Unlock instant, AI-driven research and patent intelligence for your innovation.

A message attack defense method and device

An anti-attack and message technology, applied in transmission systems, electrical components, etc., can solve problems such as speed limit and affect the establishment of normal services, and achieve the effect of saving blacklist resources

Active Publication Date: 2021-02-09
NEW H3C TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the resources of the blacklist in the device are limited, and in actual situations, TCP SYN FLOOD attacks may constantly change the source port or the interconnection protocol (Internet Protocol, IP) address between the source networks, and in this case Compared with the number of attack packets whose quintuple information remains unchanged, the number of attack packets under the following conditions increases exponentially, so it is easy to fill up the blacklist resources in the device. When the blacklist resources are full, no longer The attack packets in the blacklist will either no longer be restricted by the blacklist and directly impact the host, or will be speed-limited together with other normal packets, affecting the establishment of normal business

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A message attack defense method and device
  • A message attack defense method and device
  • A message attack defense method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are only It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments of the present application, all other embodiments obtained by those skilled in the art without...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application relates to the field of anti-message attack, particularly to a message anti-attack method and a message anti-attack device, wherein the method comprises the following steps of: monitoring the number of the first messages received in a first preset time length and carrying a same first target parameter; if the number of the first messages reaches a preset first threshold, adding thefirst target parameter into a preset anti-attack blacklist, and deleting the plurality of quintuple information with the first target parameter in the anti-attack blacklist, wherein the first targetparameter includes at least one of the five parameters corresponding to the quintuple information of the messages, and the deleted quintuple information in the anti-attack blacklist is added into theanti-attack blacklist when the number of the second messages received in a second preset time length and carrying the quintuple information reaches a second preset threshold. The application is capable of saving the blacklist resources on the basis of effectively defending against the message attacks.

Description

technical field [0001] The present application relates to the technical field of message attacks, and in particular, relates to a method and device for preventing message attacks. Background technique [0002] Transmission Control Protocol Denial of Service Attack (TCP SYN FLOOD) is a common attack method in the network. Its principle is to use the Transmission Control Protocol (Transmission Control Protocol, TCP) protocol to mark a large number of Synchronize Sequence Numbers (SYN) at position 1 The packets are sent to the interface of the network device or server (hereinafter referred to as the device) to impact the main control CPU of the device through a large number of SYN messages, so that the processing resources of the main control CPU of the device are exhausted, resulting in the failure to establish normal services. Therefore, most existing devices need to defend against TCP SYN FLOOD attacks. [0003] In the prior art, the defense method against the TCP SYN FLOOD...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1466H04L63/166H04L2463/146
Inventor 武伟
Owner NEW H3C TECH CO LTD