Malicious identifier defense method and system based on Handle system

An identification and malicious technology, applied in the field of malicious identification defense, can solve problems such as failure to respond to user requests normally

Active Publication Date: 2020-05-26
PURPLE MOUNTAIN LAB
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In order to overcome the above problems, the present invention proposes a malicious identification defense method based on the Handle system, which aims to improve th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Malicious identifier defense method and system based on Handle system
  • Malicious identifier defense method and system based on Handle system
  • Malicious identifier defense method and system based on Handle system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] The invention proposes a malicious identification defense method based on the Handle system, which aims at improving the problem that the recursive node cannot normally respond to user requests under the condition that the existing Handle system is facing a denial of service attack by large-scale sub-deployment.

[0030] image 3 Add the schematic diagram of the identification defense system for the embodiment of the present invention, add the identification defense system on the basis of the original Handle system module, and all the identification analysis requests initiated by the original users (including normal users and malicious attack users) first need to go through the identification defense system, and the identification defense system Through modules such as logo extraction, logo detection, and logo cleaning, the system directly discards or limits the speed of malicious attack logo requests, and sends normal user request message queries to the Handle system, w...

Embodiment 2

[0089]The above defense method adds an identification defense system at the entrance of the native Handle system to identify and filter malicious access identifications in advance, so that the recursive node server can respond to normal user requests and improve the resolution quality.

[0090] This embodiment provides the overall architecture of the logo defense system, which includes: a logo extraction module, a logo detection module, a logo cleaning module, and a logo sample library module.

[0091] The identification extraction is used to extract the source IP address, destination IP address, source port number, destination port number, and handle query identification prefix encoding of the IP segment, transmission segment, and identification field respectively from the request message of the ingress query. The extracted key information is stored and passed to the identification detection module and the identification cleaning module respectively;

[0092] The identificati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a malicious identifier defense method and system based on a Handle system, and aims at solving the problem that an existing Handle native system of a recursive node cannot normally respond to a user request under the condition of facing a large-scale sub-deployment denial of service attack. The identifier defense system is added at the entrance of the native Handle system,and malicious access identifiers are identified in advance, so that the aims of defending malicious identifier attacks, normally responding to a request of a user and improving the analysis service quality are fulfilled.

Description

technical field [0001] The invention relates to a malicious identification defense method and system based on a Handle system, and relates to the technical field of communication. Background technique [0002] The Handle identification analysis system was invented by Dr. Robert Kahn, the co-inventor of TCP / IP and known as the "father of the Internet", and the core system was developed by the National Institute of Innovation (CNRI). A logo can be understood as a name mark used to identify different items, entities, and IoT objects, and it can be a string composed of numbers, letters, symbols, text, etc. with certain rules. The essence of identification is the technology used to identify objects (including physical objects, virtual digital objects, etc.), so that various information processing systems, resource management systems, and network management systems can manage and control target objects. [0003] The Handle system has a distributed two-tier service structure, such...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/1416H04L63/1458
Inventor 霍如彭开来曾诗钦王晓康黄韬谢人超汪硕
Owner PURPLE MOUNTAIN LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products