Method and device for protecting CC attack, medium and computer equipment

A technology for cleaning equipment and configuring information, applied in the field of network security, it can solve problems such as difficulty in prevention, exhaustion of server resources, and inability to respond to normal access requests, so as to avoid exhaustion of server resources and reduce downtime and crashes.

Pending Publication Date: 2022-05-17
广州方硅信息技术有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Specifically, CC attacks are mainly aimed at attacks on web servers or applications, which use standard GET / POST access requests, such as URIs (Universal Resource Identifiers) that involve database operations or other URIs that consume system resources, resulting in server resource consumption. Exhausted, unable to respond to normal access requests
[0003] One of the attack methods in the CC attack is to use a large number of scattered IP (IP Address, the protocol for interconnection between networks) to initiate a small number of requests for a certain server interface to achieve the purpose of the attack. This method is more difficult in actual confrontation Prevention, however, this method is extremely easy to cause exhaustion of server resources, until it crashes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for protecting CC attack, medium and computer equipment
  • Method and device for protecting CC attack, medium and computer equipment
  • Method and device for protecting CC attack, medium and computer equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] In order to make the purpose, technical solution and advantages of the present application clearer, the embodiments of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0034] It should be clear that the described embodiments are only some of the embodiments of the present application, rather than all of the embodiments. Based on the embodiments in the embodiments of the present application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the embodiments of the present application.

[0035] When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. In the description of the present application, it should be understood that the terms "first", "second", "third", etc. are only used to distinguish similar obje...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to the field of network security, and provides a CC attack protection method and device, a medium and computer equipment, and the method comprises the steps that a proxy server receives a first access request, and obtains a first visitor identifier and a first access target identifier; if the first access target identifier exists in the traction configuration information, hanging up the first access request, and sending the first visitor identifier and the first access target identifier to cleaning equipment; the cleaning equipment takes the first visitor identifier and the first access target identifier as first identifiers for caching; if the number of the first identifiers is greater than a first number threshold, feeding back interception information of a second access request corresponding to the first identifiers to the proxy server; and the proxy server intercepts the second access request according to the interception information, so that CC attacks of a large number of dispersed IPs on a certain target access interface form are intercepted and protected, server resource exhaustion is avoided, and the risk of server crash is reduced.

Description

technical field [0001] The embodiments of the present application relate to the technical field of network security, and in particular to a method, device, medium and computer equipment for protecting against CC attacks. Background technique [0002] Challenge Collapsar (CC for short) attack refers to a network attack method in which the attacker uses a proxy server to generate legitimate requests directed to the victim server, thereby realizing Distributed Denial of Service (DDos for short) and camouflage. Specifically, CC attacks are mainly aimed at attacks on web servers or applications, which use standard GET / POST access requests, such as URIs (Universal Resource Identifiers) that involve database operations or other URIs that consume system resources, resulting in server resource consumption. cannot respond to normal access requests. [0003] One of the attack methods in the CC attack is to use a large number of scattered IP (IP Address, the protocol for interconnectio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/55
CPCG06F21/554G06F2221/2141
Inventor 谭文
Owner 广州方硅信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products