Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-attack fragmented message processing method and device, computer and storage medium

A message processing and storage medium technology, applied in the computer field, can solve the problems of occupying storage space, firewall paralysis, insufficient memory, etc., to achieve the effect of improving reliability and ensuring normal traffic

Active Publication Date: 2018-04-13
NEUSOFT CORP
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At present, for security vendors, the anti-attack performance of the firewall is the key point. However, some attack the firewall by using fragmented packets. For example, for the same packet, sending one of the fragmented packets will not Then send again, in this way, the computer cannot complete the reorganization of fragmented packets, and these fragmented packets will continue to occupy storage space, resulting in insufficient memory when allocating normal fragmented packets, and may even cause the firewall to be in a paralyzed state
[0004] It can be seen that there is currently no better method for preventing fragmentation attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-attack fragmented message processing method and device, computer and storage medium
  • Anti-attack fragmented message processing method and device, computer and storage medium
  • Anti-attack fragmented message processing method and device, computer and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Specific embodiments of the present disclosure will be described in detail below in conjunction with the accompanying drawings. It should be understood that the specific embodiments described here are only used to illustrate and explain the present disclosure, and are not intended to limit the present disclosure.

[0068] figure 1 It is a flow chart of an attack-proof fragmented packet processing method shown according to an exemplary embodiment, as shown in figure 1 As shown, the attack-proof fragmented message processing method can be applied to a computer, and includes the following steps.

[0069] Step S11: Determine whether the total number of fragmented packets in the hash table exceeds a first preset threshold.

[0070] Step S12: When the total number exceeds the first preset threshold, clear the message reassembly items in the hash table based on the LRU (Least recently used, least recently used) algorithm.

[0071] Wherein, the hash table is used to record m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anti-attack fragmented message processing method and device, a computer and a storage medium, which are used for improving the anti-attack performance of the regrouping offragmented messages. The method comprises the following steps of determining whether the total number of fragmented messages in a hash table exceeds a first preset threshold value or not, wherein thehash table is used for recording message recombination items to be recombined and the fragmented messages which are suspended in each message recombination item to be recombined; and when the total number exceeds the first preset threshold value, clearing the message recombination items in the hash table based on a least recently used (LRU) algorithm.

Description

technical field [0001] The present disclosure relates to the field of computer technology, and in particular, to an attack-proof fragmented message processing method, device, computer and storage medium. Background technique [0002] When transmitting data in the network, fragmentation reassembly logic is often used, that is, a complete message is divided into multiple fragmented messages for transmission, and then the receiving end reassembles the fragmented messages to obtain a complete message . In fragment reassembly logic, fragmented messages belonging to different messages will be stored in different areas, so as to correctly realize the reassembly of each message. [0003] At present, for security vendors, the anti-attack performance of the firewall is the key point. However, some attack the firewall by using fragmented packets. For example, for the same packet, sending one of the fragmented packets will not Then send again, in this way, the computer cannot complete...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0227H04L63/1441
Inventor 刘健男党丽娜
Owner NEUSOFT CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products