Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data collection method and system capable of achieving DDoS defense

A data acquisition, sub-level technology, applied in the field of communication, to improve the security and stability of the system

Active Publication Date: 2017-06-23
BEIJING XUEZHITU NETWORK TECH
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

While such attacks can be launched from within the target network itself, the vast majority of attacks are launched from external systems and networks connected to the target via the Internet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data collection method and system capable of achieving DDoS defense
  • Data collection method and system capable of achieving DDoS defense

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] In the following description, numerous specific details are given in order to provide a more thorough understanding of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced without one or more of these details. In other examples, some technical features known in the art are not described in order to avoid confusion with the present invention.

[0033] In the present invention, the term "DNS" (Domain Name System) refers to Domain Name System. It is a distributed database on the Internet that maps domain names and IP addresses to each other, enabling users to access the Internet more conveniently without having to remember IP numbers that can be directly read by machines. The process of finally obtaining the IP address corresponding to the host name through the host name is called domain name resolution (or host name resolution).

[0034] When resolving a domain name, you can first use the method of qu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a data collection method capable of achieving DDoS defense, and the method comprises the steps: randomly distributing a sub-domain name for an HTTP request code; receiving an HTTP request sent by the HTTP request code to a data collection server; monitoring the network access flow of the distributed sub-domain name from the HTTP request code, modifying the resolving rule of the sub-domain name in a DNS when the network access flow of the distributed sub-domain name exceeds an early-warning value, and enabling the sub-domain name not to point to the IP address of the data collection server. The invention also relates to a data collection system capable of achieving DDoS defense.

Description

technical field [0001] The invention relates to the communication field, in particular to a data collection method capable of defending against DDoS. The present invention also relates to a data collection system, in particular to a data collection system for defending against DDoS based on wildcards. Background technique [0002] A denial of service (DoS) attack is an apparent attempt by one or more attackers to prevent or impair legitimate use of host computers, routers, servers, networks, etc. While such attacks can be launched from within the target network itself, the vast majority of attacks are launched from external systems and networks connected to the target via the Internet. Today, Internet-connected devices, systems, and networks are facing rapid expansion and the real threat of DoS attacks. Such attacks not only harm the intended target, but also threaten the stability of the Internet itself. [0003] Early DoS attack techniques involved simple tools for gene...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08H04L29/12
CPCH04L63/1458H04L67/02H04L61/4511
Inventor 邬剑
Owner BEIJING XUEZHITU NETWORK TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products