Network attack processing method and device

A network attack and processing method technology, applied in the field of network attack processing and network attack processing devices, can solve problems such as affecting business and website access, and achieve the effects of ensuring stability, reducing business impact, and reducing impact.

Active Publication Date: 2017-01-04
ALIBABA GRP HLDG LTD
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, although the shielding of the attack target IP address can ensure the overall stability of the server and the network, after shielding the attacked IP address, it will also affect the business of the IP address and affect website access.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack processing method and device
  • Network attack processing method and device
  • Network attack processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the above objects, features and advantages of the present application more obvious and comprehensible, the present application will be further described in detail below in conjunction with the accompanying drawings and specific implementation methods.

[0046] refer to figure 1 , which shows a flow chart of the steps of an embodiment of a network attack processing method of the present application, which may specifically include the following steps:

[0047] Step 101, acquire the first IP address of the connection server and the number of connections corresponding to the first IP address.

[0048] In the embodiment of the present application, multiple virtual hosts can be divided on the server, and the server can be connected to each virtual host through a public port such as port 80.

[0049] The network attack processing device may be the server itself, or a device set in the server, or a device independent of the server but capable of communicating ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network attack processing method and device The network attack processing method comprises steps of obtaining a first IP address connected to a server and a connection number corresponding to the first IP address, determining whether the connection number corresponding to the first IP address is greater than or equal to a first threshold value, if yes, shielding a source IP address connected to the first IP address. The embodiment of the network attack processing method and device not only guarantees integral stability of the server and the network, but also reduces influence on a service of an attacked IP address through shielding the source IP address, and reduces the influence on the network access.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular, to a network attack processing method and a network attack processing device. Background technique [0002] Virtual host, also called "website space", is to divide a server running on the Internet into multiple hard disk spaces with a certain size, each space is given corresponding FTP (File Transfer Protocol, file transfer protocol) permissions and Web Access rights for website publishing. [0003] In order to protect the overall stability and security of the server, the server's firewall will monitor network attacks on each virtual host. Once the firewall judges that the attack scale reaches a certain threshold, it will automatically block the IP address of the attacked virtual host. [0004] However, although the shielding of the attack target IP address can ensure the overall stability of the server and the network, after shielding the attacked IP address,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1458H04L9/40
Inventor 张倩孙磊
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products