Unlock instant, AI-driven research and patent intelligence for your innovation.

Distributed denial of service attack protection method and related device

A technology of distributed denial and protection equipment, applied in the field of network security, can solve problems such as inability to play a protective role, and achieve the effect of various protective functions

Active Publication Date: 2020-05-19
TENCENT TECH (SHENZHEN) CO LTD
View PDF9 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the various functions of the existing ADS system are relatively independent, and cannot effectively protect against complex and changeable attack methods and various business scenarios on the live network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Distributed denial of service attack protection method and related device
  • Distributed denial of service attack protection method and related device
  • Distributed denial of service attack protection method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The embodiment of the present application provides a protection method and related devices for distributed denial-of-service attacks, which are used to protect against DDoS attacks through custom protection strategies in the face of complex and changeable attack methods and various business scenarios.

[0059] The terms "first", "second", "third", "fourth", etc. (if any) in the specification and claims of the present application and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein, for example, can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "corresponding to" and any variations thereof, are intended to cover a non-exclusive inclusion, for example, a process, meth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a distributed denial of service attack protection method and a related device, which are used for realizing DDoS attack protection through a user-defined protection strategy for complex and changeable attack techniques and various service scenes. The method comprises the steps that when an attack alarm is received, if a user-defined expression does not exist in a preset configuration file of protection equipment, the user-defined expression in a database is read, wherein a protection strategy is dynamically configured in the user-defined expression; the user-defined expression is sent to the protection equipment, so that the protection equipment saves the user-defined expression into the configuration file, wherein the user-defined expression is used for indicatingthe protection equipment to call a function module matching the protection strategy and clean the flow flowing to a target network address, and the matched function module comprises at least two function modules divided according to a preset rule in the protection equipment.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular to a method for protecting against distributed denial-of-service attacks and related devices. Background technique [0002] Distributed Denial of Service (DDoS) attack means that hackers use DDoS attackers to control multiple computers to attack simultaneously to achieve the purpose of "preventing normal users from using services". Generally, DDoS attacks can be divided into two categories: network layer attacks and application layer attacks. Network layer attacks are also called traffic-based attacks. At present, DDoS attacks have become one of the common high-harm security threats, and the main reasons for DDoS attacks are pranks, vicious competition, extortion, political factors and other reasons. DDoS attack is the most common way to affect the normal operation of the enterprise network. The biggest harm it brings is the loss of business due to unavailabl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1458H04L63/205H04L63/1416H04L67/30
Inventor 陈国罗喜军
Owner TENCENT TECH (SHENZHEN) CO LTD