CN107277074A - A kind of method and apparatus for preventing network attack - Google Patents
A kind of method and apparatus for preventing network attack Download PDFInfo
- Publication number
- CN107277074A CN107277074A CN201710705477.3A CN201710705477A CN107277074A CN 107277074 A CN107277074 A CN 107277074A CN 201710705477 A CN201710705477 A CN 201710705477A CN 107277074 A CN107277074 A CN 107277074A
- Authority
- CN
- China
- Prior art keywords
- client
- server
- forwarding server
- forwarding
- ponds
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 230000008859 change Effects 0.000 description 9
- 206010033799 Paralysis Diseases 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000009434 installation Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 206010022000 influenza Diseases 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 230000035935 pregnancy Effects 0.000 description 1
- 230000002265 prevention Effects 0.000 description 1
- 230000001681 protective effect Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The present invention proposes a kind of method and apparatus for preventing network attack, and this method includes:When determining existing network attack, the client interrupts the connection with currently selected forwarding server;Select another IP to send connection request in the forwarding server IP ponds that the client is set in itself, realize the connection between forwarding server corresponding with selected IP;So that current connected forwarding server carries out transfer to the business datum between the client and the real processor;Wherein, in forwarding server IP ponds the corresponding different forwarding servers of each IP.With this, by the setting of forwarding server, network attack is limited between client and forwarding server, without influencing whether real server;In addition, when there is network attack, then changing connected forwarding server by forwarding server IP ponds, it is ensured that the usage experience of client.
Description
Technical field
The present invention relates to network protection field, more particularly to a kind of method and apparatus for preventing network attack.
Background technology
It is simultaneously flourishing for internet cause with the development of internet, is simultaneously network attack also continuous
Change.Various network attacks emerge in an endless stream.Wherein, with the DDOS of network, (Distributed Denial of Service divide
The service of cloth refusal) it is always the problem in network safety prevention exemplified by attack, and for DDOS network attacks, can be using such as
Lower method is taken precautions against:
Method 1, directly ignore, do not handle individually;But this mode once runs into attack, network service paralysis will be caused
Paralysis, externally stops service, and the influence to business is maximum, can directly influence by the game experiencing of game player
Method 2, purchase advanced firewall, query-attack is filtered by fire wall;But this mode need it is senior anti-
The expense of wall with flues is higher, causes cost height enterprise;
Method 3, the high anti-service for buying telecom operators, filter out query-attack in basic network aspect;This side
Method can be compared high with the cost of method 2, and with the growth of network attack, cost also may proceed to increase, can be to the normal of enterprise
Operation brings pressure.
The content of the invention
In view of this, the present invention proposes a kind of method and apparatus for preventing network attack.
The present invention proposes embodiment in detail below:
The embodiment of the present invention proposes a kind of method for preventing network attack, applied to including client, it is multiple be used for pair
Forwarding server that business datum between client and real server is forwarded and for carrying out the true of data processing
In the processing system of real server, this method includes:
When determining existing network attack, the client interrupts the connection with currently selected forwarding server;
Select another IP to send connection request in the forwarding server IP ponds that the client is set in itself, realize and institute
Select the connection between the corresponding forwarding servers of IP;So as to current connected forwarding server to the client with it is described true
Business datum between real processor carries out transfer;Wherein, in forwarding server IP ponds the corresponding different forwarding clothes of each IP
Business device.
In a specific embodiment, in addition to:
The client passes through after the newest forwarding server IP ponds that currently selected forwarding server is issued are got
Newest forwarding server IP ponds are updated to original forwarding server IP ponds.
The embodiment of the present invention also proposed a kind of client, applied to including client, it is multiple be used for client with it is true
Forwarding server that business datum between real server is forwarded and the real server for carrying out data processing
In processing system, the client includes:
Interrupt module, for when determining existing network attack, interrupting the connection with currently selected forwarding server;
Link block, for selecting another IP to send connection request in the forwarding server IP ponds that are set in itself, is realized
Connection between forwarding server corresponding with selected IP, so that current connected forwarding server is to the client and institute
The business datum stated between real processor carries out transfer;Wherein, in forwarding server IP ponds each IP is corresponding different to be turned
Send out server.
In a specific embodiment, in addition to:
Update module, for after the newest forwarding server IP ponds that currently selected forwarding server is issued are got,
Original forwarding server IP ponds are updated by newest forwarding server IP ponds.
The embodiment of the present invention also proposed a kind of method for preventing network attack, applied to including client, multiple be used for
The forwarding server that is forwarded to the business datum between client and real server and for carrying out data processing
In the processing system of real server, this method includes:
After the connection with the client is set up, the forwarding server issues newest forwarding to the client and taken
Business device IP ponds;
The forwarding server is forwarded to the business datum between the client and the real server.
In a specific embodiment, in addition to:
After the connection with the client is set up, the forwarding server is according to the business need of itself, and generation is most
New forwarding server IP ponds.
In a specific embodiment, the forwarding server is between the client and the real server
Business datum is forwarded, including:
The forwarding server receives the service message of the client;
The service message is transmitted to the real server and handled by the forwarding server, and obtains described true
The result that real server is fed back;
The result is fed back to the client by the forwarding server.
The embodiment of the present invention proposes a kind of forwarding server, applied to including client, it is multiple be used for client with
The forwarding server that business datum between real server is forwarded and the real server for carrying out data processing
Processing system in, the forwarding server includes:
Module is issued, for setting up and after the connection of the client, the forwarding server is to the client
Issue newest forwarding server IP ponds;
Forwarding module, for being forwarded to the business datum between the client and the real server.
In a specific embodiment, in addition to:
Generation module, for setting up after the connection with the client, according to the business need of itself, is generated newest
Forwarding server IP ponds.
In a specific embodiment, the forwarding module, the service message for receiving the client;
The service message is transmitted into the real server to be handled, and obtains the real server and is fed back
Result;
The result is fed back into the client.
The embodiment of the present invention proposes a kind of method and apparatus for preventing network attack, applied to including client, multiple
For the forwarding server forwarded to the business datum between client and real server and for carrying out at data
In the processing system of the real server of reason, wherein this method includes:When determining existing network attack, the client is interrupted
With the connection of currently selected forwarding server;Another IP is selected to send out in the forwarding server IP ponds that the client is set in itself
Connection request is sent, the connection between forwarding server corresponding with selected IP is realized;So as to current connected forwarding server
Transfer is carried out to the business datum between the client and the real processor;Wherein, it is every in forwarding server IP ponds
The different forwarding server of individual IP correspondences.With this, by the setting of forwarding server, network attack is limited to client with turning
Between hair server, without influencing whether real server;In addition, when there is network attack, then passing through forwarding server IP
Change connected forwarding server in pond, it is ensured that the usage experience of client.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below will be attached to what is used required in embodiment
Figure is briefly described, it will be appreciated that the following drawings illustrate only certain embodiments of the present invention, therefore is not construed as pair
The restriction of scope, for those of ordinary skill in the art, on the premise of not paying creative work, can also be according to this
A little accompanying drawings obtain other related accompanying drawings.
Fig. 1 is a kind of schematic flow sheet for method for preventing network attack that the embodiment of the present invention is proposed;
Fig. 2 is that a kind of of proposition of the embodiment of the present invention prevents the structural representation of processing system involved by the method for network attack
Figure;
Fig. 3 is a kind of structural representation for client that the embodiment of the present invention is proposed;
Fig. 4 is a kind of schematic flow sheet for method for preventing network attack that the embodiment of the present invention is proposed;
Fig. 5 is a kind of structural representation for forwarding server that the embodiment of the present invention is proposed.
Embodiment
Hereinafter, the various embodiments of the disclosure will be described more fully.The disclosure can have various embodiments, and
It can adjust and change wherein.It should be understood, however, that:It is limited to spy disclosed herein in the absence of by the various embodiments of the disclosure
Determine the intention of embodiment, but the disclosure should be interpreted as covering in the spirit and scope for the various embodiments for falling into the disclosure
All adjustment, equivalent and/or alternative.
Hereinafter, the term " comprising " that can be used in the various embodiments of the disclosure or " may include " indicate disclosed
Function, operation or the presence of element, and do not limit the increase of one or more functions, operation or element.In addition, such as existing
Used in the various embodiments of the disclosure, term " comprising ", " having " and its cognate are meant only to represent special characteristic, number
Word, step, operation, element, the combination of component or foregoing item, and be understood not to exclude first one or more other
Feature, numeral, step, operation, element, the presence of the combination of component or foregoing item or increase one or more features, numeral,
Step, operation, element, the possibility of the combination of component or foregoing item.
In the various embodiments of the disclosure, statement "or" or " in A or/and B at least one " include what is listed file names with
Any combinations of word or all combinations." A or B " or " in A or/and B at least one " may include A, may include for example, statement
B may include A and B both.
The statement (" first ", " second " etc.) used in the various embodiments of the disclosure can be modified to be implemented various
Various element in example, but corresponding element can not be limited.For example, presented above be not intended to limit the suitable of the element
Sequence and/or importance.The purpose presented above for being only used for differentiating an element and other elements.For example, the first user fills
Put and indicate different user device with second user device, although the two is all user's set.For example, not departing from each of the disclosure
In the case of the scope for planting embodiment, the first element is referred to alternatively as the second element, similarly, and the second element is also referred to as first
Element.
It should be noted that:, can be by the first composition member if an element ' attach ' to another element by description
Part is directly connected to the second element, and " connection " the 3rd can be constituted between the first element and the second element
Element.On the contrary, when an element " being directly connected to " is arrived into another element, it will be appreciated that be in the first element
And second the 3rd element is not present between element.
The term " user " used in the various embodiments of the disclosure, which may indicate that, to be used the people of electronic installation or uses electricity
The device (for example, artificial intelligence electronic installation) of sub-device.
The term used in the various embodiments of the disclosure is only used for describing the purpose of specific embodiment and not anticipated
In the various embodiments of the limitation disclosure.As used herein, singulative is intended to also include plural form, unless context is clear
Chu it is indicated otherwise.Unless otherwise defined, all terms (including the technical term and scientific terminology) tool being otherwise used herein
There is the implication identical implication that the various embodiment one skilled in the art with the disclosure are generally understood that.The term
(term such as limited in the dictionary typically used) is to be interpreted as having and the situational meaning in correlative technology field
Identical implication and it will be not construed as with Utopian implication or excessively formal implication, unless in the various of the disclosure
It is clearly defined in embodiment.
Embodiment 1
The embodiment of the present invention 1 discloses a kind of method for preventing network attack, applied to including client, it is multiple be used for pair
Forwarding server that business datum between client and real server is forwarded and for carrying out the true of data processing
In the processing system of real server, as shown in figure 1, this method includes:
Step 101, when determining existing network attack, the client interrupts the company with currently selected forwarding server
Connect;
Specifically, the structure of processing system is as shown in Fig. 2 including client, multiple forwarding servers, real server;
Wherein, by taking the processing system of game service as an example, client can be game client, for example, be provided with the PC of certain money game
(Personal Computer, PC);As for forwarding server, then internet message forwarding is responsible for, specific industry is not related to
Business logic, is transmitted to real gaming server by network message according to the network port or turns the response of real gaming server
Issue client;And real server, this then be real game server, specific for provide network game service.
By taking Fig. 2 as an example, when it is determined that attacking, client and current connected forwarding server are for example, forwarded
Connection between server 1 is interrupted, and network attack is being run into this, to client, at most only can expose forwarding server
IP (agreement interconnected between Internet Protocol, network) address, without influencing whether real server, and due to turning
Hair server has multiple, can be changed in time, so as to the need for not interfering with business, such as can quickly recover trip
Costume is engaged in.
The process of specific switching forwarding server can be with following steps:
Another IP is selected to send connection request in the forwarding server IP ponds that step 102, the client are set in itself,
The connection between forwarding server corresponding with selected IP is realized, so that current connected forwarding server is to the client
Business datum between the real processor carries out transfer;Wherein, each IP correspondences in forwarding server IP ponds are different
Forwarding server.
Specifically, including IP (IP1), the IP of forwarding server 2 of forwarding server 1 in such as forwarding server IP ponds
(IP2), forwarding server n IP (IPn), with this, current connected is forwarding server 1, then is interrupting with turning
After the connection for sending out server 1, for example, the connection with forwarding server 2, specific connected mode example can be realized by IP2
Such as connection request can be sent to IP2 with client, forwarding server 2 sets up the company with client after the connection request is received
Connect.
And in order to further improve protective capacities, this method also includes:
The client passes through after the newest forwarding server IP ponds that currently selected forwarding server is issued are got
Newest forwarding server IP ponds are updated to original forwarding server IP ponds.
Specifically, client with forwarding server after being connected, forwarding server can issue newest forwarding to client
Server ip pond, subsequent client is based on received newest forwarding server IP ponds, to the forwarding server set in itself
IP ponds are updated, so as to constantly switch over;Specifically, forwarding server is handed down to the newest forwarding service of client
Device IP pool needs to generate according to itself business, for example, change IP address in periodically each forwarding server, from without
The current newest forwarding server IP ponds of stopping pregnancy life.
Embodiment 2
A kind of client of the disclosed of the embodiment of the present invention 2, applied to including client, it is multiple be used for client with it is true
Forwarding server that business datum between real server is forwarded and the real server for carrying out data processing
In processing system, as shown in figure 3, the client includes:
Interrupt module 201, for when determining existing network attack, interrupting the connection with currently selected forwarding server;
Link block 202, it is real for selecting another IP to send connection request in the forwarding server IP ponds that are set in itself
The now connection between forwarding server corresponding with selected IP, so as to current connected forwarding server to the client with
Business datum between the real processor carries out transfer;Wherein, each IP correspondences in forwarding server IP ponds are different
Forwarding server.
In a specific embodiment, in addition to:
Update module, for after the newest forwarding server IP ponds that currently selected forwarding server is issued are got,
Original forwarding server IP ponds are updated by newest forwarding server IP ponds.
Embodiment 3
The embodiment of the present invention 3 also discloses a kind of method for preventing network attack, applied to including client, multiple be used for
The forwarding server that is forwarded to the business datum between client and real server and for carrying out data processing
In the processing system of real server, as shown in figure 4, this method includes:
Step 301, setting up and after the connection of the client, the forwarding server is issued most to the client
New forwarding server IP ponds;
Step 302, the forwarding server are carried out to the business datum between the client and the real server
Forwarding.
In a specific embodiment, in addition to:
After the connection with the client is set up, the forwarding server is according to the business need of itself, and generation is most
New forwarding server IP ponds.
In a specific embodiment, the forwarding server is between the client and the real server
Business datum is forwarded, including:
The forwarding server receives the service message of the client;
The service message is transmitted to the real server and handled by the forwarding server, and obtains described true
The result that real server is fed back;
The result is fed back to the client by the forwarding server.
Specifically, being combined with previous embodiment and with reference to Fig. 2, a complete handling process can be as follows:
1st, client selects a forwarding server from built-in forwarding server ip address pools;
2nd, client connection forwarding server;
3rd, after the success of connection forwarding server, forwarding server is required according to own service, by newest forwarding server
Ip address pools are handed down to client;
4th, client updates built-in forwarding server ip address pools;
5th, client is normally interacted with forwarding server.Every service message that client is sent, forwarding server is all
It is transmitted to the real server of its rear end;The return of real server, is also transmitted to corresponding client;
6th, if there is network attack, client is caused to be disconnected with network between forwarding server.Client again from turn
Another forwarding server is selected in hair server ip address pools;
7th, client reconnects new forwarding server.Continue to interact with new forwarding server.
This programme, can effectively reduce network attack and bring service impact.Before, if there is network attack, game services
Service would generally be stopped because of that can not access.Using after this realization, client actively selects new server, reaches and quickly cuts
Change the purpose for recovering game services.
Specifically, using the ip address pools that clothes are forwarded built in client, after an ip can not be accessed because of DDOS attack, cutting
Change on another ip;To the ip addresses of client, only exposure forwarding server, with not exposing the ip of real gaming server
Location.So, network attack can only attack the ip addresses of forwarding server;Because forwarding server has many, one is attacked,
Other service normal work in the same old way;In client connection after forwarding server, there is the interaction of individual forwarding server address pool,
Realize the renewal of forwarding server ip address pools.Reach the dynamic renewal of ip address pools.
Embodiment 4
The embodiment of the present invention 4 also discloses a kind of forwarding server, applied to including client, it is multiple be used for client
The forwarding server that business datum between real server is forwarded and the real service for carrying out data processing
In the processing system of device, as shown in figure 5, the forwarding server includes:
Module 401 is issued, for setting up and after the connection of the client, the forwarding server is to the client
End issues newest forwarding server IP ponds;
Forwarding module 402, for the forwarding server to the business between the client and the real server
Data are forwarded.
In a specific embodiment, in addition to:
Generation module, for setting up after the connection with the client, according to the business need of itself, is generated newest
Forwarding server IP ponds.
In a specific embodiment, the forwarding module, the service message for receiving the client;
The service message is transmitted into the real server to be handled, and obtains the real server and is fed back
Result;
The result is fed back into the client.
The embodiment of the present invention proposes a kind of method and apparatus for preventing network attack, applied to including client, multiple
For the forwarding server forwarded to the business datum between client and real server and for carrying out at data
In the processing system of the real server of reason, wherein this method includes:When determining existing network attack, the client is interrupted
With the connection of currently selected forwarding server;Another IP is selected to send out in the forwarding server IP ponds that the client is set in itself
Connection request is sent, the connection between forwarding server corresponding with selected IP is realized;So as to current connected forwarding server
Transfer is carried out to the business datum between the client and the real processor;Wherein, it is every in forwarding server IP ponds
The different forwarding server of individual IP correspondences.With this, by the setting of forwarding server, network attack is limited to client with turning
Between hair server, without influencing whether real server;In addition, when there is network attack, then passing through forwarding server IP
Change connected forwarding server in pond, it is ensured that the usage experience of client.
It will be appreciated by those skilled in the art that accompanying drawing is a schematic diagram for being preferable to carry out scene, module in accompanying drawing or
Flow is not necessarily implemented necessary to the present invention.
It will be appreciated by those skilled in the art that the module in device in implement scene can be described according to implement scene into
Row is distributed in the device of implement scene, can also carry out one or more dresses that respective change is disposed other than this implement scene
In putting.The module of above-mentioned implement scene can be merged into a module, can also be further split into multiple submodule.
The invention described above sequence number is for illustration only, and the quality of implement scene is not represented.
Disclosed above is only several specific implementation scenes of the present invention, and still, the present invention is not limited to this, Ren Heben
What the technical staff in field can think change should all fall into protection scope of the present invention.
Claims (10)
1. a kind of method for preventing network attack, it is characterised in that applied to including client, it is multiple be used for client with it is true
Forwarding server that business datum between real server is forwarded and the real server for carrying out data processing
In processing system, this method includes:
When determining existing network attack, the client interrupts the connection with currently selected forwarding server;
Select another IP to send connection request in the forwarding server IP ponds that the client is set in itself, realize and selected IP
Connection between corresponding forwarding server;So that current connected forwarding server is to the client and the true place
The business datum managed between device carries out transfer;Wherein, in forwarding server IP ponds the corresponding different forwarding servers of each IP.
2. the method as described in claim 1, it is characterised in that also include:
The client is after the newest forwarding server IP ponds that currently selected forwarding server is issued are got, by newest
Forwarding server IP ponds are updated to original forwarding server IP ponds.
3. a kind of client, it is characterised in that applied to including client, multiple be used between client and real server
The forwarding server that is forwarded of business datum and processing system for the real server for carrying out data processing in,
The client includes:
Interrupt module, for when determining existing network attack, interrupting the connection with currently selected forwarding server;
Link block, for selecting another IP to send connection request in the forwarding server IP ponds that are set in itself, is realized and institute
Select the connection between the corresponding forwarding servers of IP, so as to current connected forwarding server to the client with it is described true
Business datum between real processor carries out transfer;Wherein, in forwarding server IP ponds the corresponding different forwarding clothes of each IP
Business device.
4. client as claimed in claim 3, it is characterised in that also include:
Update module, for after the newest forwarding server IP ponds that currently selected forwarding server is issued are got, passing through
Newest forwarding server IP ponds are updated to original forwarding server IP ponds.
5. a kind of method for preventing network attack, it is characterised in that applied to including client, it is multiple be used for client with it is true
Forwarding server that business datum between real server is forwarded and the real server for carrying out data processing
In processing system, this method includes:
After the connection with the client is set up, the forwarding server issues newest forwarding server to the client
IP ponds;
The forwarding server is forwarded to the business datum between the client and the real server.
6. method as claimed in claim 5, it is characterised in that also include:
After the connection with the client is set up, the forwarding server generates newest turn according to the business need of itself
Send out server ip pond.
7. method as claimed in claim 5, it is characterised in that the forwarding server is to the client and the true clothes
Business datum between business device is forwarded, including:
The forwarding server receives the service message of the client;
The service message is transmitted to the real server and handled by the forwarding server, and obtains the true clothes
The result that business device is fed back;
The result is fed back to the client by the forwarding server.
8. a kind of forwarding server, it is characterised in that applied to including client, multiple be used for client and real server
Between the forwarding server that is forwarded of business datum and for the processing system for the real server for carrying out data processing
In, the forwarding server includes:
Module is issued, for setting up after the connection with the client, the forwarding server is issued to the client
Newest forwarding server IP ponds;
Forwarding module, for being forwarded to the business datum between the client and the real server.
9. forwarding server as claimed in claim 8, it is characterised in that also include:
Generation module, for setting up after the connection with the client, according to the business need of itself, generates newest forwarding
Server ip pond.
10. forwarding server as claimed in claim 8, it is characterised in that the forwarding module, for receiving the client
Service message;
The service message is transmitted into the real server to be handled, and obtains the place that the real server is fed back
Manage result;
The result is fed back into the client.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710705477.3A CN107277074A (en) | 2017-08-17 | 2017-08-17 | A kind of method and apparatus for preventing network attack |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710705477.3A CN107277074A (en) | 2017-08-17 | 2017-08-17 | A kind of method and apparatus for preventing network attack |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN107277074A true CN107277074A (en) | 2017-10-20 |
Family
ID=60080173
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201710705477.3A Pending CN107277074A (en) | 2017-08-17 | 2017-08-17 | A kind of method and apparatus for preventing network attack |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN107277074A (en) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108712450A (en) * | 2018-08-01 | 2018-10-26 | 北京闲徕互娱网络科技有限公司 | The means of defence and system of ddos attack |
| CN109120607A (en) * | 2018-08-01 | 2019-01-01 | 北京闲徕互娱网络科技有限公司 | The recognition methods and system of ddos attack |
Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101883078A (en) * | 2009-05-08 | 2010-11-10 | 上海清鹤数码科技有限公司 | DDOS attack defense system and method for streaming media server application layer |
| CN102185859A (en) * | 2011-05-09 | 2011-09-14 | 北京艾普优计算机系统有限公司 | Computer system and data interaction method |
| CN103023857A (en) * | 2011-09-20 | 2013-04-03 | 腾讯科技(深圳)有限公司 | Method and system for remote deployment of information resources |
| US20140130152A1 (en) * | 2012-11-07 | 2014-05-08 | Trusteer Ltd. | Defense against dns dos attack |
| CN106302313A (en) * | 2015-05-14 | 2017-01-04 | 阿里巴巴集团控股有限公司 | DDoS defence method based on dispatching patcher and DDoS system of defense |
| CN106941505A (en) * | 2017-05-16 | 2017-07-11 | 成都迈瑞科科技有限公司 | A kind of method and its system of defence ddos attacks |
-
2017
- 2017-08-17 CN CN201710705477.3A patent/CN107277074A/en active Pending
Patent Citations (6)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101883078A (en) * | 2009-05-08 | 2010-11-10 | 上海清鹤数码科技有限公司 | DDOS attack defense system and method for streaming media server application layer |
| CN102185859A (en) * | 2011-05-09 | 2011-09-14 | 北京艾普优计算机系统有限公司 | Computer system and data interaction method |
| CN103023857A (en) * | 2011-09-20 | 2013-04-03 | 腾讯科技(深圳)有限公司 | Method and system for remote deployment of information resources |
| US20140130152A1 (en) * | 2012-11-07 | 2014-05-08 | Trusteer Ltd. | Defense against dns dos attack |
| CN106302313A (en) * | 2015-05-14 | 2017-01-04 | 阿里巴巴集团控股有限公司 | DDoS defence method based on dispatching patcher and DDoS system of defense |
| CN106941505A (en) * | 2017-05-16 | 2017-07-11 | 成都迈瑞科科技有限公司 | A kind of method and its system of defence ddos attacks |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN108712450A (en) * | 2018-08-01 | 2018-10-26 | 北京闲徕互娱网络科技有限公司 | The means of defence and system of ddos attack |
| CN109120607A (en) * | 2018-08-01 | 2019-01-01 | 北京闲徕互娱网络科技有限公司 | The recognition methods and system of ddos attack |
| CN108712450B (en) * | 2018-08-01 | 2020-12-01 | 北京闲徕互娱网络科技有限公司 | Method and system for preventing DDoS attack |
| CN109120607B (en) * | 2018-08-01 | 2021-03-19 | 北京闲徕互娱网络科技有限公司 | DDoS attack identification method and system |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US10084751B2 (en) | Load balancing among a cluster of firewall security devices | |
| US10367831B2 (en) | Systems, methods, and devices for defending a network | |
| Khan et al. | Topology discovery in software defined networks: Threats, taxonomy, and state-of-the-art | |
| US20140143854A1 (en) | Load balancing among a cluster of firewall security devices | |
| CN105100026B (en) | A kind of safe retransmission method of message and device | |
| US11863570B2 (en) | Blockchain-based network security system and processing method | |
| US20070019565A1 (en) | System and Method for Identifying an Efficient Communication Path in a Network | |
| US8259727B2 (en) | Switching network employing a user challenge mechanism to counter denial of service attacks | |
| CN106330951A (en) | Network protection method, network protection device and network protection system | |
| CN108900549A (en) | A kind of safe block chain networking technology | |
| CN107277074A (en) | A kind of method and apparatus for preventing network attack | |
| CN105407099B (en) | The verifying that Firewall Group is concentrated is shared | |
| US20080320164A1 (en) | Method and apparatus for routing of network addresses | |
| CN110572380A (en) | TCP reinjection plugging method and device | |
| Rao et al. | SEDoS-7: A proactive mitigation approach against EDoS attacks in cloud computing | |
| CN107645458B (en) | Three-layer message drainage method and controller | |
| CN110457119A (en) | Asynchronous process callback method and device | |
| EP1853024B1 (en) | Switching network employing adware quarantine techniques | |
| CN102143173A (en) | Method and system for defending distributed denial of service (Ddos) attacks and gateway equipment | |
| CN110995586A (en) | BGP message processing method and device, electronic equipment and storage medium | |
| Schneider et al. | Building trustworthy systems: Lessons from the PTN and Internet | |
| CN108199965B (en) | Flow spec table item issuing method, network device, controller and autonomous system | |
| Talpur et al. | A survey on DDoS attacks: Router-based threats and defense mechanism in real-world data centers | |
| CN113259387B (en) | Method for preventing honeypot from being controlled to jump board machine based on virtual exchange | |
| CN113630400B (en) | Communication method, device and system for joint attack prevention in network security |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WD01 | Invention patent application deemed withdrawn after publication | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20171020 |