Anomaly detection and attack initiator analysis system based on network flow message
A network traffic and anomaly detection technology, which is applied in the field of network traffic anomaly detection and analysis, can solve the problems of high cost of attack protection, inability to obtain enough information, and do not mention the traceability of network attacks, etc., to achieve the effect of reducing capacity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0039] For the most common and widespread DDOS attack, there are two common manifestations of this attack:
[0040] 1. DDOS attacks often show a very high attack rate and a long attack duration, which leads to paralysis of servers with weak processing capabilities and cannot normally process normal requests.
[0041] 2. The attack packets of DDOS attacks are often wrong and repeated. Even if IP masquerading is performed to bypass interception, the content is chaotic and disorderly.
[0042] If the attacker comes from the same initiator, who kidnaps many zombie machines to launch the attack, conventional attack detection can only find that the flow rate of the attack is abnormal and block some abnormal IPs, but the attacker can use camouflage to change Its own IP even signs to bypass the blocking of the blacklist, so as to ensure that the DDOS attack can last for a long time.
[0043] In order to find out the attack suspects of the above-mentioned attacks, through the database...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 
