CN103179136A - Saturation distribution type denial-of-service attack method and saturation distribution type denial-of-service attack system in defense dynamic website - Google Patents

Saturation distribution type denial-of-service attack method and saturation distribution type denial-of-service attack system in defense dynamic website Download PDF

Info

Publication number
CN103179136A
CN103179136A CN2013101416791A CN201310141679A CN103179136A CN 103179136 A CN103179136 A CN 103179136A CN 2013101416791 A CN2013101416791 A CN 2013101416791A CN 201310141679 A CN201310141679 A CN 201310141679A CN 103179136 A CN103179136 A CN 103179136A
Authority
CN
China
Prior art keywords
service attack
domain name
distributed denial
standby server
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2013101416791A
Other languages
Chinese (zh)
Other versions
CN103179136B (en
Inventor
张昱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NANJING YXLINK INFORMATION TECHNOLOGIES Co Ltd
Original Assignee
NANJING YXLINK INFORMATION TECHNOLOGIES Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NANJING YXLINK INFORMATION TECHNOLOGIES Co Ltd filed Critical NANJING YXLINK INFORMATION TECHNOLOGIES Co Ltd
Priority to CN201310141679.1A priority Critical patent/CN103179136B/en
Publication of CN103179136A publication Critical patent/CN103179136A/en
Application granted granted Critical
Publication of CN103179136B publication Critical patent/CN103179136B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a saturation distribution type denial-of-service attack method and a saturation distribution type denial-of-service attack system in a defense dynamic website. Data stream is automatically switched to a hidden spare link under saturation distribution type denial-of-service attack, and is automatically switched to an original main link when the saturation distribution type denial-of-service attack is cancelled. With the adoption of the saturation distribution type denial-of-service attack method and the saturation distribution type denial-of-service attack system in the defense dynamic website provided by the invention, the problem that dynamic data cannot be accessed under the saturation distribution type denial-of-service attack in prior art can be solved. The saturation distribution type denial-of-service attack method and the saturation distribution type denial-of-service attack system in the defense dynamic website provided by the invention can be applied to various fields such as electronic government affairs, electronic commerce, negotiable securities and bank in need of carrying out dynamic data transmission under the saturation distribution type denial-of-service attack, and has a wide application prospect.

Description

The method and system of saturated distributed denial of service attack in the defence dynamic website
?
Technical field
The present invention relates to a kind of implementation method and system that solves saturated distributed denial of service attack, particularly a kind of method and system of defending saturated distributed denial of service attack in dynamic website, belong to the network security technology field.
Background technology
Continuous maturation and development along with network technology, distributed denial of service attack has become the severeest potential safety hazard of current site, for saturated distributed denial of service attack, do not have especially very effective means to protect, carry out the website data shunting and the harm static website can only effectively be protected be subject to saturated distributed denial of service attack time of the mode accelerated for adopting the CDN mode, and for dynamic website can't immediate updating the website dynamic content, and the means of protection distributed denial of service attack commonly used have with inferior several:
1, utilize the distributed denial of service of anti-DDOS(of specialty) equipment: single anti-DDOS equipment can effectively protect DDOS and attack, the state but if distributed denial of service attack reaches capacity (saturation condition: attack traffic is more than or equal to the total bandwidth flow of network), can cause network congestion, even disposed the anti-DDOS equipment of specialty this moment, because network is in congestion state, the application of website still can't be accessed, and causes assailant's purpose to be reached.
2, utilize CDN(Content Delivery Network: content distributing network) carry out shunting and the acceleration of website: this method is just shunting and the acceleration in order to carry out the website in the early stage, but for static website, when main web site is subject to distributed denial of service attack, even the network of main web site is in congestion state, other CDN node still can effectively be accessed, and has the function of certain anti-saturation distributed denial of service attack.But not enough is: for dynamic website, because main web site has been in congestion state, what dynamic content can't be correct transfers to the CDN node from main web site, and causes dynamic message transmission to postpone or show incorrect problem.
Therefore be subject to the problem of saturated distributed denial of service attack for dynamic website, need a kind of effective mean of defense and solution.
Summary of the invention
Goal of the invention: for problems of the prior art and deficiency, the invention provides a kind of dynamic website when being subject to saturated Denial of Service attack, transmission link can automatically switch, the reserve link that utilization is hidden to a plurality of secondary nodes, reaches the method and system of saturated distributed denial of service attack in the defence dynamic website with dynamic data transmission.
Technical scheme: a kind of method of defending saturated distributed denial of service attack in dynamic website, set up reserve link and the standby server cluster hidden, the chain route primary link of master server cluster and reserve link form; When not suffering distributed denial of service attack, born the data input and output of user's access by primary link, the standby server cluster is not worked; When distributed denial of service attack is arranged, enable the standby server cluster, standby server passes through reserve link, the dynamic data of request master server, master server is according to request, the structure dynamic data returns to standby server by reserve link, and standby server returns to the up-to-date dynamic data information of user; After distributed denial of service attack disappears, data communication is switched to primary link from reserve link.
When not suffering distributed denial of service attack, born the data input and output of user's access by primary link, the standby server cluster is not worked, and concrete steps are as follows:
Step 301, the user submits to the access domain name request to the dns server cluster;
Step 302 is returned to the IP address of accessed master server by the dns server cluster;
Step 303, the user submits to access request data to master server according to the IP address of master server;
Step 304, be deployed in the ADS equipment inspection user request data stream of master server front end and whether comprise distributed denial of service attack, when not suffering distributed denial of service attack, the ADS equipment Inspection is less than distributed denial of service attack, and ADS equipment is submitted user's request msg to the master server cluster;
Step 305, master server return results to the user after user's access request is finished dealing with;
Step 306, process finishes.
When the primary link of master server suffers distributed denial of service attack, at this moment be divided into 2 kinds of situations, the first: the distributed denial of service attack state that do not reach capacity, this moment, primary link still can carry out transfer of data; The second: the distributed denial of service attack state that reaches capacity, this moment, primary link was in blocked state, and any data can't normal transmission; For the first situation, the concrete steps of processing are as follows:
Step 401, the assailant initiates distributed denial of service attack, and the ADS equipment on primary link of being deployed in detects and filters distributed denial of service attack according to the prevention policies of administrator configurations;
Step 402, ADS equipment is after distributed denial of service attack being detected and reaching the threshold value of administrator configurations, send the alarm information of being attacked to the cloud dispatching patcher, after the cloud dispatching patcher receives alarm information, confirm that primary link is attacked, revise the domain name of domain name and point to, and the standby server cluster address is revised as in the IP address;
Step 403, dns server cluster are regularly inquired about the domain name state of cloud dispatching patcher;
Step 404, cloud dispatching patcher are returned to the IP address group of up-to-date domain name state and correspondence to the dns server cluster, and the dns server cluster is directed to the standby server cluster according to the domain name after upgrading;
Step 405 when the user accesses domain name, is at first gone the sensing of dns server nslookup;
Step 406, dns server return to the standby server IP address of a region of user according to the geographic area at user place;
Step 407, the user submits to visit data to standby server according to the standby server IP address of returning;
Step 408, the distributed purging system that is deployed in the standby server front end filters the attack data that exist in access request, and the data flow of concurrent warp let-off filtration is to standby server;
Step 409, standby server are asked the dynamic data of master server by reserve link;
Step 410, main service are according to the request of standby server, and the structure dynamic data returns to standby server by reserve link;
Step 411, standby server return to the up-to-date dynamic data information of user, and process finishes.
For the second situation, the concrete steps of processing are as follows:
Step 501, the assailant initiates saturated distributed denial of service attack, and this moment, primary link was congested by saturation attack, and ADS equipment can't send a warning message;
Step 502, cloud dispatching patcher regular check primary link situation when finding that primary link can't respond, confirms that this primary link suffers saturated Denial of Service attack, perhaps the primary link off-line, revise the sensing of domain name, and the standby server cluster address is revised as in the IP address;
Step 503, dns server cluster are regularly inquired about the domain name state of cloud dispatching patcher;
Step 504, cloud dispatching patcher are returned to the IP address group of up-to-date domain name state and correspondence to the dns server cluster, and dns server cluster more new domain name is directed to the standby server cluster;
Step 505 when the user accesses the master server domain name, is at first gone the sensing of dns server inquiry domain name;
Step 506, dns server return to the standby server IP address of a region of user according to the geographic area at user place;
Step 507, the user submits to visit data to standby server according to the standby server IP address of returning;
Step 508, the distributed purging system that is deployed in the standby server front end filters the attack data that exist in user access request, and the data flow of concurrent warp let-off filtration is to standby server;
Step 509, standby server are asked the dynamic data of master server by reserve link;
Step 510, master server are according to the standby server request, and the structure dynamic data returns to standby server by reserve link;
Step 511, standby server return to the up-to-date dynamic data information of user, and process finishes.
After distributed denial of service attack disappeared, data communication automatically switched to primary link from reserve link, and concrete steps are as follows:
Step 601, the assailant stops saturated distributed denial of service attack, and distributed purging system judgement is attacked and is disappeared;
Step 602, by distributed purging system notice cloud dispatching patcher, attack is disappeared, and prepares the switchback primary link, after the cloud dispatching patcher receives and attacks the notification message that disappears, new domain name state more;
Step 603, dns server cluster are regularly inquired about the domain name state of cloud dispatching patcher;
Step 604, cloud dispatching patcher are returned to the IP address group of up-to-date domain name state and correspondence to the dns server cluster, and dns server cluster more new domain name is directed to the master server cluster;
Step 605 when the user accesses domain name, is at first gone the sensing of dns server inquiry domain name;
Step 606, dns server return to user's master server IP address;
Step 607, the user submits to visit data to master server according to the master server IP address of returning;
Step 608, the ADS equipment that is deployed in the master server front end is sent to master server with the data flow of access request;
Step 609, master server are according to access request, and the structure dynamic data returns to the user, and process finishes.
A kind of system that defends saturated distributed denial of service attack in dynamic website comprises the master server cluster, primary link, hiding standby server cluster and reserve link, ADS equipment, cloud dispatching patcher, and distributed purging system;
Described master server cluster when not suffering distributed denial of service attack or after distributed denial of service attack disappears, is used for the response user access request by primary link;
Described standby server cluster, when suffering distributed denial of service attack, by reserve link, the dynamic data of request master server is used for the response user access request; Described standby server cluster is distributed in different regions;
Described ADS equipment is located at the front end of master server, and the keeper arranges by ADS equipment and detects and the prevention policies of filter distribution formula Denial of Service attack, and domain name, primary link, reserve link information that configuration is needed protection; ADS equipment sends to the cloud dispatching patcher with configuration information; ADS equipment is after distributed denial of service attack being detected and reaching the threshold value of administrator configurations, send the alarm information of being attacked to the cloud dispatching patcher, after the cloud dispatching patcher receives alarm information, confirm that primary link is attacked or the primary link off-line, according to configuration information, revise the domain name of domain name and point to, and the standby server cluster address is revised as in the IP address;
Described cloud dispatching patcher comprises the dns server cluster; The dns server cluster is regularly inquired about the domain name state of cloud dispatching patcher; The cloud dispatching patcher is returned to the IP address group of up-to-date domain name state and correspondence to the dns server cluster, and the dns server cluster is directed to the standby server cluster according to the domain name after upgrading;
Described distributed purging system is located at the standby server front end, is used for the distributed denial of service attack from the assailant is cleaned and filters, and will be sent to standby server through the user access data flow that filters.
Described cloud dispatching patcher selects standby server to carry out data buffer storage according to configuration information.
Beneficial effect: the method and system of saturated distributed denial of service attack in defence dynamic website provided by the invention, when suffering saturated distributed denial of service attack, automatically data flow is switched to hidden reserve link, and can automatically data flow be switched back original primary link when attack is disappeared; Solve when suffering saturated distributed denial of service attack in prior art the situation that dynamic data can't be accessed.The present invention can be applicable to E-Government, ecommerce, security, bank etc., in saturated distributed denial of service attack situation, still needs to carry out the numerous areas of dynamic data transmission, is with a wide range of applications.
Description of drawings
Fig. 1 is the systematic schematic diagram of the embodiment of the present invention;
Fig. 2 is the flow chart of Administrator prevention policies and configuration information in the embodiment of the present invention;
Fig. 3 is the normal browsing process figure of user in the embodiment of the present invention;
Fig. 4 is active link switching flow figure in the embodiment of the present invention;
Fig. 5 is passive link switching flow chart in the embodiment of the present invention;
Fig. 6 is after in the embodiment of the present invention, attack is disappeared, automatically the flow chart of switchback primary link.
Embodiment
Below in conjunction with specific embodiment, further illustrate the present invention, should understand these embodiment only is used for explanation the present invention and is not used in and limits the scope of the invention, after having read the present invention, those skilled in the art all fall within the application's claims limited range to the modification of the various equivalent form of values of the present invention.
As shown in Figure 1, in the defence dynamic website, the system of saturated distributed denial of service attack, mainly comprise the master server cluster, hiding standby server cluster, ADS equipment, cloud dispatching patcher, and distributed purging system;
The master server cluster when not suffering distributed denial of service attack or after distributed denial of service attack disappears, is used for the response user access request by primary link; Master server bandwidth 100Mbps, user's visit capacity is less than 50Mbps at ordinary times, and the dynamic data accessing amount is less than 20Mbps, and when normally accessing, bandwidth is enough.
The standby server cluster, when suffering distributed denial of service attack, by reserve link, the dynamic data of request master server is used for the response user access request; The standby server cluster is distributed in different regions; The total bandwidth of standby server cluster is far longer than the bandwidth of master server, can prevent saturated Denial of Service attack.Reserve link is the hiding reserve link of 30Mbps, external disclosure not, and the assailant can't learn the IP address of reserve link.
ADS equipment is located at the front end of master server, and this equipment can be with the collaborative work of cloud dispatching patcher, and the keeper arranges the prevention policies of detection and filter distribution formula Denial of Service attack, configuration information by ADS equipment; ADS equipment is after distributed denial of service attack being detected and reaching the threshold value of administrator configurations, send the alarm information of being attacked to the cloud dispatching patcher, after the cloud dispatching patcher receives alarm information, confirm that primary link is attacked or the primary link off-line, according to configuration information, revise the domain name of domain name and point to, and the standby server cluster address is revised as in the IP address;
The cloud dispatching patcher comprises the dns server cluster; The dns server cluster is regularly inquired about the domain name state of cloud dispatching patcher; The cloud dispatching patcher is returned to the IP address group of up-to-date domain name state and correspondence to the dns server cluster, and the dns server cluster is directed to the standby server cluster according to the domain name after upgrading;
Distributed purging system is located at the standby server front end, is used for the distributed denial of service attack from the assailant is cleaned and filters, and will be sent to standby server through the user access data flow that filters.
The described keeper of Fig. 2 configuration step on ADS equipment is as follows:
Step 201, the prevention policies configuration: at first the keeper configures prevention policies on local ADS equipment;
Step 202, the domain name configuration: the keeper fills in the domain name, primary link, the reserve link information that need protection complete;
Step 203, ADS equipment sends to the cloud dispatching patcher with configuration information;
Step 204, cloud dispatching patcher select standby server to carry out the static data buffer memory according to the information of administrator configurations.
As shown in Figure 3, when not suffering distributed denial of service attack, the user normally accesses, and is born the data input and output of user's access by primary link, and the standby server cluster is not worked, and concrete steps are as follows:
Step 301, the user submits to the access domain name request to the dns server cluster;
Step 302 is returned to the IP address of accessed master server by the dns server cluster;
Step 303, the user submits to access request data to master server according to the IP address of master server;
Step 304, be deployed in the prevention policies inspection user request data stream of ADS equipment according to Administrator of master server front end and whether comprise distributed denial of service attack, when not suffering distributed denial of service attack, the ADS equipment Inspection is less than distributed denial of service attack, and the user's request data stream after ADS equipment will filter is submitted the master server cluster to;
Step 305, master server return results to the user after user's access request is finished dealing with;
Step 306, process finishes.
When the primary link of master server suffers distributed denial of service attack, at this moment be divided into 2 kinds of situations, the first: the distributed denial of service attack state that do not reach capacity, this moment, primary link still can carry out transfer of data.The second: the distributed denial of service attack state that reaches capacity, this moment, primary link was in blocked state, and any data can't normal transmission.For the first situation, the concrete steps of processing following (active link switching flow as shown in Figure 4):
Step 401, the assailant initiates distributed denial of service attack, and the ADS equipment on primary link of being deployed in detects and filters attack according to the prevention policies of administrator configurations;
Step 402, ADS equipment is after distributed denial of service attack being detected and reaching the threshold value of administrator configurations, send the alarm information of being attacked to the cloud dispatching patcher, after the cloud dispatching patcher receives alarm information, confirm that primary link is attacked, revise that the domain name of upgrading this domain name is pointed to and the standby server cluster address is revised as in the IP address;
Step 403, dns server cluster are regularly inquired about the domain name state of cloud dispatching patcher;
Step 404, cloud dispatching patcher are returned to the IP address group of up-to-date domain name state and correspondence to the dns server cluster, and dns server cluster more new domain name is directed to the standby server cluster;
When step 405, normal users are accessed this domain name, at first go the sensing of this domain name of server lookup;
Step 406, dns server be according to geographic area, user place, returns to the regional corresponding standby server IP address at one of user and its place;
Step 407, the user submits to visit data to standby server according to the standby server IP address of returning;
Step 408, the distributed purging system that is deployed in the standby server front end filters the attack data that exist in user access request, and the data flow of concurrent warp let-off filtration is to standby server;
Step 409, standby server are asked the dynamic data of master server by reserve link;
Step 410, master server are according to the request of standby server, and the structure dynamic data returns to standby server by reserve link;
Step 411, standby server return to the up-to-date dynamic data information of user, and process finishes.
For the second situation, as shown in Figure 5, passive link switching flow process, the concrete steps of processing are as follows:
Step 501, the assailant initiates saturated distributed denial of service attack, and this moment, primary link was congested by saturation attack, and ADS equipment can't send a warning message;
Step 502, cloud dispatching patcher regular check primary link situation when finding that primary link can't respond, confirms that this primary link suffers saturated Denial of Service attack, perhaps the primary link off-line, revise the sensing of this domain name, and the standby server cluster address is revised as in the IP address;
Step 503, dns server cluster are regularly inquired about the domain name state of cloud dispatching patcher;
Step 504, cloud dispatching patcher are returned to the IP address group of up-to-date domain name state and correspondence to the dns server cluster, and dns server cluster more new domain name is directed to the standby server cluster;
When step 505, normal users are accessed this domain name, at first go dns server to inquire about the sensing of this domain name;
Step 506, dns server be according to geographic area, user place, returns to the regional corresponding standby server IP address at one of user and its place;
Step 507, the user submits to visit data to standby server according to the standby server IP address of returning;
Step 508, the distributed purging system that is deployed in the standby server front end filters the attack data that exist in access request, and the data flow of concurrent warp let-off filtration is to standby server;
Step 509, standby server are asked the dynamic data of master server by reserve link;
Step 510, master server are according to request, and the structure dynamic data returns to standby server by reserve link;
Step 511, standby server return to the up-to-date dynamic data information of user, and process finishes.
As shown in Figure 6, after attack was disappeared, data communication automatically switched to primary link from reserve link, and concrete steps are as follows:
Step 601, the assailant stops saturated distributed denial of service attack, and distributed purging system judgement is attacked and is disappeared;
Step 602, by distributed purging system notice cloud dispatching patcher, attack is disappeared, and prepares the switchback primary link, and the cloud dispatching patcher is upgraded this domain name state after receiving and attacking the notification message that disappears;
Step 603, dns server cluster are regularly inquired about the domain name state of cloud dispatching patcher;
Step 604, cloud dispatching patcher are returned to the IP address group of up-to-date domain name state and correspondence to the dns server cluster, and dns server cluster more new domain name is directed to the master server cluster;
When step 605, normal users are accessed this domain name, at first go dns server to inquire about the sensing of this domain name;
Step 606, name server return to user's master server IP address;
Step 607, the user submits to visit data to master server according to the master server IP address of returning;
Step 608, the ADS equipment that is deployed in the master server front end filters the attack data that exist in access request, and the data flow of concurrent warp let-off filtration is to master server;
Step 609, step 610, main service is according to request, and the structure dynamic data returns to the user, and process finishes.
In sum, the present invention automatically switches to data flow hidden reserve link, and can automatically data flow be switched back original link when attack is disappeared when suffering distributed denial of service attack.technique can be applied to E-Government, ecommerce, security, finance, the numerous areas such as military and national defense, for example, in E-Government, leave the disclosed information of government affairs in the database of master server in, when master server suffers saturated Denial of Service attack, by reserve link, multidate information is gone to standby server and be transferred to the user, and the standby server node is numerous, has the very strong ability of resisting saturated Denial of Service attack, the user of access government website still can in time get the disclosed information of relevant government affairs like this, because this scheme is disposed flexibly, mode that can the Adoption Network service provides to the user, therefore, present technique has very high promotional value.

Claims (8)

1. a method of defending saturated distributed denial of service attack in dynamic website, is characterized in that: set up reserve link and the standby server cluster hidden, the chain route primary link of master server cluster and reserve link composition; When not suffering distributed denial of service attack, born the input and output of user accesses data by primary link, the standby server cluster is not worked; When distributed denial of service attack is arranged, enable the standby server cluster, standby server passes through reserve link, the dynamic data of request master server, master server is according to request, the structure dynamic data returns to standby server by reserve link, and standby server returns to the up-to-date dynamic data information of user; After distributed denial of service attack disappears, data communication is switched to primary link from reserve link.
2. the method for saturated distributed denial of service attack in defence dynamic website as claimed in claim 1, it is characterized in that: when not suffering distributed denial of service attack, born the input and output of user accesses data by primary link, the standby server cluster is not worked, and concrete steps are as follows:
Step 301, the user submits to the access domain name request to the dns server cluster;
Step 302 is returned to the IP address of accessed master server by the dns server cluster;
Step 303, the user submits to access request data to master server according to the IP address of master server;
Step 304, be deployed in the ADS equipment inspection user request data stream of master server front end and whether comprise distributed denial of service attack, when not suffering distributed denial of service attack, the ADS equipment Inspection is less than distributed denial of service attack, and the user's request msg after ADS equipment will filter is submitted the master server cluster to;
Step 305, master server return results to the user after user's access request is finished dealing with;
Step 306, process finishes.
3. the method for saturated distributed denial of service attack in defence dynamic website as claimed in claim 1, it is characterized in that: when the primary link of master server suffers distributed denial of service attack, at this moment be divided into 2 kinds of situations, the first: the distributed denial of service attack state that do not reach capacity, this moment, primary link still can carry out transfer of data; The second: the distributed denial of service attack state that reaches capacity, this moment, primary link was in blocked state, and any data can't normal transmission; For the first situation, the concrete steps of processing are as follows:
Step 401, the assailant initiates distributed denial of service attack, and the ADS equipment on primary link of being deployed in detects and filters distributed denial of service attack according to the prevention policies of administrator configurations;
Step 402, ADS equipment is after distributed denial of service attack being detected and reaching the threshold value of administrator configurations, send the alarm information of being attacked to the cloud dispatching patcher, after the cloud dispatching patcher receives alarm information, confirm that primary link is attacked, revise the domain name of domain name and point to, and the standby server cluster address is revised as in the IP address;
Step 403, dns server cluster are regularly inquired about the domain name state of cloud dispatching patcher;
Step 404, cloud dispatching patcher are returned to the IP address group of up-to-date domain name state and correspondence to the dns server cluster, and the dns server cluster is directed to the standby server cluster according to the domain name after upgrading;
Step 405 when the user accesses domain name, is at first gone the sensing of dns server nslookup;
Step 406, dns server return to the standby server IP address of a region of user according to the geographic area at user place;
Step 407, the user submits to visit data to standby server according to the standby server IP address of returning;
Step 408, the distributed purging system that is deployed in the standby server front end filters the attack data that exist in access request, and the data flow of concurrent warp let-off filtration is to standby server;
Step 409, standby server are asked the dynamic data of master server by reserve link;
Step 410, main service are according to the request of standby server, and the structure dynamic data returns to standby server by reserve link;
Step 411, standby server return to the up-to-date dynamic data information of user, and process finishes.
4. the method for saturated distributed denial of service attack in defence dynamic website as claimed in claim 3, it is characterized in that: for the second situation, the concrete steps of processing are as follows:
Step 501, the assailant initiates saturated distributed denial of service attack, and this moment, primary link was congested by saturation attack, and ADS equipment can't send a warning message;
Step 502, cloud dispatching patcher regular check primary link situation when finding that primary link can't respond, confirms that this primary link suffers saturated Denial of Service attack, perhaps the primary link off-line, revise the sensing of domain name, and the standby server cluster address is revised as in the IP address;
Step 503, dns server cluster are regularly inquired about the domain name state of cloud dispatching patcher;
Step 504, cloud dispatching patcher are returned to the IP address group of up-to-date domain name state and correspondence to the dns server cluster, and dns server cluster more new domain name is directed to the standby server cluster;
Step 505 when the user accesses the master server domain name, is at first gone the sensing of dns server inquiry domain name;
Step 506, dns server return to the standby server IP address of a region of user according to the geographic area at user place;
Step 507, the user submits to visit data to standby server according to the standby server IP address of returning;
Step 508, the distributed purging system that is deployed in the standby server front end filters the attack data that exist in user access request, and the data flow of concurrent warp let-off filtration is to standby server;
Step 509, standby server are asked the dynamic data of master server by reserve link;
Step 510, master server are according to the standby server request, and the structure dynamic data returns to standby server by reserve link;
Step 511, standby server return to the up-to-date dynamic data information of user, and process finishes.
5. the method for saturated distributed denial of service attack in defence dynamic website as claimed in claim 1, it is characterized in that: after distributed denial of service attack disappeared, data communication switched to primary link from reserve link, and concrete steps are as follows:
Step 601, the assailant stops saturated distributed denial of service attack, and distributed purging system judgement is attacked and is disappeared;
Step 602, by distributed purging system notice cloud dispatching patcher, attack is disappeared, and prepares the switchback primary link, after the cloud dispatching patcher receives and attacks the notification message that disappears, new domain name state more;
Step 603, dns server cluster are regularly inquired about the domain name state of cloud dispatching patcher;
Step 604, cloud dispatching patcher are returned to the IP address group of up-to-date domain name state and correspondence to the dns server cluster, and dns server cluster more new domain name is directed to the master server cluster;
Step 605 when the user accesses domain name, is at first gone the sensing of dns server inquiry domain name;
Step 606, dns server return to user's master server IP address;
Step 607, the user submits to visit data to master server according to the master server IP address of returning;
Step 608 is sent to master server after being deployed in the data stream filtering of ADS equipment with access request of master server front end;
Step 609, master server are according to access request, and the structure dynamic data returns to the user, and process finishes.
6. the system of saturated distributed denial of service attack in a realization defence dynamic website as described in claim 1-5 any one, it is characterized in that: comprise the master server cluster, primary link, standby server cluster and the reserve link hidden, ADS equipment, cloud dispatching patcher, and distributed purging system;
Described master server cluster when not suffering distributed denial of service attack or after distributed denial of service attack disappears, is used for the response user access request by primary link;
Described standby server cluster, when suffering distributed denial of service attack, by reserve link, the dynamic data of request master server is used for the response user access request;
Described ADS equipment is located at the front end of master server, and the keeper arranges by ADS equipment and detects and the prevention policies of filter distribution formula Denial of Service attack, and domain name, primary link, reserve link information that configuration is needed protection; ADS equipment sends to the cloud dispatching patcher with configuration information; ADS equipment is after distributed denial of service attack being detected and reaching the threshold value of administrator configurations, send the alarm information of being attacked to the cloud dispatching patcher, after the cloud dispatching patcher receives alarm information, confirm that primary link is attacked or the primary link off-line, according to configuration information, revise the domain name of domain name and point to, and the standby server cluster address is revised as in the IP address;
Described cloud dispatching patcher comprises the dns server cluster; The dns server cluster is regularly inquired about the domain name state of cloud dispatching patcher; The cloud dispatching patcher is returned to the IP address group of up-to-date domain name state and correspondence to the dns server cluster, and the dns server cluster is directed to the standby server cluster according to the domain name after upgrading;
Described distributed purging system is located at the standby server front end, is used for the distributed denial of service attack from the assailant is cleaned and filters, and will be sent to standby server through the user access data flow that filters.
7. the system of saturated distributed denial of service attack in defence dynamic website as described in claim 6, it is characterized in that: described standby server cluster is distributed in different regions.
8. the system of saturated distributed denial of service attack in defence dynamic website as described in claim 6 is characterized in that: described cloud dispatching patcher selects standby server to carry out data buffer storage according to configuration information.
CN201310141679.1A 2013-04-22 2013-04-22 The method and system of saturated distributed denial of service attack in defence dynamic website Active CN103179136B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310141679.1A CN103179136B (en) 2013-04-22 2013-04-22 The method and system of saturated distributed denial of service attack in defence dynamic website

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310141679.1A CN103179136B (en) 2013-04-22 2013-04-22 The method and system of saturated distributed denial of service attack in defence dynamic website

Publications (2)

Publication Number Publication Date
CN103179136A true CN103179136A (en) 2013-06-26
CN103179136B CN103179136B (en) 2016-01-20

Family

ID=48638759

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310141679.1A Active CN103179136B (en) 2013-04-22 2013-04-22 The method and system of saturated distributed denial of service attack in defence dynamic website

Country Status (1)

Country Link
CN (1) CN103179136B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105072211A (en) * 2015-08-12 2015-11-18 网宿科技股份有限公司 Domain name deployment system and domain name deployment method based on DNS (Domain Name Server)
CN106254429A (en) * 2016-07-25 2016-12-21 浪潮(北京)电子信息产业有限公司 The control method of a kind of multi-path data transmission and device
CN106302313A (en) * 2015-05-14 2017-01-04 阿里巴巴集团控股有限公司 DDoS defence method based on dispatching patcher and DDoS system of defense
CN106357496A (en) * 2016-10-28 2017-01-25 美的智慧家居科技有限公司 Switching control method and device of household electric appliance and cloud server
CN106453006A (en) * 2016-10-31 2017-02-22 美的智慧家居科技有限公司 Binding control method and device for household appliance and cloud server
CN107294922A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 A kind of network address dispatching method and device for tackling network attack
CN107735778A (en) * 2015-07-22 2018-02-23 法斯特利有限公司 Protect the communication link between content delivery network and content original server
CN109347792A (en) * 2018-09-03 2019-02-15 中新网络信息安全股份有限公司 A kind of anti-Large Scale DDoS Attack system of defense and defence method continuing linkage pattern based on cloud+end equipment
CN109450841A (en) * 2018-09-03 2019-03-08 中新网络信息安全股份有限公司 A kind of Large Scale DDoS Attack detection and system of defense and defence method based on the on-demand linkage pattern of cloud+end equipment
CN109617913A (en) * 2019-01-15 2019-04-12 成都知道创宇信息技术有限公司 A kind of management method of quick positioning multiple users share node ddos attack
CN110138783A (en) * 2019-05-15 2019-08-16 重庆八戒电子商务有限公司 A method of ddos attack is handled based on cloud computing platform
CN110995848A (en) * 2019-12-10 2020-04-10 北京海益同展信息科技有限公司 Service management method, device, system, electronic equipment and storage medium
CN111385235A (en) * 2018-12-27 2020-07-07 北京卫达信息技术有限公司 DDoS attack defense system and method based on dynamic transformation
CN113489711A (en) * 2021-07-01 2021-10-08 中国电信股份有限公司 DDoS attack detection method, system, electronic device and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101127649A (en) * 2007-09-30 2008-02-20 华为技术有限公司 A method and system for preventing from network attacks
CN101136900A (en) * 2006-10-16 2008-03-05 中兴通讯股份有限公司 Fast transparent fault shift device and implementing method facing to service
CN101394285A (en) * 2007-09-17 2009-03-25 国际商业机器公司 Apparatus, system, and method for server failover to standby server during broadcast storm or denial-of-service attack
CN101588246A (en) * 2008-05-23 2009-11-25 成都市华为赛门铁克科技有限公司 Method, network equipment and network system for defending distributed denial service DDoS attack
US20120210416A1 (en) * 2011-02-16 2012-08-16 Fortinet, Inc. A Delaware Corporation Load balancing in a network with session information
CN102739453A (en) * 2012-07-03 2012-10-17 华为软件技术有限公司 Master-standby switching method, device and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101136900A (en) * 2006-10-16 2008-03-05 中兴通讯股份有限公司 Fast transparent fault shift device and implementing method facing to service
CN101394285A (en) * 2007-09-17 2009-03-25 国际商业机器公司 Apparatus, system, and method for server failover to standby server during broadcast storm or denial-of-service attack
CN101127649A (en) * 2007-09-30 2008-02-20 华为技术有限公司 A method and system for preventing from network attacks
CN101588246A (en) * 2008-05-23 2009-11-25 成都市华为赛门铁克科技有限公司 Method, network equipment and network system for defending distributed denial service DDoS attack
US20120210416A1 (en) * 2011-02-16 2012-08-16 Fortinet, Inc. A Delaware Corporation Load balancing in a network with session information
CN102739453A (en) * 2012-07-03 2012-10-17 华为软件技术有限公司 Master-standby switching method, device and system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郭庆: "云清洗三打DDoS", 《网络世界》 *

Cited By (23)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106302313A (en) * 2015-05-14 2017-01-04 阿里巴巴集团控股有限公司 DDoS defence method based on dispatching patcher and DDoS system of defense
CN110691149B (en) * 2015-07-22 2022-12-13 法斯特利有限公司 Method and apparatus for operating content delivery network and method for operating origin server
CN110691149A (en) * 2015-07-22 2020-01-14 法斯特利有限公司 Securing communications between a content delivery network and an origin server
CN107735778A (en) * 2015-07-22 2018-02-23 法斯特利有限公司 Protect the communication link between content delivery network and content original server
CN107735778B (en) * 2015-07-22 2019-10-18 法斯特利有限公司 Protect the communication link between content delivery network and content original server
CN105072211A (en) * 2015-08-12 2015-11-18 网宿科技股份有限公司 Domain name deployment system and domain name deployment method based on DNS (Domain Name Server)
CN105072211B (en) * 2015-08-12 2018-11-02 网宿科技股份有限公司 Domain name deployment system based on DNS and method
CN107294922A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 A kind of network address dispatching method and device for tackling network attack
CN106254429A (en) * 2016-07-25 2016-12-21 浪潮(北京)电子信息产业有限公司 The control method of a kind of multi-path data transmission and device
CN106357496A (en) * 2016-10-28 2017-01-25 美的智慧家居科技有限公司 Switching control method and device of household electric appliance and cloud server
CN106453006A (en) * 2016-10-31 2017-02-22 美的智慧家居科技有限公司 Binding control method and device for household appliance and cloud server
CN106453006B (en) * 2016-10-31 2020-08-04 美的智慧家居科技有限公司 Binding control method and device for household appliances and cloud server
CN109450841A (en) * 2018-09-03 2019-03-08 中新网络信息安全股份有限公司 A kind of Large Scale DDoS Attack detection and system of defense and defence method based on the on-demand linkage pattern of cloud+end equipment
CN109347792B (en) * 2018-09-03 2020-11-27 中新网络信息安全股份有限公司 Large-scale DDoS attack resistance defense system and method based on cloud + end equipment continuous linkage mode
CN109347792A (en) * 2018-09-03 2019-02-15 中新网络信息安全股份有限公司 A kind of anti-Large Scale DDoS Attack system of defense and defence method continuing linkage pattern based on cloud+end equipment
CN111385235A (en) * 2018-12-27 2020-07-07 北京卫达信息技术有限公司 DDoS attack defense system and method based on dynamic transformation
CN111385235B (en) * 2018-12-27 2022-08-26 北京卫达信息技术有限公司 DDoS attack defense system and method based on dynamic transformation
CN109617913B (en) * 2019-01-15 2021-04-27 成都知道创宇信息技术有限公司 Management method for rapidly positioning DDoS attack of multi-user sharing node
CN109617913A (en) * 2019-01-15 2019-04-12 成都知道创宇信息技术有限公司 A kind of management method of quick positioning multiple users share node ddos attack
CN110138783A (en) * 2019-05-15 2019-08-16 重庆八戒电子商务有限公司 A method of ddos attack is handled based on cloud computing platform
CN110995848A (en) * 2019-12-10 2020-04-10 北京海益同展信息科技有限公司 Service management method, device, system, electronic equipment and storage medium
CN110995848B (en) * 2019-12-10 2022-09-06 京东科技信息技术有限公司 Service management method, device, system, electronic equipment and storage medium
CN113489711A (en) * 2021-07-01 2021-10-08 中国电信股份有限公司 DDoS attack detection method, system, electronic device and storage medium

Also Published As

Publication number Publication date
CN103179136B (en) 2016-01-20

Similar Documents

Publication Publication Date Title
CN103179136A (en) Saturation distribution type denial-of-service attack method and saturation distribution type denial-of-service attack system in defense dynamic website
US9548961B2 (en) Detecting adverse network conditions for a third-party network site
Babiceanu et al. Cyber resilience protection for industrial internet of things: A software-defined networking approach
Wang et al. Cascade-based attack vulnerability on the US power grid
CN104106094B (en) In a network environment using local policy application enter to rack email message scan
Dewar The “triptych of cyber security”: A classifi cation of active cyber defence
CN103023924A (en) Content distribution network based DDoS (distributed denial of service) attack protecting method and content distribution network based DDoS attack protecting system for cloud distribution platform
CN103209192B (en) For domain name state purging system during ddos attack and detection method
CN102137111A (en) Method and device for preventing CC (Challenge Collapsar) attack and content delivery network server
CN104380657A (en) System and method for determining and using local reputations of users and hosts to protect information in a network environment
CN106534114A (en) Big-data-analysis-based anti-malicious attack system
CN107634959A (en) Means of defence, apparatus and system based on automobile
CN101213812A (en) Method for defending against denial of service attacks in IP networks by target victim self-identification and control
CN104917779A (en) Protection method of CC attack based on cloud, device thereof and system thereof
CN107277080A (en) A kind of is the internet risk management method and system of service based on safety
CN101213813A (en) Method for defending against denial of service attacks in IP networks by target victim self-identification and control
CN105282169A (en) DDoS attack warning method and system based on SDN controller threshold
CN109714372A (en) Network safety system and processing method based on block chain
CN103856487A (en) Method and system for protecting authorization DNS
CN104394163A (en) Security detection method based on Web application
CN109688242A (en) A kind of cloud guard system and method
US8898332B2 (en) Methods, systems, devices and computer program products for protecting a network by providing severable network zones
Zhang et al. Cascading failures of power grids caused by line breakdown
Dalek et al. Information controls during military operations: The case of Yemen during the 2015 political and armed conflict
CN104426840A (en) Active threat detection system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C53 Correction of patent of invention or patent application
CB02 Change of applicant information

Address after: Yuhuatai District of Nanjing city Ning dual 210012 Jiangsu province No. 18 building 4 layer D

Applicant after: Nanjing Yxlink Information Technologies Co., Ltd.

Address before: Yuhuatai District of Nanjing City, the 210012 avenue of flora in Jiangsu province 23 Building No. 3 509

Applicant before: Nanjing Yxlink Information Technologies Co., Ltd.

COR Change of bibliographic data

Free format text: CORRECT: APPLICANT; FROM: NANJING YXLINK INFORMATION TECHNOLOGIES LTD. TO: NANJING YXLINK INFORMATION TECHNOLOGIES CO., LTD.

C14 Grant of patent or utility model
GR01 Patent grant