DDoS attack detection method, device and equipment and storage medium

A technology of attack detection and attack signature, applied in the field of network security, can solve the problem of not being able to discover the correlation and trigger relationship of DDoS attacks

Active Publication Date: 2021-02-12
CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD +1
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, at present, the main means to ensure the availability of 5G networks from DDoS attacks still rely on traditional firewalls and traffic detection and cleaning equipment for protection.
Since

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • DDoS attack detection method, device and equipment and storage medium
  • DDoS attack detection method, device and equipment and storage medium
  • DDoS attack detection method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, those skilled in the art can understand that in each embodiment of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following embodiments, the technical solutions claimed in this application can also be realized.

[0031] The division of the following embodiments is for the convenience of description, and should not constitute any limitation to the specific implementation of the present invention, and the various embodiments can be combined and referred to each other on the premise of no contradiction.

[0032] The first embodiment of the present invention relates t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a DDoS attack detection method, device and equipment and a storage medium. According to the method and the device, the information entropy is determined basedon the traffic behaviors of multiple tenants, specifically, the traffic behaviors can be divided into the data domain traffic and the signaling domain traffic, so that the determined information entropy can reflect the relevance of the traffic behaviors of the tenants and the DDoS attack behaviors in the time dimension; correlation and triggering between DDoS attack behaviors and flow behaviors can also be reflected, then DDoS attack behavior detection is carried out on the flow behaviors of the multiple tenants according to the information entropy, and a mode of correlation between the flowbehaviors of the multiple tenants and attack characteristics of the DDoS attack behaviors is established; the problems that in a traditional detection mode, private protocol characteristics and service logic characteristics of different tenants cannot be accurately matched, DDoS attack behaviors hidden in data domain flow corresponding to the tenants and DDoS attack behaviors hidden in corresponding signaling domain flow cannot be found, and then detection is inaccurate are solved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of network security, and in particular to a DDoS attack detection method, device, equipment and storage medium. Background technique [0002] 5G technology can meet the needs of users in various application scenarios, and connect communication between people and people, people and things, and things and things faster and better, so as to achieve the goal of interconnecting everything. The multi-tenant mode based on Network Slicing is an important feature of 5G networks. Tenants can use different types of slicing modes to respond to various communication needs and select heterogeneous transaction / interaction modes to achieve massive connections and differentiated bandwidth. Model selection and communication quality selection to adapt to its own business use cases. While 5G technology provides a large number of access points and high-quality and large-bandwidth access capabilities fo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1458H04L63/1425Y02D30/50
Inventor 王易戈吴君轶
Owner CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products