Attack data cleaning method, device, apparatus, storage medium and system

A technology for attacking data and equipment, which is applied in the field of computer networks, can solve problems affecting network transmission speed and achieve the effect of guaranteeing transmission speed

Inactive Publication Date: 2020-02-14
北京首都在线科技股份有限公司
View PDF7 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, in order to deal with DDoS attacks, cleaning devices such as firewalls can be used to clean the attack data in the network data stream, but cleaning the network data stream will affect the network transmission speed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack data cleaning method, device, apparatus, storage medium and system
  • Attack data cleaning method, device, apparatus, storage medium and system
  • Attack data cleaning method, device, apparatus, storage medium and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0052] As an exemplary implementation, such as figure 2 As shown, the attack data cleaning method provided in the embodiment of the present application, after detecting whether there is attack data in the network data stream, further includes:

[0053] Step S201. In the case that there is no attack data in the network data stream, send the network data stream to the routing device.

[0054] In an exemplary embodiment, if there is no attack data in the network data stream, the network data stream can be directly sent to the routing device, and the transmission speed of normal data will not be affected by cleaning the attack data.

[0055] The attack data cleaning method provided in the embodiment of the present application can be applied to a detection device. The detection device can detect whether there is attack data to determine whether to convert the destination address of the network data flow before sending the network data flow to the routing device. The normal netwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an attack data cleaning method, device and apparatus, a storage medium and a system. The method comprises the steps of detecting whether attack data exists in a network data flow or not; converting a destination address of the network data flow from a data receiving address into an address of a flow cleaning area under the condition that attack data exists in the network data flow; sending the network data flow after the destination address is converted to routing equipment; wherein the flow cleaning area is used for cleaning attack data in the network data flow, converting a destination address of the cleaned network data flow into a data receiving address, and sending the network data flow of which the destination address is the data receiving address to the routing equipment. According to the embodiment of the invention, the transmission speed of the normal network data flow can be ensured while the attack data is blocked.

Description

technical field [0001] The present application relates to a computer network technology, in particular to a method, device, equipment, storage medium and system for cleaning attack data. Background technique [0002] Denial of Service (DoS) attack is to use reasonable network request data to occupy too many network resources, so that legitimate users cannot get a response from the data receiving end. Distributed Denial of Service (DistributedDenial of Service, DDoS) attack combines multiple computers as an attack platform to launch an attack on one or more targets, thereby multiplying the power of DoS attacks. [0003] At present, in order to cope with DDoS attacks, cleaning devices such as firewalls can be used to clean the attack data in the network data flow, but cleaning the network data flow will affect the network transmission speed. Contents of the invention [0004] The embodiment of this application provides a method, device, device, storage medium and system for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/741H04L29/06H04L29/12H04L45/74
CPCH04L63/1425H04L63/1441H04L45/74H04L61/25H04L63/0236
Inventor 姚鹏飞
Owner 北京首都在线科技股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products