CN105991511A - Method and device for detecting CC attack - Google Patents

Method and device for detecting CC attack Download PDF

Info

Publication number
CN105991511A
CN105991511A CN201510040959.2A CN201510040959A CN105991511A CN 105991511 A CN105991511 A CN 105991511A CN 201510040959 A CN201510040959 A CN 201510040959A CN 105991511 A CN105991511 A CN 105991511A
Authority
CN
China
Prior art keywords
access request
source
request
threshold value
record
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510040959.2A
Other languages
Chinese (zh)
Inventor
宋阳阳
祝建跃
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alibaba Group Holding Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201510040959.2A priority Critical patent/CN105991511A/en
Publication of CN105991511A publication Critical patent/CN105991511A/en
Pending legal-status Critical Current

Links

Landscapes

  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention provides a method and a device for detecting a CC attack. The method comprises the steps of acquiring a preset number of access request records of a first source IP to a first target IP; conducting the statistics on the number of access request records among all the acquired access request records, wherein the page identifiers of request sources in the access request records taken into account are empty; based on the statistical number of the access request records with the page identifiers of request sources therein are empty, detecting the CC attack. The embodiment of the invention provides the method and the device for detecting the CC attack. According to the method and the device, the difference between a real user and the access behavior of a CC attacker is analyzed. Based on the difference, a determination value is calculated, so that the CC attack can be effectively detected.

Description

A kind of method and apparatus detecting CC attack
Technical field
The application relates to technical field of network security, detects, particularly to a kind of, the method and apparatus that CC attacks.
Background technology
Along with fast development and the drastically expansion of network size of network technology, the security breaches person of being hacked in network is increasingly Many utilizes with the main frame in attacking network.The most popular CC (Challenge Collapsar) attacks and belongs to network attack One.
CC attack belongs to a kind of distributed denial of service based on the page (DDOS:Distributed Denial of Service) and attacks Hit.Assailant generally constantly can send the request message consuming destination server performance to destination server, causes destination service Device constantly performs substantial amounts of calculating or operation, expends ample resources.When calculating or the operation of destination server execution reach self During the processing limit of CPU, will cause accessing normally and be terminated process, machine of even delaying.
For above-mentioned situation, the method that existing a kind of CC of detection attacks can realize by redirecting detection.In the method, Typically can add one before destination server and redirect the detection equipment message with detection transmission to described destination server.This jumping Turning detection equipment can replace destination server to send a checking to request end before destination server receives request message Message.This checking message may require that request end sends confirmation to destination server again, and needs to take in confirmation Band only redirects the key that detection equipment is known.The checking message returned typically can be responded by normal request end, and can be according to The requirement of checking message sends confirmation to destination server again.Detection equipment receives the confirmation letter that normal request end is sent After ceasing and being verified, the access request of normal request of can letting pass end.And query-attack end tends not to the checking returned Message responds, and is to continue with initiating new access request to destination server.Detection equipment does not receives query-attack end and sends out The confirmation come, then the query-attack end access request to destination server of will not letting pass.So can reach to detect CC to attack Purpose.
During implementing the application, inventor finds prior art, and at least there are the following problems:
Along with the development of CC attack pattern, assailant can be launched a offensive to destination server by broiler or proxy server. The checking message redirecting the return of detection equipment can be responded, the most again to destination server by broiler or proxy server Sending and carry the confirmation only redirecting the key that detection equipment is known, the most just can penetrate above-mentioned prior art redirects inspection Survey mode.
Summary of the invention
The purpose of the embodiment of the present application is that providing a kind of detects the method and apparatus that CC attacks, effectively to detect CC attack.
The method and apparatus that a kind of CC of detection that the embodiment of the present application provides attacks is achieved in that
A kind of method detecting CC attack, including:
Obtain the access request record of the first source IP to first object IP of predetermined number;
Add up and the access request record of described acquisition is asked source page be designated the quantity of empty access request record;
Request source page based on described statistics is designated the quantity detection CC of the access request record of sky and attacks.
A kind of method detecting CC attack, including:
The access request of the first source IP to first object IP of monitoring predetermined number;
Add up and described access request is asked source page be designated the cumulative amount of empty access request;
Request source page based on described statistics is designated the cumulative amount detection CC of the access request of sky and attacks.
A kind of method detecting CC attack, including:
Obtain the access request record of the first source IP to first object IP of predetermined number;
Add up and the access request record of described acquisition is asked source page identify the quantity of mutually different access request record;
Request source page based on described statistics identifies the quantity detection CC of mutually different access request record and attacks.
A kind of method detecting CC attack, including:
The access request of the first source IP to first object IP of monitoring predetermined number;
Statistics request source page identifies the cumulative amount of mutually different access request;
Request source page based on described statistics identifies the cumulative amount detection CC of mutually different access request and attacks.
A kind of equipment detecting CC attack, described equipment is the third party device independent of request end and destination server, including Access request record acquiring unit, the first statistic unit, the first identifying unit and the second identifying unit, wherein:
Described access request record acquiring unit, is used for obtaining the access request of the first source IP to first object IP of predetermined number Record;
Described first statistic unit, is used for adding up in the access request record of described acquisition and asks source page to be designated the access of sky The quantity of request record;
Described first identifying unit, is used for arranging detection threshold value;Ask when the request source page of described statistics is designated empty access When the quantity seeking record is more than or equal to described detection threshold value, it is determined that the access request of the first source IP to first object IP is CC Attack;When the request source page of described statistics is designated the quantity of the access request record of sky less than described detection threshold value, sentence The access request of fixed first source IP to first object IP is not that CC attacks;
Described second identifying unit, for Set scale threshold value;Ask when the request source page of described statistics is designated empty access When the quantity seeking record accounts for the ratio value of described predetermined number more than or equal to described proportion threshold value, it is determined that the first source IP to first The access request of Target IP is that CC attacks;When the request source page of described statistics is designated the quantity of the access request record of sky When accounting for the ratio value of described predetermined number less than described proportion threshold value, it is determined that the access request of the first source IP to first object IP is not It is that CC attacks.
A kind of equipment detecting CC attack, described equipment is integrated in destination server as module, including monitoring unit, the Two statistic units, the 3rd identifying unit and the 4th identifying unit, wherein:
Described monitoring unit, is used for monitoring the access request of the first source IP to first object IP of predetermined number;
Described second statistic unit, is used for adding up in described access request and asks source page to be designated the accumulation of empty access request Quantity;
Described 3rd identifying unit, is used for arranging detection threshold value;Ask when the request source page of described statistics is designated empty access When the cumulative amount asked is more than or equal to described detection threshold value, it is determined that the access request of the first source IP to first object IP is CC Attack;When the request source page of described statistics is designated the cumulative amount of the access request of sky less than described detection threshold value, sentence The access request of fixed first source IP to first object IP is not that CC attacks;
Described 4th identifying unit, for Set scale threshold value;Ask when the request source page of described statistics is designated empty access When the cumulative amount asked accounts for the ratio value of described predetermined number more than or equal to described proportion threshold value, it is determined that the first source IP to first The access request of Target IP is that CC attacks;When the request source page of described statistics is designated the cumulative amount of the access request of sky When accounting for the ratio value of described predetermined number less than described proportion threshold value, it is determined that the access request of the first source IP to first object IP is not It is that CC attacks.
A kind of equipment detecting CC attack, described equipment is the third party device independent of request end and destination server, including Access request record acquiring unit, the 3rd statistic unit, the 5th identifying unit and the 6th identifying unit, wherein:
Described access request record acquiring unit, is used for obtaining the access request of the first source IP to first object IP of predetermined number Record;
Described 3rd statistic unit, is used for adding up in the access request record of described acquisition and asks source page mark mutually different The quantity of access request record;
Described 5th identifying unit, is used for arranging detection threshold value;When the request source page of described statistics identifies mutually different visit When the quantity that the request of asking records is more than or equal to described detection threshold value, it is determined that the access request of the first source IP to first object IP It not that CC attacks;When the request source page of described statistics identifies the quantity of mutually different access request record less than described inspection When surveying threshold value, it is determined that the access request of the first source IP to first object IP is that CC attacks;
Described 6th identifying unit, for Set scale threshold value;When the request source page of described statistics identifies mutually different visit When the quantity that the request of asking records accounts for the ratio value of described predetermined number more than or equal to described proportion threshold value, it is determined that the first source IP Access request to first object IP is not that CC attacks;Ask when the request source page of described statistics identifies mutually different access When the quantity seeking record accounts for the ratio value of described predetermined number less than described proportion threshold value, it is determined that the first source IP to first object IP Access request be CC attack.
A kind of equipment detecting CC attack, described equipment is integrated in destination server as module, including monitoring unit, the Four statistic units, the 7th identifying unit and the 8th identifying unit, wherein:
Described monitoring unit, is used for monitoring the access request of the first source IP to first object IP of predetermined number;
Described 4th statistic unit, is used for adding up request source page and identifies the cumulative amount of mutually different access request;
Described 7th identifying unit, is used for arranging detection threshold value;When the request source page of described statistics identifies mutually different visit When asking the cumulative amount of request more than or equal to described detection threshold value, it is determined that the access request of the first source IP to first object IP It not that CC attacks;When the request source page of described statistics identifies the cumulative amount of mutually different access request less than described inspection When surveying threshold value, it is determined that the access request of the first source IP to first object IP is that CC attacks;
Described 8th identifying unit, for Set scale threshold value;When the request source page of described statistics identifies mutually different visit When asking that ratio value that the cumulative amount of request accounts for described predetermined number is more than or equal to described proportion threshold value, it is determined that the first source IP Access request to first object IP is not that CC attacks;Ask when the request source page of described statistics identifies mutually different access When the cumulative amount asked accounts for the ratio value of described predetermined number less than described proportion threshold value, it is determined that the first source IP to first object IP Access request be CC attack.
A kind of method and apparatus detecting CC attack that the embodiment of the present application provides, by analyzing real user and CC assailant's The diversity of access behavior, and calculate judgement numerical value based on this diversity, it is possible to detection CC attacks effectively.
Accompanying drawing explanation
Fig. 1 is the schematic diagram that in one example of the application, normal request end initiates access request;
Fig. 2 is to attack end in one example of the application to initiate the schematic diagram of access request;
A kind of method flow diagram detecting CC attack that Fig. 3 provides for the application one embodiment;
A kind of method flow diagram detecting CC attack that Fig. 4 provides for another embodiment of the application;
A kind of method detecting CC attack that Fig. 5 provides for another embodiment of the application;
A kind of method flow diagram detecting CC attack that Fig. 6 provides for another embodiment of the application;
A kind of functions of the equipments module map detecting CC attack that Fig. 7 provides for the application one embodiment;
A kind of functions of the equipments module map detecting CC attack that Fig. 8 provides for another embodiment of the application;
A kind of functions of the equipments module map detecting CC attack that Fig. 9 provides for another embodiment of the application;
A kind of functions of the equipments module map detecting CC attack that Figure 10 provides for another embodiment of the application.
Detailed description of the invention
For the technical scheme making those skilled in the art be more fully understood that in the application, below in conjunction with in the embodiment of the present application Accompanying drawing, the technical scheme in the embodiment of the present application is clearly and completely described, it is clear that described embodiment is only It is some embodiments of the present application rather than whole embodiments.Based on the embodiment in the application, ordinary skill people All other embodiments that member is obtained under not making creative work premise, all should belong to the scope of the application protection.
Fig. 1 is the schematic diagram that in one example of the application, normal request end initiates access request.As it is shown in figure 1, real user can To input web page address, accession page 1 by browser.And then, real user can be clear by clicking on the link on the page 1 Look at other page jumped to, the page 2, the page 3, the page 4 or the page 5 that e.g. real user is interested.The most permissible The page 1 is called header page.By the link in header page, other page can be jumped to.When real user is in browse page During face 5, browsing pages 6 or the page 7 can be continued by clicking on the link on the page 5.When real user is at browsing pages 7 Time, browsing pages 8, the page 9 or the page 10 can be continued by clicking on the link on the page 7.It is similar to, the page 5, page Face 7 can be header page, and these header page can provide the link jumping to other page.Visible, real user exists When accessing website, typically can the most in depth browse other page based on an initial page.
Fig. 2 is to attack end in one example of the application to initiate the schematic diagram of access request.Can be continually as in figure 2 it is shown, attack end Accession page 1 and the access request of the page 2 is initiated to destination server.Attack end typically directly by the page 1 and the page 2 Web page address initiates access request to destination server.Such attack pattern, access a certain page time, this page and other Linking relationship is the most there is not between the page.
Above-mentioned real user is distinct with the access behavior of assailant.Real user, when browsing pages, the most first accesses one A little header page, the links and accesses next one page that can be provided by header page subsequently.And assailant is to destination server When launching a offensive, the most directly access target pages by web page address.The application one embodiment can based on real user with The diversity accessing behavior between assailant is attacked to detect CC.
A kind of method flow diagram detecting CC attack that Fig. 3 provides for the application one embodiment.As it is shown on figure 3, described method Including:
S100: obtain the access request record of the first source IP to first object IP of predetermined number.
In the embodiment of the present application, request end and destination server may be at, in the network environment of backbone network, being used for detecting CC The detection equipment attacked can be independently of the third party device of request end and destination server.Described source IP can represent initiation The IP address of the request end accessed, described Target IP can represent the IP address being accessed for destination server.Source IP is to mesh The access request that mark IP initiates can produce access request record in backbone network.Detection equipment can obtain from backbone network to be preset The access request record of the first source IP to first object IP of quantity is attacked with detection CC.In order to accurately test access please Ask and whether record exist CC aggressive behavior, bigger predetermined number can be set, such as, predetermined number can be set to 1000, The access request record of these 1000 the first source IP to first object IP can be detected by detection equipment.
The access request record of each acquisition can comprise the source IP of this access behavior, Target IP and the access request page. Such as, access request record 1 describes source IP1 and initiates the request of accession page 1 to Target IP 1, and access request record 2 is remembered Carry IP2 and initiate the request of accession page 2 to Target IP 2.Access request record also comprises request source page mark.Please Source page mark is asked to can be used to indicate the header page address of this access request.Such as, the first source IP is to first object IP Initiate the request of accession page 2, and the request of this accession page 2 is to be initiated by the link clicking on the page 1.So exist In the request source page mark of this access request record, can write the address of the page 1, indicating this access request is from the page 1 Chain is taken over.In the application specific embodiment, described request source page mark can be the referer in access request Field.This referer field has indicated the page address of the request source page of this access request.Walk below the embodiment of the present application Suddenly all illustrate with referer field.
S200: add up and ask source page to be designated the quantity of empty access request record in the access request record of described acquisition.
Table 1 is the access request record signal table of real user in one example of the application.As it can be seen from table 1 access request Record can include source IP, Target IP, accession page and referer field.Wherein, referer field can be used to note The address of the header page of this access request bright, shows this access request from which page link comes.Such as, the page 2 With the referer field of the page 3 is the address of the page 1, illustrate that accession page 2 is from the page 1 with the request of the page 3 Chain is taken over.The referer field of the page 1 is empty, illustrates that the request of accession page 1 is that the address by the page 1 is direct Initiate.For example, it may be the URL that user directly inputs the page 1 in a browser initiates access request to destination server.
The access request record signal table of real user in one example of table 1 the application
Source IP Target IP Accession page Referer field
First source IP First object IP The page 1
First source IP First object IP The page 2 The page 1
First source IP First object IP The page 3 The page 1
First source IP First object IP The page 4 The page 3
First source IP First object IP The page 5 The page 4
First source IP First object IP The page 6 The page 4
Table 2 is the access request record signal table of CC assailant in one example of the application.CC assailant is often through automatization Script, directly initiate access request to destination server continually by the address of the page.From Table 2, it can be seen that CC assailant is in the access request that destination server is initiated, and referer field is sky.This explanation CC assailant is It is directly to initiate access request by the address of the page to destination server.In the page that CC assailant accesses, the page and page The most there is not linking relationship between face, this results in referer field essentially sky in the access request record of CC assailant.
The access request record signal table of CC assailant in one example of table 2 the application
Source IP Target IP Accession page Referer field
First source IP First object IP The page 1
First source IP First object IP The page 1
First source IP First object IP The page 1
First source IP First object IP The page 2
First source IP First object IP The page 2
First source IP First object IP The page 2
The embodiment of the present application can be by analyzing the access request of the first source IP to first object IP of the predetermined number of described acquisition Referer field in record detects whether the first source IP belongs to CC attack to the access request that first object IP initiates. Specifically, during the embodiment of the present application can add up the access request record of described acquisition, referer field is empty access request note The quantity of record.Such as, can obtain the quantity that referer field is empty access request record from table 1 is 1, and from table Can obtain the quantity that referer field is empty access request record in 2 is 6.It can be seen that the access of real user please The quantity asking referer field in record to be empty access request record is significantly less than in the access request record of CC assailant Referer field is the quantity of empty access request record.
When implementing, the detection device interior in the embodiment of the present application can comprise an enumerator.This detection equipment is permissible Detect the referer field in the access request record of described acquisition.When the referer field in a certain access request record is Time empty, the enumerator of detection device interior just can add 1.After detection equipment travels through the access request record of described acquisition, described It is the number of empty access request record that numeral in enumerator can represent referer field in the access request record of described acquisition Amount.
S300: the quantity detection CC of the access request record being designated sky based on described request source page attacks.
After detection equipment gets the quantity that described referer field is empty access request record, can quantity based on this acquisition Whether the access request detecting the first source IP to first object IP belongs to CC attack.Specifically, described referer can be calculated Field is the ratio that the quantity of empty access request record accounts for described predetermined number.Such as, in table 1, referer field is empty The quantity of access request record is 1, and predetermined number is 6, then referer field is that the quantity of empty access request record accounts for pre- If the ratio of quantity is 1/6.In table 2 referer field be the quantity of empty access request record be 6, predetermined number is 6, So referer field is that to account for the ratio of predetermined number be 6/6=1 for the quantity of empty access request record.The embodiment of the present application is permissible Pre-set the first proportion threshold value, when the quantity that the referer field of described calculating is empty access request record accounts for described present count When the ratio of amount is more than or equal to this first proportion threshold value, decide that the access request of the first source IP to first object IP is CC Attack;The embodiment of the present application can pre-set the second proportion threshold value, when the referer field of described calculating is empty access request When the quantity of record accounts for the ratio of described predetermined number less than this second proportion threshold value, decide that the first source IP to first object IP Access request be not CC attack.Generally, described first proportion threshold value and the second proportion threshold value can be equal; At some in particular cases, described first proportion threshold value can be more than the second proportion threshold value.Such as, the first proportion threshold value is 0.95, Second proportion threshold value is 0.8, and situation between 0.8 to 0.95 needs to judge whether to belong to CC aggressive behavior by manually carrying out.
During actually detected, described proportion threshold value can be set to 0.95, when the referer field calculated is empty access When the quantity of request record accounts for the ratio of described predetermined number more than or equal to 0.95, decide that the first source IP is to first object The access request of IP is that CC attacks.
It addition, the embodiment of the present application can also arrange the first detection threshold value, when the referer field of described statistics is that empty access please When the quantity seeking record detects threshold value more than or equal to described first, it is determined that the access request of the first source IP to first object IP Attack for CC;The embodiment of the present application can also arrange the second detection threshold value, when the referer field of described statistics is empty access When the quantity of request record is less than described second detection threshold value, it is determined that the access request of the first source IP to first object IP is not CC Attack.Same, the first detection threshold value can be equal with the second detection threshold value.At some in particular cases, the first detection threshold value Can be more than the second detection threshold value.
During actually detected, predetermined number can be set to 1000, and detection threshold value can be set to 950, when Article 1000, in access request the referer field of statistics be the cumulative amount of empty access request more than or equal to 950 time, it is determined that The access request of the first source IP to first object IP is that CC attacks.
In another embodiment of the application, detection equipment is also used as a functional module and is integrated on destination server, this inspection Measurement equipment can in real time monitoring transmission to the access request of this destination server.The one that Fig. 4 provides for another embodiment of the application The method flow diagram that detection CC attacks.As shown in Figure 4, described method includes:
S110: the access request of the first source IP to first object IP of monitoring predetermined number.
S210: add up and ask source page to be designated the cumulative amount of empty access request in described access request.
The detection equipment being integrated on destination server can monitor in real time and be positioned at the request end transmission at the first source IP to being positioned at The access request of this destination server at first object IP.By step S200 it can be seen that real user and CC assailant In the access request that destination server is initiated, referer field differs greatly.In the access request of real user, referer Field is empty access request negligible amounts, and in the access request of CC assailant, referer field is empty access request number Measure quite a lot of.Detection equipment in the embodiment of the present application can be by adding up the cumulative number that referer field is empty access request Amount, thus judge whether the access request of the first source IP to first object IP is that CC attacks.In a particular embodiment, in order to Accurately detection CC aggressive behavior, can arrange bigger predetermined number, such as, predetermined number can be set to 1000, Detection equipment can monitor the access request of 1000 the first source IP to first object IP continuously, and adds up these 1000 access In request, referer field is the cumulative amount of empty access request.
Specifically, the detection device interior in the embodiment of the present application can comprise the first enumerator and the second enumerator.Detection equipment Monitoring the first source IP sends every access request to first object IP, often one access request of detection in real time, detection equipment First timer just can add 1.When referer field access request being detected is empty, the second enumerator just can add 1. When the first counters count reaches predetermined number, it is empty access that detection equipment can add up referer field in the second enumerator The cumulative amount of request.
S310: request source page based on described statistics is designated the cumulative amount detection CC of the access request of sky and attacks.
The embodiment of the present application can pre-set the 3rd detection threshold value, when the referer field of described statistics is empty access request When cumulative amount is more than or equal to described 3rd detection threshold value, it is determined that the access request of the first source IP to first object IP is CC Attack;The embodiment of the present application can pre-set the 4th detection threshold value, when the referer field of described statistics is empty access request Cumulative amount less than described 4th detection threshold value time, it is determined that the access request of the first source IP to first object IP is not that CC attacks Hit.3rd detection threshold value can be equal with the 4th detection threshold value.At some in particular cases, the 3rd detection threshold value can be more than the Four detection threshold values.
During actually detected, predetermined number can be set to 1000, and detection threshold value can be set to 950, when Article 1000, in access request the referer field of statistics be the cumulative amount of empty access request more than or equal to 950 time, it is determined that The access request of the first source IP to first object IP is that CC attacks.
Account for described pre-it addition, the application equally calculates the cumulative amount that the referer field of described statistics is empty access request If the ratio of quantity detects CC and attacks.The embodiment of the present application can pre-set the 3rd proportion threshold value, when described calculating Referer field is that the cumulative amount of empty access request accounts for the ratio of described predetermined number more than or equal to the 3rd proportion threshold value Time, decide that the access request of the first source IP to first object IP is that CC attacks;The embodiment of the present application can pre-set Four proportion threshold value, when the cumulative amount that the referer field of described calculating is empty access request, to account for the ratio of described predetermined number little When four proportion threshold value, decide that the access request of the first source IP to first object IP is not that CC attacks.3rd ratio Threshold value can be equal with the 4th proportion threshold value.At some in particular cases, the 3rd proportion threshold value can be more than the 4th proportion threshold value.
It should be noted that destination server is attacked by CC assailant often through proxy server.Such as CC attacks Person is by being positioned at source IP1, and destination server is launched a offensive by three proxy servers at source IP2 and source IP3.Utilize above-mentioned Technical scheme, can detect that source IP1, source IP2 and source IP3 all exist aggressive behavior, and follow-up can to source IP1, Source IP2 and source IP3 closes, but real source IP of CC assailant cannot be detected and be closed.In consideration of it, In the application one preferred embodiment, step S100 can specifically include:
Really establish rules then based on real source IP, obtain first real source IP access request note to first object IP of predetermined number Record.Wherein, described real source IP is established rules really, specifically includes:
When the x-forward-for field of access request record is empty, using the IP address in the IP field of source as real source IP;
When the x-forward-for field of access request record is non-NULL, determine according to the IP address in x-forward-for field Real source IP.
The preferred embodiment of the application can be identified very by the source IP field in access request and x-forward-for field Real request source IP.The reference format of x-forward-for field can be:
x-forward-for:client1,proxy1
Wherein, client1 represents real IP address, and proxy1 represents the IP address of proxy server 1.Above-mentioned When the reference format of x-forward-for field is it is to be understood that access request sends from client1, x-forward-for Field is empty;The when that this access request being addressed to proxy1 and sent out by proxy1, client1 is added to In x-forward-for field;The when that this access request being addressed to proxy2 and is sent out by proxy2 afterwards, Proxy1 is added in x-forward-for field.Visible, when x-forward-for field is non-NULL, First IP address in x-forward-for field is real source IP of this access request.When x-forward-for word When section is empty, the IP address in the IP field of source in access request record is real source IP of this access request record.
Another being identified real source IP of access request record has the beneficial effects that: so that obtain access request note The time of record shortens.For example, it is assumed that when not real source IP to access request record carries out identification, need from 10000 visits Ask request record in just can filter out 5000 source IP1 to Target IP 1 access request record (other 5000 access ask Seeking record is other source IP access request record to Target IP 1);When real source IP of access request record is carried out identification Rear discovery, in these 10000 access request records, real source IP of source IP1 and source IP2 is source IP1, then this 10000 In bar access request record, it should the access request record of source IP2 to Target IP 1 is also divided in a steady stream IP1 to Target IP 1 Access request record in.If that need also exist for the access request record filtering out 5000 source IP1 to Target IP 1, can (other 2000 access request records are that other source IP is to target with regard to permissible to have only to read 7000 access request records The access request record of IP1).So can shorten the source IP time to the access request record of Target IP of acquisition predetermined number, Can earlier detect CC aggressive behavior and earlier close.Same, in another preferred embodiment of the application, Step S110 can specifically include:
Really establish rules then based on real source IP, the access request of the first real source IP of monitoring predetermined number to first object IP. Wherein, described real source IP is established rules really, specifically includes:
When the x-forward-for field of access request is empty, using the IP address in the IP field of source as real source IP;
When the x-forward-for field of access request is non-NULL, determine truly according to the IP address in x-forward-for field Source IP.
Access request to monitoring carries out the identification of real source IP, equally shortens the source IP of monitoring predetermined number to Target IP Time of access request, thus earlier the source IP address residing for CC assailant is detected and closes.
In actual scene, CC assailant can also pretend the access behavior of real user by filling referer field.Example As, when CC assailant prepares to launch a offensive to a certain Website server, can the referer field in access request fill The address of the portal page of this website, thus pretend the linking relationship between the page and the page accessed.CC assailant is the most sharp In bulk the referer field of access request is filled identical page address with script, as shown in table 3.Can from table 3 To find out, CC assailant has all inserted the page address of the page 1 in the referer field of each access request initiated.Should The page 1 can be the portal page of website, it is also possible to be the false page.
In one example of table 3 the application, CC assailant fills the access request record signal table of referer field
Source IP Target IP Accession page Referer field
First source IP First object IP The page 1 The page 1
First source IP First object IP The page 2 The page 1
First source IP First object IP The page 2 The page 1
First source IP First object IP The page 2 The page 1
First source IP First object IP The page 2 The page 1
First source IP First object IP The page 2 The page 1
First source IP First object IP The page 3 The page 1
First source IP First object IP The page 3 The page 1
First source IP First object IP The page 3 The page 1
Although CC assailant fills referer field by batch pretends the linking relationship between the page and the page, by contrast Table 1 and table 3 are still it appeared that real user and CC assailant access the diversity of behavior.Real user accesses destination service In the access request that device produces, the page address of referer field is the most different, such as in table 1, in the access request of real user There are the page 1, the page 3 and the address of the page 4 in the page address of referer field.And CC attack access destination server produces Access request in the page address of referer field the most identical, such as in table 3, referer in the access request of CC assailant The page address of field only has the address of the page 1.It can be seen that in the access request of real user and assailant, referer word The quantity property of there are differences of the mutually different access request of section.Such as, in table 1 in the access request of real user, referer The quantity of the mutually different access request of field is 4, these four mutually different referer fields be respectively empty referer field, The page 1, the page 3 and the page 4;And in the access request of assailant, owing to referer field is the most identical, therefore referer The quantity of the mutually different access request of field is only 1.The embodiment of the present application can be carried out detection resources IP based on this point diversity and arrive Whether the access request of Target IP belongs to CC is attacked.Fig. 5 for another embodiment of the application provide a kind of detect CC attack Method.As it is shown in figure 5, described method includes:
S120: obtain the access request record of the first source IP to first object IP of predetermined number.
In the embodiment of the present application, request end and destination server may be at, in the network environment of backbone network, being used for detecting CC The detection equipment attacked can be independently of the third party device of request end and destination server.This step is similar with S100, inspection Measurement equipment can obtain the access request record of the first source IP to first object IP of predetermined number to detect CC from backbone network Attack.In order to whether there is CC aggressive behavior during accurately test access request records, bigger predetermined number can be set, Predetermined number such as can be set to 1000, and detection equipment can be to the visit of these 1000 the first source IP to first object IP Ask that request record detects.
S220: add up and ask source page to identify the number of mutually different access request record in the access request record of described acquisition Amount.
Detection equipment gets the first source IP of predetermined number to after the access request record of first object IP, can add up described The quantity of referer field mutually different access request record in the access request record obtained.The application one embodiment detects Equipment can comprise an enumerator.Detection equipment can obtain Article 1 access request note from the beginning of Article 1 access request record A referer field in record, and a referer field is put into reference to queue, unison counter adds 1.Then detect Equipment can obtain the 2nd referer field of Article 2 access request record, when a referer field and the 2nd referer word When section is different, the 2nd referer field page can be put into reference to queue by detection equipment, adds 1 in unison counter.As a referer When field is identical with the 2nd referer field, detection equipment does not do any operation.Process Article 2 access request record, detection Equipment can continue to obtain the 3rd referer field of Article 3 access request record and by the 3rd referer field and with reference in queue Each referer field contrasts, if the 3rd referer field is the most different, then from reference to each referer field in queue 3rd referer field is put into reference to queue by detection equipment, and unison counter adds 1;If the 3rd referer field and reference team In row, certain referer field is identical, then detection equipment does not do any operation.Detection equipment can travel through the access of predetermined number please Seeking in record each access request record and be above-mentioned identical contrast operation, the access that the most just can obtain described acquisition please Seeking the quantity of referer field mutually different access request record in record, this quantity can be with reference to referer field in queue Quantity, can also be simultaneously the quantity added up of enumerator.
If it is pointed out that, the referer field of certain access request record is sky, and this sky referer field is to go out for the first time Existing, then this sky referer field can also be as with reference to a referer field in queue.The empty referer of follow-up appearance Field just can be considered as the field identical with reference to this sky referer field in queue, no longer includes scope of statistics in.
S320: the quantity detection CC identifying mutually different access request record based on described request source page attacks.
The embodiment of the present application can pre-set the 5th detection threshold value, when described referer field mutually different access request record Quantity less than described 5th detection threshold value time, it is determined that the access request of the first source IP to first object IP be CC attack;This Application embodiment can pre-set the 6th detection threshold value, when the quantity of referer field mutually different access request record is more than Or during equal to described 6th detection threshold value, it is determined that the access request of the first source IP to first object IP is not that CC attacks.The Five detection threshold values can be equal with the 6th detection threshold value.At some in particular cases, the 5th detection threshold value can be less than the 6th detection Threshold value.
During actually detected, predetermined number can be set to 1000, and detection threshold value can be set to 50, when Article 1000, when in access request, the quantity of the referer field mutually different access request record of statistics is less than 50, it is determined that first The access request of source IP to first object IP is that CC attacks.
Same, the embodiment of the present application can also be by calculating the referer field mutually different access request record of described statistics Quantity account for the ratio of described predetermined number and attack to detect CC.The embodiment of the present application can pre-set the 5th proportion threshold value, When the quantity of the referer field mutually different access request record of described calculating accounts for the ratio of described predetermined number less than the 5th During proportion threshold value, decide that the access request of the first source IP to first object IP is that CC attacks;The embodiment of the present application can be pre- 6th proportion threshold value is first set, when the quantity of the referer field mutually different access request record of described calculating accounts for described presetting When the ratio of quantity is more than or equal to six proportion threshold value, decide that the access request of the first source IP to first object IP not It is that CC attacks.5th proportion threshold value can be equal with the 6th proportion threshold value.At some in particular cases, the 5th proportion threshold value can With less than the 6th proportion threshold value.
During actually detected, described predetermined number can be set to 1000, and described proportion threshold value is set to 0.05, When the quantity of the referer field mutually different access request record calculated accounts for the ratio of described predetermined number less than 0.05, just Judge that the access request of the first source IP to first object IP is attacked as CC.
Similarly, in the application one preferred embodiment, real source IP of access request record can be carried out identification.In this Shen Please be in a preferred embodiment, step S120 can specifically may include that
Really establish rules then based on real source IP, obtain first real source IP access request note to first object IP of predetermined number Record.Wherein, described real source IP is established rules really, specifically includes:
When the x-forward-for field of access request record is empty, using the IP address in the IP field of source as real source IP;
When the x-forward-for field of access request record is non-NULL, determine according to the IP address in x-forward-for field Real source IP.
In another embodiment of the application, detection equipment is also used as a functional module and is integrated on destination server, this inspection Measurement equipment can in real time monitoring transmission to the access request of this destination server.The one that Fig. 6 provides for another embodiment of the application The method flow diagram that detection CC attacks.As shown in Figure 6, described method includes:
S130: the access request of the first source IP to first object IP of monitoring predetermined number.
S230: add up and ask source page to identify the cumulative amount of mutually different access request in described access request.
The detection equipment being integrated on destination server can monitor in real time and be positioned at the request end transmission at the first source IP to being positioned at The access request of this destination server at first object IP.Detection equipment in the embodiment of the present application can be preset by monitoring The access request of the first source IP to first object IP of quantity, and it is different to add up referer field in described access request The cumulative amount of access request, thus judge whether the access request of the first source IP to first object IP is that CC attacks.? In specific embodiment, in order to accurately detect CC aggressive behavior, bigger predetermined number can be set, such as can be by pre- If quantity is set to 1000, detection equipment can monitor the access request of 1000 the first source IP to first object IP continuously, And add up the cumulative amount of the mutually different access request of referer field in these 1000 access request.
Specifically, the detection device interior in the embodiment of the present application can comprise the first enumerator and the second enumerator.Detection equipment Monitoring the first source IP sends every access request to first object IP, often one access request of detection in real time, detection equipment First timer just can add 1.Detection equipment can obtain Article 1 access request note from the beginning of Article 1 access request record A referer field in record, and a referer field is put into reference to queue, the second enumerator adds 1 simultaneously.Then Detection equipment can obtain the 2nd referer field of Article 2 access request record, as a referer field and the 2nd referer During field difference, the 2nd referer field page can be put into reference to queue by detection equipment, and the second enumerator adds 1 simultaneously.When When one referer field is identical with the 2nd referer field, detection equipment does not do any operation.Process Article 2 access request note Record, detection equipment can continue to obtain the 3rd referer field of Article 3 access request record and by the 3rd referer field and ginseng Examine each referer field in queue to contrast, if the 3rd referer field is equal with reference to each referer field in queue Difference, then the 3rd referer field is put into reference to queue by detection equipment, and the second enumerator adds 1 simultaneously;If the 3rd referer Field is identical with reference to certain referer field in queue, then detection equipment does not do any operation.Detection equipment can be to monitoring Every access request is above-mentioned identical contrast operation.When the first counters count reaches predetermined number, detection equipment can obtain The cumulative amount of the mutually different access request of referer field in the access request of described predetermined number, this cumulative amount is permissible For with reference to the quantity of referer field in queue, can also be the quantity added up of the second enumerator simultaneously.
If it is pointed out that, the referer field of certain access request is sky, and this sky referer field is to occur for the first time, So this sky referer field can also be as with reference to a referer field in queue.The empty referer field of follow-up appearance Just can be considered as the field identical with reference to this sky referer field in queue, no longer include scope of statistics in.
S330: request source page based on described statistics identifies the cumulative amount detection CC of mutually different access request and attacks.
The embodiment of the present application can pre-set the 7th detection threshold value, when tiring out of the described mutually different access request of referer field When product amount is less than described 7th detection threshold value, it is determined that the access request of the first source IP to first object IP is that CC attacks;This Application embodiment can pre-set the 8th detection threshold value, when the cumulative amount of the mutually different access request of referer field is more than Or during equal to described 8th detection threshold value, it is determined that the access request of the first source IP to first object IP is not that CC attacks.The Seven detection threshold values can be equal with the 8th detection threshold value.At some in particular cases, the 7th detection threshold value can be less than the 8th detection Threshold value.
During actually detected, predetermined number can be set to 1000, and detection threshold value can be set to 50, when Article 1000, when in access request, the cumulative amount of the mutually different access request of referer field of statistics is less than 50, it is determined that first The access request of source IP to first object IP is that CC attacks.
Same, the embodiment of the present application can also be by calculating the tired of the mutually different access request of referer field of described statistics Product amount accounts for the ratio of described predetermined number and attacks to detect CC.The embodiment of the present application can pre-set the 7th proportion threshold value, When the cumulative amount of the mutually different access request of referer field of described calculating accounts for the ratio of described predetermined number less than the 7th During proportion threshold value, decide that the access request of the first source IP to first object IP is that CC attacks;The embodiment of the present application can set Put the 8th proportion threshold value, when the cumulative amount of the mutually different access request of referer field of described calculating accounts for described predetermined number Ratio more than or equal to eight proportion threshold value time, decide that the access request of the first source IP to first object IP is not CC Attack.7th proportion threshold value can be equal with the 8th proportion threshold value.At some in particular cases, the 7th proportion threshold value can be less than 8th proportion threshold value.
During actually detected, described predetermined number can be set to 1000, and described proportion threshold value is set to 0.05, When the cumulative amount of the mutually different access request of referer field calculated accounts for the ratio of described predetermined number less than 0.05, just Judge that the access request of the first source IP to first object IP is attacked as CC.
Same, in the application one preferred embodiment, real source IP of access request can be carried out identification.In the application one In preferred embodiment, step S130 specifically may include that
Really establish rules then based on real source IP, the access request of the first real source IP of monitoring predetermined number to first object IP. Wherein, described real source IP is established rules really, specifically includes:
When the x-forward-for field of access request is empty, using the IP address in the IP field of source as real source IP;
When the x-forward-for field of access request is non-NULL, determine truly according to the IP address in x-forward-for field Source IP.
The embodiment of the present application also provides for a kind of equipment detecting CC attack.A kind of detection that Fig. 7 provides for the application one embodiment The functions of the equipments module map that CC attacks.As it is shown in fig. 7, described equipment includes:
Access request record acquiring unit 100, is used for obtaining the access request of the first source IP to first object IP of predetermined number Record;
First statistic unit 200, is used for adding up in the access request record of described acquisition and asks source page to be designated the access of sky The quantity of request record;
First identifying unit 300, is used for arranging detection threshold value;Ask when the request source page of described statistics is designated empty access When the quantity seeking record is more than or equal to described detection threshold value, it is determined that the access request of the first source IP to first object IP is CC Attack;When the request source page of described statistics is designated the quantity of the access request record of sky less than described detection threshold value, sentence The access request of fixed first source IP to first object IP is not that CC attacks;
Second identifying unit 400, for Set scale threshold value;Ask when the request source page of described statistics is designated empty access When the quantity seeking record accounts for the ratio value of described predetermined number more than or equal to described proportion threshold value, it is determined that the first source IP to first The access request of Target IP is that CC attacks;When the request source page of described statistics is designated the quantity of the access request record of sky When accounting for the ratio value of described predetermined number less than described proportion threshold value, it is determined that the access request of the first source IP to first object IP is not It is that CC attacks.
Described equipment can be the third party device independent of request end and destination server.
In the application one preferred embodiment, described access request record acquiring unit 100 specifically includes:
Real source IP access request record acquisition module 101, is used for really establishing rules then based on real source IP, obtains predetermined number The first real source IP to the access request record of first object IP.
A kind of functions of the equipments module map detecting CC attack that Fig. 8 provides for another embodiment of the application.As shown in Figure 8, institute The equipment of stating includes:
Monitoring unit 110, is used for monitoring the access request of the first source IP to first object IP of predetermined number;
Second statistic unit 210, is used for adding up in described access request and asks source page to be designated the accumulation of empty access request Quantity;
3rd identifying unit 310, is used for arranging detection threshold value;Ask when the request source page of described statistics is designated empty access When the cumulative amount asked is more than or equal to described detection threshold value, it is determined that the access request of the first source IP to first object IP is CC Attack;When the request source page of described statistics is designated the cumulative amount of the access request of sky less than described detection threshold value, sentence The access request of fixed first source IP to first object IP is not that CC attacks;
4th identifying unit 410, for Set scale threshold value;Ask when the request source page of described statistics is designated empty access When the cumulative amount asked accounts for the ratio value of described predetermined number more than or equal to described proportion threshold value, it is determined that the first source IP to first The access request of Target IP is that CC attacks;When the request source page of described statistics is designated the cumulative amount of the access request of sky When accounting for the ratio value of described predetermined number less than described proportion threshold value, it is determined that the access request of the first source IP to first object IP is not It is that CC attacks.
Described equipment can be integrated in destination server as a module.
In the application one preferred embodiment, described monitoring unit 110 specifically includes:
Real source IP access request monitoring module 111, is used for really establishing rules then based on real source IP, the of monitoring predetermined number One real source IP is to the access request of first object IP.
A kind of functions of the equipments module map detecting CC attack that Fig. 9 provides for another embodiment of the application.As it is shown in figure 9, institute The equipment of stating includes:
Access request record acquiring unit 120, is used for obtaining the access request of the first source IP to first object IP of predetermined number Record;
3rd statistic unit 220, is used for adding up in the access request record of described acquisition and asks source page mark mutually different The quantity of access request record;
5th identifying unit 320, is used for arranging detection threshold value;When the request source page of described statistics identifies mutually different visit When the quantity that the request of asking records is more than or equal to described detection threshold value, it is determined that the access request of the first source IP to first object IP It not that CC attacks;When the request source page of described statistics identifies the quantity of mutually different access request record less than described inspection When surveying threshold value, it is determined that the access request of the first source IP to first object IP is that CC attacks;
6th identifying unit 420, for Set scale threshold value;When the request source page of described statistics identifies mutually different visit When the quantity that the request of asking records accounts for the ratio value of described predetermined number more than or equal to described proportion threshold value, it is determined that the first source IP Access request to first object IP is not that CC attacks;Ask when the request source page of described statistics identifies mutually different access When the quantity seeking record accounts for the ratio value of described predetermined number less than described proportion threshold value, it is determined that the first source IP to first object IP Access request be CC attack.
Described equipment can be the third party device independent of request end and destination server.
In the application one preferred embodiment, described access request record acquiring unit 120 specifically includes:
Real source IP access request record acquisition module 121, is used for really establishing rules then based on real source IP, obtains predetermined number The first real source IP to the access request record of first object IP.
A kind of functions of the equipments module map detecting CC attack that Figure 10 provides for another embodiment of the application.As shown in Figure 10, Described equipment includes:
Monitoring unit 130, is used for monitoring the access request of the first source IP to first object IP of predetermined number;
4th statistic unit 230, is used for adding up request source page and identifies the cumulative amount of mutually different access request;
7th identifying unit 330, is used for arranging detection threshold value;When the request source page of described statistics identifies mutually different visit When asking the cumulative amount of request more than or equal to described detection threshold value, it is determined that the access request of the first source IP to first object IP It not that CC attacks;When the request source page of described statistics identifies the cumulative amount of mutually different access request less than described inspection When surveying threshold value, it is determined that the access request of the first source IP to first object IP is that CC attacks;
8th identifying unit 430, for Set scale threshold value;When the request source page of described statistics identifies mutually different visit When asking that ratio value that the cumulative amount of request accounts for described predetermined number is more than or equal to described proportion threshold value, it is determined that the first source IP Access request to first object IP is not that CC attacks;Ask when the request source page of described statistics identifies mutually different access When the cumulative amount asked accounts for the ratio value of described predetermined number less than described proportion threshold value, it is determined that the first source IP to first object IP Access request be CC attack.
Described equipment can be integrated in destination server as a module.
In the application one preferred embodiment, described monitoring unit 130 specifically includes:
Real source IP access request monitoring module 131, is used for really establishing rules then based on real source IP, the of monitoring predetermined number One real source IP is to the access request of first object IP.
A kind of method and apparatus detecting CC attack that the embodiment of the present application provides, by analyzing real user and CC assailant's The diversity of access behavior, and calculate judgement numerical value based on this diversity, it is possible to detection CC attacks effectively.
In the nineties in 20th century, can clearly distinguish for the improvement of a technology is that the improvement on hardware is (such as, to two The improvement of the circuit structures such as pole pipe, transistor, switch) or software on improvement (for the improvement of method flow).But, Along with the development of technology, the improvement of current a lot of method flows can be considered as directly improving of hardware circuit.Design Personnel nearly all obtain corresponding hardware circuit by being programmed in hardware circuit by the method flow of improvement.Therefore, no Can say that the improvement of a method flow cannot realize by hardware entities module.Such as, PLD (Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) it is exactly such a integrated circuit, device programming is determined by its logic function by user.By designer Member's programming voluntarily comes a digital display circuit " integrated " on a piece of PLD, without chip maker please designing and make Make special IC chip 2.And, nowadays, replacing and manually make IC chip, this programming changes the most mostly Realize with " logic compiler (logic compiler) " software, software compiler phase used when it is write with program development Similar, and the most handy specific programming language of source code before compiling is write, this is referred to as hardware description language (Hardware Description Language, HDL), and HDL the most not only has one, but have many kinds, such as ABEL (Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、 Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language) etc., that commonly use most is VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog2.Those skilled in the art also it should also be apparent that, it is only necessary to by method flow with above-mentioned Several hardware description languages are slightly made programming in logic and are programmed in integrated circuit, it is possible to be readily available and realize this logical method stream The hardware circuit of journey.
Controller can be implemented in any suitable manner, such as, controller can take such as microprocessor or processor and Storage can by this (micro-) processor perform computer readable program code (such as software or firmware) computer-readable medium, Gate, switch, special IC (Application Specific Integrated Circuit, ASIC), FPGA Controller and the form of embedding microcontroller, the example of controller includes but not limited to following microcontroller: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, Memory Controller can also quilt It is embodied as a part for the control logic of memorizer.
It is also known in the art that in addition to realizing controller in pure computer readable program code mode, the most permissible Make controller with gate, switch, special IC, FPGA control by method step carries out programming in logic The form of device processed and embedding microcontroller etc. realizes identical function.The most this controller is considered a kind of Hardware Subdivision Part, and the structure in hardware component can also be considered as to include in it for the device realizing various function.Or even, may be used To be considered as the device being used for realizing various function being not only the software module of implementation method but also can be the knot in hardware component Structure.
System, device, module or the unit that above-described embodiment illustrates, specifically can be realized by computer chip or entity, or Realized by the product with certain function.
For convenience of description, it is divided into various unit to be respectively described with function when describing apparatus above.Certainly, the application is being implemented Time the function of each unit can be realized in same or multiple softwares and/or hardware.
As seen through the above description of the embodiments, those skilled in the art it can be understood that to the application can be by soft Part adds the mode of required general hardware platform and realizes.Based on such understanding, the technical scheme of the application is the most in other words The part contributing prior art can embody with the form of software product, and this computer software product can be stored in In storage medium, such as ROM/RAM, magnetic disc, CD etc., use so that a computer equipment is (permissible including some instructions It is personal computer, server, or the network equipment etc.) perform each embodiment of the application or some part institute of embodiment The method stated.
Each embodiment in this specification all uses the mode gone forward one by one to describe, and between each embodiment, identical similar part is mutual Seeing, what each embodiment stressed is the difference with other embodiments.Especially for system embodiment Speech, owing to it is substantially similar to embodiment of the method, so describe is fairly simple, relevant part sees the part of embodiment of the method Illustrate.
The application can be used in numerous general or special purpose computing system environments or configuration.Such as: personal computer, server Computer, handheld device or portable set, laptop device, multicomputer system, system based on microprocessor, top set Box, programmable consumer-elcetronics devices, network PC, minicomputer, mainframe computer, include any of the above system or equipment Distributed computing environment etc..
The application can be described in the general context of computer executable instructions, such as program module. Usually, program module include perform particular task or realize the routine of particular abstract data type, program, object, assembly, Data structure etc..The application can also be put into practice in a distributed computing environment, in these distributed computing environment, by passing through Communication network and connected remote processing devices performs task.In a distributed computing environment, program module may be located at bag Include storage device in interior local and remote computer-readable storage medium.
Although depicting the application by embodiment, it will be appreciated by the skilled addressee that the application have many deformation and a change and Without departing from spirit herein, it is desirable to appended claim includes that these deformation and change are without deviating from spirit herein.

Claims (36)

1. one kind is detected the method that CC attacks, it is characterised in that including:
Obtain the access request record of the first source IP to first object IP of predetermined number;
Add up and the access request record of described acquisition is asked source page be designated the quantity of empty access request record;
Request source page based on described statistics is designated the quantity detection CC of the access request record of sky and attacks.
The most as claimed in claim 1 a kind of detect the method that CC attacks, it is characterised in that the of described acquisition predetermined number The access request record of one source IP to first object IP specifically includes:
Really establish rules then based on real source IP, obtain first real source IP access request note to first object IP of predetermined number Record.
A kind of method detecting CC attack the most as claimed in claim 2, it is characterised in that the determination of described real source IP Rule specifically includes:
When the x-forward-for field of access request record is empty, using the IP address in the IP field of source as real source IP; When the x-forward-for field of access request record is non-NULL, determine truly according to the IP address in x-forward-for field Source IP.
The most as claimed in claim 1 a kind of detect CC attack method, it is characterised in that described based on described statistics please The quantity detection CC asking source page to be designated empty access request record attacks and specifically includes:
First detection threshold value is set;
When the request source page of described statistics is designated the quantity of the access request record of sky more than or equal to described first inspection When surveying threshold value, it is determined that the access request of the first source IP to first object IP is that CC attacks.
The most as claimed in claim 1 a kind of detect CC attack method, it is characterised in that described based on described statistics please The quantity detection CC asking source page to be designated empty access request record attacks and specifically includes:
Second detection threshold value is set;
When the request source page of described statistics is designated the quantity of the access request record of sky less than described second detection threshold value, Judge that the access request of the first source IP to first object IP is not that CC attacks.
The most as claimed in claim 1 a kind of detect CC attack method, it is characterised in that described based on described statistics please The quantity detection CC asking source page to be designated empty access request record attacks and specifically includes:
First proportion threshold value is set;
The ratio value of described predetermined number is accounted for when the request source page of described statistics is designated the quantity of access request record of sky During more than or equal to described proportion threshold value, it is determined that the access request of the first source IP to first object IP is that CC attacks.
The most as claimed in claim 1 a kind of detect CC attack method, it is characterised in that described based on described statistics please The quantity detection CC asking source page to be designated empty access request record attacks and specifically includes:
Second proportion threshold value is set;
The ratio value of described predetermined number is accounted for when the request source page of described statistics is designated the quantity of access request record of sky During less than described second proportion threshold value, it is determined that the access request of the first source IP to first object IP is not that CC attacks.
8. one kind is detected the method that CC attacks, it is characterised in that including:
The access request of the first source IP to first object IP of monitoring predetermined number;
Add up and described access request is asked source page be designated the cumulative amount of empty access request;
Request source page based on described statistics is designated the cumulative amount detection CC of the access request of sky and attacks.
The most as claimed in claim 8 a kind of detect the method that CC attacks, it is characterised in that the of described monitoring predetermined number The access request of one source IP to first object IP specifically includes:
Really establish rules then based on real source IP, the access request of the first real source IP of monitoring predetermined number to first object IP.
A kind of method detecting CC attack the most as claimed in claim 9, it is characterised in that the determination of described real source IP Rule specifically includes:
When the x-forward-for field of access request is empty, using the IP address in the IP field of source as real source IP;
When the x-forward-for field of access request is non-NULL, determine truly according to the IP address in x-forward-for field Source IP.
11. a kind of methods detecting CC attack as claimed in claim 8, it is characterised in that described based on described statistics Request source page is designated the cumulative amount detection CC attack of the access request of sky and specifically includes:
3rd detection threshold value is set;
When the request source page of described statistics is designated the cumulative amount of the access request of sky more than or equal to described 3rd inspection When surveying threshold value, it is determined that the access request of the first source IP to first object IP is that CC attacks.
12. a kind of methods detecting CC attack as claimed in claim 8, it is characterised in that described based on described statistics Request source page is designated the cumulative amount detection CC attack of the access request of sky and specifically includes:
4th detection threshold value is set;
When the request source page of described statistics is designated the cumulative amount of the access request of sky less than described 4th detection threshold value, Judge that the access request of the first source IP to first object IP is not that CC attacks.
13. a kind of methods detecting CC attack as claimed in claim 8, it is characterised in that described based on described statistics Request source page is designated the cumulative amount detection CC attack of the access request of sky and specifically includes:
3rd proportion threshold value is set;
The ratio value of described predetermined number is accounted for when the request source page of described statistics is designated the cumulative amount of access request of sky During more than or equal to described three proportion threshold value, it is determined that the access request of the first source IP to first object IP is that CC attacks.
14. a kind of methods detecting CC attack as claimed in claim 8, it is characterised in that described based on described statistics Request source page is designated the cumulative amount detection CC attack of the access request of sky and specifically includes:
4th proportion threshold value is set;
The ratio value of described predetermined number is accounted for when the request source page of described statistics is designated the cumulative amount of access request of sky During less than described four proportion threshold value, it is determined that the access request of the first source IP to first object IP is not that CC attacks.
15. 1 kinds are detected the method that CC attacks, it is characterised in that including:
Obtain the access request record of the first source IP to first object IP of predetermined number;
Add up and the access request record of described acquisition is asked source page identify the quantity of mutually different access request record;
Request source page based on described statistics identifies the quantity detection CC of mutually different access request record and attacks.
16. a kind of methods detecting CC attack as claimed in claim 15, it is characterised in that described acquisition predetermined number The access request record of the first source IP to first object IP specifically includes:
Really establish rules then based on real source IP, obtain first real source IP access request note to first object IP of predetermined number Record.
17. a kind of methods detecting CC attack as claimed in claim 16, it is characterised in that described real source IP is really Set pattern then specifically includes:
When the x-forward-for field of access request record is empty, using the IP address in the IP field of source as real source IP;
When the x-forward-for field of access request record is non-NULL, determine according to the IP address in x-forward-for field Real source IP.
18. a kind of methods detecting CC attack as claimed in claim 15, it is characterised in that described based on described statistics Request source page identifies the quantity detection CC attack of mutually different access request record and specifically includes:
5th detection threshold value is set;
When the request source page of described statistics identifies the quantity of mutually different access request record less than described 5th detection threshold During value, it is determined that the access request of the first source IP to first object IP is that CC attacks.
19. a kind of methods detecting CC attack as claimed in claim 15, it is characterised in that described based on described statistics Request source page identifies the quantity detection CC attack of mutually different access request record and specifically includes:
6th detection threshold value is set
When the request source page of described statistics identifies the quantity of mutually different access request record more than or equal to described the During six detection threshold values, it is determined that the access request of the first source IP to first object IP is not that CC attacks.
20. a kind of methods detecting CC attack as claimed in claim 15, it is characterised in that described based on described statistics Request source page identifies the quantity detection CC attack of mutually different access request record and specifically includes:
5th proportion threshold value is set;
When the quantity of the request source page mutually different access request record of mark of described statistics accounts for the ratio of described predetermined number When example value is less than described five proportion threshold value, it is determined that the access request of the first source IP to first object IP is that CC attacks.
21. a kind of methods detecting CC attack as claimed in claim 15, it is characterised in that described based on described statistics Request source page identifies the quantity detection CC attack of mutually different access request record and specifically includes:
6th proportion threshold value is set;
When the quantity of the request source page mutually different access request record of mark of described statistics accounts for the ratio of described predetermined number When example value is more than or equal to described six proportion threshold value, it is determined that the access request of the first source IP to first object IP is not CC Attack.
22. 1 kinds are detected the method that CC attacks, it is characterised in that including:
The access request of the first source IP to first object IP of monitoring predetermined number;
Statistics request source page identifies the cumulative amount of mutually different access request;
Request source page based on described statistics identifies the cumulative amount detection CC of mutually different access request and attacks.
23. a kind of methods detecting CC attack as claimed in claim 22, it is characterised in that described monitoring predetermined number The access request of the first source IP to first object IP specifically includes:
Really establish rules then based on real source IP, the access request of the first real source IP of monitoring predetermined number to first object IP.
24. a kind of methods detecting CC attack as claimed in claim 23, it is characterised in that described real source IP is really Set pattern then specifically includes:
When the x-forward-for field of access request is empty, using the IP address in the IP field of source as real source IP;
When the x-forward-for field of access request is non-NULL, determine truly according to the IP address in x-forward-for field Source IP.
25. a kind of methods detecting CC attack as claimed in claim 22, it is characterised in that described based on described statistics Request source page identifies the cumulative amount detection CC attack of mutually different access request and specifically includes:
7th detection threshold value is set;
When the request source page of described statistics identifies the cumulative amount of mutually different access request less than described 7th detection threshold During value, it is determined that the access request of the first source IP to first object IP is that CC attacks.
26. a kind of methods detecting CC attack as claimed in claim 22, it is characterised in that described based on described statistics Request source page identifies the cumulative amount detection CC attack of mutually different access request and specifically includes:
8th detection threshold value is set;
When the request source page of described statistics identifies the cumulative amount of mutually different access request more than or equal to described the During eight detection threshold values, it is determined that the access request of the first source IP to first object IP is not that CC attacks.
27. a kind of methods detecting CC attack as claimed in claim 22, it is characterised in that described based on described statistics Request source page identifies the cumulative amount detection CC attack of mutually different access request and specifically includes:
7th proportion threshold value is set;
When the cumulative amount of the request source page mutually different access request of mark of described statistics accounts for the ratio of described predetermined number When example value is less than described seven proportion threshold value, it is determined that the access request of the first source IP to first object IP is that CC attacks.
28. a kind of methods detecting CC attack as claimed in claim 22, it is characterised in that described based on described statistics Request source page identifies the cumulative amount detection CC attack of mutually different access request and specifically includes:
8th proportion threshold value is set;
When the cumulative amount of the request source page mutually different access request of mark of described statistics accounts for the ratio of described predetermined number When example value is more than or equal to described eight proportion threshold value, it is determined that the access request of the first source IP to first object IP is not CC Attack.
29. 1 kinds are detected the equipment that CC attacks, it is characterised in that described equipment is independent of request end and destination server Third party device, including access request record acquiring unit, the first statistic unit, the first identifying unit and the second identifying unit, Wherein:
Described access request record acquiring unit, is used for obtaining the access request of the first source IP to first object IP of predetermined number Record;
Described first statistic unit, is used for adding up in the access request record of described acquisition and asks source page to be designated the access of sky The quantity of request record;
Described first identifying unit, is used for arranging detection threshold value;Ask when the request source page of described statistics is designated empty access When the quantity seeking record is more than or equal to described detection threshold value, it is determined that the access request of the first source IP to first object IP is CC Attack;When the request source page of described statistics is designated the quantity of the access request record of sky less than described detection threshold value, sentence The access request of fixed first source IP to first object IP is not that CC attacks;
Described second identifying unit, for Set scale threshold value;Ask when the request source page of described statistics is designated empty access When the quantity seeking record accounts for the ratio value of described predetermined number more than or equal to described proportion threshold value, it is determined that the first source IP to first The access request of Target IP is that CC attacks;When the request source page of described statistics is designated the quantity of the access request record of sky When accounting for the ratio value of described predetermined number less than described proportion threshold value, it is determined that the access request of the first source IP to first object IP is not It is that CC attacks.
30. a kind of equipment detecting CC attack as claimed in claim 29, it is characterised in that described access request record obtains Take unit to specifically include:
Real source IP access request record acquisition module, is used for really establishing rules then based on real source IP, obtains the of predetermined number One real source IP is to the access request record of first object IP.
31. 1 kinds are detected the equipment that CC attacks, it is characterised in that described equipment is integrated in destination server as module, Including monitoring unit, the second statistic unit, the 3rd identifying unit and the 4th identifying unit, wherein:
Described monitoring unit, is used for monitoring the access request of the first source IP to first object IP of predetermined number;
Described second statistic unit, is used for adding up in described access request and asks source page to be designated the accumulation of empty access request Quantity;
Described 3rd identifying unit, is used for arranging detection threshold value;Ask when the request source page of described statistics is designated empty access When the cumulative amount asked is more than or equal to described detection threshold value, it is determined that the access request of the first source IP to first object IP is CC Attack;When the request source page of described statistics is designated the cumulative amount of the access request of sky less than described detection threshold value, sentence The access request of fixed first source IP to first object IP is not that CC attacks;
Described 4th identifying unit, for Set scale threshold value;Ask when the request source page of described statistics is designated empty access When the cumulative amount asked accounts for the ratio value of described predetermined number more than or equal to described proportion threshold value, it is determined that the first source IP to first The access request of Target IP is that CC attacks;When the request source page of described statistics is designated the cumulative amount of the access request of sky When accounting for the ratio value of described predetermined number less than described proportion threshold value, it is determined that the access request of the first source IP to first object IP is not It is that CC attacks.
32. a kind of equipment detecting CC attack as claimed in claim 31, it is characterised in that described monitoring unit specifically wraps Include:
Real source IP access request monitoring module, is used for really establishing rules then based on real source IP, and the first of monitoring predetermined number is true Actual source IP is to the access request of first object IP.
33. 1 kinds are detected the equipment that CC attacks, it is characterised in that described equipment is independent of request end and destination server Third party device, including access request record acquiring unit, the 3rd statistic unit, the 5th identifying unit and the 6th identifying unit, Wherein:
Described access request record acquiring unit, is used for obtaining the access request of the first source IP to first object IP of predetermined number Record;
Described 3rd statistic unit, is used for adding up in the access request record of described acquisition and asks source page mark mutually different The quantity of access request record;
Described 5th identifying unit, is used for arranging detection threshold value;When the request source page of described statistics identifies mutually different visit When the quantity that the request of asking records is more than or equal to described detection threshold value, it is determined that the access request of the first source IP to first object IP It not that CC attacks;When the request source page of described statistics identifies the quantity of mutually different access request record less than described inspection When surveying threshold value, it is determined that the access request of the first source IP to first object IP is that CC attacks;
Described 6th identifying unit, for Set scale threshold value;When the request source page of described statistics identifies mutually different visit When the quantity that the request of asking records accounts for the ratio value of described predetermined number more than or equal to described proportion threshold value, it is determined that the first source IP Access request to first object IP is not that CC attacks;Ask when the request source page of described statistics identifies mutually different access When the quantity seeking record accounts for the ratio value of described predetermined number less than described proportion threshold value, it is determined that the first source IP to first object IP Access request be CC attack.
34. a kind of equipment detecting CC attack as claimed in claim 33, it is characterised in that described access request record obtains Take unit to specifically include:
Real source IP access request record acquisition module, is used for really establishing rules then based on real source IP, obtains the of predetermined number One real source IP is to the access request record of first object IP.
35. 1 kinds are detected the equipment that CC attacks, it is characterised in that described equipment is integrated in destination server as module, Including monitoring unit, the 4th statistic unit, the 7th identifying unit and the 8th identifying unit, wherein:
Described monitoring unit, is used for monitoring the access request of the first source IP to first object IP of predetermined number;
Described 4th statistic unit, is used for adding up request source page and identifies the cumulative amount of mutually different access request;
Described 7th identifying unit, is used for arranging detection threshold value;When the request source page of described statistics identifies mutually different visit When asking the cumulative amount of request more than or equal to described detection threshold value, it is determined that the access request of the first source IP to first object IP It not that CC attacks;When the request source page of described statistics identifies the cumulative amount of mutually different access request less than described inspection When surveying threshold value, it is determined that the access request of the first source IP to first object IP is that CC attacks;
Described 8th identifying unit, for Set scale threshold value;When the request source page of described statistics identifies mutually different visit When asking that ratio value that the cumulative amount of request accounts for described predetermined number is more than or equal to described proportion threshold value, it is determined that the first source IP Access request to first object IP is not that CC attacks;Ask when the request source page of described statistics identifies mutually different access When the cumulative amount asked accounts for the ratio value of described predetermined number less than described proportion threshold value, it is determined that the first source IP to first object IP Access request be CC attack.
36. a kind of equipment detecting CC attack as claimed in claim 35, it is characterised in that described monitoring unit specifically wraps Include:
Real source IP access request monitoring module, is used for really establishing rules then based on real source IP, and the first of monitoring predetermined number is true Actual source IP is to the access request of first object IP.
CN201510040959.2A 2015-01-27 2015-01-27 Method and device for detecting CC attack Pending CN105991511A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510040959.2A CN105991511A (en) 2015-01-27 2015-01-27 Method and device for detecting CC attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510040959.2A CN105991511A (en) 2015-01-27 2015-01-27 Method and device for detecting CC attack

Publications (1)

Publication Number Publication Date
CN105991511A true CN105991511A (en) 2016-10-05

Family

ID=57036350

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510040959.2A Pending CN105991511A (en) 2015-01-27 2015-01-27 Method and device for detecting CC attack

Country Status (1)

Country Link
CN (1) CN105991511A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107743113A (en) * 2016-11-23 2018-02-27 腾讯科技(深圳)有限公司 A kind of detection method and system of website attack
CN108632050A (en) * 2017-03-15 2018-10-09 阿里巴巴集团控股有限公司 A kind of method and apparatus of record web log
CN108650274A (en) * 2018-05-21 2018-10-12 中国科学院计算机网络信息中心 A kind of network inbreak detection method and system
CN110535857A (en) * 2019-08-29 2019-12-03 中国工商银行股份有限公司 The method and apparatus of protecting network attack
US10505974B2 (en) 2016-07-22 2019-12-10 Alibaba Group Holding Limited Network attack defense system and method
US10715546B2 (en) 2016-11-23 2020-07-14 Tencent Technology (Shenzhen) Company Limited Website attack detection and protection method and system
CN113760664A (en) * 2021-09-10 2021-12-07 哈尔滨工业大学 Two-stage threshold attack detection method, computer and storage medium
US11323453B2 (en) 2018-08-23 2022-05-03 Alibaba Group Holding Limited Data processing method, device, access control system, and storage media
CN116760649A (en) * 2023-08-23 2023-09-15 智联信通科技股份有限公司 Data security protection and early warning method based on big data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080320567A1 (en) * 2007-06-20 2008-12-25 Imperva, Inc. System and method for preventing web frauds committed using client-scripting attacks
CN102281298A (en) * 2011-08-10 2011-12-14 深信服网络科技(深圳)有限公司 Method and device for detecting and defending challenge collapsar (CC) attack
CN103179132A (en) * 2013-04-09 2013-06-26 中国信息安全测评中心 Method and device for detecting and defending CC (challenge collapsar)
CN104092665A (en) * 2014-06-19 2014-10-08 小米科技有限责任公司 Access request filtering method, device and facility
CN104113525A (en) * 2014-05-23 2014-10-22 中国电子技术标准化研究院 Method and apparatus for defending resource consumption type Web attacks

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080320567A1 (en) * 2007-06-20 2008-12-25 Imperva, Inc. System and method for preventing web frauds committed using client-scripting attacks
CN102281298A (en) * 2011-08-10 2011-12-14 深信服网络科技(深圳)有限公司 Method and device for detecting and defending challenge collapsar (CC) attack
CN103179132A (en) * 2013-04-09 2013-06-26 中国信息安全测评中心 Method and device for detecting and defending CC (challenge collapsar)
CN104113525A (en) * 2014-05-23 2014-10-22 中国电子技术标准化研究院 Method and apparatus for defending resource consumption type Web attacks
CN104092665A (en) * 2014-06-19 2014-10-08 小米科技有限责任公司 Access request filtering method, device and facility

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
肖军 等: "基于会话异常度模型的应用层分布式拒绝服务攻击过滤", 《计算机学报》 *

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10505974B2 (en) 2016-07-22 2019-12-10 Alibaba Group Holding Limited Network attack defense system and method
US11184387B2 (en) 2016-07-22 2021-11-23 Alibaba Group Holding Limited Network attack defense system and method
CN107743113A (en) * 2016-11-23 2018-02-27 腾讯科技(深圳)有限公司 A kind of detection method and system of website attack
US10715546B2 (en) 2016-11-23 2020-07-14 Tencent Technology (Shenzhen) Company Limited Website attack detection and protection method and system
CN108632050A (en) * 2017-03-15 2018-10-09 阿里巴巴集团控股有限公司 A kind of method and apparatus of record web log
CN108632050B (en) * 2017-03-15 2021-03-02 阿里巴巴集团控股有限公司 Method and device for recording website access log
CN108650274A (en) * 2018-05-21 2018-10-12 中国科学院计算机网络信息中心 A kind of network inbreak detection method and system
CN108650274B (en) * 2018-05-21 2021-07-27 中国科学院计算机网络信息中心 Network intrusion detection method and system
US11323453B2 (en) 2018-08-23 2022-05-03 Alibaba Group Holding Limited Data processing method, device, access control system, and storage media
CN110535857A (en) * 2019-08-29 2019-12-03 中国工商银行股份有限公司 The method and apparatus of protecting network attack
CN110535857B (en) * 2019-08-29 2022-07-22 中国工商银行股份有限公司 Method and device for protecting network attack
CN113760664A (en) * 2021-09-10 2021-12-07 哈尔滨工业大学 Two-stage threshold attack detection method, computer and storage medium
CN116760649A (en) * 2023-08-23 2023-09-15 智联信通科技股份有限公司 Data security protection and early warning method based on big data
CN116760649B (en) * 2023-08-23 2023-10-24 智联信通科技股份有限公司 Data security protection and early warning method based on big data

Similar Documents

Publication Publication Date Title
CN105991511A (en) Method and device for detecting CC attack
CN104391979B (en) Network malice reptile recognition methods and device
CN108304410A (en) A kind of detection method, device and the data analysing method of the abnormal access page
KR20140101697A (en) Automatic detection of fraudulent ratings/comments related to an application store
CN104143008B (en) The method and device of fishing webpage is detected based on picture match
CN102739653B (en) Detection method and device aiming at webpage address
CN108334774A (en) A kind of method, first server and the second server of detection attack
CN107403251A (en) Risk checking method and device
CN103530336B (en) The identification equipment and method of Invalid parameter in uniform resource position mark URL
CN105868256A (en) Method and system for processing user behavior data
CN110474900B (en) Game protocol testing method and device
CN109981415A (en) Condition judgement method, electronic equipment, system and medium
CN103701779B (en) Method and device for accessing website for second time and firewall equipment
CN106534062A (en) Crawler prevention method
CN103530337B (en) Identify the device and method of Invalid parameter in uniform resource position mark URL
CN104156487B (en) Web data statistical method and device
CN105681124B (en) A kind of wire-speed detection method and device
CN105578434B (en) A kind of method and server detecting pseudo-base station motion profile
US11314795B2 (en) User navigation in a target portal
CN104468459B (en) A kind of leak detection method and device
CN103581321B (en) A kind of creation method of refer chains, device and safety detection method and client
CN107018039B (en) Method and device for testing performance bottleneck of server cluster
CN109450853B (en) Malicious website determination method and device, terminal and server
CN107026854A (en) Validating vulnerability method and device
CN109361674A (en) Bypass stream data detection method, device and the electronic equipment of access

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20161005