A method and related device for protecting against distributed denial-of-service attacks

A technology of distributed rejection and protection equipment, applied in the field of network security, can solve problems such as inability to play a protective role, and achieve the effect of various protection functions

Active Publication Date: 2021-10-08
TENCENT TECH (SHENZHEN) CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the various functions of the existing ADS system are relatively independent, and cannot effectively protect against complex and changeable attack methods and various business scenarios on the live network.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and related device for protecting against distributed denial-of-service attacks
  • A method and related device for protecting against distributed denial-of-service attacks
  • A method and related device for protecting against distributed denial-of-service attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The embodiment of the present application provides a protection method and related devices for distributed denial-of-service attacks, which are used to protect against DDoS attacks through custom protection strategies in the face of complex and changeable attack methods and various business scenarios.

[0059] The terms "first", "second", "third", "fourth", etc. (if any) in the specification and claims of the present application and the above drawings are used to distinguish similar objects, and not necessarily Used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein, for example, can be practiced in sequences other than those illustrated or described herein. Furthermore, the terms "comprising" and "corresponding to" and any variations thereof, are intended to cover a non-exclusive inclusion, for example, a process, meth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application discloses a protection method and related devices for distributed denial-of-service attacks, which are used to realize protection against DDoS attacks through self-defined protection strategies in the face of complex and changeable attack methods and various business scenarios. The application method includes: when an attack alarm is received, if the custom expression does not exist in the configuration file preset by the protection device, then read the custom expression in the database, and the custom expression is dynamically configured with a protection strategy; The protection device sends a custom expression to make the protection device store the custom expression in the configuration file. The custom expression is used to instruct the protection device to call the function module that matches the protection policy to clean the traffic flowing to the target network address. The matching functional modules include at least two functional modules divided according to preset rules in the protective device.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular to a method for protecting against distributed denial-of-service attacks and related devices. Background technique [0002] Distributed Denial of Service (DDoS) attack means that hackers use DDoS attackers to control multiple computers to attack simultaneously to achieve the purpose of "preventing normal users from using services". Generally, DDoS attacks can be divided into two categories: network layer attacks and application layer attacks. Network layer attacks are also called traffic-based attacks. At present, DDoS attacks have become one of the common high-harm security threats, and the main reasons for DDoS attacks are pranks, vicious competition, extortion, political factors and other reasons. DDoS attack is the most common way to affect the normal operation of the enterprise network. The biggest harm it brings is the loss of business due to unavailabl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1416H04L63/1458H04L63/205H04L67/30
Inventor 陈国罗喜军
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products