Low-speed DDoS attack defense method and system

A low-speed, attacker technology, applied in transmission systems, electrical components, etc., can solve problems such as inability to judge users, inability to achieve attack defense, etc., to achieve the effect of improving network security

Active Publication Date: 2019-03-08
盾盟(上海)网络科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the designed estimator can only detect the number of users who continuously access the server, but cannot judge whi

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Low-speed DDoS attack defense method and system
  • Low-speed DDoS attack defense method and system
  • Low-speed DDoS attack defense method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0047] Example 1

[0048] The network model based on the low-speed DDoS attack defense studied in the present invention is as follows: figure 1 As shown, users in the Internet access the internal network through a central gateway, and the internal network consists of server farms. The central gateway includes a central router and a central server. The central router is responsible for real-time data forwarding and online attack defense, while the central server can implement offline decoding.

[0049] like figure 2 As shown, the specific implementation steps of the low-speed DDoS attack defense online coding flowchart based on the continuous attack model (the attacker has accessed the attacked server within a given t period) involved in the summary of the invention are as follows:

[0050] S21: At the beginning of each measurement cycle, initialize M f All bits are 0.

[0051] S22: Determine whether a data packet arrives? If a data packet arrives, continue to execute ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a low-speed DDoS attack defense method and system based on a compact data structure. The method comprises an on-line coding step, an off-line decoding step and an attack defense step, wherein the on-line coding step is that an SRAM records a data packet into a continuous memory space opened by an access server by using k hash functions when the data packet arrives, and at the end of each measurement period, the SRAM stores a data packet record of the period to a server for off-line analysis; the off-line decoding step is that the server performs off-line decoding on theobtained data packet record, and uploads an obtained result to a central router for judging whether a user in the next period is an attacker or not; the attack defense step is that when the data packet arrives, the data packet is mapped to the result of the off-line decoding by using the k hash functions, so that whether the data packet is from the attacker or not is judged. According to the method and the system, the low-speed DDoS attacker can be quickly and accurately found, the defense measures can be provided in a targeted mode, and the network safety is improved.

Description

technical field [0001] The invention relates to a low-speed distributed denial-of-service attack defense method and system, belonging to the field of network attack defense. Background technique [0002] Distributed Denial of Service (DDoS) attack, referred to as DDoS attack, refers to the use of client / server technology to combine a large number of computers as an attack platform to launch an attack on one or more targets, occupying a large number of legitimate requests through a large number of resources, bringing down the attacked server or degrading its performance. When a large number of DDoS attackers access the attacked server at a rate much greater than the rate at which legitimate users send packets, the server will be paralyzed, and legitimate users cannot access the server normally. There are a large number of DDoS attack detectors that can judge whether a user is a DDoS attacker by detecting the packet sending rate. However, when these illegal users reduce the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0218H04L63/1458
Inventor 黄河孙玉娥朱丰杰
Owner 盾盟(上海)网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products