Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for cleaning SYN FLOOD attack

A technology for cleaning systems and messages, which is applied in the field of computer networks, can solve problems such as low efficiency, missing traffic, complex deployment of network architecture, etc., and achieve the effect of preventing counterfeiting of legitimate traffic and reducing pressure

Inactive Publication Date: 2017-01-25
GUANGDONG EFLYCLOUD COMPUTING CO LTD
View PDF2 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The above two methods have obvious disadvantages. The first method brings a lot of complexity and trouble in the deployment of the network architecture of the system because it needs to reply the verification message to the client. It generates a cookie and a reply for each SYN request. The efficiency of the message is also very low; the second method needs to establish a connection identifier for each SYN request, and the efficiency is relatively low. The SYN attack with large traffic can often reach millions of messages per second, and secondly, some small traffic The SYN attack may forge the retransmission behavior, use the same address and port to resend the SYN message at intervals, and only check the validity of the retransmission, which will miss and kill this part of the traffic

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for cleaning SYN FLOOD attack
  • Method and system for cleaning SYN FLOOD attack
  • Method and system for cleaning SYN FLOOD attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] refer to figure 1 , the cleaning method of a kind of SYN FLOOD attack of the present invention, comprises the following steps:

[0048] A. Establish an identification status array;

[0049] B. When a message is received, obtain the total length of the message and the quintuple information of the message;

[0050] C, judge whether the type of the message is a SYN message and whether the total length of the message is greater than a preset length threshold, if so, discard the message; otherwise, perform step D;

[0051] D. Determine whether the message is the first message, if so, execute step E; otherwise, execute step F;

[0052] E, judge whether the type of this message is a SYN message, if so, then the number of times of repeated establishment is set to 0, the last connection time is set as the current time, and discards this message; Otherwise, then discards this message;

[0053] F. Determine whether the type of the message is a SYN message, if so, perform SYN re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for cleaning SYN FLOOD attack. The method has the advantages that by filtering an overlong SYN message, the stress during connection establishing and analysis is greatly reduced; then, by analyzing after a connection identification is established, the reloading time of SYN is judged, and the reloading times are limited, so as to prevent an attacker from simulating reloading activity and counterfeiting into legal traffic; the method can be widely applied to SYN attach defense techniques.

Description

technical field [0001] The invention relates to the technical field of computer networks, in particular to a cleaning method and system for SYN FLOOD attacks. Background technique [0002] Denial of Service attack (DoS, Denial of Service) refers to using various service requests to exhaust the system resources of the attacked network, so that the attacked network cannot process the requests of legitimate users. With the rise of botnets, and due to the characteristics of simple attack methods, large impact, and difficulty in tracing, distributed denial of service attacks (DDoS, Distributed Denial of Service) have grown rapidly and become increasingly rampant. A botnet composed of tens of thousands of hosts provides the required bandwidth and hosts for DDoS attacks, forming a huge attack and network traffic, causing great harm to the attacked network. [0003] With the continuous improvement and development of DDoS attack technology, operators such as ISPs, ICPs, and IDCs fac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1458
Inventor 梁润强易建仁史伟梁永堂彭国柱
Owner GUANGDONG EFLYCLOUD COMPUTING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products