A protection method of distributed denial of service attack based on RSSP-II protocol
A distributed denial and protocol technology, applied in electrical components, transmission systems, etc., can solve problems such as server paralysis, SYNflooding denial of service, failure to work normally, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0033] like Figure 4 As shown, a kind of protection method based on the distributed denial of service attack of RSSP-II agreement provided by the present invention, this method mainly comprises the following steps:
[0034] Step S110: Encrypted transmission of data packets for peer entity identity verification;
[0035] Step S120: Collect and sort out the IDs of legal vehicle-ground equipment;
[0036] Step S130: Each vehicle-ground device stores the equipment numbers of other vehicle-ground devices communicating with it into the CTCS-ID table;
[0037] Step S140: updating the CTCS-ID table;
[0038] Step S150: The communication party A filters and checks the ID of the communication party B requesting to establish a secure connection with the CTCS-ID table, and verifies its legitimacy;
[0039] Step S160: If the ID of the communication party B is different from all the IDs in the CTCS-ID table, it is determined that the ID of the communication party B is forged, and the co...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


