Unlock instant, AI-driven research and patent intelligence for your innovation.

A network attack source tracing method, device and system

A network attack and network connection technology, applied in the field of network attack traceability, can solve the problem that the server is difficult to implement the network attack traceability plan, and achieve the effect of ensuring smooth execution

Active Publication Date: 2022-03-01
CHINA SOUTHERN POWER GRID COMPANY +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is a problem in the traditional network attack traceability scheme, that is, when the network attack causes the resources of the server to be exhausted, it is difficult for the server to implement the network attack traceability scheme.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A network attack source tracing method, device and system
  • A network attack source tracing method, device and system
  • A network attack source tracing method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0070] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0071] refer to Figure 1-2 , the embodiment of the present application provides a network attack source tracing method applied to a server, including:

[0072] S1. According to the preset server pressure detection method, detect the current server pressure on the server in real time, and judge whether the current server pressure is greater than the preset pressure threshold;

[0073] S2. If the current server pressure is greater than the preset pressure threshold, the preset first network attack source tracing strategy is adopted in real time to perform the first attack s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application discloses a network attack source tracing method, device and system, including: detecting the current server pressure in real time; if it is greater than the pressure threshold, obtain the first attack source tracing result; judge whether the first source tracing time value is greater than the source tracing time threshold; if greater, Obtain the first communication data set; obtain the first response data set; and be the first data collection; use physical means to disconnect the network connection of the server for a preset period of time, and then restore the network connection of the server; obtain the second communication Data set; obtain the second response data set; merge into the second total data set; obtain the same data; obtain the second attack source tracing result; perform countermeasures; detect the server pressure on the server again; if it is greater than the preset pressure threshold, Then the third attack source traceability result output by the third attack source traceability model is obtained, thereby completing the hierarchical network attack source traceability process and ensuring the smooth execution of network attack source traceability.

Description

technical field [0001] This application relates to the computer field, and in particular to a network attack source tracing method, device and system. Background technique [0002] A network attack, for example, attacks the server by consuming certain resources of the server, such as computing resources, network connections and other resources. In order to defend against network attacks, a network attack source tracing solution can be used to discover the attacker or attack path, so as to take targeted countermeasures. However, there is a problem in the traditional network attack traceability solution, that is, when the server resources are exhausted due to the network attack, it is difficult for the server to implement the network attack source traceability solution. Contents of the invention [0003] This application proposes a network attack source tracing method applied to servers, including: [0004] S1. According to the preset server pressure detection method, dete...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L2463/146
Inventor 吕华辉毕凯峰张佳发明哲陈华军张华兵王健母天石李慧娟邓子杰李昳付志博周磊黄海英刘家豪叶思斯
Owner CHINA SOUTHERN POWER GRID COMPANY