Detection and defense method for SYN Flood attack
An attack detection and attacked technology, applied in digital transmission systems, secure communication devices, electrical components, etc., can solve the problems of increased network load, inability to play a protective role, large occupation, etc., and achieve efficient and accurate filtering and efficient and accurate defense. , filter efficient effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0045] The technical solutions in the embodiments of the present application are clearly and completely described below in combination with the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. Based on the embodiments in this application, all other embodiments obtained by those skilled in the art without making creative efforts belong to the scope of protection of this application.
[0046] Such as figure 1 As shown, the present application provides a method for detecting and defending against SYN Flood attacks, which is mainly divided into two parts: an attack detection part and an attack defense part.
[0047] Among them, the attack detection part is realized through the second-stage detection scheme, including the first-stage detection and the second-stage detection, and the attack behavior can be accurately detected without increasing the network and host lo...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


