Unlock instant, AI-driven research and patent intelligence for your innovation.

A defense method aiming at DDoS attack

A technology of attacked and network equipment, which is applied in the direction of digital transmission system, electrical components, transmission system, etc., can solve the problems of ineffective defense against attacks, consumption of equipment resources, etc., achieve effective security defense, improve the ability to resist DDoS attacks, The effect that is conducive to the promotion of the application

Inactive Publication Date: 2007-05-30
苏州国华科技有限公司
View PDF1 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is more effective in preventing DDoS attacks by a single user on a network device. However, with the development of network device processing capabilities, a single user launches a TCP SYN Flood attack through a single IP of a single system, which is harmful to current network devices. The impact caused is not particularly serious, and the new network attacks that appear at present are more of launching TCP SYN Flood attacks from multiple different IP addresses (including forged ones). In this case, the above technical solutions described The defense method of recording and limiting the number of user IP connections cannot effectively defend against attacks launched by multiple IPs at the same time, and also consumes device resources because too much IP information needs to be recorded

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A defense method aiming at DDoS attack
  • A defense method aiming at DDoS attack
  • A defense method aiming at DDoS attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] The technical solution provided by this embodiment is: when the client sends the first handshake information to the server, it invokes the detection rules to determine whether the server is under attack. If there is no attack, the system accepts the first One handshake information, and send the second handshake information to the client, waiting for the arrival of the client's third handshake information; The set of information is processed, according to the discarding rules to judge all the first handshake information that belongs to the attack part, and then discard the first handshake information that is identified as a DDoS attack, so as to ensure that the system has enough resources to process the new incoming first handshake information. The second handshake information, and accept the newly entered first handshake information, send the second handshake information to the client, and wait for the arrival of the client's third handshake information.

[0022] Referr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to one computer network safety technique, which starts the judge program for network device and is based on the following rules: a, semi-connection line SYN message volume is super whole capacity for about 95 percent; b, semi-connection line SYN message number is over grown; c, if it is over normal number, then it is regarded as network attack and executing the dissert program to discard SYN message with sustain time over one second.

Description

technical field [0001] The invention relates to a computer network security technology, in particular to a method for network equipment security defense against DDoS attacks. Background technique [0002] The TCP (Transmission Control Protocol) protocol is a network transmission control protocol widely used at present, and it is a connection-oriented protocol. In the network, no matter which party sends data to the other party, it must first establish a connection between the two parties. In order to establish this connection, the general steps are: first, the requesting end (usually called the client) sends A SYN message segment (segment 1), indicating the port of the server that the client intends to connect to, and the initial serial number ISN; in the second step, the server sends back the SYN message segment (segment 2) containing the initial serial number of the server as Answer, at the same time, set the confirmation sequence number to the client's ISN plus 1 to conf...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/00
Inventor 周嘉伟金士尧许宏琪陈强
Owner 苏州国华科技有限公司