Network attack defense method, device and system, storage medium and electronic equipment
A technology of network attack and network connection, applied in the defense method and device of network attack, storage medium, system, and electronic equipment field, which can solve the problem of poor ability to defend against DoS attack
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0044] The method embodiment provided by Embodiment 1 of the present disclosure may be executed in a server (such as an authentication server, a firewall server, a security server, etc.), a computer, a mobile phone, a tablet, or a similar computing device. Take running on the server as an example, figure 1 It is a hardware structural block diagram of a server according to an embodiment of the present disclosure. Such as figure 1 As shown, the server can include one or more ( figure 1 Only one is shown in ) processor 102 (processor 102 may include but not limited to microprocessor (Microcontroller Unit, MCU) or programmable logic device (Field Programmable Gate Array, FPGA) and other processing devices) and for storing data Optionally, the server may further include a transmission device 106 and an input and output device 108 for communication functions. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it doe...
Embodiment 2
[0092] In this embodiment, a network attack defense device and system are also provided, which are used to implement the above embodiments and preferred implementation modes, and those that have already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.
[0093] Figure 5 is a structural block diagram of a network attack defense device according to an embodiment of the present disclosure, which is applied to a server, such as Figure 5 As shown, the device includes: a receiving module 50, a judging module 52, and a defense module 54, wherein,
[0094] The receiving module 50 is configured to receive a handshake confirmation message sent by the client during the thir...
Embodiment 3
[0113] Embodiments of the present disclosure also provide a storage medium, in which a computer program is stored, wherein the computer program is configured to execute the steps in any one of the above method embodiments when running.
[0114] Optionally, in this embodiment, the above-mentioned storage medium may be configured to store a computer program for performing the following steps:
[0115] S1. Receive a handshake confirmation message sent by the client during the third handshake process, wherein the handshake confirmation message carries an authentication field, and the authentication field is based on the information sent by the server to the client during the second handshake process The handshake message sent is generated;
[0116] S2, judging whether the authentication field matches a preset field;
[0117] S3. Disconnect the network connection between the server and the client if the authentication field does not match the preset field.
[0118] Optionally, in...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com