Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anti-attack processing method, device, device and storage medium

A technology for attacking equipment and processing devices, which is applied in the field of communication, and can solve problems such as DDoS attacks on Internet of Things devices and Internet of Things damage, and achieve the effect of preventing attacks

Active Publication Date: 2021-06-01
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the existing technology, due to the limited security capabilities of IoT devices, IoT devices are easily used in DDoS attacks. If a large number of IoT devices are easily used in DDoS attacks, the Internet of Things will be fatally damaged.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-attack processing method, device, device and storage medium
  • Anti-attack processing method, device, device and storage medium
  • Anti-attack processing method, device, device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0040] The anti-attack processing method provided by the present invention can be applied to figure 1 The communication system shown. Such as figure 1 As shown, the communication system includes: a communication network A, a communication network B, and a communication network C, wherein the communication network A includes a core device 11, an access gateway 21, and an Internet of T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments of the present invention provide an attack defense processing method, device, equipment, and storage medium. The method includes: the core device in the communication network receives the identification information and the IP address of the attacking device sent by the attacked device in the communication network; and broadcasts the identification information and the IP address of the attacking device to the first access gateway in the communication network In the blockchain network formed by the second access gateway in other communication networks, the first access gateway prohibits the attacking device from accessing the communication network through the first access gateway, and the second access gateway prohibits the attacking device from accessing the communication network through the second access gateway. The second access gateway accesses other communication networks. The embodiment of the present invention uses the core device and broadcasts the identification information and IP address of the attacking device to a block chain network composed of access gateways of different communication networks, so that the access gateways of each communication network prohibit the attacking device Access to the corresponding communication network, so as to effectively prevent DDoS attacks.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of communications, and in particular, to an attack defense processing method, device, device, and storage medium. Background technique [0002] Distributed denial of service (Distributed Denial of Service, DDoS) attack refers to the use of client / server technology to combine multiple computers as an attack platform to launch DDoS attacks on one or more targets, thereby doubling the probability of denial of service attacks. power. [0003] In the prior art, due to the limited security capabilities of IoT devices, IoT devices are easily used in DDoS attacks. If a large number of IoT devices are easily used in DDoS attacks, the Internet of Things will be fatally damaged. Contents of the invention [0004] Embodiments of the present invention provide an attack prevention processing method, device, equipment, and storage medium, so as to prevent DDoS attacks. [0005] In the first as...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1458H04L63/1466
Inventor 田新雪马书惠肖征荣
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products