Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A malicious identification defense method and system based on handle system

An identification and malicious technology, applied in the field of malicious identification defense, can solve problems such as unable to respond to user requests normally, achieve the effect of defending against malicious identification attacks and improving the quality of analysis services

Active Publication Date: 2022-05-03
PURPLE MOUNTAIN LAB
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] In order to overcome the above problems, the present invention proposes a malicious identification defense method based on the Handle system, which aims to improve the problem that the existing Handle system of recursive nodes cannot normally respond to user requests under the condition of large-scale distributed denial of service attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A malicious identification defense method and system based on handle system
  • A malicious identification defense method and system based on handle system
  • A malicious identification defense method and system based on handle system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] The invention proposes a malicious identification defense method based on the Handle system, which aims at improving the problem that the recursive node cannot normally respond to user requests under the condition that the existing Handle system is facing a denial of service attack by large-scale sub-deployment.

[0030] image 3 Add the schematic diagram of the identification defense system for the embodiment of the present invention, add the identification defense system on the basis of the original Handle system module, and all the identification analysis requests initiated by the original users (including normal users and malicious attack users) first need to go through the identification defense system, and the identification defense system Through modules such as logo extraction, logo detection, and logo cleaning, the system directly discards or limits the speed of malicious attack logo requests, and sends normal user request message queries to the Handle system, w...

Embodiment 2

[0089]The above defense method adds an identification defense system at the entrance of the native Handle system to identify and filter malicious access identifications in advance, so that the recursive node server can respond to normal user requests and improve the resolution quality.

[0090] This embodiment provides the overall architecture of the logo defense system, which includes: a logo extraction module, a logo detection module, a logo cleaning module, and a logo sample library module.

[0091] The identification extraction is used to extract the source IP address, destination IP address, source port number, destination port number, and handle query identification prefix encoding of the IP segment, transmission segment, and identification field respectively from the request message of the ingress query. The extracted key information is stored and passed to the identification detection module and the identification cleaning module respectively;

[0092] The identificati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a malicious identification defense method and system based on the Handle system, which aims to improve the problem that the existing Handle native system of a recursive node cannot normally respond to user requests under the condition of large-scale sub-deployment denial of service attacks. By adding an identification defense system at the entrance of the native Handle system, the malicious access identification can be identified in advance, so as to prevent malicious identification attacks, respond to user requests normally, and improve the quality of analysis services.

Description

technical field [0001] The invention relates to a malicious identification defense method and system based on a Handle system, and relates to the technical field of communication. Background technique [0002] The Handle identification analysis system was invented by Dr. Robert Kahn, the co-inventor of TCP / IP and known as the "father of the Internet", and the core system was developed by the National Institute of Innovation (CNRI). A logo can be understood as a name mark used to identify different items, entities, and IoT objects, and it can be a string composed of numbers, letters, symbols, text, etc. with certain rules. The essence of identification is the technology used to identify objects (including physical objects, virtual digital objects, etc.), so that various information processing systems, resource management systems, and network management systems can manage and control target objects. [0003] The Handle system has a distributed two-tier service structure, such...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0236H04L63/1416H04L63/1458
Inventor 霍如彭开来曾诗钦王晓康黄韬谢人超汪硕
Owner PURPLE MOUNTAIN LAB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products