Business flow processing method, business flow learning method, device and system

A business traffic and server technology, which is applied in the fields of business traffic learning and business traffic processing, and can solve problems such as failure of normal business and manslaughter of normal traffic.

Active Publication Date: 2020-04-17
TENCENT TECH (SHENZHEN) CO LTD
View PDF13 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, if the protected server has business traffic using unused protocols, the speed limit will obviously cause accidental killing of normal traffic
This is because the rate limit can only drop packets indiscr

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Business flow processing method, business flow learning method, device and system
  • Business flow processing method, business flow learning method, device and system
  • Business flow processing method, business flow learning method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0098] The embodiment of the present application provides a service flow processing method, a service flow learning method, a device, and a system, which are capable of real-time identification of protocol flood attack traffic, and only analyze service flow under unavailable protocol numbers. The business traffic that meets the abnormal traffic processing conditions is efficiently intercepted, and the business traffic under the available protocol number is released to prevent normal business from being killed by mistake.

[0099] The terms "first", "second", "third", "fourth", etc. (if any) in the specification and claims of the present application and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein, for example, can be practiced in sequenc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a business flow processing method and a business flow learning method, device and system, which can be applied to the field of data security in data transmission, can efficiently intercept the business flow meeting the abnormal flow processing condition, and release the business flow under the available protocol number to prevent a normal business from being mistakenly killed. The method provided by the invention comprises the steps of preparing a template; when a target internet protocol IP address of the server is attacked, obtaining a protocol number baseline of theserver and the target protocol number corresponding to the attacked target IP address; if the target protocol number is inconsistent with the available protocol number in the protocol number base line, obtaining load characteristic statistical results of P data packets according to the business traffic corresponding to the target protocol number; and if the load characteristic statistical resultsmeet an abnormal flow processing condition, determining Q data packets from the P data packets, and intercepting the Q data packets.

Description

technical field [0001] The present application relates to the field of network security, in particular to a method for processing service flow, a method, a device and a system for learning service flow. Background technique [0002] In the fields of medical care, finance, credit information, banking, government affairs, games, and education, business services are often provided to users through servers, and attack technologies against servers have also developed. Among them, the distributed denial of service (Distributed Denial of Service, DDoS) attack refers to that hackers send a large amount of abnormal traffic to the server by controlling multiple machines distributed in various places, so that the server is busy processing abnormal traffic, resulting in the server being unable to process normal user requests. With the continuous development of attack technology, a new attack method has emerged, that is, protocol flood attack. The attacker controls the bot to forge the s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 陈国彭晨晨
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products