Method of guarding network attack
A network attack and network equipment technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve the problems of resource occupation, source address spoofing attacks, crashes, etc., to achieve a low-occupancy, simple and efficient solution Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] Normally, after a network device router receives a message, it will look up the routing and forwarding table according to the destination address of the message. If it finds the outgoing interface of the router corresponding to the destination address, it will forward the message through the corresponding interface. If the destination address is the router itself, the message is handed over to the upper layer to continue processing. The routing and forwarding table in the router includes information about the correspondence between network addresses and interfaces. The routing and forwarding table can be generated for user configuration or automatically learned by the router. . In combination with the above-mentioned state of the art, the specific implementation of the method for preventing network attacks according to the present invention is as follows, see figure 1 :
[0024] Step 1: The router receives an IP message, and the message carries the message's source address...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com