Unlock instant, AI-driven research and patent intelligence for your innovation.

Protection method, device and storage medium for network attack

A network attack, network protocol address technology, applied in the field of devices, storage media, and network attack protection methods, can solve the problems of manslaughter, terminal failure to pass protection system verification, and discarding, etc., and achieves the effect of high fault tolerance

Active Publication Date: 2022-05-20
TENCENT TECH (SHENZHEN) CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, some terminals have turned on the "firewall" function, which will discard the wrong response, so that this type of terminal cannot pass the verification of the protection system, resulting in manslaughter

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method, device and storage medium for network attack
  • Protection method, device and storage medium for network attack
  • Protection method, device and storage medium for network attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0032] The terms "first", "second", "third", "fourth", etc. (if any) in the description and claims of the present invention and the above drawings are used to distinguish similar objects and not necessarily Describe a specific order or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the invention described herein are, for example, capable of practice in sequences other than thos...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a network attack protection method, device and storage medium, which are applied in the technical field of information processing. The protection system will directly return an error response message after receiving the first request message from the terminal, and use the terminal to determine whether the terminal is a terminal with a trusted network protocol address based on the feedback of the error response message, so as to prevent network attacks. protection. In this way, after the terminal sends the first request message, if the terminal turns on the "firewall" function, the protection system will continue to wait for the terminal's feedback when it does not receive any response, and judge whether the terminal is capable or not based on the feedback. The terminals that believe in the network protocol address will not accidentally kill this type of terminal, making the fault tolerance higher.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method, device and storage medium for protecting against network attacks. Background technique [0002] Attacks such as distributed denial of service attacks (Distributed Denial of Service, DDoS) are usually launched through botnets. Since botnets are distributed throughout the Internet, such attacks are called distributed DoS attacks. [0003] Synchronous flood (SYNFLOOD) attack is the most typical DDoS attack method, and it is still the main DDoS attack threat until now. SYNFLOOD is to send a large number of Synchronize (Syn for short) packets to the destination server at the same time by controlling the broilers distributed all over the Internet. After receiving the syn packets, the attacked server will perform the following operations: (1) generate a large number of syn half connection, the number of connections is full, and no new network connection can be establis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1458
Inventor 陈国
Owner TENCENT TECH (SHENZHEN) CO LTD