A Method to Mitigate Distributed Denial of Service Attack
A distributed rejection and analysis module technology, applied in the field of network security, can solve problems such as large modification of the operating system kernel, inability to record IP packet options and TCP packet options, consumption of server-side CPU resources and memory resources, etc., to alleviate the problem. Effects of Distributed Denial of Service Attacks
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment 1
[0029] A method for mitigating distributed denial-of-service attacks, the method of the present invention is deployed on a protected server, or deployed on a gateway device, and the gateway device is located between the client and the protected server; this embodiment is aimed at mitigating Transmission control protocol TCP synchronous SYN message flooding DDoS attack; Given a set of area range area_blocks represented by Internet Protocol IP address blocks, for example, there are m+1 sub-areas, namely sub-area 0, sub-area 1, and sub-area 2 , ..., sub-area m, and a positive integer threshold of the number of packets of the protocol type or message nature allowed in each sub-area within the given area range, where a sub-area such as sub-area 0 corresponds to a TCP SYN message The number of positive integer thresholds is the threshold of the number of semi-join table syn_table cells that can be used in this sub-area. The threshold is set according to experience. For each remaini...
Embodiment 2
[0034] A method for mitigating distributed denial of service attacks, the method of the present invention is either deployed on a protected server, or deployed on a gateway device or router, and the gateway device or router is located between the client and the protected server; this implementation The example is aimed at mitigating the transmission control protocol TCP end FIN message flooding DDoS attack; given a set of area range area_blocks represented by Internet Protocol IP address blocks, for example, there are m+1 sub-areas in total, that is, sub-area 0, sub-area 1, sub-area 2, ..., sub-area m, and the positive integer threshold of the number of TCP FIN packets allowed in each sub-area within the given area range, where a sub-area such as sub-area 0 corresponds to a TCP FIN message The positive integer threshold of the number is the threshold of the number of semi-connected table syn_table cells that can be used in this sub-area. The threshold is set according to expe...
Embodiment 3
[0039] A method for mitigating distributed denial of service attacks, the method of the present invention is either deployed on a protected server, or deployed on a gateway device or router, and the gateway device or router is located between the client and the protected server; this implementation The example is aimed at alleviating the flooding DDoS attack of User Datagram Protocol UDP packets; given a set of area range area_blocks represented by Internet Protocol IP address blocks, and the given area range allowed by each sub-area according to the actual The positive integer threshold of the number of UDP packets determined by the analysis results of the number of UDP packets in normal access traffic; the current value of the number of UDP packets allowed in each sub-area The positive integer threshold of the number: the given area_blocks is either based on the IP address allocation information and whois information, or based on the analysis results of the actual normal ac...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com