Unlock instant, AI-driven research and patent intelligence for your innovation.

Processing method for http looping attack

A processing method and looping technology, applied in the Internet field, can solve problems such as system resource impact and system loss, and achieve the effects of simple operation, avoidance of looping, and easy implementation.

Inactive Publication Date: 2019-04-19
北京云端智度科技有限公司
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] When random discarding occurs in this way, system resources have been partially affected, and the system has actually suffered losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Processing method for http looping attack
  • Processing method for http looping attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0028] Such as Figure 1-2 As shown, the present invention relates to a processing method of http ring attack, and the steps are as follows:

[0029] After the proxy system receives the user request, if the request header does not contain the hop count (TTL) header, it will insert the TTL: n (n is the maximum hop count, typically 16) header in the request header; then include the TTL header All requests are forwarded to the next-level proxy system; after the proxy system receives the user request, if the request header contains a hop count (TTL) header, but the validity check of the TTL information fails (for example, cannot be parsed, or exceeds the maximum value) , then delete the original TTL header and insert a new TTL: n (n is the maximum number of hops, typically 16) header; then forward the request containing the TTL header to the next-level proxy system; the proxy system After receiving the user request, if the TTL header is included and the hop count information is v...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a processing method for an http looping attack. Through utilization of a mechanism of adding a hop field header, the maximum times for the same request to pass a proxy systemis limited, and when the maximum times reaches, the request is discarded, so follow-up continuous looping is blocked. A request header is completely forwarded to a next level through utilization of the proxy system. In a practical environment, the proxy system does not know a use request of business for the header, so most of the time, the request header is not adjusted, and the mechanism is used.Only part of the proxy systems in a looping path need to support the mechanism, and the purpose of preventing looping can be achieved. Compared with a conventional scheme, the method has the advantages that only looping requests are discarded, normal requests are not influenced, looping can be distinguished accurately, rapid recovery can be carried out under the condition that no pressure occursin the system, operation is simple, the method is easy to realize, and the method is convenient for wide generalization and popularization.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a processing method for HTTP looping attacks. Background technique [0002] The http proxy system (such as forward proxy, reverse proxy, CDN system, etc.) provides a http request proxy forwarding system, which forwards user requests to the real source site, and the real source site provides the data access. Such as figure 1 As shown, in the current prior art, under normal circumstances, the system forwards the user request to the upstream system after receiving the http request from the user, and forwards the response to the user after receiving the response from the upstream system. However, in some special cases such as configuration errors or malicious constructions, the real source site may still be an http proxy system. In this way, in the case of multi-level proxies, as long as there are cross-references, local loops or global loops may occur. [0003] There are man...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/705H04L12/733H04L45/18H04L45/122
CPCH04L45/18H04L45/20
Inventor 刘晓光汪志武温伟球
Owner 北京云端智度科技有限公司