A kind of defense method and equipment of ddos attack
A device and a technology of preset time periods, applied in the field of network security, can solve problems such as the separation of broiler users, the unsatisfactory protection effect of the protection algorithm, and the economic loss of service providers.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0066] In order to make the purpose, technical solutions and advantages of the present invention clearer, the following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the drawings in the embodiments of the present invention.
[0067] Due to the certain similarity between the broiler flock and the normal users or the infected normal users, the data packets sent by them are no different from the normal traffic, so that the general defense methods cannot identify the DDoS attack, and thus cannot defend against the DDoS attack in time
[0068] In view of this, the embodiment of the present invention provides a new defense method for DDoS attacks. The defense method determines the behavior correlation between a behavior of a user interacting with the server and other behaviors. If a certain behavior of the user is related If the degree is within the corresponding preset fluctuation range, it can be considere...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com