Unlock instant, AI-driven research and patent intelligence for your innovation.

Application layer attack protection method and attack protection end

An application layer and client-side technology, applied in the field of network communication, can solve problems such as difficult attack behaviors

Active Publication Date: 2018-08-17
北京云枢网络科技有限公司
View PDF10 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the current application-layer attack methods generally use distributed proxy servers or botnets to send a large number of requests to website servers. In this way, the IP request rate of each distributed proxy server or botnet has no obvious difference. Therefore, it is often difficult to judge the attack behavior by detecting the IP request rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application layer attack protection method and attack protection end
  • Application layer attack protection method and attack protection end
  • Application layer attack protection method and attack protection end

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the purposes, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be described clearly and completely below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments It is only a part of the embodiments of the present application, but not all of the embodiments. The following detailed description of the embodiments of the application is not intended to limit the scope of the application as claimed, but is merely representative of selected embodiments of the application. Based on the embodiments of the present application, all other embodiments obtained by those skilled in the art without creative work fall within the protection scope of the present application.

[0038] The following methods, apparatuses, electronic devices, or computer storage media in the embodiments of the present ap...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the network communication technology field, especially relates to an application layer attack protection method, which is used for an attack protection end. The application layer attack protection method comprises steps that a first message transmitted by a client after handshake between the attack protection end and the client is acquired; a binary message segment is acquired on the preset position of the first message, and the acquired binary message segment is matched with preset binary data; when the binary message segment is not matched with the preset binary data, the message of the client is refused to be forwarded to the server. By adopting the technical scheme provided by the invention, the attack behaviors of the application layer can be effectively protected. The invention also provides the application layer attack protection end.

Description

technical field [0001] The present application relates to the technical field of network communication, and in particular, to a protection method for application layer attacks and an attack protection terminal. Background technique [0002] The application layer is located at the topmost layer in the network structure and can provide services for network users. When it comes to compromising systems, the application layer is the target of most intrusions. High-value attack targets (such as online banking and interfaces for sensitive medical information) exist at or are accessible from the application layer. Application layer attacks are aimed at exhausting server resources and causing server denial of service. Most of the existing application-layer attack detection solutions are implemented by calculating the Internet Protocol (IP) request rate of interconnection between networks within a fixed period of time. When the IP request rate reaches the set threshold, it can be d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1441H04L63/168H04L2463/144
Inventor 汪利福王泽
Owner 北京云枢网络科技有限公司