CC (Challenge Collapsar) attack defense method of distributed system and distributed system

A distributed system, black hole challenge technology, applied in the field of distributed system, challenge black hole attack defense, can solve problems such as downtime, slow DNS server response, etc., to avoid CC attacks

Inactive Publication Date: 2020-08-21
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF11 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a distributed system challenge black hole attack defense method and a distributed system to at least solve the problem of slow response or downtime of the DNS server caused by CC attacks in related technologies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • CC (Challenge Collapsar) attack defense method of distributed system and distributed system
  • CC (Challenge Collapsar) attack defense method of distributed system and distributed system
  • CC (Challenge Collapsar) attack defense method of distributed system and distributed system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solutions and advantages of the present application clearer, the present application will be described and illustrated below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application. Based on the embodiments provided in the present application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts shall fall within the protection scope of the present application.

[0052] Obviously, the accompanying drawings in the following description are only some examples or embodiments of the present application, and those skilled in the art can also apply the present application to other similar scenarios. In addition, it can also be understood that although such development efforts may be complex and lengthy, for those of or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a CC (Challenge Collapsar) attack defense method of a distributed system and the distributed system. The method comprises the steps that a cache server receives a domain nameresolution request message sent by a client in the distributed system; the cache server queries a domain name resolution result of a preset domain name requested to be resolved by the domain name resolution request message; and under the condition that the domain name resolution result of the preset domain name is queried, the cache server sends the domain name resolution result of the preset domain name to the client. Through the method and the device, the problem of slow response or downtime of the DNS server due to CC attack is solved, and CC attack to the DNS server is avoided.

Description

technical field [0001] This application relates to the field of network security, especially to the challenge black hole attack defense method and distributed system of distributed systems. Background technique [0002] In a production environment, there is a scenario where an Api (Application Programming Interface, Application Programming Interface) interface call needs to be made between different servers. With the widespread deployment of distributed systems, the use of this scenario has become more and more widespread, and the corresponding request volume has also become larger and larger. At the same time, with the fierce competition in the market, because developers do not pay enough attention to such issues as DNS server resolution, it may cause CC (ChaIIenge CoIIapsar, challenge black hole) attacks on DNS (Domain Name Server, domain name server) servers. [0003] In related technologies, figure 1 is a schematic diagram of a domain name resolution request method in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/1441H04L63/20H04L61/4511
Inventor 汪磊范渊杨勃
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products