Link flooding attack protection method and device

A link flooding attack and transmission path technology, applied in the field of link flooding attack protection methods and devices, can solve the problems that the link flooding attack protection cannot be realized, the link flood attack protection method cannot be directly used, etc., Achieve the effect of ensuring normal communication, reducing congestion, and achieving balanced distribution

Active Publication Date: 2020-09-29
INST OF INFORMATION ENG CAS
View PDF11 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a link flooding attack protection method and device to solve the problem that the existing ...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Link flooding attack protection method and device
  • Link flooding attack protection method and device
  • Link flooding attack protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0040] Link flooding attack means that the attacker uses the cooperation between attack agents (such as zombie hosts) distributed in different physical locations to use the mutual communication between zombie hosts or the open services of zombie hosts inside / outside the target area access to the target area, launching a flood attack on multiple "k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a link flooding attack protection method and device. The method comprises the following steps: acquiring each flow transmission demand of a satellite network,an inter-satellite visibility relationship among satellites in the satellite network and the number of wave beams of each satellite; based on the inter-satellite visibility relationship between the satellites and the beam number of the satellites, determining a plurality of candidate transmission paths corresponding to each flow transmission demand; and based on each flow transmission demand and the plurality of candidate transmission paths corresponding to each flow transmission demand, determining a final transmission path corresponding to each flow transmission demand and carrying out flowdistribution. According to the method and the device provided by the embodiment of the invention, the balanced distribution of the network flow in the satellite network is realized, and the normal communication between the target area and the external network is ensured.

Description

technical field [0001] The invention relates to the technical field of network protection, in particular to a link flood attack protection method and device. Background technique [0002] With the increasing demand for frequent cross-domain interaction of services and long-distance data transmission, large-scale and complex interconnected networks such as the Internet, space-ground integrated network, and the Internet of Things continue to form, and various nodes in the network are widely distributed across regions and across time and space. , interconnected and interdependent. Large-scale and complex Internet networks are vulnerable to link flooding attacks, resulting in the failure of normal communication between many nodes in a large area of ​​the network and external networks. [0003] The existing network attack protection schemes only protect the ground network, that is, they can only protect the network where the physical connection relationship between routing nodes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/801H04L12/803H04L12/727H04L12/729H04L12/733H04B7/185H04L45/121H04L45/122H04L45/125
CPCH04L63/1458H04L47/125H04L45/121H04L45/122H04L45/125H04B7/1851H04W8/04
Inventor 李勇俊郭云川李凤华房梁
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products