Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and system for protecting against network attacks

A network attack and network request technology, applied in the field of information processing, can solve problems such as transparent transmission

Active Publication Date: 2020-12-22
TENCENT TECH (SHENZHEN) CO LTD
View PDF15 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the case of deploying proxy machines in the network, using the existing network protection methods, a large number of network requests from bots will be transparently transmitted to the server due to hitting the trust list

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for protecting against network attacks
  • A method and system for protecting against network attacks
  • A method and system for protecting against network attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0023] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects and not necessarily Describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of practice in sequences other than thos...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a network attack protection method and system, which are applied in the technical field of information processing. In the method of this embodiment, the network attack protection device will analyze the network request of the client forwarded by the proxy machine to obtain the address information of the client, and then calculate the first verification information according to the address information of the client, and determine according to the first verification information A trust list based on the client's address information. In this way, in the protection process of network attacks, it is possible to directly confirm whether the client is a normal client according to the address information and the trust list of the client that initiates the network request. Compared with the trust list based on source IP information in the prior art, it is possible to prevent When a proxy machine is deployed in the system, the network request for the broiler is transparently transmitted because the IP information of the proxy machine hits the trust list.

Description

technical field [0001] The present invention relates to the technical field of information processing, in particular to a network attack protection method and system. Background technique [0002] Attackers use proxy servers or bots to generate legitimate requests to victim hosts to implement distributed denial of service (Distributed Denial of Service, DDOS) and camouflage called Challenge Collapsar (CC) attacks. Broilers here are also called puppet machines, which refer to machines that can be remotely controlled by hackers. For example, "gray pigeons" are used to induce users to click or the computer is hacked or the user's computer has a loophole and is planted with a Trojan horse. Hackers can manipulate it at will and use it. do anything. [0003] In the prior art, a CC protection device is deployed in the network. When the CC protection device detects that the server is under a CC attack, it will analyze the network request sent by the client, and extract the source I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0876H04L63/101H04L63/12H04L67/56H04L67/60
Inventor 金帅张浩浩
Owner TENCENT TECH (SHENZHEN) CO LTD