Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

49 results about "Application layer DDoS attack" patented technology

An application layer DDoS attack is a form of denial-of-service where attackers target the application layer of the OSI model. The attack disables specific functions or features as opposed to an entire network and often used against financial institutions to distract IT and security personnel from security breaches. As of 2013, application layer DDoS attacks represent 20% of all DDoS attacks.

Application layer distributed denial of service (DDoS) attack detection method and defensive system aimed at website

The invention relates to an application layer distributed denial of service (DDoS) attack detection method and defensive system and relates to network safety, in particular to application layer DDoS attack detection and defend. The invention provides a detection method and the defensive system based on user click sequence forecasting. Firstly, a page table uniform resource locator (URL) of a website is extracted, a clustering algorithm is utilized to conduct clustering, page table classification Vj and a user click sequence of the website are obtained, then the user click sequence is utilized to construct a random wandering image, a next observation period click sequence of a user is calculated through a process of random wandering, at last, similarity of a predict sequence and a click sequence is calculated, and abnormity of the user click sequence is judged through training threshold. The application layer DDoS attack detection method and defensive system can effectively detect attacking of an application layer, particularly stimulate an attack request of normal user behavior, and can be widely applied to safe defend of a data center website server.
Owner:深圳占领信息技术有限公司

Method for detecting and filtering application layer DDoS (Distributed Denial of Service) attack on basis of access marking

InactiveCN103078856AImprove the ability to resist DDoS attacks at the application layerImplement synchronous filteringTransmissionFeature vectorFeature extraction
The invention discloses a method for detecting and filtering an application layer DDoS (Distributed Denial of Service) attack on the basis of access marking. The method comprises the following steps of: on the training phase, carrying out non-strategy marking on access behaviors of normal users; carrying out marking processing by adopting a marking strategy; extracting detection features by adopting a feature extraction strategy and representing access users as feature vectors; acquiring SVDD (Support Vector Data Description) supraspheres of the normal users and storing the SVDD supraspheres into a training database; carrying out marking on the basis of the marking strategy on access behaviors of users who enter a server and are to be detected; extracting effective detection features and expressing the access users into a feature vector form; and according to the SVDD supraspheres, carrying out detection classification and abnormity judgment on the feature vectors and when the access users are abnormal users, carrying out synchronous filtering. Implementation of the technical scheme adopted by the invention has the following beneficial effects that access marking and extraction of abnormal features are not limited to the specific server; synchronous filtering on attacking users can be implemented in the detecting process; and capability that the server resists to application layer DDoS attack is improved.
Owner:大连环宇移动科技有限公司 +1

DDoS(Distributed Denial of Service)attack defensive system for application layer based on multiple feature recognition

The invention discloses a DDoS(Distributed Denial of Service) attack defensive system for an application layer based on multiple feature recognition. When a user initiates a request, the system stores information of a user data packet in a net-node network flow table, analyzes the user data packet, and judges whether the source of the user data packet is real and reliable or not; verification data is inserted when data is returned to the user; whether the source is real and reliable or not is detected again; afterthe fact that the source is real is determined, the credibility of the user is a threshold value credibility; the system distributes a cookie identity identifier to the source; then, a data database for recording the cookie identity identifier is established; access information of the cookie identity identifier within a certain time period is recorded and stored; the access information is used as the basis of identity verification management; and corresponding dispatching is carried out through analysis and treatment of a feature library. According to the invention, whether the long-term access behaviour of the user is normal or illegal can be analyzed and judged by establishing a blacklist and a whitelist ofaccess feature detection analysis; and the normal flow of the user cannot be intercepted when a DDoS attack occurs.
Owner:SHENZHEN YIKAYI NETWORK TECH

Network access system and method based on application layer data

The embodiments of the invention propose a system for network access based on application layer data, including: a client, for establishing TCP connection with an access server, and sending a data request to the access server based on the TCP connection; an access server, for selecting a background server providing service to the client from a background server group according to the data request, and sending TCP protocol information negotiated in the TCP connection to the selected background server; the selected background server, for providing data directly to the client according to the TCP protocol information, without via the access server. The embodiments of the invention also propose a method for network access based on application layer data. By applying of the embodiments of the invention, the complexity is reduced, the implementation efficiency is enhanced, and the interactive process is simplified for the background server.
Owner:SHENZHEN TENCENT COMP SYST CO LTD

Network protocol conversion system, network protocol converter and network protocol conversion method

The invention discloses a network protocol conversion system, a network protocol converter and a network protocol conversion method. The network protocol converter comprises a first receiving unit, a content acquiring unit, an application layer extracting layer, a first packing unit and a first transmitting unit, wherein the first receiving unit is used for receiving data request information of a first network protocol of a client side, the content acquiring unit is used for connecting with protected equipment through a second network protocol so as to acquiring content of the protected equipment according to the data request information, the application layer extracting unit is used for extracting application layer data in the second network protocol, the first packing unit is used for packing the content of the protected equipment in a form of the first network protocol according to the application layer data and preset configuration information, and the first transmitting unit is used for transmitting the packed content to the client side. The network protocol conversion system, the network protocol converter and the network protocol conversion method have the advantages that through the externally connected network protocol converter, security conversion for an original product network protocol is realized transparently, development for special products one by one is not required, low developing workload is required, and application range is large.
Owner:VERTIV ENERGY SYST INC

Method and device for improving detection accuracy of Web application layer attacks

ActiveCN107483510AMitigating technical issues with high false positive ratesTransmissionWeb applicationMisinformation
The invention provides a method and device for improving the detection accuracy of Web application layer attacks and relates to the technical field of network safety. The method comprises the steps that target request information sent by a user is acquired, wherein the target request information is request information for access to a network server; an execution command triggered by the network server based on the target request information is detected, wherein the execution command is a command used for executing a target operation, and the target operation is an operation of generating responding information based on the target request information; according to the execution command, whether or not an attack action exists in the target request information is determined, wherein the attack action is the attack action conducted on the Web application layer. The method and device solve the technical problem that a traditional application layer attack detection method is relatively high in misinformation rate.
Owner:HANGZHOU ANHENG INFORMATION TECH CO LTD

Application layer DDoS attack detection method based on logistic regression

The invention relates to an application layer DDoS attack detection method based on logistic regression. The method comprises the following steps: with the IP address of an access user as an identifier, extracting a feature set of user access behaviors; calculating a logistic regression function value of the user; obtaining the maximum likelihood function according to a logistic regression model,wherein the loss function of the logistic regression model is the opposite number of the maximum likelihood function; with the loss function as the target function, solving the target function by using a quantum particle swarm optimization algorithm to obtain the parameters of the logistic regression model, so that the target value of the loss function is the maximal; and predicting the unmarked user features by using the solved logistic regression model to obtain the category of the user.
Owner:TIANJIN UNIV

Distributed denial-of-service attack detection method based on external connection behaviors of Web communication group

The invention discloses a distributed denial-of-service attack detection method based on the external connection behaviors of a Web communication group. The method comprises the following steps of: 1) setting a port mirror image on network equipment, and copying and transmitting all network messages passing through the equipment to an attach detection front-end processor; 2) extracting the communication group of a given Web server and the external connection behaviors of the communication group, and transmitting the communication group and the external connection behaviors thereof to an attack detection server by using the attack detection front-end processor; 3) counting external connection behavior parameters comprising the number CN_MLN of clients connected with a plurality of external connection nodes and a total client number CN of the Web communication group, and monitoring the offset of ratio of the two parameters by using an improved cumulative sum (CUSUM) algorithm to judge the occurrence of an application layer distributed denial-of-service (DDoS) attack according to the offset by using the attack detection server; and 4) reporting whether the application layer DDoS attack occurs to the given Web server or not to a network monitoring terminal at the end of each time period.
Owner:SHANDONG UNIV

Cellular ad hoc network radio resource optimization and allocation method

The invention relates to a cellular ad hoc network radio resource optimization and allocation method which comprises the following steps: for a given system model and parameters, obtaining a performance objective function which can be realized under a cooperative relay protocol and can select a monotonic increasing function reflecting the generation speed of application layer data required by users; giving the following constraint conditions required to be met by realizing performance indexes: different QoS (quality of service) requirements of end-users, a flow conservation principle, maximum and minimum transmission power requirements and attainable speed requirements; carrying out Lagrangian dual decomposition according to the objective function and the constraint conditions, respectively decomposing to a physical layer, a network layer and an application layer of OSI (open system interconnection), and respectively carrying out the optimized solution on each layer by using a sub-gradient mathematical method; and after respectively solving the optimization sub-problems of the physical layer, the network layer and the application layer, obtaining the optimal flow distribution, relay selection, transmission power and data generation speed distribution of each sub-carrier. The method provided by the invention ensures better stability and reality, and is suitable for the next generation of cellular ad hoc cooperative networks.
Owner:GUANGZHOU UNIVERSITY

Application layer DDoS attack detection and defense method based on multiple feature entropies

The invention discloses an application layer DDoS attack detection and defense method based on multiple feature entropies. The method comprises an application layer connection feature preprocessing module, a multi-time-window resource monitoring module based on inclination calculation, and a multi-feature-entropy harmonic average calculation decision module. The application layer connection feature preprocessing module counts URI resources and sets a resource consumption table, and performs multi-feature decomposition and preprocessing on the connection request in the log to generate a connection feature log; a multi-time-window resource monitoring module based on inclination calculation monitors the total connection and the total load capacity change of servers in a plurality of time windows in real time; and the multi-feature entropy harmonic average calculation decision module calculates a multi-feature entropy harmonic average vector norm, and judges whether an application layer DDoS attack exists or not by comparing an initial threshold value. The method has the advantages that real-time load monitoring and abnormal connection detection can be provided for the servers according to network servers of different scales, and it is guaranteed that the servers can effectively detect DDoS attacks on an application layer in real time.
Owner:SOUTHEAST UNIV +1

Data processing method in industrial Internet of Things gateway and industrial Internet of Things gateway

InactiveCN110535828AMeet the real-time requirements of data transmissionReduce flow pressureDatabase management systemsNetwork connectionsTraffic capacityIot gateway
The invention discloses a data processing method in an industrial Internet of Things gateway and the industrial Internet of Things gateway. The method comprises steps of enabling industrial Internet of Things gateway to receive corresponding first application layer data packets from a plurality of industrial devices; analyzing the first application layer data packet to obtain at least one or moreof the following contents: an equipment operation state, an alarm type of equipment, number information of products corresponding to the equipment, related information of a production cycle of the products corresponding to the equipment, and duration information of the state of the equipment; covering the content obtained by analyzing the first application layer data packet on the request data part of the first application layer data packet according to a preset format so as to obtain a second application layer data packet; and sending the second application layer data packet to a next node device of the industrial Internet of Things gateway corresponding to the plurality of industrial devices through a network. According to the invention, the standards of heterogeneous data sources are unified, and the flow pressure caused by data uplink is reduced.
Owner:华瑞新智科技(北京)有限公司 +1

Application layer data sequential packing method, device and equipment and storage medium

The invention discloses an application layer data sequential packing method and device, computer equipment and a readable storage medium. The application layer data sequential packing method comprisesthe following steps: receiving a data packet of an application layer; Analyzing the data packet; Judging whether the data packet format is legal; If the format of the data packet is legal, judging whether the data packet meets a return condition or not; And if the data packet does not meet the return condition, caching the current data packet. The sequential packing method includes packaging thereceived out-of-order data in an application layer; according to the serial number of the received data packet and the serial number of the data packet required in the current sequence, returning or caching the data packet; and further judging whether a data packet adjacent to the received data packet exists in the cache region or not before returning, and if yes, combining the received data packet with the adjacent data packet, thereby effectively simplifying the application layer data packet sorting process and processing steps, improving the efficiency, and improving the data sequence packaging success rate and system stability.
Owner:北京明朝万达科技股份有限公司

DDoS attack detection method based on network traffic application layer

The invention discloses a DDoS attack detection method based on a network traffic application layer. The method comprises the following steps: selecting three parameters including a flow change rate,a new source IP address change rate and a source IP address request allocation rate to analyze network flow. Therefore, the DDoS attack traffic is distinguished from the FC traffic. The system is provided with a network flow analysis module, a DDoS attack detection module and an attack response module. When network flow changes suddenly, the network flow analysis module sends a warning signal to the DDoS attack detection module. The DDoS attack module is used for judging whether an FC attack or a DDoS attack occurs. When the DDoS attack is detected, the DDoS attack is detected. The attack response module is activated to filter malicious traffic and maintain uninterrupted service for a real user, the similarity between application layer DDoS attack traffic and FC traffic can be effectivelyrecognized, main characteristics of the application layer DDoS attack traffic and FC traffic are selected for distinguishing, the false alarm rate and the missing report rate are reduced, the cost islow, and application and popularization are facilitated.
Owner:北京云端智度科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products