Active defense method and device for data flow attacks

A technology of active defense and data flow, applied in the direction of electrical components, transmission systems, etc., can solve problems affecting the network speed of computer equipment, irreparable losses, disadvantages, etc.

Active Publication Date: 2020-06-26
上海飞旗网络技术股份有限公司
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Network attacks will expose computer equipment to an unsafe environment, which is quite detrimental to the normal operation of computer equipment and important data information stored in computer equipment
As a type of attack in network attacks, data flow attacks will greatly affect the network speed of the network wher...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active defense method and device for data flow attacks
  • Active defense method and device for data flow attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0066] Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. Although exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited by the embodiments set forth herein. Rather, these embodiments are provided for more thorough understanding of the present disclosure and to fully convey the scope of the present disclosure to those skilled in the art.

[0067] In order to better understand the above technical solutions, the technical solutions of the present invention will be described in detail below through the accompanying drawings and specific examples. It should be understood that the embodiments of the present invention and the specific features in the examples are detailed descriptions of the technical solutions of the present invention, and It is not a limitation to the tec...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an active defense method and device for data flow attacks. The method includes: correspondingly storing the obtained data stream and the coding characteristic value of the network protocol code corresponding to the data stream into a preset data stream list; determining a flow curve of the data flow in a preset coordinate plane according to the flow of the data flow in eachlist area of the data flow list and the coding characteristic value of the protocol code corresponding to the network protocol; determining the similarity between the preset characteristic and the curve characteristic of the extracted flow curve in the list area. When it is determined that the computer equipment corresponding to the curve characteristics has the data flow attack behavior accordingto the similarity, communication between the computer equipment and the target network can be actively cut off before the computer equipment starts the data flow attack behavior, and active defense of data flow attacks is achieved.

Description

technical field [0001] The invention relates to the technical field of big data data flow detection, in particular to an active defense method and device for data flow attacks. Background technique [0002] With the development of big data and communication networks, computer equipment is facing various cyber attacks. Cyber ​​attacks (Cyber ​​Attacks, CA) refer to offensive actions against information systems, network systems or infrastructure systems of computer equipment. Network attacks will expose computer equipment to an unsafe environment, which is quite detrimental to the normal operation of computer equipment and important data information stored in computer equipment. As a type of attack in network attacks, data flow attack will greatly affect the network speed of the network where the computer equipment is located. Generally speaking, defenses against data flow attacks will be activated when there are abnormal and irregular delays in the network speed. However, e...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1466
Inventor 杨贻宏
Owner 上海飞旗网络技术股份有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products