Network attack defense method, device and system

A network attack and service system technology, which is applied in the field of network attack defense methods, devices and systems, can solve the problems of high complexity and poor flexibility in defense against DDoS, and achieve the effects of flexible modification or setting, reduced complexity, and reduced frequency access

Active Publication Date: 2018-04-06
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, a large number of servers are generally deployed in service systems such as cloud platforms or distributed servers. If multiple or even all servers in the service system need to defend against DDoS, it is necessary to deploy verification code verification mechanisms on multiple servers. , leading to high complexity in defense against DDoS; moreover, once the verification code verification logic in a certain server needs to be changed, the service provided by the server needs to be interrupted, and then the verification logic can be modified in the server, which is less flexible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network attack defense method, device and system
  • Network attack defense method, device and system
  • Network attack defense method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The solutions of the embodiments of the present application can be applied to attacking and defending servers in any service system, so as to reduce malicious access to servers in the service system such as DDoS attacks. Wherein, the service system may include one or more servers. For example, the service system may be a cloud platform that includes multiple servers. In this way, the solution of the embodiment of the present application may perform network attack defense on one or more servers in the cloud platform. As another example, the service system may be a server cluster that provides certain service services, and the server cluster may include multiple servers. In this way, the solution of the embodiment of the present application may carry out network attacks on one or more servers in the server cluster defense.

[0031] In the embodiment of the present application, the mentioned client may be a client accessing the service system, for example, the client may ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network attack defense method, device and system. According to the method, bypass inspection equipment intercepts an access request sent to a server in a service system, and redirects a client sending the access request to an authentication server, so as to authenticate the verification code of the client through the authentication server; and when it is determined that the client passes the verification of the authentication server, the access request sent by the client is forwarded to the server in the service system. Through adoption of the method, the service system can defend malicious attack behaviors like DDoS more flexibly and conveniently.

Description

technical field [0001] The present application relates to the field of network technology, in particular to a network attack defense method, device and system. Background technique [0002] With the continuous advancement of network technology, there are more and more network attacks in the network field. At present, distributed denial of service attack (Distributed Denial of Service, DDoS) has become a relatively serious attack method in many network attacks. A more common DDoS attack method is maliciously frequently initiating access requests to targets (eg, servers) that need to be attacked, so as to occupy too many service resources, so that legitimate users cannot get service responses. [0003] In order to defend against DDOS, it is necessary to configure the verification code verification mechanism in the server in advance, so that the server can start the verification code verification function. After the server starts the verification code verification function, i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1458H04L63/0892H04L67/564H04L67/563H04L63/1441H04L63/1408H04L67/01
Inventor 张浩浩
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products