Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for processing requests and storage medium

A technology for processing requests and access requests, which is applied in the computer field and can solve problems such as failure of strike methods

Active Publication Date: 2021-11-09
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] At present, there are many mature attack modes, such as using a large number of proxy servers and controlling puppet machines to hide the real IP address of the attacker. When the client constantly changes the IP address to make a request, the attack method based on the IP address of the existing technology will fail

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for processing requests and storage medium
  • A method and device for processing requests and storage medium
  • A method and device for processing requests and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Embodiments of the present invention provide a method and device for processing requests and a storage medium, which are used to effectively strike against malicious access requests.

[0034] In order to make the purpose, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the following The described embodiments are only some, not all, embodiments of the present invention. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention belong to the protection scope of the present invention.

[0035] The terms "comprising" and "having" in the description and claims of the present invention and the above drawings, as well as any variations thereof, are intended to cover a non-exclusiv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention disclose a method and device for processing a request and a storage medium, which are used to effectively combat malicious access requests. Among them, a method for processing requests includes: determining at least two statistical dimensions from a preset multi-dimensional strategy according to an access request sent by a client, and the multi-dimensional strategy includes: a variety of different statistical dimensions and each statistical dimension For the corresponding attack rules, the statistical dimension is used to indicate the fields that need to be counted; at least two kinds of field contents are extracted from the access request, and at least two kinds of field contents correspond to at least two kinds of statistical dimensions one-to-one, and each kind of field contents can be used according to the unique identification access request; determine whether the respective occurrences of at least two kinds of field contents in the preset statistical period exceed the corresponding threshold; when the respective occurrences of at least two kinds of field contents exceed the corresponding threshold, according to at least The cracking rules corresponding to the two statistical dimensions crack down on access requests.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method and device for processing requests and a storage medium. Background technique [0002] In the early stage of distributed denial of service (Distributed Denial of Service, DDoS) attacks, most of them can be protected by the industry-renowned "black hole" (Collapsar) anti-denial of service attack system, so hackers have developed a new type of attack against After the HyperText Transfer Protocol (HTTP) DDOS attack, it was named Challenge Collapsar, claiming that black hole devices could not be defended, and the name CC has been used to this day. CC attack is a kind of DDOS attack, which occurs at the application layer of the seventh layer. What is different from DDOS at the network layer is that the Transmission Control Protocol (Transmission Control Protocol, TCP) connection has been established, and the attacking Internet Protocol (Internet Protocol, IP) is the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1458
Inventor 洪旭升胡珀郑兴陈剑牛保龙刘志颖李相垚易楠
Owner TENCENT TECH (SHENZHEN) CO LTD