Method and device for denial-of-service simulation attack and computing device

A denial of service attack and simulated attack technology, applied in the computer field, can solve the problems of attack effectiveness or protection effectiveness, the inability to objectively reflect the actual change of the strategy, low attack efficiency and protection efficiency, etc., to eliminate misjudgment and analysis Incomplete, improve protection efficiency, and ensure accuracy

Active Publication Date: 2019-01-11
TENCENT TECH (SHENZHEN) CO LTD
View PDF10 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It can be seen that in the prior art, the attack and defense of denial-of-service attacks such as DoS attacks or DDoS attacks require manual guessing and construction of corresponding strategies. In the process of attack confrontation, manual analysis is required, which is time-consuming and laborious, and the operation efficiency is low. This has a strong correlation with the analysis ability of the analysts, so it may not be able to objectively reflect the actual changes in the strategy, so that both the effectiveness of the attack and the effectiveness of the defense may be affected, resulting in low attack efficiency and defense efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for denial-of-service simulation attack and computing device
  • Method and device for denial-of-service simulation attack and computing device
  • Method and device for denial-of-service simulation attack and computing device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055]In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the application. Obviously, the described embodiments are only It is a part of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application. In the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined arbitrarily with each other. Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0056] Some of the words involved in th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention discloses a method and a device for denial-of-service simulation attack and a computing device, belonging to the technical field of computers. The method comprises the steps of:determining an intercepted attack packet in the last round of denial-of-service simulation attack process; employing the intercepted attack packet to perform training of a protection prediction modelto obtain a trained protection prediction model, wherein the protection prediction model is configured to predict a protection policy employed by a protection node; and performing the next round of denial-of-service simulation attack through the trained protection prediction model. Through adoption of a mode of employing the intercepted attack packet at the last round to perform training and learning of the protection prediction model and employing the trained protection prediction model to perform the next round of the denial-of-service simulation attack, the accuracy of the protection policyprediction is improved through a machine self-learning mode so as to improve the effectiveness of the simulation attack and the simulation attack efficiency.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method, device and computing equipment for simulating a denial of service attack. Background technique [0002] Denial of Service (DoS) attack or distributed denial of service (Distributed Denial of Service, DDoS) attack is a means of network attack, the purpose of which is to exhaust the network or system resources of the attacked device, temporarily interrupt the service or stop, rendering its normal users inaccessible. [0003] For DoS attacks and DDoS attacks, at present, the purpose of detection and protection is mainly achieved by identifying the unconventional content in the protocol field (such as the content maliciously added or modified by the attacker). For example, it is necessary to manually guess the attack strategy of the attacker, and then construct a defense strategy that bypasses the attack strategy for protection. Similarly, for the attacker, it is also ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24
CPCH04L41/145H04L41/147H04L63/1458H04L63/1466H04L63/20
Inventor 申军利杨勇胡珀郑兴王海鹏赖佳
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products