Challenge black hole attack detection method and related device

A technology for challenging black holes and detection methods, applied in the field of detection methods and related devices for challenging black hole attacks, can solve problems such as high false alarm rate, and achieve the effect of reducing false alarm rate and accurate detection

Active Publication Date: 2020-02-18
NEW H3C SECURITY TECH CO LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing technology only detects whether there is a CC attack based on the rate and concentration of access requests, which has a high false positive rate

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Challenge black hole attack detection method and related device
  • Challenge black hole attack detection method and related device
  • Challenge black hole attack detection method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the purpose, technical solutions and advantages of the embodiments of the present disclosure clearer, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the drawings in the embodiments of the present disclosure. Obviously, the described embodiments It is a part of the embodiments of the present disclosure, but not all of them. The components of the disclosed embodiments generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0021] Accordingly, the following detailed description of the embodiments of the present disclosure provided in the accompanying drawings is not intended to limit the scope of the claimed disclosure, but merely represents selected embodiments of the present disclosure. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary sk...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of network security, and provides a challenge black hole attack detection method and a related device, and the method comprises the steps: calculating the request rate and / or concentration degree of a URL according to the statistical information of the URL corresponding to a page access request; judging whether a suspicious challenge black hole CC attack exists or not according to the request rate and / or the concentration degree; if the suspicious CC attack exists, obtaining current running state information of the server; and if the current running state information does not meet the preset condition, judging that the suspicious CC attack is the CC attack. The false alarm rate can be reduced by combining the rate and the concentration degree of the access request and the current running state of the server.

Description

technical field [0001] The present disclosure relates to the field of network security, in particular, to a detection method and a related device for challenging black hole attacks. Background technique [0002] Challenge Black Hole CC (Challenge Collapsar, CC) attack is an application-layer DDoS attack that takes website pages as the main attack target. When launching an attack, the attacker chooses an application that requires more resource overhead on the open page of the server, for example, it needs to occupy the server Pages that use a lot of CPU resources for calculations or applications that require a lot of access to the database, when the server is too late to process these access requests, the page will not be able to respond to normal user access requests. At this time, normal access will be rejected. [0003] The existing technology only detects whether there is a CC attack based on the rate and concentration of access requests, which has a high false positive r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1458
Inventor 李金英
Owner NEW H3C SECURITY TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products