Unlock instant, AI-driven research and patent intelligence for your innovation.

Defense method and defense device for SSDP reflection attack based on multi-point defense in Internet of things

A technology of reflection attack and Internet of Things, which is applied in the direction of electrical components and transmission systems, can solve the problems of low recognition accuracy, large time and space overhead, and poor defense effect, so as to improve security, improve efficiency, and avoid The effect of a surge in network traffic

Active Publication Date: 2018-11-09
CHINA UNIV OF PETROLEUM (EAST CHINA)
View PDF2 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] The above methods first identify DDoS attacks and then defend them. The identification process requires a lot of time and space overhead. More importantly, the identification accuracy is not high, resulting in poor defense effects.
In addition, restricting network traffic and network resources will affect the normal network services of service providers and victim nodes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Defense method and defense device for SSDP reflection attack based on multi-point defense in Internet of things
  • Defense method and defense device for SSDP reflection attack based on multi-point defense in Internet of things
  • Defense method and defense device for SSDP reflection attack based on multi-point defense in Internet of things

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0043] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0044] In a complete SSDP-based DDoS attack, there are several roles: attacker, zombie, router, service provider, and victim. Because the attacker is uncontrollable, we deploy the defense method and defense device of the present invention on zombie machines, service providers and victims.

[0045] 1) Limit the time interval for zombies to send SSDP request packets, use T Z means, for example, T Z = 0.01 seconds to send a SSDP request packet, the same type of SSDP request is less than T Z Repeated sending within the time interval will be blocked by the defense device.

[0046] 2) Limit the time interval T for service providers to receive SSDP request data packets S_recive And the time interval T for responding to the SSDP request data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a defense method for the SSDP reflection attack based on multi-point defense in the Internet of things. According to the defense method, the defense mechanism is deployed in multiple network positions such as a zombie, a service provider and a victim, as shown in a Figure 1. The time interval at which the zombie sends the same SSDP request message is set to reduce the message sending number per unit time; the time interval for the service provider to respond to the same message is set to reduce the response number per unit time; a reasonable TTL value of the SSDP serviceresponse report is set to limit transmission of the SSDP service response messages over long distances; the time interval at which the victim receives the same message is set to discard the same service response message. The defense method is advantaged in that the network flow is reduced without affecting network service efficiency, so detecting occurrence of the SSDP reflection attack in advance is not needed. The invention further provides a defense device for the SSDP reflection attack based on multi-point defense in the Internet of things.

Description

technical field [0001] The present invention relates to a SSDP protocol-based reflection attack defense method and defense device, in particular to a SSDP reflection attack defense method and defense device based on multi-point defense existing in the Internet of Things environment. Background technique [0002] DDoS attack is a commonly used and effective attack method in cyberspace. This attack method can send various requests to the victim continuously by controlling a large number of zombie machines in a short period of time, resulting in a surge in the network traffic of the victim until it cannot serve the outside world. Provide normal service. [0003] SSDP, namely Simple Service Discovery Protocol (SSDP, Simple Service Discovery Protocol), is an application layer protocol and one of the core protocols constituting the Universal Plug and Play (UPnP) technology. When the SSDP protocol-based smart device receives the SSDP request data message, if the device can provide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/1458H04L63/20
Inventor 刘昕曹帅张孝苗周杰韩张卫山
Owner CHINA UNIV OF PETROLEUM (EAST CHINA)