Method of guarding network attack

A network attack and network equipment technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve the problems of source address spoofing attacks, occupation of resources, crashes, etc., to achieve simple implementation, low resource occupation, and high efficiency. Effect

Inactive Publication Date: 2003-04-16
HUAWEI TECH CO LTD
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the current network access, there are a large number of source address spoofing attacks
The attacker sends a request to the server by forging the source address of other users on the network, occupying a lot of server resources. If the server responds to the request, it will send a response message to the actual user of the source address, and the response message occupies a large amount of the server. The resources of the actual user of the source address. In severe cases, the server and the actual user of the source address will not be able to respond to other requests, or even crash
[0004] In view of the problems existing in the above-mentioned prior art, if the first network access control method is ado

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of guarding network attack
  • Method of guarding network attack
  • Method of guarding network attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] Normally, after receiving a message, a router on a network device will look up the routing table according to the destination address of the message. If it finds the outbound interface of the router corresponding to the destination address, it will forward the message through the corresponding interface. If If the destination address is the router itself, the message will be handed over to the upper layer for further processing. The routing and forwarding table in the router includes the corresponding relationship information between the network address and the interface. The routing and forwarding table can be generated for user configuration or automatically learned by the router. . In combination with the above-mentioned existing technical conditions, the specific implementation of the method for preventing network attacks described in the present invention is as follows, see figure 1 :

[0024] Step 1: The router receives an IP message, which carries information su...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to a method for preventing network from attack includes firstly, setting network address and interface information correspondent relationship list in network equipment, namely,network addresses of other network equipment connected with the said network equipment interface and applied interface information correspondent relation list of other network equipment connected on the said network; the route transferred list can be used in a router then the network equipment looks for the said correspondent relationship list according to the original address of the received message and makes judgment in terms of the result it is fake to determine the addressability of the message.

Description

technical field [0001] The invention relates to a network access control technology, in particular to a method for preventing network attacks. Background technique [0002] At present, there are two ways to implement network access control: one network access control method defines a series of access control rules, the access control rules include control rules based on network addresses, etc., and the rules specify which packets can pass , which messages are not allowed to pass, so that when the message enters the router, it will match these rules, the message that does not meet the rules will be discarded, and the message that meets the rules can continue to be transmitted; the other is based on The access control method of traffic statistics, which can count traffic according to certain characteristics of packets. If the traffic of packets with corresponding characteristics exceeds the specified value, the router can limit the traffic of this type of packets, or refuse to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/00H04L12/24
Inventor 胡宇驰周雯
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products