Detection and protection method and system for application layer DDOS attack based on IP credibility

A DDOS and protection system technology, applied in the field of CDN network security, can solve the problems of not considering the characteristics of the request, the inability to model, and the limitations of the technical solution, so as to improve the experience, ensure the quality of access, and improve the accuracy.

Pending Publication Date: 2021-03-12
SHANGHAI QINIU INFORMATION TECH
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1) The first technical solution cannot effectively detect DDoS and CC attacks, because when there are enough attackers, especially when a URL is frequently requested, the detection method can be easily bypassed;
[0006] 2) The second technical solution has relatively large limitations and is not suitable for application to CDN platforms, because CDN platforms, as the infrastructure of cloud services, can access a variety of services in different forms, and cannot analyze most user behavior data. Perform HsMM modeling;
[0007] 3) The third technical solution only considers the session parameters, and does not consider other request characteristics, such as the requested User-Agent, the request header of the specific attack software, the frequency of the requested access, etc. In particular, there is no comparison with historical Linkage of DDoS attack incidents, lack of analysis accuracy and effectiveness

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection and protection method and system for application layer DDOS attack based on IP credibility
  • Detection and protection method and system for application layer DDOS attack based on IP credibility
  • Detection and protection method and system for application layer DDOS attack based on IP credibility

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Embodiments and examples of the present invention will be described in detail below with reference to the drawings.

[0032] see figure 1 , figure 1 It shows a schematic diagram of the processing flow of an IP reputation-based application layer DDOS attack detection and protection method in an embodiment, specifically including steps S11-S14:

[0033] Step S11: Calculate and obtain the IP reputation of all access request IPs according to the historical record data, and store the IP reputation to form an IP reputation database.

[0034] In this step, for the specific implementation steps of calculating and obtaining the IP reputation of all access request IPs, please refer to figure 2 The schematic diagram of the calculation flow of the IP reputation is shown.

[0035] The acquired IP reputation data is stored in a memory to form an IP reputation database. Specifically, the IP reputation data can be stored in a distributed NoSQL cluster. In one embodiment, the IP rep...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an application layer DDOS attack detection and protection method and system based on IP credibility and electronic equipment, and the method comprises the steps: obtaining the IP credibility through combining an IP access log and a DDOS attack event record, carrying out the shunting of an access request according to the IP credibility, redirecting a high-risk access request to a corresponding high-protection server. Therefore, requests of different security threat levels are shunted and isolated, and detection and protection of application layer DDoS attacks are further realized. By utilizing the method disclosed by the invention, the abnormal traffic can be effectively distinguished, the accuracy of preventing and detecting the DDoS attack is improved, and meanwhile, when the service is attacked, the access quality of a normal user can be effectively ensured and the user experience is improved, so that the method disclosed by the invention hasobvious beneficial effects.

Description

technical field [0001] The present application relates to the field of CDN network security, in particular to a method and system for detecting and protecting application layer DDOS attacks based on IP reputation. Background technique [0002] With the rapid development of mobile Internet, cloud computing, 5G, AI, Internet of Things and other technologies and industries, the digital transformation of society and enterprises has entered a critical stage. More and more enterprises have accelerated their service migration to the public cloud. While technology upgrades, attacks against sensitive cloud workloads and data have also followed. In particular, games, live broadcasts, finance, and government websites are faced with a large number of black products crowding out network bandwidth through malicious traffic, and services cannot operate normally. In recent years, with the continuous development and improvement of hardware devices and underlying detection technologies for D...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/1458H04L63/1425
Inventor 谢辉姜智吴信谊
Owner SHANGHAI QINIU INFORMATION TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products