A link flooding attack protection method and device

A link flooding attack and transmission path technology, applied in the field of link flooding attack protection methods and devices, can solve the problems that the link flood attack protection cannot be realized, the link flood attack protection method cannot be directly used, etc. Achieve the effect of ensuring normal communication, reducing congestion, and achieving balanced distribution

Active Publication Date: 2021-07-13
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a link flooding attack protection method and device to solve the problem that the existing link flooding attack protection method cannot be directly used in the satellite network and cannot realize the protection against the link flooding attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A link flooding attack protection method and device
  • A link flooding attack protection method and device
  • A link flooding attack protection method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0040] Link flooding attack means that the attacker uses the cooperation between attack agents (such as zombie hosts) distributed in different physical locations to use the mutual communication between zombie hosts or the open services of zombie hosts inside / outside the target area access to the target area, launching a flood attack on multiple "k...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present invention provide a link flooding attack protection method and device, wherein the method includes: obtaining each traffic transmission requirement of the satellite network, the inter-satellite visibility relationship between each satellite in the satellite network, and the The number of beams; based on the inter-satellite visibility relationship between the satellites and the number of beams of each satellite, determine several candidate transmission paths corresponding to each traffic transmission requirement; based on the respective traffic transmission requirements and their corresponding For several candidate transmission paths, determine the final transmission paths corresponding to the respective traffic transmission requirements and perform traffic allocation. The method and device provided by the embodiments of the present invention realize the balanced distribution of network traffic in the satellite network and ensure normal communication between the target area and the external network.

Description

technical field [0001] The invention relates to the technical field of network protection, in particular to a link flood attack protection method and device. Background technique [0002] With the increasing demand for frequent cross-domain interaction of services and long-distance data transmission, large-scale and complex interconnected networks such as the Internet, space-ground integrated network, and the Internet of Things continue to form, and various nodes in the network are widely distributed across regions and across time and space. , interconnected and interdependent. Large-scale and complex Internet networks are vulnerable to link flooding attacks, resulting in the failure of normal communication between many nodes in a large area of ​​the network and external networks. [0003] The existing network attack protection schemes only protect the ground network, that is, they can only protect the network where the physical connection relationship between routing nodes...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/801H04L12/803H04L12/727H04L12/729H04L12/733H04B7/185H04L45/121H04L45/122H04L45/125
CPCH04L63/1458H04L47/125H04L45/121H04L45/122H04L45/125H04B7/1851H04W8/04
Inventor 李勇俊郭云川李凤华房梁
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products