Method and device for identifying unknown cdn nodes in cc attack protection

A node and legal technology, applied in the network field, can solve problems such as users' inability to access websites, and achieve the effect of ensuring business continuity

Active Publication Date: 2022-01-28
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a method and device for identifying unknown CDN nodes in CC attack protection, so as to solve the technical problem that the CDN node is misjudged as the CC attack source and the proxy IP is blocked, causing users in some areas to be unable to access the website

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for identifying unknown cdn nodes in cc attack protection
  • Method and device for identifying unknown cdn nodes in cc attack protection
  • Method and device for identifying unknown cdn nodes in cc attack protection

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] In order to make the object, technical solutions, and advantages of the present application, the technical solutions of the present application will be apparent from the accompanying drawings, which will be described in connection with the accompanying drawings. Embodiments. Based on the embodiments in the present application, one of ordinary skill in the art is in the scope of the present application without making creative labor premistence.

[0046] The terms "including" and "having" as mentioned in the present application embodiment are intended to cover the contained in the cover. For example, a series of steps or units comprising a series of steps or units are not limited to the procedures or units, but optionally, other steps or units that are not listed, or optionally also Includes other steps or units inherent to these processes, methods, products, or equipment.

[0047] It should be noted that the features of the present application and the features in the embodim...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present application provides a method and device for identifying unknown CDN nodes in CC attack protection, which relate to the field of network technology and include: receiving a hypertext transfer protocol (HTTP) request carrying a proxy field, the proxy field includes a proxy Internet protocol (IP ) address, the HTTP request includes the source IP address; if the HTTP request is sent through a browser, record the source IP address in the IP array corresponding to the proxy IP address; if the array corresponding to the proxy IP address meets the preset condition, determine the proxy IP address as The IP address of the content distribution network (CDN) node is unknown, which solves the technical problem that the CDN node is misjudged as a challenge black hole (CC) attack source and blocks the IP, causing users in some areas to be unable to access the website.

Description

Technical field [0001] The present application relates to the field of network technology, in particular, to a method and apparatus for identifying unknown CDN nodes in CC attack protection. Background technique [0002] At present, a large number of small and medium-sized websites use some content distribution networks (CONTENT Delivery Network, CDN) services to speed up website access, and will also install challenge protection software on the website server, once the user uses CDN services When the protection work is executed, the acquired agent Internet protocol (Internet Protocol, IP) is a CDN Node IP, which is a compatible CDN service, and the protection software generally has built-in popular CDN node IP addresses to achieve CDN transparency. Effect. [0003] Business and security often have compatibility problems in some scenes, the principle of the CC protection system does not open the statistics of the source IP access, once the CDN has added a service node or changed ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/1416H04L63/145
Inventor 胡涛涛范渊
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products