A CC protection method based on CDN node logs
A log and node technology, applied in the field of CC protection, can solve problems such as real-time adjustment of defense strength, failure to refer to the performance status of the source server, and failure of the source server to operate normally, so as to reduce the probability and risk of false interception and avoid performance overload Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.
[0027] like figure 1 As shown, a CC protection method based on CDN node logs includes the following steps:
[0028] Step 1: Obtain the IP request information in the CDN node log, and analyze and judge whether it is an attack according to the IP request information;
[0029] Based on the list and attack signature database, the IP request information is analyzed as follows:
[0030] Match the source IP in the IP request information with the blacklist, if the source IP matches any source IP in the blacklist, the output analysis result is "match";
[0031] If the source IP does not match any source IP in the blacklist, the latest access frequency of the source IP will be counted and compared with the source IP access frequency threshold. If it exceeds the source IP access frequency threshold, the output analysis result will be " threshold exceed...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

