Unlock instant, AI-driven research and patent intelligence for your innovation.

Attack defense method and attack defense equipment

A technology of attack defense system and protection equipment, which is applied in the field of attack defense methods and an attack defense equipment, and can solve problems such as unsatisfactory

Active Publication Date: 2020-07-07
HUAWEI TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method obviously cannot meet the needs of some websites whose services mainly rely on user interaction, such as shopping websites or game websites.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack defense method and attack defense equipment
  • Attack defense method and attack defense equipment
  • Attack defense method and attack defense equipment

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0117] The scheduling device maintains two guard address sets, namely the first guard address set and the second guard address set. The protection IP addresses in the first protection address set are protection IP addresses used to generate the protection address sequence. The protection IP addresses in the second protection address set do not participate in generating the protection address sequence by means of arrangement, but are used to replace the attacked protection IP address in the protection address sequence when an attack occurs. The protection IP addresses in the first protection address set and the second protection address set are all IP addresses provided by the protection device and accessible by the terminal device.

[0118] The first protection address set includes three protection IP addresses, IP 1, IP 2, and IP 3 respectively. The second protection address set includes a protection IP address, which is IP4.

[0119] According to the first protection addre...

example 2

[0150] An attacker may attack multiple protected IP addresses at the same time. In order to deal with this situation, the same number of protected IP addresses can be set in the first protected address set and the second protected address set, that is, each IP address in the first protected address set The protection IP address sets the backup address. Similar to Example 1, the protection IP addresses in the first protection address set are protection IP addresses used to generate the protection address sequence. The protection IP addresses in the second protection address set do not participate in generating the protection address sequence by means of arrangement, but are used to replace the attacked protection IP address in the protection address sequence when an attack occurs. The protection IP addresses in the first protection address set and the second protection address set are all IP addresses provided by the protection device and accessible by the terminal device.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an attack defense method and attack defense equipment, which are applied to an attack defense system. The attack defense system comprises scheduling equipment and at least oneprotection equipment, the protection equipment provides a plurality of protection IP addresses, and the terminal equipment accesses the website server through the protection IP addresses. And the scheduling equipment receives a protection address obtaining request from the first terminal equipment, obtains a corresponding first protection address sequence according to the identifier of the first terminal equipment, obtains a first unused protection IP address from the first protection address sequence, and returns the obtained protection IP address to the first terminal equipment. The scheduling equipment acquires the attacked protection IP addresses, and judges whether the protection IP addresses used in the first protection address sequence are attacked in sequence or not; and if the first terminal equipment is attacked, the scheduling equipment obtains an identifier of the first terminal equipment corresponding to the first protection address sequence, and determes the first terminal equipment as an attack source.

Description

technical field [0001] The present application relates to the field of computer and communication technologies, and in particular to an attack defense method and an attack defense device. Background technique [0002] Denial of service (DoS) attack is a means of network attack. The purpose of denial of service attack is to exhaust the network resources or system resources of the target computer, temporarily interrupt or stop the service provided by the target computer, and cause normal users to be unable to Access the target computer. When an attacker (also known as a hacker) uses two or more controlled computers on the network as the attack initiator to launch a DoS attack on the target computer, this attack method is called a distributed denial-of-service attack (distributed denial-of-service attack). -service attack, DDoS). [0003] In recent years, an attack called challenge collapsar (CC) has emerged. A CC attack is essentially a DDoS attack, and its characteristic i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1458
Inventor 席康杰
Owner HUAWEI TECH CO LTD