Protection method and protection device for application layer attacks and electronic equipment

A protective device and application layer technology, applied in the field of computer network security, can solve the problem that the method of client request rate detection is difficult to work

Inactive Publication Date: 2018-11-23
北京云枢网络科技有限公司
View PDF4 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the current application-layer attack methods generally use distributed proxy servers or botnets to send a large number of requests to the server. Since the request rate of each proxy or botnet client has no obvious abnormality, the method of client request rate detection often difficult to work

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method and protection device for application layer attacks and electronic equipment
  • Protection method and protection device for application layer attacks and electronic equipment
  • Protection method and protection device for application layer attacks and electronic equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035]In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are only It is a part of the embodiments of this application, not all of them. The components of the embodiments of the application generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations. Accordingly, the following detailed description of the embodiments of the application provided in the accompanying drawings is not intended to limit the scope of the claimed application, but merely represents selected embodiments of the application. Based on the embodiments of the present application, all other embodiments obtained by those skilled in the art without ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides a protection method and a protection device for application layer attacks, electronic equipment and a computer readable storage medium. The protection method comprises: after an access request sent by a client is received, sending response information carrying a jump link to the client; and if request information of the access jump link sent by the client is not received, denying forwarding the access request to the server. A protection side sends response information carrying a jump link and verification request information to the client; and according to theresponse made by the client, whether the client is an abnormal client can be accurately judged, the access request from the abnormal client is denied to be forwarded to the server when the client is an abnormal client, and the abnormal client can be effectively prevented from attacking the application layer, so that the server can serve the normal client.

Description

technical field [0001] The invention relates to the technical field of computer network security, and more specifically, to a protection method, protection device and electronic equipment for application layer attacks. Background technique [0002] Distributed denial of service (Distributed Denial of Service, DDoS) attack refers to the use of server technology to combine multiple computers as an attack platform to launch an attack on one or more targets, thereby multiplying the power of denial of service attacks. Among them, the application layer DDoS attack means that the attacker submits a large number of requests to the server, consumes the processing resources of the server, exhausts the processing resources and causes the server to be paralyzed, and then the server will refuse to serve normal users. [0003] Most of the existing attack detection schemes are realized by calculating the request rate of the client within a fixed time, and when the request rate of the clien...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/10H04L63/1416H04L63/1425H04L63/1458
Inventor 汪利福王泽
Owner 北京云枢网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products