Method and device for determining DDoS attack devices
A technology of attacking equipment and scheduling time, which is applied in the computer field, can solve problems such as poor user experience and failure to identify equipment equipped with DDoS attacks, and achieve the effect of improving user experience
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0043] Embodiment 1 of the present invention provides a method for determining a DDoS attack device, which is used to solve the technical problems that the method for determining a DDoS attack device in the prior art cannot identify a DDoS attack device with a complete protocol stack behavior and has poor user experience. This method can be applied to the attacked device (such as the server) itself, and can also be applied to the protection device specially set at the front end of the attacked device, which is not specifically limited in the embodiment of the present invention.
[0044] refer to figure 2 , the method for determining the DDoS attack device includes:
[0045] Step 101: When receiving HTTP requests sent by N clients, acquire the feature value of each of the N clients.
[0046] Specifically, each client has only one eigenvalue, and the eigenvalue of the client represents the characteristics of the application that the client initiates the HTTP request and / or the...
Embodiment 2
[0063] Embodiment 2 of the present invention provides a method for determining a DDoS attacking device, and the overall inventive concept of the method is the same as that of Embodiment 1. The difference is that the characteristic value of the client in the second embodiment refers to the characteristic information of the client, and there can be multiple characteristic values (i.e. characteristic information) of each client; while the characteristic value in the above-mentioned embodiment 1 is based on the multiple items of the client A value calculated from characteristic information, and a client has only one characteristic value. The complete implementation process of Embodiment 2 of the present invention is introduced below:
[0064] Step 1: Obtain at least one feature value of each of the N clients when receiving the HTTP requests sent by the N clients.
[0065] Among them, a characteristic value of the client is a characteristic information of the client, including b...
Embodiment 3
[0072] Embodiment 3 of the present invention provides a device for determining a DDoS attack device, refer to image 3 , the device consists of:
[0073] A receiving unit 201, configured to receive HTTP requests sent by N clients;
[0074] The processing unit 202 is configured to obtain a characteristic value of each client among the N clients, the characteristic value characterizing the characteristics of the application that the client initiates the HTTP request and / or the operating environment of the application and / or the hardware of the client ;Dividing each client with the same characteristic value into the same category, counting the traffic of each individual client within a predetermined time range; when determining that the traffic of any type of client within a predetermined time range exceeds the first threshold, Determining any type of client as a DDoS attack device.
[0075] Optionally, the device further includes a first sending unit 203;
[0076] The first s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com