Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network attack defending system and method for defending network attacks

A network attack and defense system technology, applied in the field of network security, can solve problems such as the inability to realize logical judgment and bottlenecks in processing capabilities at the application layer, and achieve the effect of effective defense

Inactive Publication Date: 2017-12-08
BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD +1
View PDF6 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The detection of network attacks is mainly divided into the detection of the transport layer and the detection of the application layer. The hardware firewalls commonly used today are more suitable for the attack defense of the transport layer, and most of the interception rules are based on the initial settings of the manufacturer. Or the simple setting of the management interface, so it cannot achieve flexible logical judgment for the application layer
[0004] In addition, although the hardware firewall itself has the advantage of hardware acceleration, its processing power still has a bottleneck for large computer rooms.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack defending system and method for defending network attacks
  • Network attack defending system and method for defending network attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] It should be noted that, in the description of the following specific embodiments of the present invention, for the sake of convenience, part of the content may be described for a specific network protocol (for example, HTTP protocol), but it should be understood that the embodiments of the present invention are not limited to these specific protocols.

[0028] The term "subsystem" used in the present invention can be implemented as a single computer or server, or as a cluster composed of multiple computers and / or servers, and all the computers included in the same cluster cooperate to realize the same specific function. Specifically, a "subsystem" may be a cluster composed of multiple x86 servers. In addition, an interpretation of the term "load balancing" in the present invention includes front-end forwarding for balancing the access pressure of back-end business servers. It should be understood that, the above explanation instructions for the terms of the present in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network attack defending system and a method for defending network attacks. The system comprises an application layer load balancing subsystem, a message queue subsystem and a real-time computing subsystem; the application layer load balancing subsystem is configured to receive a user request and contains a load balancing agent, and the load balancing agent is configured to read the user request from the application layer load balancing subsystem and write the user request into the message queue subsystem; the message queue subsystem is configured to cache the user request written by the load balancing agent; and the real-time computing subsystem is configured to acquire the cached user request from the message queue subsystem, analyze data in the user request, generate a banning rule according to an analysis result and write the banning rule into the message queue subsystem; and specifically, the message queue subsystem is further configured to cache the banning rule, and the load balancing agent is further configured to acquire the cached banning rule from the message queue subsystem and apply the extracted banning rule to the application layer load balancing subsystem.

Description

technical field [0001] The invention relates to the field of network security, in particular to a network attack defense system and a method for defending network attacks through the network attack defense system. Background technique [0002] With the rapid development of the Internet, network security has become an increasingly significant problem. Hackers have caused many companies to pay a heavy price through stealing data or retaliating attacks. For a typical Internet company, the network is an extremely important basic setting, which has extremely high requirements for network security. This requires that when a network security attack occurs, it must be detected within a certain period of time. [0003] The detection of network attacks is mainly divided into the detection of the transport layer and the detection of the application layer. The hardware firewalls commonly used today are more suitable for the attack defense of the transport layer, and most of the intercep...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06
CPCH04L63/1416H04L67/1036
Inventor 闫国旗都海峰
Owner BEIJING JINGDONG SHANGKE INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products