User datagram protocol traffic filtering method and device, server and memory medium

A user datagram and traffic filtering technology, applied in the field of network security, can solve problems such as poor effect and difficulty in meeting protection requirements, and achieve the effect of good protection effect and reduced impact.

Active Publication Date: 2018-11-02
TENCENT TECH (SHENZHEN) CO LTD
View PDF9 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem in the related art that it is difficult to meet the protection requirements and the effect is not good when using a sing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User datagram protocol traffic filtering method and device, server and memory medium
  • User datagram protocol traffic filtering method and device, server and memory medium
  • User datagram protocol traffic filtering method and device, server and memory medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0025] In order to facilitate the understanding of the technical solutions provided by the embodiments of the present invention, the problems existing in the existing UDP traffic filtering solutions are described below:

[0026] DDoS attack means that hackers send a large amount of abnormal traffic to the destination server by controlling the dead network distributed in various places. The server is busy processing abnormal traffic, unable to process normal user requests, and even the system crashes, resulting in denial of service. UDP Flood is a very common DDoS attack method. Through a large amount of UDP garbage traffic, server bandwidth is blocked, resulting in business paralysis. Since UDP is a connectionless transport protocol, s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user datagram protocol traffic filtering method and device, a server and a memory medium and belongs to the field of network security. The method comprises the steps of obtaining fingerprint feature baseline data of the server when the server bears a user datagram protocol flooding attack, wherein the fingerprint feature baseline data comprises a business load feature baseline, a business port feature baseline, a business packet length feature baseline and a business protocol feature baseline; and filtering user datagram protocol traffic which is about to be sent to the server, through sequential utilization of the business load feature baseline, the business port feature baseline, the business packet length feature baseline and the business protocol feature baseline, until the user datagram protocol traffic which is about to be sent to the server in the unit time is smaller than a security threshold; and sending the filtered traffic to the server.

Description

technical field [0001] The invention relates to the field of network security, in particular to a user datagram protocol flow filtering method, device, server and storage medium. Background technique [0002] Distributed Denial of Service (DDoS) attack means that hackers send a large amount of abnormal traffic to the destination server by controlling the dead network distributed in various places. The server is busy processing abnormal traffic, unable to process normal user requests, and even the system crashes. cause a denial of service. [0003] User Datagram Protocol (UDP) flooding (Flood) is a very common DDoS attack method. It uses a large amount of UDP garbage traffic to block server bandwidth and cause business paralysis. [0004] Traditional UDP protection is mostly implemented through a single protection strategy, such as rate limiting strategy, feature filtering strategy, packet length limiting strategy, and source port strategy. With the diversification of attac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0245H04L63/1416H04L63/1425H04L63/1458
Inventor 陈国杨磊罗喜军
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products