Network attack defense method, device and system, storage medium and electronic equipment

A technology of network attack and network connection, applied in the defense method and device of network attack, storage medium, system, and electronic equipment field, which can solve the problem of poor ability to defend against DoS attack

Inactive Publication Date: 2021-05-18
GUANGZHOU HUIRUI SITONG INFORMATION SCI & TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Embodiments of the present disclosure provide a network attack defense method, device, system, storage medium, and electronic equipment to solve the technical problem of poor defense against DoS attacks in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack defense method, device and system, storage medium and electronic equipment
  • Network attack defense method, device and system, storage medium and electronic equipment
  • Network attack defense method, device and system, storage medium and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] The method embodiment provided by Embodiment 1 of the present disclosure may be executed in a server (such as an authentication server, a firewall server, a security server, etc.), a computer, a mobile phone, a tablet, or a similar computing device. Take running on the server as an example, figure 1 It is a hardware structural block diagram of a server according to an embodiment of the present disclosure. Such as figure 1 As shown, the server can include one or more ( figure 1 Only one is shown in ) processor 102 (processor 102 may include but not limited to microprocessor (Microcontroller Unit, MCU) or programmable logic device (Field Programmable Gate Array, FPGA) and other processing devices) and for storing data Optionally, the server may further include a transmission device 106 and an input and output device 108 for communication functions. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it doe...

Embodiment 2

[0092] In this embodiment, a network attack defense device and system are also provided, which are used to implement the above embodiments and preferred implementation modes, and those that have already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0093] Figure 5 is a structural block diagram of a network attack defense device according to an embodiment of the present disclosure, which is applied to a server, such as Figure 5 As shown, the device includes: a receiving module 50, a judging module 52, and a defense module 54, wherein,

[0094] The receiving module 50 is configured to receive a handshake confirmation message sent by the client during the thir...

Embodiment 3

[0113] Embodiments of the present disclosure also provide a storage medium, in which a computer program is stored, wherein the computer program is configured to execute the steps in any one of the above method embodiments when running.

[0114] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:

[0115] S1. Receive a handshake confirmation message sent by the client during the third handshake process, wherein the handshake confirmation message carries an authentication field, and the authentication field is based on the information sent by the server to the client during the second handshake process The handshake message sent is generated;

[0116] S2, judging whether the authentication field matches a preset field;

[0117] S3. Disconnect the network connection between the server and the client if the authentication field does not match the preset field.

[0118] Optionally, in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network attack defense method, device and system, a storage medium and electronic equipment, and belongs to the field of communication. The method comprises the steps: receiving the a handshake confirmation message sent by a client side in the third handshake process, wherein the handshake confirmation message carries an authentication field, and the authentication field is generated based on a handshake message sent by a server to the client side in the second handshake process; judging whether the authentication field is matched with a preset field or not; and if the authentication field is not matched with the preset field, disconnecting the network connection between the server and the client. By means of the method and the device, the technical problem of poor DoS attack defense capability of related technologies is solved, the security of network connection between the client and the server is improved, and the stability and the robustness of the server are improved.

Description

technical field [0001] The present disclosure relates to the communication field, in particular, to a network attack defense method, device, system, storage medium, and electronic equipment. Background technique [0002] In the related art, the communication system using AAA (verification, authorization and accounting, Authentication, Authorization, Accounting) server for authentication, including but not limited to WLAN (Wireless Local Area Network, WirelessLocal Area Network), using https (Hypertext Transfer Security Protocol, Hyper Text Transfer Protocol over SecureSocket Layer) protocol communication website, using SSH (Secure Shell Protocol, Secure Shell) communication system, using TLS (Transport Layer Security, Transport Layer Security) / SSL (Secure Sockets Layer Secure Sockets Protocol) For the communication system of encryption protocol, etc., the anti-replay attack function is designed by adding random numbers in the handshake protocol process. The TLS / SSL three-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1458H04L63/08
Inventor 窦小龙
Owner GUANGZHOU HUIRUI SITONG INFORMATION SCI & TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products