A defense and network security device against distributed attacks based on big data

A network security and distributed technology, which is applied in the field of defense and network security devices, can solve the problems of effective defense and counter attack, and achieve the effect of preventing DDoS attacks

Active Publication Date: 2021-09-24
法诺信息产业有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the problem that the host computer under the same IP address can only adopt the defense against DDoS attack alone, and cannot make effective defense and counterattack to the attack in time under the attack of widely distributed DDoS like this, the present invention provides a method based on Big data defense against distributed attacks and network security devices

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A defense and network security device against distributed attacks based on big data
  • A defense and network security device against distributed attacks based on big data

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0023] The reference picture is Figure 1-2 . A defense and network security device against distributed attacks based on big data, used for defense against distributed attacks on the Internet, including network communication base station 1, network switch 2, Ethernet adapter 3, cloud processor 4, cloud Database 5, Ethernet interface 6, wireless extender 7, described network communication base station 1, Ethernet interface 6 and wireless extender 7 are included in physical layer 8, described network switch 2, Ethernet adapter 3, cloud processor 4 and the cloud database 5 are included in the data link layer 9, the Ethernet interface is used to connect the wired network of the computer equipment 10, and the wireless extender 7 is used to search for mobile equipment 11 in the area in a wireless transmission mode, The mobile device 11 accesses the network communication base station 1 at the same time, and the cloud processor 4 searches for the mobile devices 11 in the area obtaine...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a large data-based defense against distributed attacks and a network security device, including a network communication base station, a network switch, an Ethernet adapter, a cloud processor, a cloud database, an Ethernet interface, a wireless extender, and a network communication The base station, Ethernet interface, and wireless extender are included in the physical layer, and the network switch, Ethernet adapter, cloud processor, and cloud database are included in the data link layer. Devices and mobile devices signal IP in the network communication base station to search the processing history of the mobile device in the cloud database. The Ethernet adapter assigns any field to the distributed attack on the computer according to the processing history of the mobile device. The network switch converts the Ethernet The field assigned by the adapter is converted into the network signal received by the mobile device and transmitted to the mobile device, and the mobile device processes this part of the attack signal.

Description

technical field [0001] The invention relates to the field of network security, in particular to a big data-based defense against distributed attacks and a network security device. Background technique [0002] With the rapid development and in-depth application of computer science and technology, changes in cyberspace are constantly changing and affecting people's way of life. As people rely more and more on the Internet, many confidential information about enterprises, individuals, and even countries are involved on the Internet, so the issue of network security has always been an important topic in the process of technological development. Among the many network attack methods existing on the Internet at present, Distributed Denial of Service Attack (Distributed Denial of Service Attack, DDoS for short) is the most common and highly destructive attack method. Most distributed denial-of-service attacks come from botnets, which cooperate with each other to launch denial-of-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/02H04L63/1416H04L63/1458H04L2463/146
Inventor 汤智林徐建红
Owner 法诺信息产业有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products