Anti-attack SYN message processing method, device, firewall and storage medium

A message processing and anti-attack technology, applied in the computer field, can solve the problems of exhaustion of firewall resources and no better SYNFlood attack methods, and achieve the effect of improving performance and defending against SYNFlood attacks

Active Publication Date: 2018-09-18
NEUSOFT CORP
View PDF5 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method only relatively reduces the burden on the server, but it may still cause the resource exhaustion of the firewall itself
[0004] It can be seen that there is currently no better way to prevent SYN Flood attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-attack SYN message processing method, device, firewall and storage medium
  • Anti-attack SYN message processing method, device, firewall and storage medium
  • Anti-attack SYN message processing method, device, firewall and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] Specific embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present disclosure, and are not intended to limit the present disclosure.

[0058] First, the implementation background of the present disclosure will be introduced. The firewall is a transit device set between the terminal and the server, which can be a firewall device integrated on the server side, or a firewall device independent of the server and the terminal. To establish a connection between the terminal and the server, the firewall needs to verify the reliability before establishing the connection. Take the establishment of a TCP (Transmission Control Protocol) connection as an example. To establish a connection with the server, the terminal needs to perform a three-way handshake with the firewall. After the three-way handsha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an anti-attack SYN message processing method and device, firewall and a storage medium, and the performance of resisting the SYN Flood attack by the firewall is improved. Themethod comprises the following steps: receiving a SYN message; determining a processing way on the SYN message according to a source IP address of the SYN message and the constructed white list and other lists when determining the firewall is attacked, wherein the white list is used for storing source IP address of three-time successful handshaking, and the other lists comprises at least one of ablack list for storing the attack IP address, a red list for verifying whether the SYN message is the attack message, and a yellow list for storing the connection information to be determined whetheris the attack; and the connection information comprises the source IP address, the destination IP address and the port number.

Description

technical field [0001] The present disclosure relates to the field of computer technology, and in particular, relates to an attack-proof SYN message processing method, device, firewall and storage medium. Background technique [0002] SYN Flood (SYN flood attack) is one of the most well-known DoS (Denial of Service, denial of service attack) and DDoS (Distributed Denial of Serivce, distributed denial of service attack) attack methods. Its principle is to use the design defect of TCP (Transmission Control Protocol) to forge a false IP or IP address range to send a large number of SYN (Synchronous, TCP / IP handshake signal used when establishing a connection) TCP connection. SYN message), so that the attacked party needs to consume memory to maintain the connection state as a semi-connection until it times out, so that other normal services cannot be processed, and the purpose of the attack is achieved. [0003] At present, the methods for defending against SYN Flood attacks m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0209H04L63/101H04L63/1458
Inventor 刘健男党丽娜
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products