Unlock instant, AI-driven research and patent intelligence for your innovation.

Network attack protection method, device and system

A network attack and network technology, applied in transmission systems, electrical components, etc., can solve problems such as limited networking methods and narrow application ranges

Active Publication Date: 2021-03-30
HANGZHOU DPTECH TECH
View PDF23 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, check whether the three-way handshake of TCP is complete, and check whether there is a request record after DNS receives the reply message. This method can fundamentally solve the protection against amplification attacks carried out by the external network, but it is limited by the networking method. Narrow range of applications

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack protection method, device and system
  • Network attack protection method, device and system
  • Network attack protection method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar parts in the drawings, and thus their repeated descriptions will be omitted.

[0036] Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided in order to give a thorough understanding of embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure may be practiced without one or mo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network attack protection method, device and system based on a bypass mode, electronic equipment and a computer readable medium. The method can be used for detecting equipment and comprises the following steps: acquiring bidirectional flow data in a network; determining a destination IP address of the bidirectional flow data based on quintuple information; when the countvalue of the state information error corresponding to the destination IP address in the preset period is greater than a threshold value, generating warning information; and sending the warning information to a protection device, so that the protection device protects the network attack. According to the network attack protection method, device and system based on the bypass mode, the electronic equipment and the computer readable medium, the amplification attack based on the state can be protected in the bypass mode, and the defect that protection can only be conducted in a speed limiting mode in the prior art is overcome.

Description

technical field [0001] The present disclosure relates to the field of computer information processing, in particular, to a bypass mode-based network attack protection method, device, system, electronic equipment, and computer-readable medium. Background technique [0002] Distributed Denial of Service attack (Distributed Denial of Service) referred to as DDoS, also known as blocking attack or flood attack, is currently the most common form of attack on the Internet. DDoS attacks usually use traffic from a large number of infected computers (ie, botnets) to consume bandwidth or resources on the target website or the entire network, making the target unable to process a large number of data packets, resulting in service interruption or stop. [0003] For the amplification attacks that are very common nowadays, the most commonly used defense method is speed limit, that is, by limiting the number of visits to fixed source ports and source IPs. However, since amplification attack...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441H04L63/1458
Inventor 邢涛
Owner HANGZHOU DPTECH TECH