DDOS mass flow defense architecture

A large flow, protection platform technology, applied in the direction of electrical components, transmission systems, etc., can solve the problems of expensive, unsuitable for small and medium-sized enterprises, poor versatility, etc., to achieve the effect of ensuring the security of the source station and low cost

Inactive Publication Date: 2020-02-04
上海来三网络科技有限公司
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Aiming at the deficiencies of the prior art, the present invention provides a DDOS large-traffic defense framework, which solves the problems that the DDOS

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DDOS mass flow defense architecture

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0022] A kind of DDOS large flow defense framework of the present embodiment, protection platform comprises main server, miniature server and hidden server, and several miniature servers set up connection pool, by load balancing the IP and port that are connected with main server are mapped to each miniature server Hide the IP and port of the server, monitor the abnormality of the connection pool in real time, and quickly switch to the new IP and port when an abnormal IP is detected.

[0023] The number of individual IP and port access connections can be quantitatively controlled. When a certain number is reached, switch to a new IP, which can ensure that after an IP is attacked, only the current IP link will be affected, and other connections will still operate normally. .

[0024] When an abnormal IP is found, the abnormal connection will be quickly switched to a new IP and port, and the abnormal connection will be recorded; a batch of new IPs will be reassigned to the abnor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network safety protection, and provides a router. The invention discloses a DDOS large-flow defense architecture. The protection platform comprises a main server, a micro server and a hidden server. The method comprises the following steps: establishing a connection pool by a plurality of micro servers, mapping IPs and ports connected with a main server to IPs and ports of hidden servers on the micro servers through load balancing, carrying out real-time anomaly monitoring on the connection pool, and quickly switching to new IPs and ports when anabnormal IP is monitored; the DDOS defense system solves the problems that a DDOS defense system in the prior art is poor in universality, high in price and not suitable for small and medium-sized enterprise applications, and cannot locate an attack source.

Description

technical field [0001] The invention relates to the technical field of network security protection, in particular to a DDOS large flow defense framework. Background technique [0002] DDOS attacks occupy a large amount of network resources through a large number of legal requests, so as to achieve the purpose of paralyzing the network. The relatively mature DDOS defenses on the market are Alibaba Cloud's Anti-DDoS High IP and Cloud Shield Anti-DDoS High IP, which target Internet servers (including non-Aliyun hosts) that suffer from heavy traffic and cause service unavailability after DDoS attacks Under certain circumstances, the paid value-added service launched by the user can divert the attack traffic to the high-defense IP by configuring the high-defense IP to ensure the stability and reliability of the source site. [0003] The DDOS defense system of the existing technology supports 8-line exclusive defense of Telecom, China Unicom, China Mobile, Education Network, etc....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1458
Inventor 刘波
Owner 上海来三网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products