Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

CC attack protection method and device, storage medium and computer device

A protective device and a legal technology, applied in the field of network security, can solve problems such as resource consumption, wrong seals, and poor customer experience, so as to prevent work failures and ensure safety.

Active Publication Date: 2019-08-09
辽宁途隆科技有限公司
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

An attacker can usually continuously send request packets to the target server that consume the performance of the target server, causing the target server to continuously perform a large number of calculations or operations, consuming a lot of resources
When the calculation or operation performed by the target server reaches the processing limit of its own CPU, it will cause normal access to be terminated, or even downtime
[0004] The anti-CC attack method in the prior art usually only protects against large-traffic attacks. When faced with targeted CC attacks, there are often a large number of leaks, false seals, etc., and the customer experience is extremely bad. At the same time, a large number of anti-CC firewalls on the market have problems such as difficulty in client SDK integration and easy cracking.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CC attack protection method and device, storage medium and computer device
  • CC attack protection method and device, storage medium and computer device
  • CC attack protection method and device, storage medium and computer device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] Hereinafter, the present application will be described in detail with reference to the drawings and embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.

[0068] In this embodiment, a CC attack protection method is provided for the client, such as figure 1 As shown, the method includes:

[0069] Step 101, obtain the request data packet generated by the target application to the target server.

[0070] In the embodiment of the present application, when the target application program in the client establishes a communication connection with the target server and generates a request data packet to the target server, the request data packet is sent with a delay. For example, when a user wants to log in to a game software, the game software needs to send a login request packet containing information such as a login name and a login password to the ga...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a CC attack protection method and device, a storage medium and a computer device. The method comprises the steps of obtaining a request data packet generated by a target application to a target server; performing encryption processing on the request data packet according to a preset encryption rule; and sending the encrypted request data packet to a forwarding server to enable the forwarding server to forward the request data packet to the target server after performing security authentication on the request data packet. According to the invention, the request data packet is encrypted at a client side and the encrypted data packet is sent to the forwarding server, so that the encryption mode is used as a basis for security verification of the request data packet. The forwarding server is used for performing security authentication on the encrypted request data packet and then realizing the data forwarding, so that the security of the request data packet forwarded to the target server is ensured, and the working fault of the target server caused by the CC attack can be effectively prevented.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a CC attack protection method and device, storage medium, and computer equipment. Background technique [0002] With the rapid development of network technology and the rapid expansion of network scale, security holes in the network are increasingly exploited by attackers to attack hosts in the network. The popular CC (Challenge Collapsar) attack in recent years is a kind of network attack. [0003] CC attack belongs to a page-based distributed denial of service (DDOS, Distributed Denial of Service) attack. An attacker can usually continuously send request packets to the target server that consume the performance of the target server, causing the target server to continuously perform a large number of calculations or operations, consuming a lot of resources. When the calculation or operation performed by the target server reaches the processing limit of its o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1458H04L63/0428H04L63/08H04L63/1425
Inventor 赵海洋任亮刘丽刘汉东张福源朱林于欣栗一龙
Owner 辽宁途隆科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products