首页> 外国专利> DNS FLOODING ATTACK DETECTING METHOD ACCORDING TO A PROPERTY OF ATTACK TRAFFIC CAPABLE OF PROVIDING A SMOOTH NETWORK SERVICE TO A NORMAL USER

DNS FLOODING ATTACK DETECTING METHOD ACCORDING TO A PROPERTY OF ATTACK TRAFFIC CAPABLE OF PROVIDING A SMOOTH NETWORK SERVICE TO A NORMAL USER

机译:根据向普通用户提供平滑网络服务的攻击流量的属性的DNS洪流攻击检测方法

摘要

PURPOSE: A DNS flooding attack detecting method according to a property of attack traffic is provided to block only attack traffic caused by a malicious user while protecting the traffic of a normal user.;CONSTITUTION: The generation of a DNS packet within a critical time is determined(432). The DNS packet includes a message of the same type as a message included in a transmitted packet. The DNS packet includes a specific filed value and a specific address same as the transmitted packet. If the DNS packet within the critical time is generated more than a predetermined number, the transmitted packet is determined as packets related to an attack(433).;COPYRIGHT KIPO 2013;[Reference numerals] (410) Detecting a DNS packet; (411) DNS inquiry?; (421,432) Same SIP/DIP/DNS ID exists?; (422) Generating an entry; (431) DNS response?; (433) Cutting off the packet; (434) Removing the entry; (AA,DD,EE,GG) No; (BB,CC,FF,HH) Yes
机译:目的:根据攻击流量的性质,提供一种DNS泛洪攻击检测方法,在保护普通用户流量的同时,仅阻止恶意用户的攻击流量。确定(432)。 DNS分组包括与发送的分组中包括的消息相同类型的消息。 DNS分组包括与发送的分组相同的特定字段值和特定地址。如果在关键时间内生成的DNS包多于预定数量,则将发送的包确定为与攻击有关的包(433)。COPYRIGHTKIPO 2013; [410]检测DNS包; (411)DNS查询? (421,432)是否存在相同的SIP / DIP / DNS ID? (422)生成条目; (431)DNS响应? (433)切断包装袋; (434)删除条目; (AA,DD,EE,GG)否; (BB,CC,FF,HH)是

著录项

  • 公开/公告号KR20130014226A

    专利类型

  • 公开/公告日2013-02-07

    原文格式PDF

  • 申请/专利号KR20110076207

  • 发明设计人 KIM BYOUNG KOO;

    申请日2011-07-29

  • 分类号H04L12/22;H04L12/26;H04L12/56;G06F21/20;

  • 国家 KR

  • 入库时间 2022-08-21 16:27:46

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号