Attack request determination method and device and server

A determination method and server technology, applied in the field of Internet security, can solve the problems of high manslaughter rate, inability to accurately identify CC attacks, inapplicability, etc., and achieve the effects of accurate judgment, flexible judgment method, and accurate judgment result.

Inactive Publication Date: 2018-07-06
ALIBABA GRP HLDG LTD
View PDF5 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] This application provides a method and device for determining attack requests to solve the problem that the prior art method of determining attack requests only through the number of visits to IP addresses is not applicable to CC attack types with low frequency of IP address visits, and cannot accurately identify various types CC attacks, high manslaughter rate, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack request determination method and device and server
  • Attack request determination method and device and server
  • Attack request determination method and device and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein refers to and includes any and all possible combinations of one or more of the associated listed items.

[0032] It should be understood that although the terms first, second, third, etc. may be used in this application to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the present application, first information may also be called second information, and similarly, second information may also be call...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attack request determination method. The method comprises the steps of receiving an access request; extracting first request information in the access request and matching the first request information with information in various preset blacklists supporting various matching parameters; and determining that the access request is an attack request when the information matches the information in any type of blacklist successfully. Through application of the technical scheme provided by the invention, the problem that in the prior art, a mode of determining the attack request only through the access times of an IP (Internet Protocol) address does not adapt to a CC (Challenge Collapsar) attack type of which access frequency for the IP address is not high, various CC attacks cannot be precisely identified and a manslaughter rate is high is solved; the access request can be judged based on various matching parameters; the judgment dimensionality is relatively wide;a judgment mode is relatively flexible; and a judgment result is relatively accurate.

Description

technical field [0001] The present application relates to the technical field of Internet security, in particular to a method, device and server for determining an attack request. Background technique [0002] With the continuous development of Internet services, the pages of the website are becoming more and more complex, and the website needs to consume more and more resources to process the requests. In this case, the more users visit, the higher the system load. Websites are vulnerable to CC (Challenge Collapsar, challenge black hole) attacks. CC attacks will cause huge resource consumption, which will cause the page to open very slowly. If CPU (Central Processing Unit, central processing unit) or bandwidth resources are consumed As far as possible, the service may be unavailable, which will affect the user's access to the network, and the user experience will be poor. [0003] In the prior art, the CC attack is mainly determined by counting the visits of IP (Internet P...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/1441H04L9/40
Inventor 冯帅涛杨洋向西西
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products