CN107454120A - The method of network attack defending system and defending against network attacks - Google Patents

The method of network attack defending system and defending against network attacks Download PDF

Info

Publication number
CN107454120A
CN107454120A CN201610371336.8A CN201610371336A CN107454120A CN 107454120 A CN107454120 A CN 107454120A CN 201610371336 A CN201610371336 A CN 201610371336A CN 107454120 A CN107454120 A CN 107454120A
Authority
CN
China
Prior art keywords
subsystem
user
load balancing
message queue
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610371336.8A
Other languages
Chinese (zh)
Inventor
闫国旗
都海峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201610371336.8A priority Critical patent/CN107454120A/en
Publication of CN107454120A publication Critical patent/CN107454120A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1001Protocols in which an application is distributed across nodes in the network for accessing one among a plurality of replicated servers
    • H04L67/1036Load balancing of requests to servers for services different from user content provisioning, e.g. load balancing across domain name servers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Abstract

The invention discloses a kind of method of network attack defending system and defending against network attacks.The system includes:Application layer load balancing subsystem, it is configured as receiving user's request, holds host load balancing agency thereon, load balancing agency is configured as reading user's request from application layer load balancing subsystem, and user is asked into write-in message queue subsystem;Message queue subsystem, it is configured as caching the user's request for acting on behalf of write-in by load balancing;And real-time computing subsystem, it is configured as obtaining cached user's request from message queue subsystem, data in asking user are analyzed, and rule is closed according to analysis result generation, and rule write-in message queue subsystem will be closed, wherein, message queue subsystem is additionally configured to cache to closing rule, and load balancing agency be additionally configured to from message queue subsystem obtain cached close rule and by extracted close rule be applied to application layer load balancing subsystem.

Description

The method of network attack defending system and defending against network attacks
Technical field
The present invention relates to network safety filed, and system is defendd more particularly to network attack defending system and by network attack The method of system defending against network attacks.
Background technology
With the rapid development of Internet, network security have become one it is increasingly notable the problem of, hacker is by stealing Data or revenge attack, many companies are made to pay the cost of bitterness.For typical Internet firm, network is and its again The basis instrument wanted, there is high requirement to the security of network, this is required when network security attacks occur will can It is timely detected out in certain timeliness.
Detection for network attack, the detection of transport layer and the detection of application layer are broadly divided into, is nowadays generally adopted Hardware firewall is more adapted to most of the attack-defending of transport layer, and its interception rule to be all based on production firm Initial setting or the simple setting of administration interface, therefore it can not realize flexible logic judgment for application layer.
In addition, although hardware firewall itself possesses hardware-accelerated advantage, for large-scale computer room, it handles energy Power still has bottleneck.
The content of the invention
In order to solve the above-mentioned problems in the prior art, the present invention propose a kind of network attack defending system and The method of defending against network attacks.
According to an aspect of the present invention, it is proposed that a kind of network attack defending system.The system includes:Application layer is born Equalization subsystem is carried, is configured as receiving user's request, holding place (host) on the application layer load balancing subsystem has load Equilibrium agency, the load balancing agency are configured as reading user's request from the application layer load balancing subsystem, And the user is asked into write-in message queue subsystem;Message queue subsystem, it is connected to application load balancing System, it is configured as caching the user's request for acting on behalf of write-in by the load balancing;And real-time computing subsystem, even The message queue subsystem is connected to, is configured as obtaining cached user's request from the message queue subsystem, to institute The data stated in user's request are analyzed, and close rule according to analysis result generation, and close regular write-in by described The message queue subsystem, wherein, the message queue subsystem is additionally configured to cache the rule of closing, with And load balancing agency be additionally configured to obtain from the message queue subsystem cached close rule and will be carried The rule of closing taken is applied to the application layer load balancing subsystem.
Preferably, the system also includes:Data storage subsystem, the real-time computing subsystem is connected to, is configured To be carried out to the analysis result, the user's access history data closed rule and/or analyze to obtain from user's request Storage.
Preferably, the system also includes:Management configuration server, be connected to the application layer load balancing subsystem, In the message queue subsystem, the computing subsystem in real time, it is configured as to the application layer load balancing subsystem, institute State load balancing agency, the message queue subsystem and the computing subsystem in real time and configuration data is provided.
Preferably, the application layer load balancing subsystem is configured as from described in the reception of transport layer load-balanced server User asks.
Preferably, the load balancing agency is configured as being compressed user request, and by through overcompression User asks write-in message queue subsystem.
Preferably, the analysis that computing subsystem asks to carry out to the user described in real time includes analysis of accounts, wherein, institute Stating real-time computing subsystem asks corresponding source IP address to count the user obtained in the specified time cycle, works as pin When counting to a source IP address exceedes the threshold value specified, the computing subsystem in real time, which adds the source IP address, closes rule Then.
Preferably, the analysis that computing subsystem asks to carry out to the user described in real time includes analysis of accounts, wherein, institute Stating real-time computing subsystem asks corresponding purpose IP address to count the user obtained in the specified time cycle, when When exceeding the threshold value specified for the counting of purpose IP address, computing subsystem pair and the purpose IP address phase in real time The corresponding source IP address of corresponding user's request is counted, and statistical magnitude highest one or more source IP address is added Enter to close rule.
Preferably, the analysis that computing subsystem asks to carry out to the user described in real time includes the matching analysis, wherein, institute The feature specified stated during real-time computing subsystem asks the user is matched with the feature list prestored, when depositing In matching, ask corresponding IP address to add the user with the feature that matching be present and close rule.
Preferably, the management configuration server is additionally configured to:According to traffic conditions, trigger and the application layer is loaded The degradation processing of equalization subsystem, the message queue subsystem and/or the computing subsystem in real time.
According to another aspect of the present invention, there is provided a kind of side by network attack defending system defending against network attacks Method.The network attack defending system includes application layer load balancing subsystem, message queue subsystem and calculates subsystem in real time System, wherein, hold on the application layer load balancing subsystem and host load balancing agency.Methods described includes:The application Layer load balancing subsystem receives user's request;The load balancing agency reads institute from the application layer load balancing subsystem User's request is stated, and the user is asked into the write-in message queue subsystem, to be carried out by the message queue subsystem Caching;The computing subsystem in real time obtains cached user's request from the message queue subsystem;It is described to calculate in real time Data during subsystem is asked the user are analyzed, to close rule according to analysis result generation;It is described to calculate in real time The rule of closing is write the message queue subsystem by subsystem, to be cached by the message queue subsystem;With And load balancing agency obtained from the message queue subsystem cached close rule and close rule by what is extracted Then it is applied to the application layer load balancing subsystem.
Preferably, the system also includes data storage subsystem, and methods described also includes:Data storage System is entered to the analysis result, the user's access history data closed rule and/or analyze to obtain from user's request Row storage.
Preferably, the system also includes management configuration server, and methods described also includes:The management configuration server To the application layer load balancing subsystem, load balancing agency, the message queue subsystem and the calculating in real time Subsystem provides configuration data.
Preferably, user request is from transport layer load-balanced server by the application layer load balancing subsystem Receive.
Preferably, the user is asked the write-in message queue subsystem to include by the load balancing agency:It is described Load balancing agency is compressed to user request, and the user through overcompression is asked into write-in message queue subsystem.
Preferably, the analysis that computing subsystem asks to carry out to the user described in real time includes analysis of accounts, wherein, institute Stating real-time computing subsystem asks corresponding source IP address to count the user obtained in the specified time cycle, works as pin When counting to a source IP address exceedes the threshold value specified, the computing subsystem in real time, which adds the source IP address, closes rule Then.
Preferably, the analysis that computing subsystem asks to carry out to the user described in real time includes analysis of accounts, wherein, institute Stating real-time computing subsystem asks corresponding purpose IP address to count the user obtained in the specified time cycle, when When exceeding the threshold value specified for the counting of purpose IP address, computing subsystem pair and the purpose IP address phase in real time The corresponding source IP address of corresponding user's request is counted, and statistical magnitude highest one or more source IP address is added Enter to close rule.
Preferably, the analysis that computing subsystem asks to carry out to the user described in real time includes the matching analysis, wherein, institute The feature specified stated during real-time computing subsystem asks the user is matched with the feature list prestored, when depositing In matching, ask corresponding IP address to add the user with the feature that matching be present and close rule.
Preferably, methods described also includes:The management configuration server is triggered to the application layer according to traffic conditions The degradation processing of load balancing subsystem, the message queue subsystem and/or the computing subsystem in real time.
By using the method for network attack defending system and defending against network attacks proposed by the invention so that realize More flexible, effective defence to the request of user's magnanimity.Thus, above-described the problems of the prior art are solved.
Brief description of the drawings
Fig. 1 shows the structured flowchart of network attack defending system according to an embodiment of the invention;
Fig. 2 shows the side according to an embodiment of the invention by network attack defending system defending against network attacks The flow chart of method.
Embodiment
It is pointed out that in the description of the detailed description below of the present invention, for convenience's sake, partial content It may be illustrated for specific procotol (for example, http protocol), it is understood that, embodiments of the invention It is not limited to these specific agreements.
The term " subsystem " occurred in the present invention can be implemented as single computer or server, can also be embodied as By multiple computers and/or server group into cluster, included whole collaborative computers realize identical in same cluster Specific function.Specifically, " subsystem " can be by multiple x86 server groups into cluster.In addition, the art occurred in the present invention A kind of explanation of language " load balancing " includes the front end forwarding carried out to balance backend services server access pressure.Should Understanding, explanation of the above to the term of the present invention, which indicate that, to be easy to carry out details to technical scheme, and simultaneously It is not used to limit the solution of the present invention.
The present invention is specifically described below with reference to accompanying drawing.
First, Fig. 1 shows the structured flowchart of network attack defending system 100 according to an embodiment of the invention. The network attack defending system 100 includes application layer load balancing subsystem 110, message queue subsystem 120 and counted in real time Operator Systems 130, load balancing agency 140 is hosted wherein holding on the application layer load balancing subsystem 110.
In one embodiment, the application layer load balancing subsystem 110 is configured as receiving user's request, holds thereon The load balancing of place is acted on behalf of 140 (in one embodiment, being embodied as load balancer process) and is configured as from the application Layer load balancing subsystem 110 reads user's request, and the user is asked into write-in message queue subsystem 120.
For the application layer load balancing subsystem 110 using x86 frameworks, it is more real by HAProxy or Nginx It is existing.Both of which needs load balancing agency 140 therefrom duplicate requests data, packet of duplication in the form of plug-in unit or module Include http header information, user browser Cookie and form data (except the binary file of upload).While in order to keep away Exempt from load balancing agency and excessively occupy the resource of application layer load balancing subsystem 110, it is necessary to which load balancing agent binding is arrived On specific core cpu, to prevent excessive CPU contexts switch from influenceing load balancer process self performance.
In a preferred embodiment, the application layer load balancing subsystem 110 is configured as equal from transport layer load The server that weighs receives user's request.The transport layer load-balanced server is used to carry out load balancing in transport layer.Together Sample, interception can be set thereon or close rule, as existing most of hardware firewalls, these intercept or closed Often simply setting or set in advance, but might as well be used to better ensure that rear end as the supplement of technical scheme Safety.
In a preferred embodiment, user is being asked write-in message queue subsystem by the load balancing agency 140 Before 120, user request is compressed first, the user through overcompression is then asked into write-in message queue subsystem 120.The purpose so done is, in practice, because load-balanced server requires higher to the throughput of network interface card, therefore is Avoid influenceing the network throughput of load balancing agency 140, it is necessary to incoming message queue again after user's request is first compressed System 120.
Specifically, compress mode includes:
A, IP address is converted into the storage of 4 byte integers;
B, using the binary mode serialized data such as ProtoBuf;
C, deep layer second compression is carried out (although the compression algorithm such as gzip can effectively reduce data using compression algorithms such as gzip Transmission quantity, but more CPU can be consumed, if using needs to depend on hardware configuration situation).
In one embodiment, the message queue subsystem 120 is connected to the application load balancing subsystem 110, It is configured as caching user's request by the write-in of load balancing agency 140.
In a preferred embodiment, the message queue subsystem 120 is that (one kind possesses big handling up property using Kafka Can the Message Queuing system that increases income) etc. existing Message Queuing system's realization of increasing income.
Primary and foremost purpose using message queue subsystem 120 is in order to promote the decoupling between each subsystem, due to each subsystem The process performance of system is simultaneously asynchronous, so if by the way of each subsystem direct interaction, process performance can be caused minimum Subsystem ties down the operation of whole system.Designed, can made each by means of the increase income high-throughput of Message Queuing system such as Kafka Subsystem is cooperated in a manner of non-obstruction.In addition, in order to ensure that mathematical logic is isolated in Kafka, it is necessary in message queue Following 3 class Topic is set:HTTP raw requests data Topic, analysis result Topic and close rule T opic.
In one embodiment, it is described in real time computing subsystem 130 be connected to the message queue subsystem 120, by with It is set to and cached user's request is obtained from the message queue subsystem 120, the data in asking the user is divided Analysis, and rule is closed according to analysis result generation, and the rule of closing is write into the message queue subsystem 120.It is excellent Selection of land, the rule of closing include the list for the IP address closed.
Preferably, the computing subsystem 130 in real time is to be based on a kind of Storm (the higher streaming computings of increasing income of real-time Framework) or Spark Streaming etc. increase income what real-time Computational frame was realized.Preferably, the base of computing subsystem 130 in real time User is asked to carry out analysis of accounts or the matching analysis in the Data analysis logic of customization, and given birth to according to the attack IP identified Into closing rule.
Specifically, real-time analyzing subsystem 130 taken out from message queue subsystem 120 specify time cycle (such as A period of time recently, such as 10 minutes) in user's request, be distributed to inner topology knot (if compressed) after decompression Calculating analysis is carried out in structure.In addition, in order to ensure the ageing of data analysis, real-time analyzing subsystem 130 needs to be absorbed in most Analysis in nearly a period of time, it is necessary to ensure to consume number since newest time point after real-time analyzing subsystem 130 is restarted According to.Analysis is generally divided into analysis of accounts and the matching analysis.Analysis of accounts can be used for the scale attack for finding DDOS etc, It can be used for finding the attack of the leak types such as SQL injection with analysis, attack IP address finally identified based on this two classes algorithm.
Preferably, the analysis that computing subsystem 130 asks to carry out to the user described in real time includes analysis of accounts, its In, the computing subsystem 130 in real time asks corresponding source IP address to carry out the user obtained in the specified time cycle Count, when the counting for a source IP address exceedes the threshold value specified, the computing subsystem 130 in real time is by the source IP Location adds and closes rule.
Preferably, the analysis that computing subsystem 130 asks to carry out to the user described in real time includes analysis of accounts, its In, the computing subsystem 130 in real time asks corresponding purpose IP address to be entered the user obtained in the specified time cycle Row counting, when the counting for a purpose IP address exceedes the threshold value specified, 130 pairs of the computing subsystem in real time is with being somebody's turn to do The corresponding source IP address of the corresponding user's request of purpose IP address is counted, and by statistical magnitude highest one or more Individual source IP address adds and closes rule.
Preferably, the analysis that computing subsystem 130 asks to carry out to the user described in real time includes the matching analysis, its In, the computing subsystem 130 in real time carries out the feature specified in user request and the feature list prestored Matching, when there is a match, ask corresponding IP address to add the user with the feature that matching be present and close rule.
In one embodiment, the analysis result of real-time analyzing subsystem 130 can include:For envelope caused by attack IP Prohibit regular data;User's access history data after analysis.Two parts are finally required for writing the corresponding data stream of message queue In, and carry out persistent storage (such as by data storage subsystem described below).
In one embodiment, the message queue subsystem 120 is configured as caching the rule of closing.Institute State load balancing agency 140 be additionally configured to obtain from the message queue subsystem 120 cached close rule and by institute The rule of closing of extraction is applied to the application layer load balancing subsystem 110.
Specifically, load balancing agency 140 receives from message queue subsystem 120 closes rule, and is applied to application layer On load balancing subsystem 110, application layer load balancing subsystem 110 is set to stop forwarding the IP closed packet, so as to Realize the protection to backend services server.
In one embodiment, the system also includes data storage subsystem.The data storage subsystem is connected to It is described in real time computing subsystem 130, and be configured as to the analysis result, it is described close rule and/or from user ask in Obtained user's access history data is analyzed to be stored.
Preferably, the data storage subsystem can use the PostgreSQL databases such as MySQL as storage engines, and can be with Used according to different analysis result datas and divide storehouse form data storage.Preferably, can be analyzed according to caused by the unit interval Data volume hourly or daily carries out rolling table.Specifically, the data storage subsystem receives real-time analyzing subsystem 130 and produced Analyze data, and according to data time stamp with divide sheet form write such as MySQL database.
Preferably, the system also includes management configuration server.The management configuration server is connected to the application In layer load balancing subsystem 110, the message queue subsystem 120, the computing subsystem 130 in real time, be configured as to The application layer load balancing subsystem 110, load balancing agency 140, the message queue subsystem 120 and the reality When computing subsystem 130 provide configuration data.For example, the management configuration server is by real-time computing subsystem 130 provide configuration datas to regularly update the various analysis threshold values used in the computing subsystem 130 in real time or close threshold value. For another example the management configuration server also provides management interface to keeper, each subsystem function is triggered by hand for its operation. Such as triggering degrade switch, issue specific close rule etc. by hand.
In one embodiment, the management configuration server is additionally configured to trigger system degradation processing.Institute of the present invention The network attack defending system being related to belongs to non-traffic system, therefore is designed to bypath system.In order in heavy traffic condition Under (such as the big rush of electric business) ensure that the performance of operation system, and the normal operation of the system, system of the invention need to support Multistage degradation processing, the processing of all degradations is by management configuration server triggers.
Specifically, degradation processing includes:
A) degradation of user's request data collection:Load balancing agency 140 stops collection form data or Cookie data, Only retain the essential informations such as source IP, destination URL;The degradation schemes belong to source degradation, can slow down the place of all subsystems Manage pressure.
B) calculate and degrade in real time:Real-time computing subsystem 130 reduces the dimension of data analysis;The reduction scheme is used to slow down The processing pressure of real-time computing subsystem.
C) data storage degrades:Real-time computing subsystem 130 stops writing analysis result to message queue subsystem 120, Only retain the write-in for closing rule;The degradation schemes are used to slow down database write-in pressure, while also slow down message queue subsystem The pressure of system 120.
Next, referring to Fig. 2.Fig. 2, which is shown, according to an embodiment of the invention passes through network attack defending system The flow chart of the method 200 of defending against network attacks.The network attack defending system includes application layer load balancing subsystem, disappeared Queue subsystem and real-time computing subsystem are ceased, wherein, hold on the application layer load balancing subsystem and host load balancing Agency.Methods described 200 starts from providing step S210, and the application layer load balancing subsystem receives user's request.Connect down Come, in step S220, the load balancing agency reads user's request from the application layer load balancing subsystem, and The user is asked to write the message queue subsystem, to be cached by the message queue subsystem.Next, In step S230, the computing subsystem in real time obtains cached user's request from the message queue subsystem.Then, exist In step S240, the computing subsystem in real time is analyzed the data in user request, to be given birth to according to analysis result Into closing rule.Then, in step s 250, the rule of closing is write the message queue by the computing subsystem in real time Subsystem, to be cached by the message queue subsystem.Finally, in step S260, the load balancing is acted on behalf of from institute State message queue subsystem obtain cached close rule and by extracted close rule be applied to the application layer load Equalization subsystem.
Preferably, the system also includes data storage subsystem, and methods described also includes:Data storage System is entered to the analysis result, the user's access history data closed rule and/or analyze to obtain from user's request Row storage.
Preferably, the system also includes management configuration server, and methods described also includes:The management configuration server To the application layer load balancing subsystem, load balancing agency, the message queue subsystem and the calculating in real time Subsystem provides configuration data.
Preferably, user request is from transport layer load-balanced server by the application layer load balancing subsystem Receive.
Preferably, the user is asked the write-in message queue subsystem to include by the load balancing agency:It is described Load balancing agency is compressed to user request, and the user through overcompression is asked into write-in message queue subsystem.
Preferably, the analysis that computing subsystem asks to carry out to the user described in real time includes analysis of accounts, wherein, institute Stating real-time computing subsystem asks corresponding IP address to count the user that is obtained in the specified time cycle, when for When the counting of one IP address exceedes the threshold value specified, the computing subsystem in real time, which adds the IP address, closes rule.
Preferably, the analysis that computing subsystem asks to carry out to the user described in real time includes the matching analysis, wherein, institute The feature specified stated during real-time computing subsystem asks the user is matched with the feature list prestored, when depositing In matching, ask corresponding IP address to add the user with the feature that matching be present and close rule.
Preferably, methods described also includes:The management configuration server is triggered to the application layer according to traffic conditions The degradation processing of load balancing subsystem, the message queue subsystem and/or the computing subsystem in real time.
Preferably, methods described 200 is performed by the system 100 shown in Fig. 1.Enter above for the system 100 in Fig. 1 Capable various specific descriptions and explanation, are equally applicable to each step of method 200, will not be repeated here.
Although combined the preferred embodiments of the present invention show the present invention above, those skilled in the art will It will be appreciated that without departing from the spirit and scope of the present invention, various modifications can be carried out to the present invention, replaces and changes Become.Therefore, the present invention should not be limited by above-described embodiment, and should be limited by appended claims and its equivalent.

Claims (18)

1. a kind of network attack defending system, including:
Application layer load balancing subsystem, it is configured as receiving user's request, holds place on the application layer load balancing subsystem Load balancing is acted on behalf of, and the load balancing agency is configured as
User's request is read from the application layer load balancing subsystem, and
The user is asked into write-in message queue subsystem;
The message queue subsystem, the application load balancing subsystem is connected to, is configured as to by the load balancing User's request of agency's write-in is cached;And
Real-time computing subsystem, the message queue subsystem is connected to, is configured as
Cached user's request is obtained from the message queue subsystem,
Data in asking the user are analyzed, and close rule according to analysis result generation, and
The rule of closing is write into the message queue subsystem,
Wherein, the message queue subsystem is additionally configured to cache the rule of closing, and the load balancing Agency be additionally configured to from the message queue subsystem obtain cached close rule and by extracted close rule should For the application layer load balancing subsystem.
2. system according to claim 1, in addition to:
Data storage subsystem, the real-time computing subsystem is connected to, is configured as to the analysis result, described closes rule The user's access history data for analyzing to obtain in asking then and/or from user is stored.
3. system according to claim 1, in addition to:
Management configuration server, be connected to the application layer load balancing subsystem, the message queue subsystem, it is described in real time Computing subsystem, it is configured as to the application layer load balancing subsystem, load balancing agency, message queue System and the computing subsystem in real time provide configuration data.
4. according to the system described in any one of claim 1-3, wherein, the application layer load balancing subsystem is configured To receive user's request from transport layer load-balanced server.
5. according to the system described in any one of claim 1-3, wherein, the load balancing agency is configured as to described User's request is compressed, and the user through overcompression is asked into write-in message queue subsystem.
6. according to the system described in any one of claim 1-3, wherein, the computing subsystem in real time please to the user Asking the analysis of progress includes analysis of accounts, wherein, the computing subsystem in real time is to the user that is obtained in the specified time cycle The corresponding source IP address of request is counted, when the counting for a source IP address exceedes the threshold value specified, the reality When computing subsystem by the source IP address add close rule.
7. according to the system described in any one of claim 1-3, wherein, the computing subsystem in real time please to the user Asking the analysis of progress includes analysis of accounts, wherein, the computing subsystem in real time is to the user that is obtained in the specified time cycle The corresponding purpose IP address of request is counted, when the counting for a purpose IP address exceedes the threshold value specified, institute The corresponding source IP address of the real-time computing subsystem pair user request corresponding with the purpose IP address is stated to count, and will Statistical magnitude highest one or more source IP address adds and closes rule.
8. according to the system described in any one of claim 1-3, wherein, the computing subsystem in real time please to the user Asking the analysis of progress includes the matching analysis, wherein, it is described in real time computing subsystem by the user ask in the feature specified Matched with the feature list prestored, when there is a match, ask institute right the user with the feature that matching be present The IP address answered adds and closes rule.
9. system according to claim 3, wherein, the management configuration server is additionally configured to:According to traffic conditions, Trigger the drop to the application layer load balancing subsystem, the message queue subsystem and/or the computing subsystem in real time Level processing.
10. a kind of method by network attack defending system defending against network attacks, the network attack defending system includes should With layer load balancing subsystem, message queue subsystem and real-time computing subsystem, wherein, the application layer load balancing subsystem Hold on system and host load balancing agency, methods described includes:
The application layer load balancing subsystem receives user's request;
The load balancing agency reads user's request from the application layer load balancing subsystem, and please by the user The write-in message queue subsystem is sought, to be cached by the message queue subsystem;
The computing subsystem in real time obtains cached user's request from the message queue subsystem;
The computing subsystem in real time is analyzed the data in user request, to close rule according to analysis result generation Then;
The rule of closing is write the message queue subsystem by the computing subsystem in real time, with by message queue System is cached;And
Load balancing agency obtained from the message queue subsystem cached close rule and closed what is extracted Rule is applied to the application layer load balancing subsystem.
11. according to the method for claim 10, wherein, the system also includes data storage subsystem, and methods described is also Including:
The data storage subsystem to the analysis result, it is described close rule and/or from user ask in analysis obtain User's access history data is stored.
12. according to the method for claim 10, wherein, the system also includes management configuration server, and methods described is also Including:
The management configuration server to the application layer load balancing subsystem, the load balancing agency, the message team Row subsystem and the computing subsystem in real time provide configuration data.
13. according to the method described in any one of claim 10-12, wherein, user's request is by the application layer Load balancing subsystem receives from transport layer load-balanced server.
14. according to the method described in any one of claim 10-12, wherein, the load balancing is acted on behalf of the user Request, which writes the message queue subsystem, to be included:
The load balancing agency is compressed to user request, and the user through overcompression is asked into write-in message queue Subsystem.
15. according to the method described in any one of claim 10-12, wherein, the computing subsystem in real time is to the use The analysis that family request is carried out includes analysis of accounts, wherein, the real-time computing subsystem in the specified time cycle to obtaining The corresponding source IP address of user's request is counted, when the counting for a source IP address exceedes the threshold value specified, institute State real-time computing subsystem and rule is closed into source IP address addition.
16. according to the method described in any one of claim 10-12, wherein, the computing subsystem in real time is to the use The analysis that family request is carried out includes analysis of accounts, wherein, the real-time computing subsystem in the specified time cycle to obtaining The corresponding purpose IP address of user's request is counted, when the counting for a purpose IP address exceedes the threshold value specified When, the corresponding source IP address of the computing subsystem pair in real time user request corresponding with the purpose IP address is united Meter, and statistical magnitude highest one or more source IP address is added and closes rule.
17. according to the method described in any one of claim 10-12, wherein, the computing subsystem in real time is to the use The analysis that family request is carried out includes the matching analysis, wherein, the computing subsystem in real time is by specifying in user request Feature is matched with the feature list prestored, and when there is a match, the user with the feature that matching be present is asked Corresponding IP address adds and closes rule.
18. the method according to claim 11, in addition to:The management configuration server is triggered to institute according to traffic conditions State the degradation processing of application layer load balancing subsystem, the message queue subsystem and/or the computing subsystem in real time.
CN201610371336.8A 2016-05-30 2016-05-30 The method of network attack defending system and defending against network attacks Pending CN107454120A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610371336.8A CN107454120A (en) 2016-05-30 2016-05-30 The method of network attack defending system and defending against network attacks

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610371336.8A CN107454120A (en) 2016-05-30 2016-05-30 The method of network attack defending system and defending against network attacks

Publications (1)

Publication Number Publication Date
CN107454120A true CN107454120A (en) 2017-12-08

Family

ID=60485729

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610371336.8A Pending CN107454120A (en) 2016-05-30 2016-05-30 The method of network attack defending system and defending against network attacks

Country Status (1)

Country Link
CN (1) CN107454120A (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566363A (en) * 2018-01-09 2018-09-21 网宿科技股份有限公司 Method and system is determined based on the Brute Force of streaming computing
CN109194692A (en) * 2018-10-30 2019-01-11 扬州凤凰网络安全设备制造有限责任公司 Prevent the method that network is attacked
CN109547416A (en) * 2018-10-30 2019-03-29 扬州凤凰网络安全设备制造有限责任公司 Physical level security server
CN111200637A (en) * 2019-12-20 2020-05-26 新浪网技术(中国)有限公司 Cache processing method and device
CN111797352A (en) * 2020-06-30 2020-10-20 广州市百果园信息技术有限公司 Method and device for sealing account and sealing system
CN112217808A (en) * 2020-09-27 2021-01-12 南京南瑞信息通信科技有限公司 Message queue based linkage seal and unblock device and method for cascade architecture firewall
CN112929430A (en) * 2021-01-29 2021-06-08 光控特斯联(上海)信息科技有限公司 Data transmission method and system based on communication of Internet of things
CN114615073A (en) * 2022-03-22 2022-06-10 广州方硅信息技术有限公司 Access flow control method, device, equipment and medium
CN114640534A (en) * 2022-03-29 2022-06-17 广州方硅信息技术有限公司 Access interception control method, device, equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431725A (en) * 2007-11-08 2009-05-13 中兴通讯股份有限公司 Apparatus and method for implementing right treatment of concurrent messages
CN102291394A (en) * 2011-07-22 2011-12-21 网宿科技股份有限公司 Security defense system based on network accelerating equipment
US20140373136A1 (en) * 2013-06-14 2014-12-18 Or Igelka Proactive security system for distributed computer networks
CN104333529A (en) * 2013-07-22 2015-02-04 中国电信股份有限公司 Detection method and system of HTTP DOS (Denial of Service) attack under cloud computing environment
CN104580216A (en) * 2015-01-09 2015-04-29 北京京东尚科信息技术有限公司 System and method for limiting access requests
CN104580228A (en) * 2015-01-16 2015-04-29 北京京东尚科信息技术有限公司 System and method for generating blacklist for access requests from network

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101431725A (en) * 2007-11-08 2009-05-13 中兴通讯股份有限公司 Apparatus and method for implementing right treatment of concurrent messages
CN102291394A (en) * 2011-07-22 2011-12-21 网宿科技股份有限公司 Security defense system based on network accelerating equipment
US20140373136A1 (en) * 2013-06-14 2014-12-18 Or Igelka Proactive security system for distributed computer networks
CN104333529A (en) * 2013-07-22 2015-02-04 中国电信股份有限公司 Detection method and system of HTTP DOS (Denial of Service) attack under cloud computing environment
CN104580216A (en) * 2015-01-09 2015-04-29 北京京东尚科信息技术有限公司 System and method for limiting access requests
CN104580228A (en) * 2015-01-16 2015-04-29 北京京东尚科信息技术有限公司 System and method for generating blacklist for access requests from network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
中国支付清算协会: "《支付大讲堂 中国支付清算协会培训课程精选系列》", 31 December 2015 *

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108566363A (en) * 2018-01-09 2018-09-21 网宿科技股份有限公司 Method and system is determined based on the Brute Force of streaming computing
CN109194692A (en) * 2018-10-30 2019-01-11 扬州凤凰网络安全设备制造有限责任公司 Prevent the method that network is attacked
CN109547416A (en) * 2018-10-30 2019-03-29 扬州凤凰网络安全设备制造有限责任公司 Physical level security server
WO2020088144A1 (en) * 2018-10-30 2020-05-07 扬州凤凰网络安全设备制造有限责任公司 Physical-level security server
CN111200637A (en) * 2019-12-20 2020-05-26 新浪网技术(中国)有限公司 Cache processing method and device
CN111200637B (en) * 2019-12-20 2022-07-08 新浪网技术(中国)有限公司 Cache processing method and device
CN111797352A (en) * 2020-06-30 2020-10-20 广州市百果园信息技术有限公司 Method and device for sealing account and sealing system
CN112217808A (en) * 2020-09-27 2021-01-12 南京南瑞信息通信科技有限公司 Message queue based linkage seal and unblock device and method for cascade architecture firewall
CN112217808B (en) * 2020-09-27 2023-10-24 南京南瑞信息通信科技有限公司 Cascade architecture firewall linkage sealing and disabling device and method based on message queue
CN112929430A (en) * 2021-01-29 2021-06-08 光控特斯联(上海)信息科技有限公司 Data transmission method and system based on communication of Internet of things
CN114615073A (en) * 2022-03-22 2022-06-10 广州方硅信息技术有限公司 Access flow control method, device, equipment and medium
CN114640534A (en) * 2022-03-29 2022-06-17 广州方硅信息技术有限公司 Access interception control method, device, equipment and medium

Similar Documents

Publication Publication Date Title
CN107454120A (en) The method of network attack defending system and defending against network attacks
US10652265B2 (en) Method and apparatus for network forensics compression and storage
US9473380B1 (en) Automatic parsing of binary-based application protocols using network traffic
US9426046B2 (en) Web page download time analysis
US7864764B1 (en) Accelerated packet processing in a network acceleration device
WO2022083353A1 (en) Abnormal network data detection method and apparatus, computer device, and storage medium
WO2018121331A1 (en) Attack request determination method, apparatus and server
US10097464B1 (en) Sampling based on large flow detection for network visibility monitoring
CN104714965B (en) Static resource De-weight method, static resource management method and device
US9979624B1 (en) Large flow detection for network visibility monitoring
CN110198248B (en) Method and device for detecting IP address
US20070150584A1 (en) Apparatus, system, and method for determining server utilization in hosted computing infrastructure
US10536360B1 (en) Counters for large flow detection
WO2014026220A1 (en) Analysis of time series data
CN104252458B (en) Data analysing method and device
Lockwood et al. Implementing ultra low latency data center services with programmable logic
Sakakibara et al. An fpga nic based hardware caching for blockchain
CN111740868A (en) Alarm data processing method and device and storage medium
CN105407096A (en) Message data detection method based on stream management
US11140178B1 (en) Methods and system for client side analysis of responses for server purposes
Sakakibara et al. A hardware-based caching system on FPGA NIC for Blockchain
US11665187B1 (en) Time bounded lossy counters for network data
Shin et al. A grand spread estimator using a graphics processing unit
CN107277062B (en) Parallel processing method and device for data packets
CN110198294B (en) Security attack detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20171208

RJ01 Rejection of invention patent application after publication