Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

CC attack defense method and device, computer equipment and storage medium

A computer program and threshold setting technology, which is applied in the field of network information security, can solve problems such as low security, misjudgment, and slow response speed, and achieve the effects of high security, damage prevention, and fast response speed

Pending Publication Date: 2020-12-04
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present application provides a CC attack defense method, device, computer equipment, and storage medium, to at least solve the problem of misjudgment, slow response speed, and low security in traditional CC attack prevention methods in related technologies. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CC attack defense method and device, computer equipment and storage medium
  • CC attack defense method and device, computer equipment and storage medium
  • CC attack defense method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be described and illustrated below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application. Based on the embodiments provided in the present application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0040] Obviously, the accompanying drawings in the following description are only some examples or embodiments of the present application, and those skilled in the art can also apply the present application to other similar scenarios. In addition, it can also be understood that although such development efforts may be complex and lengthy, for those of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a CC attack defense method and device, computer equipment and a storage medium, and the method comprises the steps: carrying out the real-time monitoring of a target server, and receiving the real-time operation data of the target server; comparing the real-time operation data with a set threshold value; when the real-time operation data exceeds a set threshold value, starting a defense program; and when the real-time operation data exceeds the set threshold, carrying out attack alarm on a user. According to the invention, the exception of the server can be monitored more quickly and reasonably, defense can be started quickly, and a response is made at the first time when the server is attacked, so that the intervention time is greatly shortened, the server is prevented from being damaged more greatly by the attack, an attack alarm is given to the user, misjudgment is avoided through manual rechecking, and the response speed is high; and the safety is high.

Description

technical field [0001] The present application relates to the technical field of network information security, in particular to a CC attack defense method, device, computer equipment and storage medium. Background technique [0002] With the development of information network, there are more and more means of network attack. CC attack has a far-reaching impact on modern web sites, and the early warning and protection methods of CC attack are also various. [0003] The traditional way to prevent CC attacks is to monitor the traffic data, and block the corresponding IP address to prevent attacks when abnormal traffic data is determined. However, this defense method can only judge whether the traffic data is abnormal after the traffic data visits the server multiple times. Therefore, the server cannot respond immediately when the server is attacked, and only when the server is attacked and causes certain impact The abnormal traffic data can only be locked down for defense, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/26
CPCH04L63/1458H04L43/16H04L43/08H04L43/0817
Inventor 刘超范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products