Traffic control method and system

A flow control and flow technology, applied in the computer field, can solve problems such as poor defense effect

Active Publication Date: 2020-11-06
ALIBABA GRP HLDG LTD
View PDF7 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a flow control method and system to at least solve the technical problem of defending against attackers by increasing the physical bandwidth, which is likely to cause poor defense effect due to the limitation of the physical bandwidth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Traffic control method and system
  • Traffic control method and system
  • Traffic control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] This application provides figure 1 The timing diagram of the flow control method shown, figure 1 is a sequence diagram of a flow control method according to Embodiment 1 of the present application, and the method includes the following processing flow:

[0030] Step S102, the service provider 12 sends traffic information to the router 14;

[0031] Specifically, the service provider 12 is used to send traffic information to the destination address, and the service provider 12 may be a search engine ISP, an instant messaging ISP, a mobile Internet service ISP, a portal ISP, or an email service provider. Wherein, there may be one or more service providers 12, and in addition, the address of the service provider 12 sending traffic information is the source address.

[0032] Step S104, the router 14 sends the obtained flow information to the switch 16 corresponding to the destination address;

[0033] Specifically, the destination address is the address of the receiving d...

Embodiment 2

[0080] According to the embodiment of the present application, it also provides Figure 4 shown in the flow control method, Figure 4 It is a schematic flowchart of the flow control method, which at least includes the following steps S402 to S406:

[0081] Step S402, obtaining traffic information from all source addresses;

[0082] In some optional embodiments of the present application, the above-mentioned source address is an address for sending traffic data to a destination address.

[0083] Specifically, the source address above can be the address of an ISP. At present, according to the main business division, Chinese ISPs mainly fall into the following categories: search engine ISPs, instant messaging ISPs, mobile Internet service ISPs, portal ISPs, and email service providers. The flow information includes the flow value of the current flow.

[0084] In some optional embodiments of the present application, the real-time network traffic data can be acquired from the IS...

Embodiment 3

[0109] According to the embodiment of the present application, it also provides Figure 6 shown in the flow control method, Figure 6 It is a schematic flow chart of the flow control method, which at least includes the following steps S602 to S616:

[0110] Step S602, summarizing traffic data according to the destination IP;

[0111] Specifically, the destination IP address is the destination address for receiving traffic data; the traffic data may originate from the service provider side;

[0112] Step S604, judging whether the flow value of the flow data exceeds a first threshold;

[0113] If yes, execute step S606, if not, execute step S614;

[0114] Optionally, the traffic value is used to indicate the total traffic size from all source addresses of the traffic data;

[0115]Step S606, judging whether the above-mentioned flow value is being suppressed; if yes, execute step S616, if not, execute step S608;

[0116] Step S608, the source IP of the destination IP summari...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a traffic control method and system. The traffic control method comprises the following steps of: acquiring traffic information from a service provider side; determining a traffic value of traffic data sent to a destination address based on the traffic information, wherein the traffic value is used for indicating a total traffic size of all source addresses from the trafficdata; comparing the traffic value with a first threshold value; and determining whether to limit the traffic from the target source address in all the source addresses or not according to the comparison result. By adopting the traffic control method and the system, the technical problem that the defense effect is poor due to limitation of the physical bandwidth when an attacker is defended in a mode of improving the physical bandwidth is solved.

Description

technical field [0001] The present application relates to the field of computers, in particular, to a flow control method and system. Background technique [0002] At present, the physical bandwidth of the computer room is limited, and the bandwidth resources in the hands of attackers have far exceeded the water level of the computer room. In order to reduce the risk of the computer room and improve the protection capability of the computer room (peak bandwidth) as much as possible, it is necessary to use the ability of the operator to suppress the traffic of the attack source (broilers in the computer room, large-scale attackers in a network segment). According to the experience of attack and defense processing, whenever there is a large traffic (600Gbps+) attack, the attack source can be simply classified into three parts: domestic computer room-level attackers, domestic scattered attackers, and overseas attackers. In terms of proportion, domestic computer room-level atta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/823H04L12/801H04L47/32
CPCH04L63/1441H04L47/32H04L47/29Y02D30/50
Inventor 屠一凡
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products