A working method for locating a decentralized network security attack defense system

An attack defense system and network security technology, which is applied in the field of positioning decentralized network security attack defense system, can solve the problems of inability to attack defense and counterattack

Active Publication Date: 2021-04-09
深圳市领星网络科技有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Due to the simple method of DDoS attack and strong concealment, so far, there is no means to completely defend against this kind of attack; The defense of DDoS attack, the problem of being unable to make effective defense and counterattack to the attack in time under the attack of widely distributed DDoS like this, the present invention provides a kind of working method of computer anti-theft information system based on displacement

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A working method for locating a decentralized network security attack defense system
  • A working method for locating a decentralized network security attack defense system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034]Referencefigure 1 ,figure 2. A working method for positioning a decentralized network security attack defense system for targeting an attack area and an attack area, the defense system comprising: comprising information flow collection module 101, a flow analysis module 102, a positioning module 103, and The Wide Area Controller 1 of the configuration module 104, the regional network switch 2, the regional device configurable machine 3, the terminal connection device 4, and the GPS positioning device 5 include the following steps:

[0035]S01: The Wide Area Controller 1 acquires all net topology information through the information flow collection module 101;

[0036]S02: The Wide Area Controller 1 calculates a message update rate of the topology information by the traffic analysis module 102;

[0037]S03: The Wide Area Controller 1 determines whether the message update rate exceeds its own processing rate, if yes, then proceeds to step S04;

[0038]S04: The Wide Area Controller 1 reverse ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a working method for locating a distributed network security attack defense system, which is used for directional defense against an attack area and an attacked area, comprising the following steps: a wide area controller acquires topology information of the entire network through an information flow collection module; The domain controller calculates the message update rate of topology information through the traffic analysis module; the wide area controller judges whether the message update rate exceeds its own processing rate, and if so, the wide area controller reversely tracks the topology of this part through the positioning module Positioning of the information source of the information; the wide area controller obtains the network configuration within a certain range through the configuration module according to the positioning of the information source; the GPS positioning device authenticates each device; the terminal connection device temporarily connects each device to any signal site; the regional device The configuration machine matches the processing rate of each device according to the packet update rate; the regional device configuration machine transmits the topology information with the corresponding message update rate to the corresponding device.

Description

Technical field[0001]The present invention relates to the field of network security, and more particularly to a working method of positioning a dispersion network security attack defense system.Background technique[0002]With the rapid development and depth application of computer science and technology, changes in network space are constantly changing and affecting people's lifestyle. Since people's dependence on the Internet is getting higher and higher, many confidential information about enterprises, individuals, and even countries have been involved on the Internet, so network security issues have been an important topic in technology development. In many network attack methods in the Internet, Distributed Denialof Service Attack (DDOS) is the most common and destructive attack method. Distributed Deny Service Attack Most from the zombie network, coordinated with one or more targets to deny service attacks. Due to the simple DDoS attack method, the concealedness is strong, so th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1458
Inventor 顾健
Owner 深圳市领星网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products