A defense method and defense device for ssdp reflection attacks based on multi-point defense in the Internet of Things
A reflection attack and Internet of Things technology, which is applied in transmission systems and electrical components, can solve problems such as low recognition accuracy, large time and space overhead, and poor defense effects, so as to improve security, improve efficiency, and avoid The effect of a surge in network traffic
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0043] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.
[0044] In a complete SSDP-based DDoS attack, there are several roles: attacker, zombie, router, service provider, and victim. Because the attacker is uncontrollable, we deploy the defense method and defense device of the present invention on zombie machines, service providers and victims.
[0045] 1) Limit the time interval for zombies to send SSDP request packets, use T Z means, for example, T Z = 0.01 seconds to send a SSDP request packet, the same type of SSDP request is less than T Z Repeated sending within the time interval will be blocked by the defense device.
[0046] 2) Limit the time interval T for service providers to receive SSDP request data packets S_recive And the time interval T for responding to the SSDP request data...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 



