Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Novel network attack processing method and device

A network attack and processing method technology, which is applied in the field of DDOS and CC attack protection products, new network attack processing methods and devices, can solve problems such as rough tactics, accidental damage, and inaccurate identification of CC attack defense, so as to achieve a good Internet experience and improve The effect of stability

Pending Publication Date: 2020-09-15
深圳市锐速云计算有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, attack requests for Internet applications are generally simulated by normal users to initiate requests. Existing firewall products generally identify whether the js request can be interpreted normally by adding parameters to the request url. If so, it can be judged as normal. There is another The strategy is to judge the request frequency of a single IP within a certain period of time to determine whether it is an attack request, but the existing firewall and cloud protection products cannot accurately identify CC attack defense, the strategy is extremely rough, causing very large accidental injuries, some APIs The interface cannot directly explain the request. The present invention can accurately identify the attack feature code without causing accidental injury. Requests such as the api interface can be accessed normally without affecting the user experience

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Novel network attack processing method and device
  • Novel network attack processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 2

[0022] Embodiment 2: the acquisition module 1 first acquires the IP address of the connection server and the number of connections corresponding to the IP address, and then the IP address judgment module 2 adopts JS identification technology to identify the request sent by the acquisition module 1 to obtain the IP address, and judge the request verification If yes, the JS code cannot be interpreted, and it is judged as an attack. If not, it is a normal user. At the same time, the IP address judging module 2 divides the IP address into a whitelist and a blacklist, and the processing module 3 directly divides the blacklist The IP access is denied, and the URL that does not need to be filtered is defined in the URL whitelist, and the request that cannot explain the JS code is blocked and the response is rejected.

Embodiment 3

[0023] Embodiment 3: the acquisition module 1 can be matched multiple times, and obtains the IP address of the connection server and the corresponding connection number of the IP address, and then the IP address judging module 2 is identified according to the request that the acquisition module 1 obtains the IP address. With a fixed attack signature, the post-processing module 3 directly blocks the request with the attack signature by writing the corresponding strategy through the Shell script. At the same time, the same second, the same IP, and different UA requests can be blocked through the Shell script, and the same proxy IP, different requests to access the real IP are blocked.

[0024] A new type of network attack processing device, the processing device includes an acquisition module 1, an IP address judgment module 2 and a processing module 3, the acquisition module 1 is mainly to obtain the IP address of the connection server and the number of connections corresponding...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a novel network attack processing method and device, whichrelate to the technical field of Internet security. The method comprises the following steps of obtaining an IP address of a connection server and a connection number corresponding to the IP address, identifying and judging the request sent by the IP address in the step a, if the request can be identified, determining that the user is a normal user, and if the request cannot be identified, determining as an attack request,and shielding a request sent by the IP address of the attack request in the step b. Accurateidentification can be carried out according to attack feature codes; accidental injury cannot be caused, requests such as an api interface can be normally accessed; compared with the prior art, the method does not affect the user experience, can effectively shield the attack request in the network in time, improves the stability of the server and the network, brings better Internet experience tothe user, can recognize the attack request in the Internet more accurately, and is more suitable for an Internet protection product.

Description

technical field [0001] The invention belongs to the technical field of Internet security, in particular to DDOS and CC attack protection products, and in particular to a novel network attack processing method and device. Background technique [0002] At present, attack requests for Internet applications are generally simulated by normal users to initiate requests. Existing firewall products generally identify whether the js request can be interpreted normally by adding parameters to the request url. If so, it can be judged as normal. There is another The strategy is to judge the request frequency of a single IP within a certain period of time to determine whether it is an attack request, but the existing firewall and cloud protection products cannot accurately identify CC attack defense, the strategy is extremely rough, causing very large accidental injuries, some APIs The interface cannot explain the request directly, but the present invention can perform accurate identific...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441H04L63/1458
Inventor 蔡国星
Owner 深圳市锐速云计算有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products