H04L63/0428
Inventor 高伟红
Owner 高伟红
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products