Anti-attack method, device and equipment and machine readable storage medium

A storage medium and anti-attack technology, applied in the field of communication, can solve problems such as abnormal offline of normal users, and achieve the effect of reducing the possibility

Active Publication Date: 2020-09-04
NEW H3C SECURITY TECH CO LTD
View PDF11 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] In view of this, the present disclosure provides an attack prevention method, device, electronic equipment, and machine-readable storage medium, so as to improve the abnormality of normal users caused by the above-mentioned release message attack offline problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-attack method, device and equipment and machine readable storage medium
  • Anti-attack method, device and equipment and machine readable storage medium
  • Anti-attack method, device and equipment and machine readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The terminology used in the embodiments of the present disclosure is only for the purpose of describing a specific embodiment, rather than limiting the present disclosure. As used in this disclosure and the claims, the singular forms "a", "the" and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.

[0029] It should be understood that although terms such as first, second, and third may be used in the embodiments of the present disclosure to describe various information, such information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the present disclosure, first information may also be called second information, and similarly,...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an anti-attack method, device and equipment, and a machine readable storage medium. The method comprises the steps of receiving a release message; monitoring the IPOE user tableentry as a corresponding IPOE user table entry according to the information carried by the release message; and if the service message corresponding to the IPOE user table entry is received within the preset time, discarding the release message. Through the technical scheme, after a release message is received, a hit IPOE user table entry is monitored, and if the normal service message corresponding to the IPOE user table entry can still be received within a certain time, the received release message is considered to be an attack behavior, and the release message is discarded and offline processing is not performed on the corresponding IPOE user, so that the possibility of abnormal offline of the normal user caused by the attack of the release message is reduced.

Description

technical field [0001] The present disclosure relates to the technical field of communications, and in particular, to an attack defense method, device, equipment, and machine-readable storage medium. Background technique [0002] DHCP (Dynamic Host Configuration Protocol, Dynamic Host Configuration Protocol) is a LAN network protocol, which refers to a segment of lP (Internet Protocol, Internet Protocol) address range controlled by the server. When the client logs in to the server, it can automatically obtain the server allocation. lP address and subnet mask. [0003] BRAS (Broadband Remote Access Server, Broadband Access Server) is a new type of access gateway for broadband network applications. It is located at the edge layer of the backbone network and can complete IP / ATM (Asynchronous Transfer Mode, Asynchronous Transfer Mode) network data transfer of user bandwidth. Access to achieve broadband Internet access for terminals, IP VPN (Virtual Private Network, virtual priv...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12H04L12/46H04L12/28
CPCH04L63/0892H04L63/083H04L63/1441H04L12/4633H04L12/287H04L61/5014
Inventor 王阳廖以顺
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products