Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A processing method and device for cc attack

A processing method and attack-end technology, applied in the field of human network communication, which can solve the problems of authentication mechanism collapse and leakage, etc.

Active Publication Date: 2020-10-30
何林明
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

But this method also has a fatal loophole, that is, if the source code of the authentication algorithm that plays a key role in it is leaked, the entire authentication mechanism will also collapse.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A processing method and device for cc attack
  • A processing method and device for cc attack
  • A processing method and device for cc attack

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0043] see figure 1 , figure 1 It is a schematic flowchart of a CC attack processing method provided by the first embodiment of the present invention.

[0044] A processing method for CC attack, comprising the steps of:

[0045] S101. Send a service request to the target host according to a related control instruction, so that the target host returns a preset initial value and a preset submission condition to the CC attack end according to the service request.

[0046] Wherein, the initial value is an initial condition that triggers the CC attack end to use a preset built-in algorithm to perform an iterative cycle operation on the initial value; the submission condition is set according to the initial value to verify each iteration The condition for looping over the results of an operation.

[0047] In this embodiment, the submission condition may be a unified static submission condition preset by the client, or a dynamic matching condition transmitted to the user client al...

no. 2 example

[0059] see figure 2 , figure 2 It is a schematic flowchart of a CC attack processing method provided by the second embodiment of the present invention.

[0060] A processing method for CC attack, comprising the steps of:

[0061] S201. Receive the service request sent by the CC attack end according to the relevant control instruction, and return the preset initial value and the preset submission condition to the CC attack end according to the service request, so that the CC attack end uses The preset built-in algorithm performs an iterative cycle operation on the initial value until a final operation result meeting the submission condition is obtained.

[0062] Wherein, the initial value is an initial condition that triggers the CC attack end to use a preset built-in algorithm to perform an iterative cycle operation on the initial value; the submission condition is set according to the initial value to verify each iteration The condition for looping over the results of an...

no. 3 example

[0074] see image 3 , image 3 It is a schematic structural diagram of a CC attack processing device diagram provided by the third embodiment of the present invention.

[0075] A CC attack processing device, comprising:

[0076] The service request module 301 is configured to send a service request to the target host according to related control instructions, so that the target host returns preset initial values ​​and preset submission conditions to the CC attack end according to the service request.

[0077] Wherein, the initial value is an initial condition that triggers the CC attack end to use a preset built-in algorithm to perform an iterative cycle operation on the initial value; the submission condition is set according to the initial value to verify each iteration The condition for looping over the results of an operation.

[0078] In this embodiment, the submission condition may be a unified static submission condition preset by the client, or a dynamic matching co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a CC (Challenge Collapsar) attack processing method and device. The method comprises the following steps: sending a service request to a target host according to a relevant control instruction, so that the target host returns a preset initial value and a preset submission condition to a CC attack end according to the service request; performing an iterative loop operation on the initial value by using a preset built-in algorithm until a final operation result that meets the submission condition is obtained; and sending the final operation result to the target host, so that the target host returns an access permission instruction to the CC attack end according to the final operation result. According to the CC attack processing method provided by the invention, by increasing the operation pressure of the CC attack end, the CC attack end cannot calculate a large number of legal return values in a short time, so that a large number of attacks cannot be initiated within a short time, thus the threat of the attacks is directly eliminated at a source end.

Description

technical field [0001] The present invention relates to the technical field of human network communication, in particular to a CC attack processing method and device. Background technique [0002] The attacker uses the proxy server to generate a legitimate request directed to the victim host to achieve DDOS and camouflage called: CC (Challenge Collapsar), and we call such an attack a CC attack. [0003] CC attacks are generally used to attack some WEB interfaces. In a normal communication, the following three steps are generally involved: the client initiates a request, the server receives and processes the request, and the server returns the processed result. However, some requests consume a lot of server resources, that is, after receiving such requests, the server needs to perform a lot of calculations to calculate the results that need to be returned. Normal request speed, the resource consumption caused by the server processing these requests is within the processing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1458H04L63/1483
Inventor 何林明
Owner 何林明
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products