Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Defense system and method for Internet-of-Things system to resist DDOS attack

An Internet of Things system and defense system technology, applied in transmission systems, digital transmission systems, data exchange networks, etc., can solve the problems of inability to defend against DDoS attacks, complicated environment configuration, and threatening DDoS attacks.

Inactive Publication Date: 2018-11-23
苏州爱开客信息技术有限公司
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the development of cloud computing, the number of IoT devices is huge, and IoT devices have poor virus defense capabilities and strong destructive power after failure. These characteristics provide a hotbed for DDoS attacks. That is to say, in the IoT environment, IoT The huge number of networked nodes and IoT devices affect all aspects of real life, making DDoS attacks in the IoT environment more threatening and have a wider impact
For DDoS attacks, traditional solutions include host or network-based detection, CDN services, and telecom operator-based traffic cleaning and IP address blocking. However, these methods are unable to defend against DDoS attacks in the Internet of Things environment.
In addition, Huawei provides an agile solution for the Internet of Things. This solution mainly uses technologies such as authentication management, authorization management, and terminal identification to strengthen terminal security, and manages the network through authorized VLANs, ACLs, QoS, and user group authorization. This solution can To strengthen terminal security, there is a controller for global policy configuration, but its disadvantage is that it requires more cost to purchase defensive equipment, and uses multiple policy configurations, and the environment configuration is cumbersome

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Defense system and method for Internet-of-Things system to resist DDOS attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] In view of the deficiencies in the prior art, the inventor of this case was able to propose the technical solution of the present invention after long-term research and extensive practice. The technical solution, its implementation process and principle will be further explained as follows.

[0015] The embodiment of the present invention provides a defense system for the Internet of Things system to deal with DDOS attacks, which includes: two or more different server groups, and the terminals of the Internet of Things system access two or more different servers through more than one wireless narrowband Group, two or more different server groups work in parallel, and the two servers are connected to the same database.

[0016] Further, the defense system of the Internet of Things system against DDOS attacks includes: a first server group and a second server group, and the terminals of the Internet of Things system are respectively connected to the first server group via...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a defense system and method for an Internet-of-Things system to resist DDOS attack. The defense system includes two or more different server groups, wherein an Internet-of-Things system terminal is connected with the two or more different server groups via more than one wireless narrow band, the two or more different server groups work in parallel, and the two servers are connected with the same database. The Internet-of-Things system terminal in the defense system for an Internet-of-Things system to resist DDOS attack can be connected to two different server groups through one or two wireless narrow bands (two shown in the figure), two groups of connections (terminal-to-server) work in parallel, a first-come-first-served management mode is adopted for analysis andacquisition of data, the two server groups operate one database, and at the moment, even if one server group is attacked or down, the system still can work normally without being affected.

Description

technical field [0001] The invention relates in particular to a defense system and method for an Internet of Things system to deal with DDOS attacks, and belongs to the technical field of network security. Background technique [0002] Distributed denial of service (DDoS) attack is a common type of network attack. It uses client / server technology to combine multiple computers as an attack platform to launch DDoS attacks on one or more targets, thereby multiplying The power of denial of service attacks. With the development of cloud computing, the number of IoT devices is huge, and IoT devices have poor virus defense capabilities and strong destructive power after failure. These characteristics provide a hotbed for DDoS attacks. That is to say, in the IoT environment, IoT The huge number of networked nodes and IoT devices affect all aspects of real life, making DDoS attacks in the IoT environment more threatening and have a wider impact. For DDoS attacks, traditional soluti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L12/24
CPCH04L41/0663H04L63/1458H04L67/12
Inventor 季立
Owner 苏州爱开客信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products