Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Dispatching system-based DDoS (distributed denial of service) defense method and DDoS (distributed denial of service) defense system

A scheduling system and defense system technology, applied in the field of network security, can solve problems such as occupied bandwidth and manslaughter, and achieve the effect of reducing the impact, reducing the scope of influence, and reducing the cost of defense

Active Publication Date: 2017-01-04
ALIBABA GRP HLDG LTD
View PDF4 Cites 28 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, CDN is very effective in DDoS defense for static resources, and for common dynamic resources, this method will cause a large number of back-to-source visits, resulting in a large number of false killings and occupying a large amount of bandwidth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Dispatching system-based DDoS (distributed denial of service) defense method and DDoS (distributed denial of service) defense system
  • Dispatching system-based DDoS (distributed denial of service) defense method and DDoS (distributed denial of service) defense system
  • Dispatching system-based DDoS (distributed denial of service) defense method and DDoS (distributed denial of service) defense system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following describes in detail the embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein the same or similar reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the accompanying drawings are exemplary and are only used to explain the present application, but should not be construed as a limitation on the present application.

[0024] The following describes the DDoS defense method and DDoS defense system for distributed denial of service based on the scheduling system according to the embodiments of the present application with reference to the accompanying drawings.

[0025] figure 1 It is a flow chart of a DDoS defense method for distributed denial of service based on a scheduling system according to an embodiment of the present application.

[0026] figure 2 It is a schematic diagram of a D...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a dispatching system-based DDoS (distributed denial of service) defense method and a DDoS (distributed denial of service) defense system. The method includes the following steps that: when a DDoS attack to a first IP address is monitored, a currently available second IP address is obtained; and when a dispatching request sent by a user terminal which accesses the first IP address is received, the second IP address is sent to the user terminal, so that the user terminal can access a service target through the second IP address. With the dispatching system-based DDoS (distributed denial of service) defense method provided by the embodiments of the present invention adopted, influences of the DDoS attack can be reduced to a controllable range, defense cost can be reduced, influence on the service target accessed by a user which is caused by wrong attack killing can be greatly reduced, and the experience of a user subjected to attacks can be improved.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular, to a DDoS defense method based on a scheduling system and a DDoS defense system. Background technique [0002] DDoS (Distributed Denial of Service) attack refers to the use of client / server technology to combine multiple computers as an attack platform to launch DDoS attacks on one or more targets, thereby multiplying the risk of denial of service attacks. power. The principle of a DDoS attack is to find the resource bottleneck of the attacker, and to make the victim's business unavailable by consuming resources. Current relevant defense solutions include: [0003] DDoS traffic cleaning: The most commonly used method of preventing DDoS at present. It detects DDoS attacks through DDoS detection devices and warns them. When a DDoS attack is found, the bypass traffic cleaning device is notified to pull the traffic of the attacked destination IP, clean the atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 李晗乔会来贾炯
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products