Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for message processing

A message processing and message technology, which is applied in the field of network communication, can solve problems such as impact and inability to process, and achieve the effect of flexible methods and reduced impact

Active Publication Date: 2021-09-21
HANGZHOU DPTECH TECH
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, when defending against DDoS attacks in the prior art, it defends against a certain type of message that is determined to have an attack behavior. That is to say, if a certain type of attack is blocked, the gateway device will not process this type of normal message
Normal network activities will also be greatly affected, so this application provides a new method and device for message processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for message processing
  • Method and device for message processing
  • Method and device for message processing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0023] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application provides a method and device for message processing. For each received message, the actual message flow of the IP address can be determined according to the source Internet Protocol (IP) address of the message. According to Determine the flow direction information of the message, determine the security rule matching the flow information, thereby determine the flow threshold of the IP address, and determine whether the actual message flow of the IP address exceeds the flow threshold of the IP address, If yes, process the message according to the operation corresponding to the matched security rule; if not, forward the message according to the content of the message.

Description

technical field [0001] The present application relates to the technical field of network communication, and particularly designs a method and device for message processing. Background technique [0002] Distributed Denial of Service (DDoS) attack refers to that the attacker sends a large number of carefully constructed attack packets to the attacked target by controlling a large number of zombie hosts, causing the link congestion of the network where the attacker is located and system failure. Resource exhaustion makes it difficult for the attacker to provide services to normal users. figure 1 It is a schematic diagram of an existing DDoS attack. The terminal used by the attacker is on the left, and the server on the right is attacked by controlling the zombie host. Usually, DDoS attacks come from terminals on the intranet. [0003] Since DDoS attacks are usually based on the loopholes in the communication protocol between devices, DDoS attacks can usually be divided into ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1441H04L63/1458
Inventor 徐强
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products