Handle identification system-oriented DDoS defense method

A technology of identification and system, which is applied in the field of communication and information technology security, can solve the problems of consuming network resources and Internet DDoS defense methods cannot be used directly.

Active Publication Date: 2021-11-12
码客工场工业科技北京有限公司
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Due to the complex network environment, DDoS consumes a lot of network resources
In view of the characteristics of the industrial Internet different from the Internet, Internet DDoS defense methods cannot be directly used

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Handle identification system-oriented DDoS defense method
  • Handle identification system-oriented DDoS defense method
  • Handle identification system-oriented DDoS defense method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The present invention will be described in detail through specific embodiments below in conjunction with the accompanying drawings, but it does not constitute a limitation to the present invention.

[0038] Deploy a detection server before the Handle ID query reaches the recursive query node, and perform DDoS attack detection on the server. In addition, a processing server is deployed to process Handle identification query requests exceeding the limit value. The Handle identification system of the method of the present invention deploys sub-node servers such as figure 1 shown.

[0039] A DDoS defense method oriented to the Handle identification system is divided into five modules, which are the Handle function topic determination module, cluster analysis module, statistical analysis module, detection module, and layered speed limit processing module.

[0040] 1. For the Handle function topic determination module, two methods of establishing a Handle classification lib...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a Handle identification system-oriented DDoS defense method. The method comprises the following steps of: analyzing Handle analysis logs, mining characteristics of a query end through a method in a data mining technology, calculating deviation according to clustering and statistical results, taking the deviation as an index for detecting DDoS attacks, and carrying out multilayer speed-limiting processing on abnormal Handle query requests. The detection module and the processing module are respectively deployed on a sub-node server at a Handle client and a local Handle Service (LHS) access point, the detection of the distributed denial of service attack is realized on a Handle identification analysis system, and the security of the industrial internet identification analysis system is improved.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to the field of information technology security, and specifically relates to a DDoS defense method oriented to a Handle identification system. Background technique [0002] The node system in the industrial Internet identification analysis system mainly includes international root nodes, top-level nodes, secondary nodes, and enterprise nodes. The Industrial Internet logo endows components, products, and equipment with unique identification, which is conducive to resource management and enterprise control. It can also be based on different business needs, and the data and identification codes collected in each link of procurement, production, quality control and product packaging, etc. Binding to form a complete closed loop of data link information. Handle provides services such as permanent identification, dynamic analysis, and security management for data resource objects. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12G06K9/62
CPCH04L63/1458H04L63/1416H04L61/103G06F18/23213Y02D10/00
Inventor 张晓霍健
Owner 码客工场工业科技北京有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products