Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A traffic processing method, device and system

A processing method and equipment technology, applied in the field of communication, can solve the problems that affect the normal business of users, cannot solve the problems of high cost and low efficiency, and achieve the effect of improving experience and reducing use cost

Active Publication Date: 2020-04-24
ALIBABA GRP HLDG LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the defect that high cost and low efficiency cannot be solved in the defense against DDoS in the prior art, thus affecting the normal business of users, this application proposes a traffic processing method, which is applied to a system including primary defense equipment and advanced defense equipment , wherein the traffic cleaning capability of the advanced defense device is higher than that of the primary defense device, the method includes:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A traffic processing method, device and system
  • A traffic processing method, device and system
  • A traffic processing method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0057] As mentioned in the background technology, the defense methods in the prior art cannot achieve a good defense effect, the cost of use is too high, the effect is not good, and the user experience is not high, so a traffic processing method is proposed in the embodiment of this application , applied to a system including primary defense equipment and advanced defense equipment, where the traffic cleaning capability of the advanced defense equipment is higher than that of the primary defense equipment, such as figure 2 As shown, the method includes:

[0058] In step 201, the management and control device monitors whether the load of the primary defense device for cleaning user traffic is greater than a first threshold.

[0059] Specifically, when detecting that there is illegal traffic, first start the primary defense device to clean the illegal traffic, wherein the primary defense device can be an IDC (Internet Data Center, Internet Data Center) device, because it is not...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present application discloses a traffic processing method, device and system, which are applied to a system including primary defense equipment and advanced defense equipment, wherein the traffic cleaning capability of the advanced defense equipment is higher than that of the primary defense equipment, the The method includes: the management and control device monitors whether the load of the primary defense device used for cleaning user traffic is greater than a first threshold; if the monitoring result is yes, the management and control device transfers the traffic processed by the primary defense device to the advanced defense device for cleaning; The management and control device controls and transfers the cleaned traffic to the business processing device for processing, so that different defense devices can be selected for traffic cleaning according to the specific situation, which reduces the cost of use. At the same time, this series of operations is performed without the user It is carried out under the condition of perception and does not require the user to perform additional operations. In this way, the user experience is improved by dynamically scheduling the defense equipment.

Description

technical field [0001] The embodiments of the present application relate to the technical field of communications, and in particular, to a traffic processing method, device, and system. Background technique [0002] Such as figure 1 As shown, it is a schematic diagram of a DDoS (Distributed Denial of Service, Distributed Denial of Service) attack. The attacker uses a bot to launch a DDoS attack. The attack causes the resources of the business server to be exhausted, thereby denying the service of normal users; Some defenses include: [0003] 1. DDoS traffic cleaning, which is currently the most commonly used method of defense against DDoS, detects DDoS attacks through DDoS detection equipment and gives an early warning. When a DDoS attack is found, it notifies the bypass traffic cleaning equipment to pull the traffic of the attacked destination IP and clean the attack traffic. Reinject normal flow. [0004] 2. Publish black hole routes on the carrier network, that is, whe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L29/12H04L12/803H04L12/853H04L47/2416
CPCH04L47/125H04L47/2416H04L63/1458H04L61/4511H04L67/61H04L9/40
Inventor 李阳董宝强赵洪日张毅
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products