Device of using intelligent switching of multiple domain names for DDoS (Distributed Denial of Service) attack defence

A technology of intelligent switching and domain name, applied in electrical components, transmission systems, etc., can solve problems such as business interruption, continuous attack, and high cost, and achieve the effects of reducing impact, increasing attack threshold, and increasing cost

Active Publication Date: 2019-04-12
成都知道创宇信息技术有限公司
View PDF8 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The essence of network attack and defense lies in the asymmetry of information and resources between the attacking and defending parties; as a large number of Internet services are accessed using specific clients such as mobile APPs, it is very important to deploy defenses on the client; when attacking a target business system, the attacker will first Stepping on the site is to detect the bearer domain name of the target business to obtain the server IP address, and then launch a DDoS attack on it; for a business system that only provides client access, netizens cannot directly see which domain name the business system uses like accessing through a browser , the attacker must capture and analyze the communication between the client and the server in order to find the business bearer domain name; currently, the clients of mainstream Internet services generally only use an official default domain name to provide access, which is easy to be captured and sniffed by Tracking, targeting persistent attacks, disrupting their business
[0003] For example, the anti-DDoS method provided by some defense vendors at the client level is to embed the SDK on the client side, call HTTPDNS, and use a large number of high-defense IPs to quickly switch to mitigate the impact of the attack; however, embedding the SDK requires a lot of manpower in the early stage. Development joint debugging, once the defense vendor is replaced, it needs to be redeveloped, which is costly; and HTTPDNS is used to quickly schedule and switch, the DNS of HTTPDNS has become the scheduling center of the business system, and it is easy to become the target of DDoS concentrated fire "beheading" attacks; use a Once the domain name and the centralized system using HTTPDNS are attacked, the business will be completely interrupted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Device of using intelligent switching of multiple domain names for DDoS (Distributed Denial of Service) attack defence
  • Device of using intelligent switching of multiple domain names for DDoS (Distributed Denial of Service) attack defence

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0022] Such as figure 1 As shown, a device for preventing DDoS attacks by intelligently switching multiple domain names includes a domain name acquisition module and a timeout monitoring module arranged on the client side, and also includes an attack monitoring device and an intelligent scheduling device arranged on the server side;

[0023] Domain name acquisition module: obtain at least two available domain names from the available domain name pool of the server-side intelligent scheduling module every T time, one of which is used as the currently used domain name, and the rest are used as standby domain names;

[0024] At the same time, the domain name acquisition module can be protected by the client's own security reinforcement and communication encryption measures to prevent available domain names from being traversed.

[0025] Timeout m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a device of using intelligent switching of multiple domain names for DDoS (Distributed Denial of Service) attack defence. The device includes a domain name acquisition module and a timeout monitoring module disposed at a client, and also includes an attack monitoring device and an intelligent scheduling device disposed at a service end. The domain name acquisition module acquires the at least two available domain names from an available domain name pool of a service end intelligent scheduling device at an interval of time T, one thereof is used as a currently used domain name, and the rest is used as an alternate domain name. The timeout monitoring module monitors time when the client issues a request to the service end. The attack monitoring device carries out real-time monitoring, and determines a domain name under an attack. The intelligent scheduling device schedules the domain name under the attack if the attack monitoring device detects the domain name under the attack. The device of using intelligent switching of the multiple domain names for DDoS (Distributed Denial of Service) attack defence can paralyze an attacker in certain time, prolong time after which an attack is initiated thereby again, increase attack resource and cost consumption of the attacker, increase attack difficulty, reduce impacts caused by the attack, and thus achieve the purpose of defence against the DDoS attack.

Description

technical field [0001] The invention provides a device for preventing DDoS attack, in particular to a device for preventing DDoS attack by intelligently switching multiple domain names. Background technique [0002] The essence of network attack and defense lies in the asymmetry of information and resources between the attacking and defending parties; as a large number of Internet services are accessed using specific clients such as mobile APPs, it is very important to deploy defenses on the client; when attacking a target business system, the attacker will first Stepping on the site is to detect the bearer domain name of the target business to obtain the server IP address, and then launch a DDoS attack on it; for a business system that only provides client access, netizens cannot directly see which domain name the business system uses like accessing through a browser , the attacker must capture and analyze the communication between the client and the server in order to find...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/1458H04L61/4511
Inventor 詹科罗立王海吉
Owner 成都知道创宇信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products