Identification method and device for denial of service attack
A denial of service attack and identification method technology, applied in the field of Internet security, can solve the problems of indistinguishability, low technical threshold, and obvious effect of CC attack attacks, and achieve the effect of improving accuracy, protecting safe operation, and realizing security protection.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0030] The algorithms and displays presented herein are not inherently related to any particular computer, virtual system, or other device. Various generic systems can also be used with the teachings based on this. The structure required to construct such a system is apparent from the above description. Furthermore, the present invention is not specific to any particular programming language. It should be understood that various programming languages can be used to implement the content of the present invention described herein, and the above description of specific languages is for disclosing the best mode of the present invention.
[0031] figure 1 It is a schematic diagram of the network application environment of the denial of service attack identification device 200 according to an embodiment of the present invention. In the figure, when the webpage client 110 accesses the target website, it needs to send an access request to the host 130 of the target website throu...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com