Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack traffic protection system, method and device, electronic equipment and storage medium

A technology for attacking traffic and traffic, applied in the field of network security, it can solve problems such as difficult protection and rapid adaptation, protection method coverage, inability to meet business timeliness and automation, etc., to improve efficiency and protection effect, and meet DDoS protection requirements. Scenario requirements and the effect of rational utilization of resources

Active Publication Date: 2020-06-16
TENCENT TECH (SHENZHEN) CO LTD
View PDF6 Cites 31 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the face of DDoS threats with complex attack scenarios in large-scale networks, due to the complex and changeable attack methods and various business scenarios, it is difficult to effectively protect and quickly adapt, and it is difficult to cover the DDoS threat with a single protection method or a single protection solution. The increasingly severe DDoS attacks cannot meet the needs of business timeliness and automation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack traffic protection system, method and device, electronic equipment and storage medium
  • Attack traffic protection system, method and device, electronic equipment and storage medium
  • Attack traffic protection system, method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purpose, technical solutions and advantages of the embodiments of the application clearer, the technical solutions of the application will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the application. Obviously, the described embodiments are the Some embodiments of the technical solution, but not all embodiments. Based on the embodiments described in the application documents, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the technical solutions of the present application.

[0051] Some concepts involved in the embodiments of the present application are introduced below.

[0052] Denial-of-service attack (DoS attack for short): also known as flood attack, is a network attack method whose purpose is to exhaust the network or system resources of the target computer, temporarily interrupt or stop the ser...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of network security, in particular to an attack traffic protection system, method and device, electronic equipment and a storage medium, which are used forproviding an automatic hierarchical protection method and improving the protection efficiency, and the system comprises: a core router cluster used for forwarding received mirror image traffic of traffic to be processed to an attack detection module; an attack detection module which is used for detecting the mirror image flow, generating alarm information after the attack traffic is detected, andreporting the alarm information to the central centralized control module; and a central centralized control module which is used for determining the attack type of the attack traffic according to the traffic feature information in the alarm information, wherein if the attack type comprises a bandwidth consumption type attack, the core router cluster is enabled to protect the to-be-processed flow, and if the attack type comprises the resource consumption type attack, the cleaning module is enabled to protect the to-be-processed flow. Since automatic layered protection is performed according to the flow characteristic information of the attack flow, the protection efficiency is improved.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular to an attack traffic protection system, method, device, electronic equipment and storage medium. Background technique [0002] As DDoS (Distributed Denial-Of-Service, distributed denial-of-service attacks) attacks become more and more frequent threats to basic business systems and data security. The design method of the DDoS protection system in the related art is usually based on Netflow (network flow) to monitor the network attack traffic, and after the attack is found, the DDoS attack is mitigated by deploying a dedicated cleaning device in series or bypass. [0003] However, in the face of DDoS threats with complex attack scenarios in large-scale networks, due to the complex and changeable attack methods and various business scenarios, it is difficult to effectively protect and quickly adapt, and it is difficult to cover the DDoS threat with a single prote...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1458
Inventor 聂建胜陈国盛红利周志彬
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products