CN110290156B - Big data-based defense and network security device for distributed attack - Google Patents
Big data-based defense and network security device for distributed attack Download PDFInfo
- Publication number
- CN110290156B CN110290156B CN201910683874.4A CN201910683874A CN110290156B CN 110290156 B CN110290156 B CN 110290156B CN 201910683874 A CN201910683874 A CN 201910683874A CN 110290156 B CN110290156 B CN 110290156B
- Authority
- CN
- China
- Prior art keywords
- network
- cloud processor
- distributed
- cloud
- ethernet
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000007123 defense Effects 0.000 title claims abstract description 19
- 238000012545 processing Methods 0.000 claims abstract description 34
- 238000000034 method Methods 0.000 claims abstract description 31
- 238000004891 communication Methods 0.000 claims abstract description 24
- 238000001514 detection method Methods 0.000 claims description 6
- 230000005540 biological transmission Effects 0.000 claims description 4
- 239000004606 Fillers/Extenders Substances 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001066 destructive effect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012544 monitoring process Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
- H04L63/1416—Event detection, e.g. attack signature detection
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/146—Tracing the source of attacks
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims (8)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910683874.4A CN110290156B (en) | 2019-07-26 | 2019-07-26 | Big data-based defense and network security device for distributed attack |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910683874.4A CN110290156B (en) | 2019-07-26 | 2019-07-26 | Big data-based defense and network security device for distributed attack |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110290156A CN110290156A (en) | 2019-09-27 |
CN110290156B true CN110290156B (en) | 2021-09-24 |
Family
ID=68022674
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910683874.4A Active CN110290156B (en) | 2019-07-26 | 2019-07-26 | Big data-based defense and network security device for distributed attack |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110290156B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111510458A (en) * | 2020-04-24 | 2020-08-07 | 太仓红码软件技术有限公司 | Working method of network attack defense system based on Internet of things |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102137075A (en) * | 2010-01-27 | 2011-07-27 | 中华电信股份有限公司 | System and method for preventing DDoS (Distributed Denial of Service) attack |
CN102904770A (en) * | 2012-08-02 | 2013-01-30 | 北京邮电大学 | High-bandwidth voice over Internet protocol (VoIP) detection system |
CN103166926A (en) * | 2011-12-14 | 2013-06-19 | 中国科学院沈阳计算技术研究所有限公司 | Session initiation protocol (SIP) distributed denial of service (DDoS) attack distributed defensive system and load balancing method thereof |
CN106357689A (en) * | 2016-11-07 | 2017-01-25 | 北京奇虎科技有限公司 | Method and system for processing threat data |
CN106657001A (en) * | 2016-11-10 | 2017-05-10 | 广州赛讯信息技术有限公司 | Botnet detection method based on Netflow and DNS blog |
CN109450876A (en) * | 2018-10-23 | 2019-03-08 | 中国科学院信息工程研究所 | A kind of DDos recognition methods and system based on various dimensions state-transition matrix feature |
-
2019
- 2019-07-26 CN CN201910683874.4A patent/CN110290156B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102137075A (en) * | 2010-01-27 | 2011-07-27 | 中华电信股份有限公司 | System and method for preventing DDoS (Distributed Denial of Service) attack |
CN103166926A (en) * | 2011-12-14 | 2013-06-19 | 中国科学院沈阳计算技术研究所有限公司 | Session initiation protocol (SIP) distributed denial of service (DDoS) attack distributed defensive system and load balancing method thereof |
CN102904770A (en) * | 2012-08-02 | 2013-01-30 | 北京邮电大学 | High-bandwidth voice over Internet protocol (VoIP) detection system |
CN106357689A (en) * | 2016-11-07 | 2017-01-25 | 北京奇虎科技有限公司 | Method and system for processing threat data |
CN106657001A (en) * | 2016-11-10 | 2017-05-10 | 广州赛讯信息技术有限公司 | Botnet detection method based on Netflow and DNS blog |
CN109450876A (en) * | 2018-10-23 | 2019-03-08 | 中国科学院信息工程研究所 | A kind of DDos recognition methods and system based on various dimensions state-transition matrix feature |
Also Published As
Publication number | Publication date |
---|---|
CN110290156A (en) | 2019-09-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109039436B (en) | Method and system for satellite security access authentication | |
EP3906652B1 (en) | Protecting a telecommunications network using network components as blockchain nodes | |
CN105024969B (en) | A kind of method and device for realizing the identification of malice domain name | |
CN110324313B (en) | Honeypot system-based malicious user identification method and related equipment | |
CN103067385B (en) | The method of defence Hijack Attack and fire compartment wall | |
EP3596908B1 (en) | System to filter impossible user travel indicators | |
WO2016028067A2 (en) | System and method for detecting malicious code using visualization | |
US10536480B2 (en) | Method and device for simulating and detecting DDoS attacks in software defined networking | |
CN110266650B (en) | Identification method of Conpot industrial control honeypot | |
WO2019236390A1 (en) | Anomalous access point detection | |
EP3535946B1 (en) | Detecting impossible travel in the on-premise settings | |
CN108270722A (en) | A kind of attack detection method and device | |
CN107733867A (en) | It is a kind of to find Botnet and the method and system of protection | |
CN110290156B (en) | Big data-based defense and network security device for distributed attack | |
Durga Devi et al. | Malicious node and malicious observer node detection system in MANETs | |
WO2013178284A1 (en) | Protecting location information | |
Zhang et al. | On effective data aggregation techniques in host–based intrusion detection in manet | |
KR101703491B1 (en) | Method for providing security service in cloud system and the cloud system thereof | |
CN109088896B (en) | Working method of Internet DDoS defense system based on Internet of things | |
CN114710388A (en) | Campus network security architecture and network monitoring system | |
CN109088895B (en) | Working method for positioning distributed network security attack defense system | |
CN114285640A (en) | Detection system and detection method for solarization attack of Ethernet house nodes in block chain | |
Yasir et al. | Cyber DoS attack-based security simulator for VANET. | |
RU2685989C1 (en) | Method of reducing damage caused by network attacks to a virtual private network | |
CN114285589A (en) | Method, terminal and system for actively guiding attack flow and disguising response |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB03 | Change of inventor or designer information | ||
CB03 | Change of inventor or designer information |
Inventor after: Tang Zhilin Inventor after: Xu Jianhong Inventor before: Xu Jianhong |
|
TA01 | Transfer of patent application right |
Effective date of registration: 20210906 Address after: 250000 814, block D, Sanqing century wealth center, No. 359, Shunhua Road, Jinan area, China (Shandong) pilot Free Trade Zone, Jinan City, Shandong Province Applicant after: Jinan fanuo Trading Co.,Ltd. Address before: 215400 West Building 501, Pioneer Park, No. 6 Beijing West Road, Taicang Economic Development Zone, Suzhou City, Jiangsu Province Applicant before: TAICANG HONGMA SOFTWARE TECHNOLOGY Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP01 | Change in the name or title of a patent holder | ||
CP01 | Change in the name or title of a patent holder |
Address after: 250000 814, block D, Sanqing century wealth center, No. 359, Shunhua Road, Jinan area, China (Shandong) pilot Free Trade Zone, Jinan City, Shandong Province Patentee after: Fano Information Industry Co.,Ltd. Address before: 250000 814, block D, Sanqing century wealth center, No. 359, Shunhua Road, Jinan area, China (Shandong) pilot Free Trade Zone, Jinan City, Shandong Province Patentee before: Jinan fanuo Trading Co.,Ltd. |
|
PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: A defense and network security device based on big data for distributed attacks Effective date of registration: 20230817 Granted publication date: 20210924 Pledgee: Qilu Bank Co.,Ltd. Jinan Second Ring West Road Branch Pledgor: Fano Information Industry Co.,Ltd. Registration number: Y2023980052626 |