Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Traffic attack protection method and device, protection server and storage medium

A traffic attack and target server technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve the problems of low protection accuracy, inability to attack traffic filtering, and low protection comprehensiveness, so as to improve the accuracy and comprehensiveness, guaranteeing normal service provision, and the effect of accurate and efficient identification and filtering

Active Publication Date: 2018-09-21
TENCENT TECH (SHENZHEN) CO LTD
View PDF8 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This traffic attack protection method can only limit the rate of packets without distinction, and there is a possibility of killing normal packets by mistake (for example, if the packet traffic of normal business is too large and hits the packet rate limit policy, the packets of normal business will be was killed by mistake), the accuracy of the protection is not high; at the same time, the traffic attack protection based on the packet rate limit policy cannot filter all the attack traffic, the comprehensiveness of the protection is low, and the protection effect is limited

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traffic attack protection method and device, protection server and storage medium
  • Traffic attack protection method and device, protection server and storage medium
  • Traffic attack protection method and device, protection server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0038] The traffic attack protection method provided by the embodiment of the present invention can intercept and filter the attack message (that is, the attack traffic) to be sent to the target server to be protected based on the fingerprint feature of the attack message at the router level, reducing the number of attacks received by the target server. The possibility of attacking packets improves the accuracy and comprehensiveness of traffic attack protection...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the invention provide a traffic attack protection method and device, a protection server and a storage medium. The method comprises the following steps of acquiring a message to be sentto a target server under a condition that a traffic attack possibility exists in the target server; at least extracting a load of a message whose source port is not a preset source port from the message to be sent to the target server in order to obtain the load of a message to be matched; matching the load of the message to be matched with fingerprint features of a pre-defined attack message, and determining the attack message from the message to be matched, wherein the determined load of the attack message is provided with a character string corresponding to each key field defined by the fingerprint features; and filtering the attack message. According to the embodiments of the invention, the accuracy of traffic attack protection can be improved, a protection effect of the traffic attack is improved, and the normal service provision of the target server is guaranteed.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a traffic attack protection method, device, protection server and storage medium. Background technique [0002] Traffic attack refers to an attack method that sends a large number of attack packets to the target server, causing the target server to fail to respond to normal business requests and affecting the service provided by the target server. Among traffic attacks, DDoS (Distributed Denial of Service, Distributed Denial of Service) attacks are the most typical. [0003] The current traffic attack protection method is mainly based on the packet rate limiting strategy, that is, to limit the rate of packets sent from the same source IP to the target IP (the target IP is the IP of the target server to be protected), so that the source IP and target IP latitude The rate limit of the message is carried out, and the messages sent from the same source IP to the tar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/851
CPCH04L47/2483H04L63/1458H04L63/1466
Inventor 陈国
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products