CN105577669B - A kind of method and device of the false source attack of identification - Google Patents

A kind of method and device of the false source attack of identification Download PDF

Info

Publication number
CN105577669B
CN105577669B CN201510998006.7A CN201510998006A CN105577669B CN 105577669 B CN105577669 B CN 105577669B CN 201510998006 A CN201510998006 A CN 201510998006A CN 105577669 B CN105577669 B CN 105577669B
Authority
CN
China
Prior art keywords
message
ttl
geographic area
source
protection server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510998006.7A
Other languages
Chinese (zh)
Other versions
CN105577669A (en
Inventor
彭武杰
魏勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nsfocus Technologies Inc
Nsfocus Technologies Group Co Ltd
Original Assignee
NSFOCUS Information Technology Co Ltd
Beijing NSFocus Information Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NSFOCUS Information Technology Co Ltd, Beijing NSFocus Information Security Technology Co Ltd filed Critical NSFOCUS Information Technology Co Ltd
Priority to CN201510998006.7A priority Critical patent/CN105577669B/en
Publication of CN105577669A publication Critical patent/CN105577669A/en
Application granted granted Critical
Publication of CN105577669B publication Critical patent/CN105577669B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1483Countermeasures against malicious traffic service impersonation, e.g. phishing, pharming or web spoofing

Abstract

The invention discloses a kind of method and devices of the false source attack of identification, it can be when server has attack to trigger, for each message for reaching the server, extract the source IP address of the message and current TTL, and according to the source IP address, correspondence and geographic area between source IP address and geographic area and reach the server message ttl threshold of router range between correspondence, determine that the message in the geographic area belonging to the message reaches the ttl threshold of router range of the server, to judge whether the current TTL of the message is located within the scope of determining ttl threshold of router, if not, then determine that the corresponding client of the message is false source.Without carrying out first packet discarding to each message for reaching server or redirecting processing, all messages can be identified, not only avoid on being influenced caused by the operation of the regular traffic of server, and save Internet resources, improve the efficiency of false identifing source.

Description

A kind of method and device of the false source attack of identification
Technical field
The present invention relates to technical field of network security more particularly to a kind of method and devices of the false source attack of identification.
Background technology
DDOS (Distributed Denial of Service, distributed denial of service attack), refers to by means of visitor Family/server technology joins together multiple computers as Attack Platform, to one or more target offensive attacks, thus Double up the attack pattern of the power of Denial of Service attack.The attack pattern can utilize destination server functional defect or Person directly consumes the system resource of destination server so that destination server can not provide normal business service to the user.
Currently, for the DDOS attack in false source, the hand of protocol stack (Protocol Stack) behavior verification is generally used Section, to distinguish normal client and attack end.For example, for TCP (Transmission Control Protocol, transmission control Agreement processed) attack, the mode that destination server generally use first packet abandons identifies false source, if it is normal source, according to The behavior of protocol stack, client can retransmit the packet being dropped, and if it is false source, then can not be retransmitted, to reach To the purpose for distinguishing normal client and attack end.For another example for HTTP (Hyper Text Transfer Protocol, Hypertext transfer protocol) attack, destination server usually responds HTTP GET messages and 302 redirects (302redirect), press According to protocol stack behavior, normal client can initiate HTTP GET messages again, and use the attack end in false source that can not then accomplish, Equally achieve the purpose that distinguish normal client and has attacked end.
That is, can effectively identify attack end to a certain extent by the way of protocol stack behavior verification, but It is, since it may need the first packet that will be received to abandon, thus, it is possible to which normal network connection can be caused to disconnect, to cause Regular traffic is set to interrupt;In addition, since it may need to redirect message to client response 302 to be initiated again by client HTTP GET messages waste Internet resources, influence interactive efficiency consequently, it is possible to additionally increasing flow.
Therefore, there is an urgent need for a kind of methods of the false source attack of new identification, to solve the side of the false source attack of existing identification The operation of influence regular traffic present in formula, or so that the problems such as resource occupying is big, interactive efficiency is low.
Invention content
It is empty to solve existing identification an embodiment of the present invention provides a kind of method and device of the false source attack of identification The operation of influence regular traffic present in the mode of false source attack, or make resource occupying is big, interactive efficiency is low etc. Problem.
An embodiment of the present invention provides a kind of method of the false source attack of identification, the method includes:
If it is determined that thering is attack to trigger by protection server, then it is directed to each arrival message by protection server, is carried Take the message source IP (Internet Protocol, Internet protocol) address and current TTL (Time To Live, Life span);
According to the correspondence between the source IP address of the message and the source IP address and geographic area of setting, determine Geographic area belonging to the message;
According to determining geographic area, and the geographic area of setting and the arrival message by protection server It is described by protection server to determine that the message in the geographic area of the determination reaches for correspondence between ttl threshold of router range Ttl threshold of router range;
Judge whether the current TTL of the message is located within the scope of the determining ttl threshold of router, if not, it is determined that described The corresponding client of message is false source.
Optionally, the corresponding pass between geographic area and the ttl threshold of router range for reaching the message by protection server System obtains in the following manner:
For any geographic area, in the section of any setting learning time triggered without attack by protection server, Obtain that source IP address belongs to any geographic area normally reaches each message sample by protection server, and The current TTL of each message sample;
The normally arrival that any geographic area is belonged to according to the source IP address got is described by protection server Each message sample current TTL, determine that the message in any geographic area reaches the TTL by protection server most Big value and minimum value, and according to determining TTL maximum values and minimum value, determine that the message in any geographic area arrives Up to the ttl threshold of router range by protection server;
The ttl threshold of router range by protection server is reached according to the message in determining each geographic area, establishes ground Manage the correspondence between region and the ttl threshold of router range for reaching the message by protection server.
Optionally, the normally arrival that any geographic area is belonged to according to the source IP address got described is protected It is described by protection server to determine that the message in any geographic area reaches by the current TTL of each message sample of server TTL maximum values and minimum value, including:
The source IP address got is belonged to it is in each message sample of any geographic area, first normally arrive Up to the current TTL of the message sample by protection server, the quilt is reached as the message in any geographic area Protect the TTL a reference values of server;
The current TTL of each message sample of any geographic area is belonged to according to the source IP address got, is determined Value is not less than each TTL of the TTL a reference values no more than each TTL and value of the TTL a reference values, and not by value More than the minimum TTL in each TTL of the TTL a reference values described protected is reached as the message in any geographic area The minimum TTL of server, using value not less than the maximum TTL in each TTL of the TTL a reference values as any geographic region Message in domain reaches the maximum TTL by protection server.
Still optionally further, the correspondence between source IP address and geographic area obtains in the following manner:
Determine that any source IP address is returned according to the data that IP address information library provides for any source IP address The geographic area of category;
According to the geographic area that determining each source IP address is belonged to, establish corresponding between source IP address and geographic area Relationship.
Optionally, the normally arrival that the source IP address got belongs to any geographic area is described by protection service Each message sample of device, including:
By each client in any geographic area, to the message sample reported by protection server;With/ Or,
By the software probe in any geographic area is arranged, to the message sample reported by protection server This.
Optionally, the method further includes:
By the message in determining each geographic area reach it is described shared to by the ttl threshold of router range of protection server it is other By protection server, message in each geographic area can be obtained by way of shared by protection server arrive so that other Up to other ttl threshold of router data by protection server.
Still optionally further, while determining that the corresponding client of the message is false source or later, the method Further include:Discard processing is carried out to the message.
Based on same inventive concept, an embodiment of the present invention provides a kind of device of the false source attack of identification, the dresses Set including:
Information acquisition unit then reaches described protected for being triggered if it is determined that being had to attack by protection server for each The message for protecting server, extracts the source IP address of the message and current TTL;
Region positioning unit, for according to the source IP address and geographic area of the source IP address of the message and setting it Between correspondence, determine the geographic area belonging to the message;
False source judging unit, for according to determining geographic area, and the geographic area of setting and the arrival quilt The correspondence between the ttl threshold of router range of the message of server is protected, determines that the message in the geographic area of the determination arrives Up to the ttl threshold of router range by protection server;And judge whether the current TTL of the message is located at the determining TTL In threshold range, if not, it is determined that the corresponding client of the message is false source.
Optionally, described device further includes the first unit, is taken for establishing geographic area with described protected is reached Correspondence between the ttl threshold of router range of the message of business device, first unit include:
Sample acquisition module, for being directed to any geographic area, described by any of protection server without attack triggering It sets in learning time section, the normally arrival that acquisition source IP address belongs to any geographic area is described by protection server Each message sample and each message sample current TTL;
Threshold determination module, the normal arrival for belonging to any geographic area according to the source IP address got The current TTL of each message sample by protection server determines that the message in any geographic area reaches the quilt The TTL maximum values and minimum value of server are protected, and according to determining TTL maximum values and minimum value, is determined described any Message in geographic area reaches the ttl threshold of router range by protection server;
Relationship establishes module, described by protection server for being reached according to the message in determining each geographic area Ttl threshold of router range establishes the corresponding pass between geographic area and the ttl threshold of router range for reaching the message by protection server System.
Optionally, the threshold determination module is specifically used for, and the source IP address got is belonged to any geography In each message sample in region, first current TTL for normally reaching the message sample by protection server, as institute It states the message in any geographic area and reaches the TTL a reference values by protection server;
The current TTL of each message sample of any geographic area is belonged to according to the source IP address got, is determined Value is not less than each TTL of the TTL a reference values no more than each TTL and value of the TTL a reference values, and not by value More than the minimum TTL in each TTL of the TTL a reference values described protected is reached as the message in any geographic area The minimum TTL of server, using value not less than the maximum TTL in each TTL of the TTL a reference values as any geographic region Message in domain reaches the maximum TTL by protection server.
Still optionally further, described device further includes the second unit, for being directed to any source IP address, according to IP The data that location information bank provides, determine the geographic area that any source IP address is belonged to;According to determining each source IP address The correspondence between source IP address and geographic area is established in the geographic area belonged to.
Optionally, the normally arrival that the source IP address got belongs to any geographic area is described by protection service Each message sample of device, including:
By each client in any geographic area, to the message sample reported by protection server;With/ Or,
By the software probe in any geographic area is arranged, to the message sample reported by protection server This.
Optionally, described device further includes shared cell, described in reaching the message in each geographic area determined Shared to by the ttl threshold of router range of protection server it is other by protection server so that other can be led to by protection server It crosses shared mode and obtains the message in each geographic area and reach other ttl threshold of router data by protection server.
Still optionally further, the false source judging unit is additionally operable to determining that the corresponding client of the message is void While false source or later, discard processing is carried out to the message.
The present invention has the beneficial effect that:
An embodiment of the present invention provides a kind of method and devices of the false source attack of identification, can determine by protection server In the case of thering is attack to trigger, for each arrival message by protection server, the source IP address of the message is extracted And current TTL, and according to the correspondence and geography between the source IP address, source IP address and geographic area of the message Correspondence between region and the ttl threshold of router range for reaching the message by protection server, determines belonging to the message Geographic area in message reach the ttl threshold of router range by protection server, to judge that the current TTL of the message is It is no to be located within the scope of the determining ttl threshold of router, if not, it is determined that the corresponding client of the message is false source.That is, being not necessarily to To reaching each message progress first packet discarding by protection server or redirecting processing, all messages can be identified, not only It avoids on being influenced caused by the operation of the regular traffic of server, and saves Internet resources, improve false identifing source Efficiency.
Description of the drawings
To describe the technical solutions in the embodiments of the present invention more clearly, make required in being described below to embodiment Attached drawing is briefly introduced, it should be apparent that, drawings in the following description are only some embodiments of the invention, for this For the those of ordinary skill in field, without creative efforts, it can also be obtained according to these attached drawings other Attached drawing.
Fig. 1 show the flow diagram of the false source attack method of the identification described in the embodiment of the present invention one;
Fig. 2 show establishing geographic area and reaching by the message of protection server described in the embodiment of the present invention one The step flow chart of correspondence between ttl threshold of router range;
Fig. 3 show the structural schematic diagram of the false source attack device of the identification described in the embodiment of the present invention two;
Fig. 4 show the structural schematic diagram of the first unit described in the embodiment of the present invention two.
Specific implementation mode
To make the objectives, technical solutions, and advantages of the present invention clearer, below in conjunction with attached drawing to the present invention make into It is described in detail to one step, it is clear that described embodiments are only a part of the embodiments of the present invention, rather than whole implementation Example.Based on the embodiments of the present invention, obtained by those of ordinary skill in the art without making creative efforts All other embodiment, shall fall within the protection scope of the present invention.
Embodiment one:
The embodiment of the present invention one provides a kind of method of the false source attack of identification, specifically, as shown in Figure 1, it is this The flow diagram of the false source attack method of identification described in inventive embodiments one, the method may include following steps:
Step 101:If it is determined that there is attack to trigger by protection server, then be directed to it is each reach it is described by protection server Message extracts the source IP address of the message and current TTL;
Step 102:According to corresponding between the source IP address of the message and the source IP address of setting and geographic area Relationship determines the geographic area belonging to the message;
Step 103:According to determining geographic area, and the geographic area of setting with reach it is described by protection server Correspondence between the ttl threshold of router range of message determines that the message in the geographic area of the determination reaches described protected The ttl threshold of router range of server;
Step 104:Judge whether the current TTL of the message is located within the scope of the determining ttl threshold of router, if it is not, then Determine that the corresponding client of the message is false source.
Wherein, it should be noted that described to be received more than setting threshold by protection server in setting time length When being worth the message of quantity, can determine has attack to trigger by protection server, wherein the setting time length and setting threshold Value quantity can be flexibly arranged according to actual conditions;In addition, can also be used other manner monitoring it is described by protection server whether There is attack to trigger, the present embodiment is not limited in any way herein.
In addition, it is necessary to explanation, if the initial value of the ttl field of any two message differs, even if described arbitrary The affiliated geographic area of two messages is identical, and arrival is described identical by protection server paths traversed, described arbitrary The end value of the ttl field of two messages is also possible to differ greatly.And since ttl field is by sender's setting of message, no By described by protection server controls, therefore, each TTL described in the present embodiment is (in such as current TTL or ttl threshold of router range TTL the decreasing value that) usually may refer to TTL, with identify the node number passed through when each message is reached by protection server or Path length, details are not described herein for the present embodiment.
Further, in this embodiment geographic area can be divided with city or operator.That is, it is directed to any message, Geographic area belonging to the message can be by the source in city or the message that the source IP address of the message belongs to The operator that IP address is belonged to.
In addition, in order to enable recognition result is more accurate, the city that can be also belonged to according to the source IP address of message, and The operator that the source IP address of message is belonged to determines the geographic area belonging to message jointly.Correspondingly, source IP address and ground Correspondence between reason region can be expressed as the correspondence between source IP address and city and operator, geographic area Correspondence between the ttl threshold of router range of the arrival message by protection server is also referred to as city and operation Correspondence between quotient and the ttl threshold of router range for reaching the message by protection server, the present embodiment are no longer superfluous herein It states.
In the following, the correspondence between the source IP address and geographic area with foundation can be expressed as source IP address and city Correspondence between city and operator, geographic area and the ttl threshold of router range for reaching the message by protection server Between correspondence be also referred to as city and operator and reach the ttl threshold of router model of the message by protection server For correspondence between enclosing, the identification process described in the present embodiment is briefly described:
Assuming that certain source IP address for being located at Australia, which is being had by protection server for 129.78.5.11, attacks triggering, then For any arrival message by protection server, its source IP address and current TTL are can extract (that is, TTL's actually subtracts Few value);
Assuming that the source IP address of the message is 222.211.139.7, current TTL is 17 (that is, the practical reduced value of TTL is 17), then the correspondence between the source IP address pre-established and geographic area can be inquired according to the source IP address, to learn The city and operator that the source IP address is belonged to;
Assuming that the source IP address belongs to Chinese Chengdu telecommunications, and, by inquiring the geographic area pre-established and arrival Correspondence between the ttl threshold of router range of the message by protection server, it may be determined that the message of Chinese Chengdu telecommunications arrives Up to the ttl threshold of router by protection server ranging from 20~22 (that is, under normal circumstances the theoretical reduced value of TTL should be 20~ 22), then, it may be determined that the source IP address be 222.211.139.7 message current TTL not within the scope of the ttl threshold of router, from And can identify that the IP address of the message is spoofed source IP address, i.e., the corresponding client of the message is false source.
That is, can be in the case where determination has attack to trigger by protection server, according to each arrival By the source IP address of the message of protection server, its affiliated geographic area is determined, and each arrival is described by protection service The current TTL of the message of device is compared with setting ttl threshold of router range corresponding with its affiliated geographic area, if described Current TTL then can determine that the IP address of the message is false IP address, that is, without to arriving not within the scope of the ttl threshold of router First packet discarding is carried out up to each message by protection server or redirects processing, all messages can be identified, not only It avoids on being influenced caused by the operation of the regular traffic of server, and saves Internet resources, improve false source attack The efficiency of identification.
Further, for any message, while determining that the corresponding client of the message is false source or later, Can also discard processing be carried out to the message, details are not described herein for the present embodiment.
In addition, it is necessary to illustrate, in the present embodiment, in addition to geographic area can be divided according to city and/or operator Except, different geographic areas can be also divided according to IP address, that is, at this point, it is directed to any message, the ground belonging to the message It can be the source IP address of the message itself to manage region also, also do not repeated this.
In the following, by between source IP address and geographic area correspondence and geographic area described protected with reaching The process of establishing of the correspondence protected between the ttl threshold of router range of the message of server is described in detail.
Optionally, the correspondence between source IP address and geographic area can obtain in the following manner:
For any source IP address, according to the IP for storing the data such as the corresponding city of each IP address and operator The data that location information bank provides, determine the geographic area that any source IP address is belonged to;
According to the geographic area that determining each source IP address is belonged to, establish corresponding between source IP address and geographic area Relationship.
Certainly, the correspondence between source IP address and geographic area can also be achieved other ways, the present embodiment exists This is not limited in any way.
Further, for any by protection server, geographic area and the arrival message by protection server Correspondence between ttl threshold of router range can obtain (as shown in Figure 2) in the following manner:
Step 201:For any geographic area, in any setting study triggered without attack by protection server Between in section, obtain that source IP address belongs to any geographic area normally reaches each message sample by protection server The current TTL of this and each message sample;
Step 202:The normally arrival that any geographic area is belonged to according to the source IP address got described is protected It is described by protection service to determine that the message in any geographic area reaches by the current TTL for protecting each message sample of server The TTL maximum values and minimum value of device, and according to determining TTL maximum values and minimum value, determine any geographic area Interior message reaches the ttl threshold of router range by protection server;
Step 203:The ttl threshold of router model by protection server is reached according to the message in determining each geographic area It encloses, establishes the correspondence between geographic area and the ttl threshold of router range for reaching the message by protection server.
It should be noted that it is described by protection server without attack trigger, can refer in setting time length, it is described Message amount is received by protection server and is less than given threshold quantity, details are not described herein again.
In addition, it is necessary to explanation, the generation moment of the setting learning time section and duration can be according to practical need Flexibly to be arranged.For example, when learning for the first time, a longer learning time section (such as 10 hours) can be set, to determine as possible Message in more geographic area reaches the ttl threshold of router range by protection server;It, can be every during follow-up operation Every setting time (such as every a week), mode of learning is opened in set period of time (such as 2 hours), to update, improves ground Manage the correspondence between region and the ttl threshold of router range for reaching the message by protection server.
In addition, still it should be noted that, it is described by protection server without attack triggering any setting learning time section in When establishing the correspondence between geographic area and the ttl threshold of router range for reaching the message by protection server, once inspection Measure it is described there is attack to trigger by protection server, then can close mode of learning, that is, stop establishing or update and is arrived geographic area Correspondence up between the ttl threshold of router range of the message by protection server, to ensure the accuracy of data with existing, this Place repeats no more.
In addition, any geographic area is directed to, described by any setting learning time of the protection server without attack triggering In section, what the source IP address that gets belonged to any geographic area normally reaches all reports by protection server Literary sample, can be source IP address belong to any geographic area normally reach all reports by protection server Text, can also be source IP address belong to any geographic area normally reach all messages by protection server In segment message, be not limited in any way herein.
Optionally, the normally arrival that any geographic area is belonged to according to the source IP address got described is protected It is described by protection server to determine that the message in any geographic area reaches by the current TTL of each message sample of server TTL maximum values and minimum value, it may include:
The source IP address got is belonged to it is in each message sample of any geographic area, first normally arrive Up to the current TTL of the message sample by protection server, the quilt is reached as the message in any geographic area Protect the TTL a reference values of server;
The current TTL of each message sample of any geographic area is belonged to according to the source IP address got, is determined Value is not less than each TTL of the TTL a reference values no more than each TTL and value of the TTL a reference values, and not by value More than the minimum TTL in each TTL of the TTL a reference values described protected is reached as the message in any geographic area The minimum TTL of server, using value not less than the maximum TTL in each TTL of the TTL a reference values as any geographic region Message in domain reaches the maximum TTL by protection server.
For example, there is one to be located at BeiJing, China by protection server, within the learning time of setting, the source IP address that gets It belongs to the 1st that Chinese Shanghai and operator are China Unicom and normally reaches working as the message sample by protection server Preceding TTL is 17, then reaches the TTL by protection server as Chinese Shanghai and operator for the message of China Unicom by 17 A reference value;
The source IP address got belongs to the 2nd that Chinese Shanghai and operator are China Unicom and normally reaches the quilt It is 19 to protect the current TTL of the message sample of server, due to 19>17, so in being as Chinese Shanghais and operator by 19 The message of state's unicom reaches the maximum TTL by protection server;
The source IP address got belongs to the 3rd that Chinese Shanghai and operator are China Unicom and normally reaches the quilt It is 16 to protect the current TTL of the message sample of server, due to 17>16, so in being as Chinese Shanghais and operator by 16 The message of state's unicom reaches the minimum TTL by protection server;
And so on, if (N is by the source IP address got belongs to Chinese Shanghai and operator is China Unicom N Positive integer) a current TTL for normally reaching the message sample by protection server is more than 19 (the existing maximums TTL), then as new maximum TTL;If the current TTL is less than 16 (the existing minimum TTL), as New minimum TTL, until the setting learning time section terminate, so as to according to finally determine TTL maximum values and minimum value, It determines Chinese Shanghai and operator reaches the ttl threshold of router range by protection server for the message of China Unicom.
That is, the method for the false source attack of identification that the present embodiment is provided, can determine by protection server In the case of being triggered without attack, learns the message in each geographic area and reach the ttl threshold of router range by protection server, and The correspondence between geographic area and the ttl threshold of router range for reaching the message by protection server is established accordingly, due to The correspondence is sampled to obtain in the case where being triggered without attack by protection server to mass data, therefore compared with To be accurate, reliable reference can be provided for the identification of false source attack.In addition, it is necessary to explanation, described in the present embodiment The learning process of correspondence in real time or can be carried out periodically, that is, geographic area is with arrival setting by the message of protection server Correspondence one between ttl threshold of router range is set up, and real-time or timing update subsequently can be still carried out, to ensure the standard of data True property, details are not described herein again.
Optionally, the normal of any geographic area is belonged to for any source IP address by protection server, got Reach each message sample by protection server, it may include:
By each client in any geographic area, to the message sample reported by protection server;With/ Or,
By the software probe that is arranged in any geographic area, (such as Amazon to can be used to be located at described any Manage the cloud host etc. in region), to the message sample reported by protection server.
That is, in section of any setting learning time, in addition to can be by regarding normal service message as message Sample learns message in each geographic area and reaches by except the ttl threshold of router range of protection server, also can be in office by being arranged Software probe in one geographic area actively reports message to described by protection server, described any to learn with this Message in reason region reaches the ttl threshold of router range by protection server, to improve geographic area and reach described protected (this mode of learning relates to correspondence between the ttl threshold of router range of the message of shield server especially suitable for destination server And the scene that flow is smaller, that is, there may be certain geographic areas due to not having the flow of arrival destination server and without the science of law The case where practising TTL data).
For example, certain be located at BeiJing, China by protection server, in section of a certain setting learning time, be not received by source IP address belongs to the message in Chinese Xi'an, thus the message without calligraphy learning to Chinese Xi'an reach it is described by protection server The cloud host that Amazon is located at Chinese Xi'an may be used in ttl threshold of router range, is actively reported to described sent by protection server Text, to determine that the message in Chinese Xi'an reaches the ttl threshold of router range by protection server, to improve geographic area and arrive Correspondence up between the ttl threshold of router range of the message by protection server.
Optionally, determining that the message in each geographic area reaches the same of any ttl threshold of router range by protection server When or later, the method may also include:
By the message in determining each geographic area reach it is described shared to by the ttl threshold of router range of protection server it is other By protection server, so that other, by protection server, (concretely other not yet study are taken to each of TTL data by protection Business device) it the message in each geographic area can be obtained by way of shared reaches other TTL thresholds by protection server Value Data.
That is, the TTL distributed datas that the destination server of single-point learns can be shared, for example, multiple mesh The TTL that mark server can learn oneself single-point shares, and to one Zhang Yun's TTL shared libraries of structure, does not have more in this way The single-point destination server for having study to TTL can also obtain TTL data by way of shared.
In addition, it is necessary to explanation, it is described by protection server and it is described it is other can be geographical upper by protection server In same geographic area, it also can logically be located at the same network segment, to ensure that any two source IP address belongs to same geography The message in region, reach it is described by protection server and it is described it is other be closer to by protection server paths traversed, into And ensure the reliability of shared data.
As shown in the above, it by the software probe in any geographic area is arranged, is reported to by protection server Message sample, and the message in determining each geographic area is reached and described is total to by the ttl threshold of router range of protection server It enjoys to other by protection server, purpose is provided to improve established geographic area and arrival is described by protection server Message ttl threshold of router range between correspondence therefore can provide for the identification of false source attack and more comprehensively join It examines.
An embodiment of the present invention provides a kind of methods of the false source attack of identification, can have attack by protection server determining In the case of triggering, for each arrival message by protection server, extracts the source IP address of the message and work as Preceding TTL, and according between the source IP address, source IP address and geographic area of the message correspondence and geographic area Correspondence between the ttl threshold of router range of the arrival message by protection server, determines the ground belonging to the message Reason region in message reach the ttl threshold of router range by protection server, with judge the message current TTL whether position In within the scope of the determining ttl threshold of router, if not, it is determined that the corresponding client of the message is false source.That is, without to arriving Up to being carried out first packet discarding or redirecting processing by each message of protection server, all messages can be identified, not only be avoided On being influenced caused by the operation of the regular traffic of server, and Internet resources are saved, improves the effect of false identifing source Rate.
In addition, the method for the false source attack of identification that the embodiment of the present invention is provided, can also determine by protection server In the case of being triggered without attack, learns the message in each geographic area and reach the ttl threshold of router range by protection server, and The correspondence between geographic area and the ttl threshold of router range for reaching the message by protection server is established accordingly, due to The correspondence is sampled to obtain in the case where being triggered without attack by protection server to mass data, therefore can Identification for the attack of false source provides reliable reference;Also, it can also be by the way that the software probe in any geographic area be arranged Device reports message sample to by protection server, and the message in determining each geographic area is reached described protected and is taken The ttl threshold of router range of business device share to it is other by modes such as protection servers, improve established geographic area and reach described in By the correspondence between the ttl threshold of router range of the message of protection server, therefore, can also be provided for the identification of false source attack It more comprehensively refers to, to improve the accuracy of false identifing source.
Embodiment two:
It is described second embodiment of the present invention provides a kind of device of the false source attack of identification based on same inventive concept Device can be server, can also be the sub-function module of server, can also be the equipment independently of server, and the present embodiment exists This is not limited in any way.Specifically, as shown in figure 3, it attacks device for the identification falseness source described in the embodiment of the present invention two Structural schematic diagram, described device may include:
Information acquisition unit 301, for if it is determined that thering is attack to trigger by protection server, then for each arrival quilt The message for protecting server, extracts the source IP address of the message and current TTL;
Region positioning unit 302, the source IP address of the message for being got according to described information acquiring unit 301 And the correspondence between the source IP address and geographic area of setting, determine the geographic area belonging to the message;
False source judging unit 303, the geographic area for being determined according to the region positioning unit 302, and setting Geographic area and reach the message by protection server ttl threshold of router range between correspondence, determine it is described really Message in fixed geographic area reaches the ttl threshold of router range by protection server;And judge the current TTL of the message Whether it is located within the scope of the determining ttl threshold of router, if not, it is determined that the corresponding client of the message is false source.
That is, described device can be in the case where determination has attack to trigger by protection server, according to each The source IP address for reaching the message by protection server determines its affiliated geographic area, and each is reached the quilt The current TTL for protecting the message of server is compared with setting ttl threshold of router range corresponding with its affiliated geographic area Compared with, if the current TTL not within the scope of the ttl threshold of router, can determine that the IP address of the message is false IP address, That is, without carrying out first packet discarding to reaching each message by protection server or redirecting processing, can to all messages into Row identification not only avoids on being influenced caused by the operation of the regular traffic of server, and saves Internet resources, improves The efficiency of false source attack recognition.
In the following, by the function of each unit described in the embodiment of the present invention is described in detail.
Optionally, for any message, while determining that the corresponding client of the message is false source or later, institute False source judging unit 303 is stated to can be additionally used in while determining that the corresponding client of the message is false source or later, it is right The message carries out discard processing.
Optionally, described device may also include the second unit (not indicated in Fig. 3), for for any source IP Location determines the geographic area that any source IP address is belonged to according to the data that IP address information library provides;According to determining The correspondence between source IP address and geographic area is established in the geographic area that each source IP address is belonged to.
Certainly, second unit can also be achieved other ways corresponding between source IP address and geographic area Relationship, the present embodiment are not limited in any way herein.
Further, described device may also include the first unit (not indicated in Fig. 3), for establish geographic area with The correspondence between the ttl threshold of router range of the message by protection server is reached, specifically as shown in figure 4, it is described The structural schematic diagram of first unit, including:
Sample acquisition module 401, for being directed to any geographic area, in the appointing without attack triggering by protection server In one setting learning time section, the normally arrival that acquisition source IP address belongs to any geographic area is described by protection service Each message sample of device and the current TTL of each message sample;
Threshold determination module 402, for belonging to the normal of any geographic area according to the source IP address got The current TTL for reaching each message sample by protection server determines that the message in any geographic area reaches institute State by the TTL maximum values and minimum value of protection server, and according to determining TTL maximum values and minimum value, determine described in Message in any geographic area reaches the ttl threshold of router range by protection server;
Relationship establishes module 403, described by protection server for being reached according to the message in determining each geographic area Ttl threshold of router range, establish geographic area and reach the message by protection server ttl threshold of router range between it is corresponding Relationship.
Optionally, the threshold determination module 402 is specifically used for, and the source IP address got is belonged to described any In each message sample in region, first current TTL for normally reaching the message sample by protection server is managed, as Message in any geographic area reaches the TTL a reference values by protection server;And
The current TTL of each message sample of any geographic area is belonged to according to the source IP address got, is determined Value is not less than each TTL of the TTL a reference values no more than each TTL and value of the TTL a reference values, and not by value More than the minimum TTL in each TTL of the TTL a reference values described protected is reached as the message in any geographic area The minimum TTL of server, using value not less than the maximum TTL in each TTL of the TTL a reference values as any geographic region Message in domain reaches the maximum TTL by protection server.
That is, the device for the false source attack of identification that the present embodiment is provided, can determine by protection server In the case of being triggered without attack, learns the message in each geographic area and reach the ttl threshold of router range by protection server, and The correspondence between geographic area and the ttl threshold of router range for reaching the message by protection server is established accordingly, due to The correspondence is sampled to obtain in the case where being triggered without attack by protection server to mass data, therefore compared with To be accurate, reliable reference can be provided for the identification of false source attack.In addition, it is necessary to explanation, described in the present embodiment The learning process of correspondence in real time or can be carried out periodically, that is, geographic area is with arrival setting by the message of protection server Correspondence one between ttl threshold of router range is set up, and real-time or timing update subsequently can be still carried out, to ensure the standard of data True property, details are not described herein again.
Optionally, any geographic area is belonged to for any source IP address by protection server, got Normally reach each message sample by protection server, it may include:
By each client in any geographic area, to the message sample reported by protection server;With/ Or,
By the software probe that is arranged in any geographic area, (such as Amazon to can be used to be located at described any Manage the cloud host etc. in region), to the message sample reported by protection server.
That is, in section of any setting learning time, first unit is in addition to can be by will be normal Service message learns message in each geographic area and reaches by except the ttl threshold of router range of protection server as message sample, Also message actively can be reported by protection server to described, by the way that the software probe in any geographic area is arranged with this The ttl threshold of router range by protection server is reached to learn the message in any geographic area, to improve geographic region (this mode of learning is especially suitable for correspondence between domain and the ttl threshold of router range for reaching the message by protection server It is related to the smaller scene of flow for destination server, that is, there may be certain geographic areas due to not having arrival destination service The flow of device and without calligraphy learning to TTL data the case where).
Optionally, described device further includes shared cell (not indicated in Fig. 3), is used for, true in first unit It, will be determining each while message in fixed each geographic area reaches any ttl threshold of router range by protection server or later Message in geographic area reach it is described shared to by the ttl threshold of router range of protection server it is other by protection server so that Other messages that can be obtained by way of shared by protection server in each geographic area reach described other protected The ttl threshold of router data of server.
That is, the TTL distributed datas that the destination server of single-point learns can be carried out by the shared cell It is shared, for example, the TTL that multiple destination servers can learn oneself single-point shares, to which one Zhang Yun TTL of structure is total Library is enjoyed, can also obtain TTL data by way of shared without the single-point destination server learnt to TTL more in this way.
As shown in the above, it by the software probe in any geographic area is arranged, is reported to by protection server Message sample, and the message in determining each geographic area is reached and described is total to by the ttl threshold of router range of protection server It enjoys to other by protection server, purpose is provided to improve established geographic area and arrival is described by protection server Message ttl threshold of router range between correspondence therefore can provide for the identification of false source attack and more comprehensively join It examines.
An embodiment of the present invention provides a kind of devices of the false source attack of identification, can have attack by protection server determining In the case of triggering, for each arrival message by protection server, extracts the source IP address of the message and work as Preceding TTL, and according between the source IP address, source IP address and geographic area of the message correspondence and geographic area Correspondence between the ttl threshold of router range of the arrival message by protection server, determines the ground belonging to the message Reason region in message reach the ttl threshold of router range by protection server, with judge the message current TTL whether position In within the scope of the determining ttl threshold of router, if not, it is determined that the corresponding client of the message is false source.That is, without to arriving Up to being carried out first packet discarding or redirecting processing by each message of protection server, all messages can be identified, not only be avoided On being influenced caused by the operation of the regular traffic of server, and Internet resources are saved, improves the effect of false identifing source Rate.
In addition, the device for the false source attack of identification that the embodiment of the present invention is provided, can also determine by protection server In the case of being triggered without attack, learns the message in each geographic area and reach the ttl threshold of router range by protection server, and The correspondence between geographic area and the ttl threshold of router range for reaching the message by protection server is established accordingly, due to The correspondence is sampled to obtain in the case where being triggered without attack by protection server to mass data, therefore can Identification for the attack of false source provides reliable reference;Also, it can also be by the way that the software probe in any geographic area be arranged Device reports message sample to by protection server, and the message in determining each geographic area is reached described protected and is taken The ttl threshold of router range of business device share to it is other by modes such as protection servers, improve established geographic area and reach described in By the correspondence between the ttl threshold of router range of the message of protection server, therefore, can also be provided for the identification of false source attack It more comprehensively refers to, to improve the accuracy of false identifing source.
It will be understood by those skilled in the art that the embodiment of the present invention can be provided as method, apparatus (equipment) or computer journey Sequence product.Therefore, complete hardware embodiment, complete software embodiment or combining software and hardware aspects can be used in the present invention The form of embodiment.Moreover, the present invention can be used in one or more wherein include computer usable program code calculating The computer program implemented in machine usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention be with reference to according to the method for the embodiment of the present invention, the flow chart of device (equipment) and computer program product And/or block diagram describes.It should be understood that each flow in flowchart and/or the block diagram can be realized by computer program instructions And/or the combination of the flow and/or box in box and flowchart and/or the block diagram.These computer programs can be provided to refer to Enable the processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to generate One machine so that by the instruction that computer or the processor of other programmable data processing devices execute generate for realizing The device for the function of being specified in one flow of flow chart or multiple flows and/or one box of block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that instruction generation stored in the computer readable memory includes referring to Enable the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, in computer or The instruction executed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although preferred embodiments of the present invention have been described, it is created once a person skilled in the art knows basic Property concept, then additional changes and modifications may be made to these embodiments.So it includes excellent that the following claims are intended to be interpreted as It selects embodiment and falls into all change and modification of the scope of the invention.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art God and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.

Claims (12)

1. a kind of method of the false source attack of identification, which is characterized in that the method includes:
If it is determined that thering is attack to trigger by protection server, then it is directed to each arrival message by protection server, extracts institute State the source IP address of message and current TTL;
According to the correspondence between the source IP address of the message and the source IP address and geographic area of setting, determine described in Geographic area belonging to message;
According to determining geographic area, and the TTL thresholds of the geographic area of setting and the arrival message by protection server The correspondence being worth between range, determines that the message in the geographic area of the determination reaches the TTL by protection server Threshold range;
Judge whether the current TTL of the message is located within the scope of the determining ttl threshold of router, if not, it is determined that the message Corresponding client is false source;
Correspondence between geographic area and the ttl threshold of router range for reaching the message by protection server is by following What mode obtained:
It is obtained described by section of any setting learning time of the protection server without attack triggering for any geographic area What source IP address belonged to any geographic area normally reaches each message sample by protection server, and each report The current TTL of literary sample;
It is described by each of protection server that normally reaching for any geographic area is belonged to according to the source IP address got The current TTL of message sample determines that the message in any geographic area reaches the TTL maximum values by protection server And minimum value, and according to determining TTL maximum values and minimum value, determine that the message in any geographic area reaches institute It states by the ttl threshold of router range of protection server;
The ttl threshold of router range by protection server is reached according to the message in determining each geographic area, establishes geographic region Correspondence between domain and the ttl threshold of router range for reaching the message by protection server.
2. the method as described in claim 1, which is characterized in that belong to any geography according to the source IP address got The current TTL for normally reaching each message sample by protection server in region, determines in any geographic area Message reaches the TTL maximum values and minimum value by protection server, including:
The source IP address got is belonged to in each message sample of any geographic area, first normal arrival institute It states by the current TTL of the message sample of protection server, described protected is reached as the message in any geographic area The TTL a reference values of server;
The current TTL that each message sample of any geographic area is belonged to according to the source IP address got, determines value No more than each TTL that each TTL and value of the TTL a reference values are not less than the TTL a reference values, and value is not more than Minimum TTL in each TTL of the TTL a reference values reaches described by protection service as the message in any geographic area The minimum TTL of device, using value not less than the maximum TTL in each TTL of the TTL a reference values as in any geographic area Message reach the maximum TTL by protection server.
3. the method as described in claim 1, which is characterized in that the correspondence between source IP address and geographic area is to pass through What following manner obtained:
Determine what any source IP address was belonged to according to the data that IP address information library provides for any source IP address Geographic area;
According to the geographic area that determining each source IP address is belonged to, the corresponding pass between source IP address and geographic area is established System.
4. the method as described in claim 1, which is characterized in that the source IP address got belongs to any geographic area Normally reach each message sample by protection server, including:
By each client in any geographic area, to the message sample reported by protection server;And/or
By the software probe in any geographic area is arranged, to the message sample reported by protection server.
5. the method as described in claim 1, which is characterized in that the method further includes:
Message in determining each geographic area is reached and described other protected is shared to by the ttl threshold of router range of protection server Server is protected, so that other message arrival institutes that can be obtained by way of shared by protection server in each geographic area State other ttl threshold of router data by protection server.
6. the method as described in claim 1, which is characterized in that determining that the corresponding client of the message is the same of false source When or later, the method further includes:
Discard processing is carried out to the message.
7. a kind of device of the false source attack of identification, which is characterized in that described device includes:
It is described by protection clothes to be then directed to each arrival for being triggered if it is determined that being had to attack by protection server for information acquisition unit The message of business device, extracts the source IP address of the message and current TTL;
Region positioning unit, for according between the source IP address of the message and the source IP address of setting and geographic area Correspondence determines the geographic area belonging to the message;
False source judging unit, for according to determining geographic area, and the geographic area of setting with arrival is described is protected Correspondence between the ttl threshold of router range of the message of server determines that the message in the geographic area of the determination reaches institute It states by the ttl threshold of router range of protection server;And judge whether the current TTL of the message is located at the determining ttl threshold of router In range, if not, it is determined that the corresponding client of the message is false source;
Described device further includes the first unit, for establishing geographic area and reaching the message by protection server Correspondence between ttl threshold of router range, first unit include:
Sample acquisition module, for being directed to any geographic area, described by any setting of the protection server without attack triggering In learning time section, it is described by each of protection server that acquisition source IP address belongs to normally reaching for any geographic area The current TTL of message sample and each message sample;
Threshold determination module, for being belonged to described in the normal arrival of any geographic area according to the source IP address got By the current TTL of each message sample of protection server, determine that the message in any geographic area reaches described protected The TTL maximum values and minimum value of server, and according to determining TTL maximum values and minimum value, determine any geography Message in region reaches the ttl threshold of router range by protection server;
Relationship establishes module, for reaching the TTL thresholds by protection server according to the message in determining each geographic area It is worth range, establishes the correspondence between geographic area and the ttl threshold of router range for reaching the message by protection server.
8. device as claimed in claim 7, which is characterized in that the threshold determination module is specifically used for,
The source IP address got is belonged to in each message sample of any geographic area, first normal arrival institute It states by the current TTL of the message sample of protection server, described protected is reached as the message in any geographic area The TTL a reference values of server;
The current TTL that each message sample of any geographic area is belonged to according to the source IP address got, determines value No more than each TTL that each TTL and value of the TTL a reference values are not less than the TTL a reference values, and value is not more than Minimum TTL in each TTL of the TTL a reference values reaches described by protection service as the message in any geographic area The minimum TTL of device, using value not less than the maximum TTL in each TTL of the TTL a reference values as in any geographic area Message reach the maximum TTL by protection server.
9. device as claimed in claim 7, which is characterized in that described device further includes the second unit;
Second unit, for be directed to any source IP address, according to IP address information library provide data, determine described in The geographic area that any source IP address is belonged to;According to the geographic area that determining each source IP address is belonged to, with establishing source IP Correspondence between location and geographic area.
10. device as claimed in claim 7, which is characterized in that the source IP address got belongs to any geographic region Domain normally reaches each message sample by protection server, including:
By each client in any geographic area, to the message sample reported by protection server;And/or
By the software probe in any geographic area is arranged, to the message sample reported by protection server.
11. device as claimed in claim 7, which is characterized in that described device further includes shared cell, is used for,
Message in determining each geographic area is reached and described other protected is shared to by the ttl threshold of router range of protection server Server is protected, so that other message arrival institutes that can be obtained by way of shared by protection server in each geographic area State other ttl threshold of router data by protection server.
12. device as claimed in claim 7, which is characterized in that falseness source judging unit is additionally operable to determining the report While the corresponding client of text is false source or later, discard processing is carried out to the message.
CN201510998006.7A 2015-12-25 2015-12-25 A kind of method and device of the false source attack of identification Active CN105577669B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510998006.7A CN105577669B (en) 2015-12-25 2015-12-25 A kind of method and device of the false source attack of identification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510998006.7A CN105577669B (en) 2015-12-25 2015-12-25 A kind of method and device of the false source attack of identification

Publications (2)

Publication Number Publication Date
CN105577669A CN105577669A (en) 2016-05-11
CN105577669B true CN105577669B (en) 2018-09-21

Family

ID=55887326

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510998006.7A Active CN105577669B (en) 2015-12-25 2015-12-25 A kind of method and device of the false source attack of identification

Country Status (1)

Country Link
CN (1) CN105577669B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375207A (en) * 2016-09-05 2017-02-01 上海斐讯数据通信技术有限公司 Time exceeded message control method and system based on SDN (Software Defined Network)
WO2019021402A1 (en) * 2017-07-26 2019-01-31 パナソニック インテレクチュアル プロパティ コーポレーション オブ アメリカ Communication device, communication method, and communication system
CN112398741B (en) * 2019-08-15 2023-09-05 华为技术有限公司 Method for learning routing, method for forwarding message, equipment and storage medium
EP4016941A4 (en) 2019-08-15 2022-11-23 Huawei Technologies Co., Ltd. Method for learning routing, method for forwarding report, device, and storage medium
CN111200611B (en) * 2020-01-06 2021-02-23 清华大学 Method and device for verifying intra-domain source address based on boundary interface equivalence class
CN114785876A (en) * 2022-04-07 2022-07-22 湖北天融信网络安全技术有限公司 Message detection method and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101582833A (en) * 2008-05-15 2009-11-18 成都市华为赛门铁克科技有限公司 Method and device for processing spoofed IP data packet
US7673032B1 (en) * 2000-06-09 2010-03-02 Resource Consortium Limited Determining the geographic location of a network device
CN101674312A (en) * 2009-10-19 2010-03-17 中兴通讯股份有限公司 Method for preventing source address spoofing in network transmission and device thereof
CN102281295A (en) * 2011-08-06 2011-12-14 黑龙江大学 Method for easing distributed denial of service attacks
CN104125242A (en) * 2014-08-18 2014-10-29 北京阅联信息技术有限公司 Protection method and protection device capable of recognizing DDOS (distributed denial of service) attacks camouflaged as LDNS (local domain name server) requests
CN104348794A (en) * 2013-07-30 2015-02-11 深圳市腾讯计算机系统有限公司 Network layer DDOS (Distributed Denial of Service) attack source identification method, device and system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100925176B1 (en) * 2007-09-21 2009-11-05 한국전자통신연구원 Apparatus and method for visualizing network state by using geographic information

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7673032B1 (en) * 2000-06-09 2010-03-02 Resource Consortium Limited Determining the geographic location of a network device
CN101582833A (en) * 2008-05-15 2009-11-18 成都市华为赛门铁克科技有限公司 Method and device for processing spoofed IP data packet
CN101674312A (en) * 2009-10-19 2010-03-17 中兴通讯股份有限公司 Method for preventing source address spoofing in network transmission and device thereof
CN102281295A (en) * 2011-08-06 2011-12-14 黑龙江大学 Method for easing distributed denial of service attacks
CN104348794A (en) * 2013-07-30 2015-02-11 深圳市腾讯计算机系统有限公司 Network layer DDOS (Distributed Denial of Service) attack source identification method, device and system
CN104125242A (en) * 2014-08-18 2014-10-29 北京阅联信息技术有限公司 Protection method and protection device capable of recognizing DDOS (distributed denial of service) attacks camouflaged as LDNS (local domain name server) requests

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Measurements of the Internet Topology in the Asia-Pacific Region;Bradley Huffaker 等;《http://www.isoc.org/inet2000/cdproceedings/8e/8e_3.htm》;20000721;全文 *
基于IP地址检测的DDoS攻击防御方法研究;陈曦;《中国优秀硕士学位论文全文数据库 信息科技辑》;20090115;全文 *
基于TTL 值异常的源地址伪造报文检测方法;荀宝铖 等;《计算机应用研究》;20061231(第12期);全文 *

Also Published As

Publication number Publication date
CN105577669A (en) 2016-05-11

Similar Documents

Publication Publication Date Title
CN105577669B (en) A kind of method and device of the false source attack of identification
US10673874B2 (en) Method, apparatus, and device for detecting e-mail attack
CN108551446B (en) Anti-attack SYN message processing method and device, firewall and storage medium
US8881281B1 (en) Application and network abuse detection with adaptive mitigation utilizing multi-modal intelligence data
CN109194680B (en) Network attack identification method, device and equipment
JP6026789B2 (en) Node device for preventing overflow of pending table in name-based network system, and device and method for preventing overflow
US20140189867A1 (en) DDoS ATTACK PROCESSING APPARATUS AND METHOD IN OPENFLOW SWITCH
CN109922072B (en) Distributed denial of service attack detection method and device
CN106657126B (en) The device and method of detection and defending DDoS (Distributed Denial of Service) attacks
CN110166480B (en) Data packet analysis method and device
CN110266650B (en) Identification method of Conpot industrial control honeypot
CN111212096B (en) Method, device, storage medium and computer for reducing IDC defense cost
CN106357660B (en) Method and device for detecting forged source IP in DDOS defense system
CN105812318B (en) For preventing method, controller and the system of attack in a network
CN103051605A (en) Data packet processing method, device and system
CN106534068A (en) Method and device for cleaning forged source IP in DDOS (Distributed Denial of Service) defense system
CN110213254A (en) A kind of method and apparatus that Internet protocol IP packet is forged in identification
CN107241304A (en) A kind of detection method and device of DDos attacks
CN110365658A (en) A kind of protection of reflection attack and flow cleaning method, apparatus, equipment and medium
CN114338120B (en) Method, device, medium and electronic equipment for detecting sweep attack
Darwish et al. Vulnerability Assessment and Experimentation of Smart Grid DNP3.
CN107454065A (en) A kind of means of defence and device of UDP Flood attacks
KR20110140063A (en) Method for detecting ip shared router and system thereof
CN102932373A (en) Zombie network detection method and device
CN108769055A (en) A kind of falseness source IP detection method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder

Address after: 100089 Beijing city Haidian District Road No. 4 North wa Yitai three storey building

Patentee after: NSFOCUS Technologies Group Co.,Ltd.

Patentee after: NSFOCUS TECHNOLOGIES Inc.

Address before: 100089 Beijing city Haidian District Road No. 4 North wa Yitai three storey building

Patentee before: NSFOCUS INFORMATION TECHNOLOGY Co.,Ltd.

Patentee before: NSFOCUS TECHNOLOGIES Inc.

CP01 Change in the name or title of a patent holder