Attack defense method and attack defense equipment
A technology of attack defense system and protection equipment, which is applied in the field of attack defense methods and an attack defense equipment, and can solve problems such as unsatisfactory
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
example 1
[0117] The scheduling device maintains two guard address sets, namely the first guard address set and the second guard address set. The protection IP addresses in the first protection address set are protection IP addresses used to generate the protection address sequence. The protection IP addresses in the second protection address set do not participate in generating the protection address sequence by means of arrangement, but are used to replace the attacked protection IP address in the protection address sequence when an attack occurs. The protection IP addresses in the first protection address set and the second protection address set are all IP addresses provided by the protection device and accessible by the terminal device.
[0118] The first protection address set includes three protection IP addresses, IP 1, IP 2, and IP 3 respectively. The second protection address set includes a protection IP address, which is IP4.
[0119] According to the first protection addre...
example 2
[0150] An attacker may attack multiple protected IP addresses at the same time. In order to deal with this situation, the same number of protected IP addresses can be set in the first protected address set and the second protected address set, that is, each IP address in the first protected address set The protection IP address sets the backup address. Similar to Example 1, the protection IP addresses in the first protection address set are protection IP addresses used to generate the protection address sequence. The protection IP addresses in the second protection address set do not participate in generating the protection address sequence by means of arrangement, but are used to replace the attacked protection IP address in the protection address sequence when an attack occurs. The protection IP addresses in the first protection address set and the second protection address set are all IP addresses provided by the protection device and accessible by the terminal device.
[...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


