Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

UDP traffic filtering method, device, server and storage medium

A user datagram and server technology, applied in the field of network security, can solve problems such as difficult to meet protection requirements and poor effect, and achieve good protection effect and reduce impact

Active Publication Date: 2020-07-17
TENCENT TECH (SHENZHEN) CO LTD
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem in the related art that it is difficult to meet the protection requirements and the effect is not good when using a single protection strategy for UDP protection, the embodiment of the present invention provides a UDP traffic filtering method, device, server and storage medium

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • UDP traffic filtering method, device, server and storage medium
  • UDP traffic filtering method, device, server and storage medium
  • UDP traffic filtering method, device, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0025] In order to facilitate the understanding of the technical solutions provided by the embodiments of the present invention, the problems existing in the existing UDP traffic filtering solutions are described below:

[0026] DDoS attack means that hackers send a large amount of abnormal traffic to the destination server by controlling the dead network distributed in various places. The server is busy processing abnormal traffic, unable to process normal user requests, and even the system crashes, resulting in denial of service. UDP Flood is a very common DDoS attack method. Through a large amount of UDP garbage traffic, server bandwidth is blocked, resulting in business paralysis. Since UDP is a connectionless transport protocol, s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user datagram protocol traffic filtering method and device, a server and a memory medium and belongs to the field of network security. The method comprises the steps of obtaining fingerprint feature baseline data of the server when the server bears a user datagram protocol flooding attack, wherein the fingerprint feature baseline data comprises a business load feature baseline, a business port feature baseline, a business packet length feature baseline and a business protocol feature baseline; and filtering user datagram protocol traffic which is about to be sent to the server, through sequential utilization of the business load feature baseline, the business port feature baseline, the business packet length feature baseline and the business protocol feature baseline, until the user datagram protocol traffic which is about to be sent to the server in the unit time is smaller than a security threshold; and sending the filtered traffic to the server.

Description

technical field [0001] The invention relates to the field of network security, in particular to a user datagram protocol flow filtering method, device, server and storage medium. Background technique [0002] Distributed Denial of Service (DDoS) attack means that hackers send a large amount of abnormal traffic to the destination server by controlling the dead network distributed in various places. The server is busy processing abnormal traffic, unable to process normal user requests, and even the system crashes. cause a denial of service. [0003] User Datagram Protocol (UDP) flooding (Flood) is a very common DDoS attack method. It uses a large amount of UDP garbage traffic to block server bandwidth and cause business paralysis. [0004] Traditional UDP protection is mostly implemented through a single protection strategy, such as rate limiting strategy, feature filtering strategy, packet length limiting strategy, and source port strategy. With the diversification of attac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0245H04L63/1416H04L63/1425H04L63/1458
Inventor 陈国杨磊罗喜军
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products