Method for preventing network attack performed by using legal data or tampering legal data

A legal data and network attack technology, applied in the field of network security, can solve problems such as calculation theory difficulties, achieve the effect of protecting network and server resources, ensuring timeliness, and preventing attacks

Active Publication Date: 2018-09-04
SICHUAN CHANGHONG ELECTRIC CO LTD
View PDF6 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The reason why these algorithms are called "safe" is based on the following two points (according to the description of the official standard): 1. It is very difficult to deduce the original input message f

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing network attack performed by using legal data or tampering legal data
  • Method for preventing network attack performed by using legal data or tampering legal data

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0030] Example one:

[0031] A method to prevent attacks using legal data or tampering with legal data, which can be used in Internet of Things (ipp) projects, launcher projects and other mobile terminals and cloud access, such as figure 2 As shown, in this embodiment, it is mainly applied to an IoT project including multiple application services 301.

[0032] Such as figure 1 As shown, the method for preventing attacks using legal data or tampering with legal data is realized by two modules: terminal signature module 101 and cloud verification module 201, where these two modules have the following functions respectively :

[0033] Terminal signature module 101: The main function is to add the business data body sent by the business terminal to the timestamp timestamp, non-repeated random numbers, such as uuid, the salt value agreed by the terminal and the cloud, and perform the hash algorithm on the combined data. Obtain the hash value; among them, the salt value agreed by the se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for preventing a network attack performed by using legal data or tampering the legal data. A timestamp, an unrepeated random number and an appointed salt value are added into requested service data, a hash algorithm is performed on the above data to acquire a hash value, and a service terminal uploads both the above data and the service data to a server while accessing a cloud; a cloud signature verification module verifies whether the timestamp and the hash value accord with signature verification, if yes, the access data, and the timestamp, unrepeated randomnumber and salt value, appointed by the cloud and the terminal, uploaded by the service terminal are subjected to the hash algorithm to acquire the hash value, and then the acquired hash value is compared with the hash value uploaded by the service terminal, if the two hash values are consistent, the verification is passed, the subsequent work can be performed, and the hash value uploaded by the service terminal in this time is cached for being compared with the hash value accessed latterly, and if the above two hash values are inconsistent, a service request is rejected. According to the method provided by the invention, the situation that the normal access is affected due to the fact that the server resources are illegally occupied can be avoided, and thus the purpose of protecting network and server resources is achieved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for preventing network attacks by using legal data or tampering with legal data. Background technique [0002] With the increase of Internet applications, servers serving Internet applications are often attacked by network attackers. Among them, network attackers intercept request data, use legal data or tamper with legal data to make a large number of repeated requests to the server, so as to occupy server and network resources and affect normal business access, which is a very common attack method. The attack method is simple and easy to distribute. It is necessary to adopt an efficient and easy-to-implement method to defend against such attacks. [0003] The hash algorithm is a secure hash algorithm certified by FIPS, which can calculate a fixed-length string (also known as a message digest) corresponding to a digital message. If the input messages are diff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
CPCH04L9/3236H04L9/3247H04L9/3297H04L63/12H04L63/1458H04L63/1466
Inventor 刘剑飞常清雪肖建
Owner SICHUAN CHANGHONG ELECTRIC CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products