Attack defense method and device

An anti-attack and message technology, applied in the field of network security, can solve problems such as the failure of computers to provide services normally, achieve the effect of reducing the time of failure to provide services normally, realize network attack defense, and reduce the possibility of network attacks

Active Publication Date: 2022-03-22
NEW H3C SECURITY TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since a DDoS attack can only be detected after a period of time, if the passive defense method is used for DDoS attack defense, the computer will not be able to provide normal services for a period of time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack defense method and device
  • Attack defense method and device
  • Attack defense method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] The following will clearly and completely describe the technical solutions in the embodiments of the application with reference to the drawings in the embodiments of the application. Apparently, the described embodiments are only some of the embodiments of the application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0039] At present, the defense against DDoS attacks mainly adopts the passive defense method. Since a DDoS attack can only be detected after a certain period of time, if a passive defense method is used for DDoS attack defense, the computer will not be able to provide normal services for a period of time.

[0040] In order to reduce the possibility of computers being attacked by the network and reduce the time during which the computer cannot provide services normally due to network...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present application provide an attack defense method and device, which are applied to detection equipment, including: receiving the first message sent by the user equipment to the server; detecting whether the server is currently in a normal working state; if it is in a normal working state, Then detect whether the first message is a scanning message; if it is a scanning message, then the first message is sent to the monitoring device, so that the monitoring device records the source IP address of the first message and the destination port of the first message. According to the corresponding relationship, the threat level of the user equipment is determined according to the destination port corresponding to the recorded source IP address of the first packet. Applying the technical solution provided by the embodiment of the present application can reduce the possibility of the computer being attacked by the network, and reduce the time that the computer cannot provide services normally due to the network attack.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to an attack defense method and device. Background technique [0002] Distributed Denial of Service (English: Distributed Denial of Service, DDoS for short) attack is a common means of network attack. A DDoS attack refers to combining multiple computers distributed in different places as an attack platform, and sending a large number of attack packets to one or more computers in the network, causing the attacked computer to fail to provide normal services. [0003] At present, DDoS attack defense mainly adopts the passive defense method, that is, the defense is carried out after detecting that the computer encounters a DDoS attack. For example, after detecting that the computer has encountered a DDoS attack, discard the packets sent by the determined attacker, or perform reverse scanning to paralyze the attack platform. [0004] Since a DDoS attack can only be d...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1458H04L63/1441H04L63/1416H04L63/1408
Inventor 仇宏迪
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products