A Method of Detecting UDP Flood Attack and Defense Based on Binary Tree
A binary tree and IP address technology, applied in the field of network security, can solve the problems of helpless defense methods, consumption of attacked network service resources, weak attack immunity, etc., to achieve rapid and efficient detection, excellent defense effect, and high accuracy.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0041] Such as Figure 21 Shown is the network topology diagram of this example. In this network, three network hosts can access a Linux server on the Internet through the Internet; A UDP Flood attack is launched, and the host with the source IP address 192.168.1.102 communicates with the Linux server normally; at this time, the Linux server NIC cache stores IP data packets from the Internet, and various system processes read them in a first-in-first-out manner. Take the IP data packet in the cache, that is, which network data packet is stored in the network card cache first, and who will be processed first. In this example, a Linux server is protected, and the traffic sent to the Linux server from the Internet is filtered on the Linux server.
[0042] First, make the following preparations on the Linux server operating system:
[0043]Install the libnids package in the user layer. libnids is a professional programming interface for network intrusion detection development. I...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com