Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for defending against denial of service attacks

A terminal device and the same technology, applied in the security field, can solve problems such as threats to terminal device security, service unavailability, device restart, etc., to achieve the effect of ensuring safe operation and reducing the probability of DoS attacks

Active Publication Date: 2022-02-22
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the limited hardware and software resources of the TEE, when the CA has a vulnerability or the REE side is rooted, malicious applications can easily use the existing interfaces to frequently call services on the TEE side.
In this case, once all the resources of the TEE are occupied and not released for a long time, a Denial of Service (DoS) attack can be caused, resulting in the unavailability of the services on the REE side and the TEE side, and even the restart of the device.
It can be seen that the possibility of DoS attacks on terminal equipment (REE side and TEE side) is relatively high, which seriously threatens the security of terminal equipment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for defending against denial of service attacks
  • A method and device for defending against denial of service attacks
  • A method and device for defending against denial of service attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The technical solutions in the embodiments of the present application will be described in detail below with reference to the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of the embodiments.

[0047] The embodiment of the present application provides a method for defending against denial of service (Denial of Service, DoS) attacks, so as to identify and prevent DoS attacks initiated by malicious programs by invoking specific interfaces or services in the device, so as to improve the security of the device. The method provided in this application can be typically applied to a terminal device, or can also be applied to a computer system such as a server. The terminal device described in the embodiments and claims of the present application is a device that provides voice and / or data connectivity to users, including wireless terminals or wired terminals. The wire...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present application provides a method for defending against DoS attacks, which can be applied to terminal devices including trusted execution environment TEE and rich execution environment REE that are isolated from each other, including: acquiring the client application program running in REE to initiate a service or interface An access request, the access request is used to request a service or resource; the access request is passed to the defense module deployed in the TEE; the defense module decides whether to authorize the access based on the control policy determined according to the access behavior model Request, the access behavior model is obtained after training the access behavior data sets of multiple normal CAs accessing the service / interface through statistical methods or machine learning algorithms. The method provided by the present application can accurately identify and block access requests with potential DoS attack threats, thereby improving device security.

Description

technical field [0001] The present application relates to the security field, and more specifically, relates to a method and device for defending against denial of service (Denial of Service, DoS) attacks. Background technique [0002] In recent years, with the development of the mobile Internet, the number of smart terminal devices has increased dramatically. In order to provide rich functions and scalable properties of smart mobile terminals, terminal devices are usually built on the Rich Execution Environment (REE) that provides an open operating environment. REE is also called a general operating environment, mainly including Rich Operating System (Rich OS) running on general-purpose processors, such as An operating system, and a client application (client application, CA) running on the Rich OS. A major advantage of REE is that users can add applications at any time, however, this open environment also provides avenues for information leakage and malware propagatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCG06F21/554G06F21/53H04L63/1458H04L63/1425G06F21/57
Inventor 谢淼姚英亮
Owner HUAWEI TECH CO LTD