Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Attack monitoring system and attack monitoring method

A monitoring system and attacked technology, applied in the security field, can solve the problems of ineffective protection scheme, inability to locate the source of the attack, and the half-open connection queue of the target computer is full, so as to achieve the effect of attack defense.

Pending Publication Date: 2022-07-29
NEW H3C SECURITY TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Distributed Denial of Service attack (Distributed Denial of Service, DDoS) is a network attack method commonly used by hackers. It refers to the use of a sufficient number of puppet computers distributed in different places to generate a large number of attack packets, One or more target computers launch an attack, causing the attacked computer to fail to provide normal services
[0003] The SYN-Flood attack is the most common DDoS attack, and it is also the most classic denial of service attack method. It takes advantage of the defects in the implementation of the TCP protocol to send a large number of attack messages with forged source addresses to the port where the network service is located. Can cause the half-open connection queue on the target computer to fill up, preventing access by other legitimate users
[0004] The DDOS attack currently provided is designed to protect against the attack received by the server. However, when the traffic of the DDOS attack is too large, the existing protection scheme basically does not work, and it is impossible to locate the source of the attack. That is to say, there is no There are recognized methods for effectively identifying DDOS attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack monitoring system and attack monitoring method
  • Attack monitoring system and attack monitoring method
  • Attack monitoring system and attack monitoring method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. Where the following description refers to the drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with this application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application.

[0026] The terminology used in this application is for the purpose of describing particular embodiments only and is not intended to limit the application. As used in this application, the singular forms "a," "the," and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It will also be understood that the term "and / or" as used herein refers to and includes any and all possible c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an attack monitoring system and an attack monitoring method, the method is applied to a monitoring server, and the method comprises the following steps: sending a monitoring instruction to each first monitoring device, the monitoring instruction carrying a first address of a target server to be monitored, the first monitoring equipment is used for monitoring area equipment in a corresponding monitoring area; receiving traffic statistical information sent by each first monitoring device; and if it is determined that the traffic sent to the target server is abnormal according to each piece of traffic statistical information, determining that the target server is attacked. Therefore, the monitoring server can effectively identify whether the server is attacked or not, that is, the traffic sent to the target server is identified at the regional equipment side, then countermeasures are taken in time when the attack is identified, and attack defense is realized to a certain extent.

Description

technical field [0001] The present application relates to the field of security technologies, and in particular, to an attack monitoring system and an attack monitoring method. Background technique [0002] Distributed Denial of Service (DDoS) attack is a network attack method commonly used by hackers at present. One or more target computers launch an attack, causing the attacked computer to fail to provide normal services. [0003] The SYN-Flood attack is the most common DDoS attack and the most classic denial of service attack. It takes advantage of the flaws in the implementation of the TCP protocol and sends a large number of attack packets with forged source addresses to the port where the network service is located. It will cause the half-open connection queue in the target computer to be full, thereby preventing other legitimate users from accessing. [0004] The currently provided DDOS attack is designed to protect against the attack received by the server. However...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40
CPCH04L63/1408H04L63/1458H04L2463/142H04L2463/141
Inventor 仇宏迪
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products