Network control method, device thereof and equipment and machine readable storage medium

A technology of network control and network equipment, which is applied in the field of communication, can solve the problems of simple and rude traffic speed limit, affecting normal player login and game, and unable to log in, so as to reduce the possibility of being mistakenly limited

Inactive Publication Date: 2020-07-31
NEW H3C SECURITY TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Application-layer attacks, typically such as the legendary dummy attack that is popular in China, use puppet machines to simulate the data flow of the legendary server, and can complete functions such as registration and login of the ordinary legendary game server, making the legendary game running on the server appear A large number of dummies affect the login and game of normal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network control method, device thereof and equipment and machine readable storage medium
  • Network control method, device thereof and equipment and machine readable storage medium
  • Network control method, device thereof and equipment and machine readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The terminology used in the embodiments of the present disclosure is only for the purpose of describing a specific embodiment, rather than limiting the present disclosure. As used in this disclosure and the claims, the singular forms "a", "the" and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.

[0026] It should be understood that although terms such as first, second, and third may be used in the embodiments of the present disclosure to describe various information, such information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the present disclosure, first information may also be called second information, and similarly,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network control method, a device thereof and equipment and a machine readable storage medium, and the method comprises the steps: analyzing a message, and recording a suspicious behavior and a corresponding source IP address if the suspicious behavior exists; calculating a corresponding suspicious value according to the corresponding suspicious behavior recorded by each source IP address; and performing network control on the corresponding source IP address according to the suspicious value. According to the technical scheme, the suspicious behaviors of the source IP addresses are analyzed, the suspicious values are obtained according to the suspicious behaviors, and the source IP addresses with high suspicious degree can be obtained according to the suspicious values, so that network control is carried out on the source IP addresses, and the possibility that normal users are mistakenly limited is reduced.

Description

technical field [0001] The present disclosure relates to the technical field of communications, and in particular, to a network control method, device, equipment, and machine-readable storage medium. Background technique [0002] DDoS (Distributed Denial of Service, Distributed Denial of Service), hackers use DDoS attackers to control multiple machines to attack simultaneously to achieve the purpose of "preventing normal users from using services", thus forming DDoS attacks. With the continuous development of the Internet With the development and fierce competition, all kinds of DDoS attackers began to appear. The common ones are as follows: [0003] Bandwidth consumption attacks, DDoS bandwidth consumption attacks are mainly direct flood attacks. The direct torrent attack adopts a simple and natural attack method, which takes advantage of the resource advantages of the attacker. When the attack flow sent by a large number of proxies converges on the target, it is enough t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/825H04L29/06
CPCH04L47/25H04L63/0236H04L63/1441
Inventor 李娜岳炳词
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products