Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Malicious network CC attack prevention method and device

A network and malicious technology, applied in the field of network security, can solve the problems of difficult to resist attacks and high costs

Inactive Publication Date: 2019-11-01
广东分利宝金服科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because it is characterized by access through a large number of different IPs, it is difficult for traditional system firewalls to resist such attacks.
It is necessary to purchase commercial protection services at a high price to resist this kind of CC attack, and the cost is relatively high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious network CC attack prevention method and device
  • Malicious network CC attack prevention method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0025] In the embodiment of the method and device for preventing malicious network CC attacks of the present invention, the flow chart of the method for preventing malicious network CC attacks is as follows figure 1 shown. figure 1 Among them, the method for preventing the malicious network CC attack includes the following steps:

[0026] Step S01 Use shell commands to monitor and analyze NGINX log files within a past set time: In this step, use shell command...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious network CC attack prevention method and device. The method comprises the following steps: A) monitoring and analyzing an NGINX log file in past set time by using ashell command; B) checking whether the access frequency of a certain IP to an address of a certain interface exceeds a threshold value or not in the NGINX log file in the past set time by using a textprocessing and arrangement command, and if so, executing the step D); otherwise, executing the step C); C) not realizing access limit, returning to the step B); D) writing an inbound rule into the firewall by using the shell command, and performing DROP operation on the inbound data packet of the specified IP; E) waiting for a set time, and returning to the step A. The method can solve the problem that a traditional firewall is difficult to resist CC attacks, can also avoid the tedious operation of manually and repeatedly adding rules, can transparently present a working principle of a completely self-compiled script, can also be customized at will according to needs, and does not need to buy commercial protection services at a high price at the same time.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method and device for preventing malicious network CC attacks. Background technique [0002] CC attack is to use different IPs to frequently initiate requests to the API interface through one or more request addresses, and realize the camouflage of DDos by sending a large number of legitimate requests to achieve the purpose of paralyzing the back-end server. Because it is characterized by access through a large number of different IPs, it is difficult for traditional system firewalls to resist such attacks. It is necessary to purchase commercial protection services at a high price to resist such CC attacks, and the cost is relatively high. Contents of the invention [0003] The technical problem to be solved by the present invention is that, aiming at the above-mentioned defects of the prior art, it provides a short board that can solve the shortcomings of traditional firewal...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/26
CPCH04L43/16H04L63/10H04L63/1425H04L63/1458
Inventor 黄子霖覃智
Owner 广东分利宝金服科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products