Unlock instant, AI-driven research and patent intelligence for your innovation.

Network attack protection method and system

A network attack, network request technology, applied in the field of information processing, can solve problems such as transparent transmission

Active Publication Date: 2018-08-14
TENCENT TECH (SHENZHEN) CO LTD
View PDF15 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the case of deploying proxy machines in the network, using the existing network protection methods, a large number of network requests from bots will be transparently transmitted to the server due to hitting the trust list

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack protection method and system
  • Network attack protection method and system
  • Network attack protection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0023] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above-mentioned drawings are used to distinguish similar objects, and are not necessarily used Describe a specific order or sequence. It should be understood that the data used in this way can be interchanged under appropriate circumstances, so that the embodiments of the present invention described herein c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a network attack protection method and system, which are applied to the technical field of information processing. The method in the embodiment comprises thefollowing steps: parsing a network request of a client forwarded by a proxy machine through network attack protection equipment to obtain address information of the client; then calculating first check information based on the address information of the client; and determining a trust list based on the address information of the client according to the first check information. Thus, whether the client is a normal client or not can be confirmed directly according to the address information of the client initiating the network request and the trust list in a network attack protection process. Compared with a trust list based on source IP information in the prior art, the network attack protection method and system have the advantages that unvarnished transmission of a network request of a broiler due to hitting of the trust list by IP information of a proxy machine under the situation that the proxy machine is deployed in the system can be prevented.

Description

Technical field [0001] The present invention relates to the field of information processing technology, and in particular to a method and system for preventing network attacks. Background technique [0002] The attacker uses a proxy server or a broiler to generate a legal request directed to the victim host to achieve Distributed Denial of Service (DDOS) and camouflage is called Challenge Collapsar (CC) attack. The broiler here is also called a puppet machine, which refers to a machine that can be remotely controlled by hackers, such as using "gray pigeons" to induce users to click, or the computer is compromised by hackers or the user's computer has loopholes and a Trojan horse is planted. Hackers can manipulate it and use it at will do anything. [0003] In the prior art, CC protection equipment is deployed in the network. When the CC protection equipment detects that the server is under a CC attack, it will analyze the network request sent by the client and extract the source n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0876H04L63/101H04L63/12H04L67/56H04L67/60
Inventor 金帅张浩浩
Owner TENCENT TECH (SHENZHEN) CO LTD