Dynamic defense system and method for CC attacks

A dynamic defense and anti-attack technology, applied in the field of CC attack defense, can solve problems such as waste of server resources, reduce the security of whitelist establishment, network congestion, etc., and achieve the effect of detecting and defending against CC attacks and realizing real-time updates

Active Publication Date: 2020-09-01
浙江德迅网络安全技术有限公司
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The principle of CC attack is that the attacker controls some hosts to send a large number of data packets to the opponent's server continuously, causing the server resources to be exhausted until it crashes. CC is mainly used to consume server resources. Everyone has such an experience : When the number of people visiting a webpage is very large, it will be slow to open the webpage. CC is to simulate multiple users (as many threads as there are users) to continuously visit those pages that require a lot of data operations (that is, a lot of CPU time) , resulting in a waste of server resources, the CPU is at 100% for a long time, there will always be unfinished connections until the network is congested, and normal access is suspended. Although the existing dynamic defense system for CC attacks has been increasingly perfect, there are still some Insufficient to be improved
[0003] The existing technology has the following problems: once the existing CC attack dynamic defense system detects that the requested IP is not under attack, it classifies the requested IP into a white list series, which reduces the security of establishing the white list

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dynamic defense system and method for CC attacks
  • Dynamic defense system and method for CC attacks
  • Dynamic defense system and method for CC attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0027] see Figure 1-3 , the present invention provides the following technical solutions: a dynamic defense system for CC attacks, including a request receiving module 4, the output of the request receiving module 4 is connected to the request statistics module 3, and the output of the request statistics module 3 is connected to the adjustment threshold module 2 Connection, the output end of the adjustment threshold module 2 is connected with the detection mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a dynamic defense system for CC attacks, and belongs to the technical field of CC attack defense methods. The system comprises a request receiving module, wherein the output end of the request receiving module is connected with a request statistics module. According to the invention, a white list is divided into a first-level white list module, a second-level white list module and a third-level white list module. IP detection in the first-level white list module is that the number of non-attack times is greater than 1 and less than 3; IP detection in the second-level white list module is that the number of non-attack times is greater than 3 and less than 5; IP detection in the third-level white list module is that the non-attack frequency is greater than 5 times; only the request IP is in the three-level white list module; and when the request IP requests again, the request can be directly judged to be non-aggressive, the request is normally processed and the response is sent without detection of a detection module, so the establishment of the white list is safer, and the CC attack can be better resisted while the detection intensity of the detection moduleis reduced.

Description

technical field [0001] The invention belongs to the technical field of CC attack defense methods, and in particular relates to a CC attack dynamic defense system and a method thereof. Background technique [0002] The principle of CC attack is that the attacker controls some hosts to send a large number of data packets to the opponent's server continuously, causing the server resources to be exhausted until it crashes. CC is mainly used to consume server resources. Everyone has such an experience : When the number of people visiting a webpage is very large, it will be slow to open the webpage. CC is to simulate multiple users (as many threads as there are users) to continuously visit those pages that require a lot of data operations (that is, a lot of CPU time) , resulting in a waste of server resources, the CPU is at 100% for a long time, there will always be unfinished connections until the network is congested, and normal access is suspended. Although the existing dynamic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1441H04L63/1416
Inventor 曹明选林勇
Owner 浙江德迅网络安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products