CC attack protection method and device, storage medium and computer device
A protective device and a legal technology, applied in the field of network security, can solve problems such as resource consumption, wrong seals, and poor customer experience, so as to prevent work failures and ensure safety.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0067] Hereinafter, the present application will be described in detail with reference to the drawings and embodiments. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other.
[0068] In this embodiment, a CC attack protection method is provided for the client, such as figure 1 As shown, the method includes:
[0069] Step 101, obtain the request data packet generated by the target application to the target server.
[0070] In the embodiment of the present application, when the target application program in the client establishes a communication connection with the target server and generates a request data packet to the target server, the request data packet is sent with a delay. For example, when a user wants to log in to a game software, the game software needs to send a login request packet containing information such as a login name and a login password to the ga...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com