Unlock instant, AI-driven research and patent intelligence for your innovation.

Dos attack testing method, device and electronic equipment based on multi-directional monitoring

An attack test and multi-faceted technology, applied in the field of network security, can solve problems such as network crashes, servers unable to provide normal services, and resource exhaustion

Active Publication Date: 2021-10-08
GUANGTONGTIANXIA NETWORK TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

By establishing a large number of such connections, the server cannot provide normal services, causing network crashes or resource exhaustion.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dos attack testing method, device and electronic equipment based on multi-directional monitoring
  • Dos attack testing method, device and electronic equipment based on multi-directional monitoring
  • Dos attack testing method, device and electronic equipment based on multi-directional monitoring

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] In a DoS attack, due to the large network traffic generated during the attack, it may cause port blocking, resource consumption, and failure to provide normal services on the attacked server. The DoS attack testing method based on multi-directional monitoring provided by the present invention adopts another server in the public network to simulate a normal user to perform regular detection (heartbeat detection) on the attacked server, thereby avoiding the use of the attacking server as the monitoring server due to traffic If it is too large, the detection data will have large deviation and inaccuracy.

[0083] The regular monitoring of the attacked server is divided into two parts: external network detection and internal resource detection. External network detection uses the TCP layer and the HTTP layer to detect the network of the attacked server from the outside. Internal resource detection detects the occupancy of resources such as the CPU and memory hardware of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a DoS attack testing method, device and electronic equipment based on multi-directional monitoring, wherein the method includes: setting server A as the master server, server A is also a detection server, server B is an attack server, and the server C is the attacked server; the main control server A monitors the attacked server C in real time; server A controls server B to conduct a DoS attack test to server C, and calculates the DoS attack test result. The present invention uses another server in the public network to simulate a normal user to perform regular detection (heartbeat detection) on the attacked server, avoiding the large deviation of detection data caused by excessive traffic when using the attacking server as the monitoring server Accuracy and other shortcomings.

Description

technical field [0001] The invention relates to the field of network security, in particular to a DoS attack testing method, device and electronic equipment based on multi-directional monitoring. Background technique [0002] DoS attack test is usually used to test the tolerance of business or server to DoS attack. For the structure of the DoS attack test, the method of separating the attacking server and the monitoring server should be adopted, and the CPU and memory occupancy rate inside the TCP layer of the network, the HTTP layer, and the attacked server, as well as the network inflow and outflow traffic of the attacked server should be analyzed respectively. The attacked server is monitored in multiple directions. Among them, the DoS attack test method covers most common DoS attack methods. [0003] The monitoring methods used in the existing DoS attack tests are usually relatively rough and simple. It is difficult to accurately describe the resources consumed by the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1416H04L63/1458
Inventor 徐文强
Owner GUANGTONGTIANXIA NETWORK TECH CO LTD