Unlock instant, AI-driven research and patent intelligence for your innovation.

SYN Flood attack protection method and device, electronic equipment and storage medium

A storage medium and illegal technology, applied in the computer field, can solve the problems of single SYNFlood attack protection scheme and inability to fully meet user needs, and achieve the effects of avoiding downlink network congestion, ensuring authentication accuracy, and avoiding service quality

Pending Publication Date: 2021-04-23
BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, in order to solve the technical problem that the SYN Flood attack protection scheme in the prior art is relatively simple and cannot fully meet the needs of users, the embodiment of the present invention provides a SYN Flood attack protection method, device, electronic equipment and storage medium

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SYN Flood attack protection method and device, electronic equipment and storage medium
  • SYN Flood attack protection method and device, electronic equipment and storage medium
  • SYN Flood attack protection method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0077] The application scenario of the protection method for the SYN Flood attack provided by the embodiment of the present invention is firstly described as an example below:

[0078] see figure 1 , is a schematic diagram of an application scenario of the SYN Flood attack protection method provided by the embodiment of the present invention...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to an SYN Flood attack protection method and device, electronic equipment and a storage medium, and the method comprises the steps: counting a first cumulative requested connection amount of a target server in a current protection period when an SYN message for requesting the connection of the target server is received and if the target server is determined to be subjected to the SYN Flood attack; determining a target authentication mode based on the first accumulated requested connection quantity so as to authenticate a client corresponding to the SYN message by adopting the target authentication mode; if the authentication result shows that the client is an illegal client, discarding the SYN message; if the authentication result shows that the client is a legal client, releasing the SYN message. Therefore, while the authentication accuracy is ensured, the protection pressure can be reduced, the downlink network congestion is avoided, the influence on the service quality of normal services is further avoided, and the user requirements are comprehensively met.

Description

technical field [0001] The embodiments of the present invention relate to the field of computer technology, and in particular to a method, device, electronic equipment and storage medium for protecting against SYN Flood attacks. Background technique [0002] SYN Flood attack is currently one of the most popular methods of DDoS (Distributed Denial of Service attack, distributed denial of service attack). Connection request, so that the resources of the attacked party are exhausted (for example, the CPU is fully loaded or the memory is insufficient). [0003] At present, in order to defend against SYN Flood attacks, a DDoS protection system can be deployed between the client and the server. The SYN packet sent by the client to the server first reaches the DDoS protection system. The client of the SYN message is authenticated. If the authentication result indicates that the client is invalid, the SYN message will be discarded. If the authentication result indicates that the cl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/823H04L47/32
CPCH04L63/1458H04L47/32
Inventor 宋建昌高玉玺
Owner BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD