Active suppression method and device for malicious traffic attack of heaven and earth convergence network

A technology that integrates network and malicious traffic. It is applied in the field of active suppression of malicious traffic attacks on the integrated network of heaven and earth. It can solve the problem of low efficiency of malicious traffic defense and achieve the effect of suppressing malicious traffic attacks.

Pending Publication Date: 2022-07-22
TSINGHUA UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides a method and device for actively suppressing malicious traffic attacks in a space-earth fusion network, which is used to solve the defect of low efficiency of defense against malicious traffic in the space-ground fusion network in the prior art, and to effectively suppress malicious traffic attacks in space-ground fusion

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active suppression method and device for malicious traffic attack of heaven and earth convergence network
  • Active suppression method and device for malicious traffic attack of heaven and earth convergence network
  • Active suppression method and device for malicious traffic attack of heaven and earth convergence network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the objectives, technical solutions and advantages of the present invention clearer, the technical solutions in the present invention will be clearly and completely described below with reference to the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention. , not all examples. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0045] Malicious traffic attacks (such as DDoS) are one of the major security risks that threaten the security of cyberspace. For malicious traffic attacks, passive defense methods based on a single network device are usually used. If a network node is attacked by malicious traffic from a certain IP, the network node disables this IP, but the attacker can hijack this IP to attack the next network node. As a result...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an active suppression method and device for malicious traffic attacks of a heaven and earth convergence network, and the method is applied to a heaven and earth convergence network system which comprises a plurality of network devices which are sequentially connected. Each network device executes the following steps: each network device obtains respective legal traffic and respective total traffic; each network device determines a filtering probability and a filtering threshold value based on the legal traffic and the total traffic; and under the condition that the total flow is higher than the filtering threshold value, filtering the received data packets by the filters corresponding to the network devices one by one based on the filtering probabilities. According to the heaven and earth convergence network malicious traffic attack active suppression method and device provided by the embodiment of the invention, the traffic is filtered through a plurality of filters in one-to-one correspondence with the network equipment, and the malicious traffic attack is effectively suppressed.

Description

technical field [0001] The invention relates to the technical field of network security, and in particular, to a method and device for actively suppressing malicious traffic attacks in a world-earth fusion network. Background technique [0002] The space-ground fusion network is based on the ground network and extended by the space network, covering natural spaces such as space, air, land, and ocean, and providing information guarantee for the activities of various users such as space-based, space-based, land-based, and sea-based. infrastructure. Malicious traffic attacks (such as DDoS) are one of the major security risks that threaten the security of the integrated cyberspace. In malicious traffic attacks, attackers hijack botnets to send junk traffic or malicious traffic to victims, exhausting the victim's network resources and threatening the normal use of the victim's network. [0003] At present, for malicious traffic attacks, passive defense methods based on a single...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L47/10
CPCH04L63/1408H04L63/1458H04L63/0227H04L63/0236H04L63/30H04L47/29
Inventor 李元杰李贺武吕治政赵玮吴茜刘君赖泽祺
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products