Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

49 results about "Ddos defense" patented technology

Large-scale DDoS (Distributed Denial of Service) attack defense system and method based on two-level linkage mechanism

The invention discloses large-scale DDoS (Distributed Denial of Service) attack defense system and method based on a two-level linkage mechanism. The method comprises the following steps of: monitoring the flow of a total network by a flow monitoring subsystem in real time, and searching and confirming a DDoS attack behavior; sending an alarm message for triggering a cleaning operation to a flow cleaning subsystem, and guiding the abnormal flow of the DDoS attach behavior to the flow cleaning subsystem; receiving the abnormal flow guided by the flow monitoring subsystem by the flow cleaning subsystem, cleaning the abnormal flow according to the cleaning operation triggered by the alarm message, (wherein the flow cleaning subsystem adopts the two-level architecture of a backbone network plus a local network defense system, and the two levels of cleaning system work cooperatively and clean synchronously), and injecting the cleaned cleaning flow back to a target customer network. The large-scale DDoS attack defense system and method based on the two-level linkage mechanism solve the problems of cleaning capacity, cleaning precision, and the like existing in the traditional DDoS defense technology; and on the basis of reducing the deployment cost of service scale, the large-scale DDoS attach defense capability of the total network is greatly improved, and the cleaning precision ofthe attack flow is increased.
Owner:CHINA TELECOM CORP LTD

Self-adaptively started ddos defense method and system based on trust value in SDN

The invention discloses a self-adaptively started ddos defense method based on a trust value in an SDN. The self-adaptively started ddos defense method comprises the following steps: a switch receives an unmatched packet, and sends a packet_in data packet to a controller; a counter is deployed in an SDN controller; the counter pre-sets a packet_in number value; when an arrival packet_in number is equal to a set value every time, the packet_in arrival rate in the time period is calculated; then, whether the packet_in arrival rate is abnormal or not is judged; the flow on the switch corresponding to packet_in is precisely detected by utilization of a reverse neural network classifier; a neural network, an intermediate layer of which is 50*50, is established; six characteristic values are calculated; training is carried out by taking the six characteristic values as input of the classifier; and, if the output value of the neural network is between 0.5 and 1, the fact that the flow is a ddos attack is determined. By means of the self-adaptively started ddos defense method and system based on the trust value in the SDN disclosed by the invention, the characteristics of the SDN, such as flow table information of a data layer and control of the controller in a control layer to the whole network, are sufficiently utilized; and thus, the ddos attack in the SDN can be effectively defensed.
Owner:NANJING UNIV OF POSTS & TELECOMM

Link type DDoS defense method and system based on migration of forward path

The invention provides a link type DDoS defense method based on migration of a forward path, applied to SDN. The method comprises the steps of 1, constructing a network flow matrix and positioning a congested link by collecting LLDP messages; 2, judging whether the congested link forms a link flooding attack; 3, if the link flooding attack exists, recognizing a suspicious network flow in the congested link; and 4, selecting a migrating link set not close to the congested link according to a constraint condition, selecting the network flow to be migrated and a migration interval, and generating migration rule information; and migrating the suspicious work flow according to the migration rule information. The method is implemented in the software definition network based on OpenFlow. According to the method provided by the invention, deployment of a link type DDoS defense system is achieved by using components easy to maintain and migrate. Meanwhile the system for implementing the method is provided.
Owner:INST OF INFORMATION ENG CAS

Smart city information security guarantee system

The invention discloses a smart city information security guarantee system. The system comprises a plurality of groups of virtual machines / physical servers which are deployed at a cloud computing datacenter, database security equipment, a Web application firewall, DDos defense equipment, security gateways and a plurality of core switches. The security gateways are hanged beside the core switchesof the cloud computing data center through adoption of single arms. Two security gateways form a group and are connected with different core switches, and a hot standby HA cluster is formed. The DDosdefense equipment is connected between the boundary of the cloud computing data center and the core switches serially in an online mode. The Web application firewall is connected between a security Web service area and the core switches serially in a transparent mode. Important database server virtual machines are migrated to a security data service area through vMotion. The database security equipment is deployed on bypasses of an access layer switch of the security data service area. According to the system, cloud computing security is greatly improved, and smart city information security isguaranteed.
Owner:广东粤迪厚创科技发展有限公司 +1

Method and device for cleaning forged source IP in DDOS (Distributed Denial of Service) defense system

The invention discloses a method and a device for cleaning a forged source IP in a DDOS (Distributed Denial of Service) defense system. The method comprises steps: a message flow with an access address to be a target server is detected; when the message flow exceeds a set threshold, a preset number of messages are intercepted from the flow as to-be-detected messages; the source IP address and the survival time value of one to-be-detected message are acquired, and according to the survival time value, the hop number when the to-be-detected message passes through a network node is calculated; and a hop set corresponding to the source IP address is queried in a local data sheet, when the hop number does not belong to the hop set, the to-be-detected message is discarded, and thus, the to-be-detected message can be prevented from arriving at the target server. Thus, the forged flow can be effectively and accurately cleaned.
Owner:GUANGZHOU HUADUO NETWORK TECH

DDOS defense method and system based on fault automatic migration system

The present invention relates to the technical field of network security and in particular to a DDOS defense method and system based on a fault automatic migration system, wherein the DDOS defense method includes: determining whether each VIP address in a VIP cluster is attacked by DDOS during domain name resolution; if so, discarding the VIP addresses attacked by the DDOS, and guiding the trafficto the VIP addresses that are not attacked; and if not, uniformly guiding the traffic to each VIP address in the VIP cluster. The technical solution of the present invention realizes the avoidance ofattack traffic by the automatic migration. An attacker generally attacks the VIPs, and the DDOS attacked VIPs are automatically discarded, and the normal traffic is guided to other VIPs that are notattacked, thereby preventing the server from being attacked, solving the problem of DDOS attack, and greatly reducing the cost and the difficulty of use.
Owner:BEIJING DUODIAN ONLINE SCI & TECH CO LTD

Large-scale DDoS (Distributed Denial of Service) attack defense system and method based on two-level linkage mechanism

The invention discloses large-scale DDoS (Distributed Denial of Service) attack defense system and method based on a two-level linkage mechanism. The method comprises the following steps of: monitoring the flow of a total network by a flow monitoring subsystem in real time, and searching and confirming a DDoS attack behavior; sending an alarm message for triggering a cleaning operation to a flow cleaning subsystem, and guiding the abnormal flow of the DDoS attach behavior to the flow cleaning subsystem; receiving the abnormal flow guided by the flow monitoring subsystem by the flow cleaning subsystem, cleaning the abnormal flow according to the cleaning operation triggered by the alarm message, (wherein the flow cleaning subsystem adopts the two-level architecture of a backbone network plus a local network defense system, and the two levels of cleaning system work cooperatively and clean synchronously), and injecting the cleaned cleaning flow back to a target customer network. The large-scale DDoS attack defense system and method based on the two-level linkage mechanism solve the problems of cleaning capacity, cleaning precision, and the like existing in the traditional DDoS defense technology; and on the basis of reducing the deployment cost of service scale, the large-scale DDoS attach defense capability of the total network is greatly improved, and the cleaning precision ofthe attack flow is increased.
Owner:CHINA TELECOM CORP LTD

A working method of an Internet DDoS defense system based on the Internet of Things

ActiveCN109088896APrevent DDoS attacksTransmissionTraffic capacityTopology information
The invention relates to a working method of an Internet DDoS defense system based on the Internet of Things, comprising the following steps: an OpenFlow controller obtains topology information; the information flow collection module collects the information flow propagated in the local area network. The OpenFlow controller calculates the packet update rate when the information flow is exchanged in the LAN switch and transmitted in the LAN. The flow monitoring module calibrates the information flow which exceeds or is lower than the message update speed limit value; the LAN adapter calculatesitself and the real-time processing rate of the LAN switch to the information flow; the configuration module adapts the packet update rate to the real-time processing rate. The OpenFlow controller transmits the adapted information stream to the corresponding LAN network. A LAN host compute selects that information flow retention with the correspond information flow message update rate according tothe real-time processing rate of the LAN host computer; the LAN host transmits the information flow which exceeds or is lower than the speed limit value of its own processing speed to the IOT equipment. A LAN switch diffuses the current flow of information that an IoT device currently has.
Owner:SHENZHEN POWER SUPPLY BUREAU

A ddos ​​defense method and system based on self-adaptive start of trust value in sdn

The invention discloses a self-adaptively started ddos defense method based on a trust value in an SDN. The self-adaptively started ddos defense method comprises the following steps: a switch receives an unmatched packet, and sends a packet_in data packet to a controller; a counter is deployed in an SDN controller; the counter pre-sets a packet_in number value; when an arrival packet_in number is equal to a set value every time, the packet_in arrival rate in the time period is calculated; then, whether the packet_in arrival rate is abnormal or not is judged; the flow on the switch corresponding to packet_in is precisely detected by utilization of a reverse neural network classifier; a neural network, an intermediate layer of which is 50*50, is established; six characteristic values are calculated; training is carried out by taking the six characteristic values as input of the classifier; and, if the output value of the neural network is between 0.5 and 1, the fact that the flow is a ddos attack is determined. By means of the self-adaptively started ddos defense method and system based on the trust value in the SDN disclosed by the invention, the characteristics of the SDN, such as flow table information of a data layer and control of the controller in a control layer to the whole network, are sufficiently utilized; and thus, the ddos attack in the SDN can be effectively defensed.
Owner:NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products