Resource adaptation analysis server ddos attack detection and defense method in intelligent collaborative network
A smart collaborative network and analysis server technology, applied in the field of network security, can solve problems such as increased overhead and ineffective implementation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0052] The embodiment of the present invention provides a detection and defense method for resource adaptation analysis server DDoS attacks in a smart collaborative network. The decision tree algorithm is used to detect the attack situation, and the weight priority queue is activated to respond to the attack to reduce The impact of the attack provides security guarantees for the smart collaborative network and improves the security and reliability of the smart collaborative network.
[0053] In order to defend against DDoS attacks faced by the resource adaptation analysis server in the smart collaborative network, the embodiment of the present invention proposes a scheme of connection migration, detection based on decision tree and weight priority queue defense.
[0054] The processing flow of a DDoS attack defense method for a resource adaptation analysis server in a smart collaborative network provided by an embodiment of the present invention is as follows: Figure 4 As shown, in...
Embodiment 2
[0092] This embodiment provides a schematic diagram of an example in which a resource adaptation analysis server in a smart collaborative network performs DDoS attack detection and defense. Image 6 As shown, the legitimate user is the service requester and normally initiates the service request. Attackers A, B, and C respectively forge a large amount of unknown traffic to initiate DDoS attacks on the resource adaptation analysis server. In the DDoS defense of the resource adaptation analysis server, the present invention is divided into three stages in total. The first stage is the resource adaptation analysis server protection stage, applying the connection migration method, using the cache server as a proxy, caching and forwarding request packets, and limiting the forwarding rate; the second stage is the collection and detection of traffic characteristics to prevent DDoS attacks Judgment; the third stage is attack defense, differentiated forwarding request packets, and improv...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


