Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for processing data

A technology for processing data and processors, applied in the computer field, it can solve problems such as the limited number of high-defense IPs, and achieve the effect of ensuring experience and availability

Active Publication Date: 2019-04-12
BEIJING BAIDU NETCOM SCI & TECH CO LTD
View PDF7 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it does not happen frequently that user services are attacked by DDoS. Under normal circumstances, the traffic accessing user services finally reaches EIP through the high-defense IP, and the experience of not directly accessing EIP is better.
The number of high-defense IPs is limited, and the number of high-defense IPs purchased by the same user is limited. When users need to purchase high-defense services for a large number of EIPs, it cannot satisfy

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for processing data
  • Method and device for processing data
  • Method and device for processing data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present disclosure will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for the convenience of description, only the parts related to the related invention are shown in the drawings.

[0026] It should be noted that, in the case of no conflict, the embodiments in the present disclosure and the features in the embodiments can be combined with each other. The present disclosure will be described in detail below with reference to the accompanying drawings and embodiments.

[0027] figure 1 An exemplary system architecture 100 is shown to which an embodiment of a method for processing data or an apparatus for processing data of the present disclosure may be applied.

[0028] Such as figure 1 As shown, the system architecture 100 may inclu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method and device for processing data. The specific implementation mode of the method comprises the following steps: receiving an access request to access atarget domain name; converting the target domain name into a preset high-security domain name; inquiring an IP corresponding to the high-security domain name in a domain name system; and sending theaccess request according to the IP corresponding to the high-security domain name, wherein if an EIP (Elastic IP) corresponding to the target domain name enables a black hole, the IP corresponding tothe high-security domain name in the domain name system is a preset high-security IP, otherwise, the IP corresponding to the high-security domain name in the domain name system is the EIP of the target domain name. According to the method for processing the data provided by the invention, in the whole process from triggering the black hole to removing the black hole, a user does not need to participate in the scheduling of high-security IP, and the high-security IP switching is completed in a full automatic way. The scheme guarantees the availability of services when being attacked, and guarantees the best experience of user services under normal circumstances.

Description

technical field [0001] Embodiments of the present disclosure relate to the field of computer technology, and in particular to methods and devices for processing data. Background technique [0002] Currently, the total bandwidth of the cloud computer room is limited, resulting in the provided EIP (Elastic IP, elastic public network IP) protection against DDoS (Distributed Denial of Service, distributed denial of service attack, which refers to a large-scale attack launched by a large number of controlled computers in the network. , Coordinated Denial of Service attack) attack capabilities are limited. Once the user EIP of the cloud computer room suffers a large-scale DDoS attack, we will call the major operators to blackhole the attacked EIP, and block all traffic accessing the EIP from entering the cloud computer room. The blackhole lasts for one day. The black hole solves the impact of DDoS attacks on the entire cloud computer room network, ensuring the stability of most u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12
CPCH04L61/103H04L63/10H04L63/1458H04L61/4511H04L61/3025H04L61/301H04L63/20H04L63/1441H04L2101/663
Inventor 叶本君王少岩黄冰
Owner BEIJING BAIDU NETCOM SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products