A method, device, electronic equipment and storage medium for mitigating ddos attacks
A technology for attacking equipment and electronic equipment, applied in the field of network security, which can solve the problem of low accuracy in mitigating DDoS attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0055] figure 2 It is a flowchart of a method for mitigating distributed denial of service attacks provided by an embodiment of the present invention, and the method includes:
[0056] S201: Obtain attribute information of the attacked device according to the received mitigation request sent by the attacked device, where the attribute information includes an IP address and a first protocol of the attacked device.
[0057] The embodiment of the present invention mitigates the DDoS attack on the basis of the DOTS framework. Specifically, the method for mitigating the DDoS attack provided by the embodiment of the present invention is applied to a DOTS server.
[0058] Based on the DOTS framework, the attacked device detects a DDoS attack and informs the DOTS Client of the attack details. The DOTS Client sends a mitigation request to the DOTS Server. After receiving the mitigation request, the DOTS Server needs to Obtain the attribute information of the attacked device. Specifi...
Embodiment 2
[0071] On the basis of the foregoing embodiments, in order to further alleviate the DDoS attack, the described protocol and IP address range for cleaning according to the preserved cleaning device, and judging whether there is a target cleaning device capable of cleaning the attacked device includes:
[0072] According to the saved IP address range that can be cleaned by each mitigation provider, determine whether there is a target IP address range that matches the IP address of the attacked device, and if so, provide the mitigation corresponding to the matched target IP address range vendors as targeted mitigation providers;
[0073] According to the cleaning protocol of each cleaning device provided by the target mitigation provider, it is judged whether there is a second protocol matching the first protocol of the attacked device.
[0074] In order to further mitigate DDoS attacks, different mitigation providers can mitigate different IP address ranges of attacked devices i...
Embodiment 3
[0080] In order to mitigate DDoS attacks more accurately, on the basis of the above-mentioned embodiments, the attribute information further includes information about the used bandwidth of the attacked device;
[0081] After the determination that there is a target cleaning device capable of cleaning the attacked device, before sending the information of the attacked device to the target cleaning device, the method further includes:
[0082] According to the used bandwidth information of the attacked device, determine whether there is a first target cleaning device capable of completely cleaning the attacked device;
[0083] If it exists, go to the next step;
[0084] If it does not exist, select the second target cleaning device with the largest cleaning capacity, and perform subsequent steps.
[0085]Since the cleaning capabilities of different cleaning devices are different, in order to completely clean the attacked device, in the embodiment of the present invention, it i...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


