CN112995186A - Improvement method and system suitable for MQTT service safety guarantee - Google Patents
Improvement method and system suitable for MQTT service safety guarantee Download PDFInfo
- Publication number
- CN112995186A CN112995186A CN202110253977.4A CN202110253977A CN112995186A CN 112995186 A CN112995186 A CN 112995186A CN 202110253977 A CN202110253977 A CN 202110253977A CN 112995186 A CN112995186 A CN 112995186A
- Authority
- CN
- China
- Prior art keywords
- request
- server
- malicious
- client
- processing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 39
- 230000006872 improvement Effects 0.000 title claims abstract description 22
- 238000012545 processing Methods 0.000 claims abstract description 56
- 230000004044 response Effects 0.000 claims abstract description 18
- 238000004364 calculation method Methods 0.000 claims abstract description 14
- 230000006978 adaptation Effects 0.000 claims abstract description 12
- 238000005516 engineering process Methods 0.000 claims abstract description 5
- 230000008569 process Effects 0.000 claims description 8
- 230000010365 information processing Effects 0.000 abstract description 3
- 238000004891 communication Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 5
- 238000010586 diagram Methods 0.000 description 4
- 230000001360 synchronised effect Effects 0.000 description 4
- 238000011160 research Methods 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001934 delay Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000007781 pre-processing Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
Abstract
The application discloses an improvement method and system suitable for MQTT service safety guarantee, and the improvement method comprises the following steps: a request step: the client sends a request to the server; a pretreatment step: the server side records the request information of the request and then asynchronously synchronizes the request to the security policy technology computation server; generating protection strategy configuration: the security policy calculation server dynamically calculates and generates protection policy configuration according to the request and the request information; security policy adaptation processing step: and the server side stores the protection strategy configuration and performs security strategy adaptation processing when the client side sends a request next time. Aiming at protection of malicious attacks, on the premise of updating of protection strategy channels commonly used in the industry, response actions and information processing with lower performance loss and random rules are designed, and rules of security protection of a malicious client to a server are disturbed.
Description
Technical Field
The invention belongs to the field of improvement of MQTT service security guarantee, and particularly relates to a method and a system for improving MQTT service security guarantee.
Background
The popularity of a communication scene designed based on an MQTT protocol is very high at present, but malicious attacks, particularly large concurrent attacks, suffered by a server are conventional topics in the field of network security, and the scheme aims to solve the malicious attacks, particularly the large concurrent attacks.
For example, according to the security protection method and system applicable to mqtt, a back-end server is combined with rules such as parameters for recording malicious requests of attackers and request frequency to form rules, the rules are configured and synchronized to nodes of a server, and the nodes operated by the server in normal operation are used for protection processing of the malicious requests.
Disadvantages of the first prior art
1: the server master node which operates normally is relied on to intercept the client which processes the malicious request, thereby seriously consuming the performance of the server which operates normally and reducing the service processing capacity of the server.
2: the method is not flexible enough due to the fact that the front-end server cluster is seriously depended on, the load of each server node of the front-end server cluster is unbalanced, the avalanche effect (the servers cannot bear excessive load pressure one by one and then crash, the load pressure is transferred to the next server) can be caused, and the operation and maintenance pressure on the servers is very high.
Disclosure of Invention
The embodiment of the application provides an improvement method and a system suitable for MQTT service safety guarantee, wherein the improvement method comprises the following steps:
a request step: the client sends a request to the server;
a pretreatment step: the server side records the request information of the request and then asynchronously synchronizes the request to the security policy technology computation server;
generating protection strategy configuration: the security policy calculation server dynamically calculates and generates protection policy configuration according to the request and the request information;
security policy adaptation processing step: and the server side stores the protection strategy configuration and performs security strategy adaptation processing when the client side sends a request next time.
The above improvement method further includes a malicious request processing step: and judging each request and outputting a judgment result, and processing the request by the server according to the judgment result.
The above improvement method, wherein the request information includes: request parameters, request IP, and request time.
The above improvement method, wherein the malicious request processing step includes:
a judging step: judging whether the request is a malicious request or not, and obtaining a judgment result;
and a judgment result processing step: if the judgment result is a non-malicious request, the server side sends the request to a service processing server for processing; if the judgment result is a malicious request, the server actively closes the request and transfers the request to a malicious request acceptance server for hosting.
In the above improvement method, the malicious request acceptance server attempts to reversely encroach the client sending the malicious request by using the malicious parameters of the malicious request client accumulated by random delay response, random disconnection and random response history.
The invention also comprises an improvement system suitable for MQTT service safety guarantee, wherein the improvement system comprises:
the server receives a request sent by the client and records request information of the request;
and the server side asynchronously synchronizes the request to the security policy technical calculation server, the security policy calculation server dynamically calculates and generates protection policy configuration according to the request and the request information, and the server side stores the protection policy configuration and performs security policy adaptation processing when the client side sends the request next time.
The above improvement system, wherein, still include:
and the malicious request processing unit is used for judging each request and outputting a judgment result, and the server side processes the requests according to the judgment result.
The above improvement system, wherein the request information includes: request parameters, request IP, and request time.
The above improvement system, wherein the malicious request processing unit includes:
the judging module is used for judging whether the request is a malicious request or not and obtaining a judging result;
if the judgment result is a non-malicious request, the server sends the request to the service processing server for processing;
and if the judgment result is that the request is a malicious request, the server actively closes the request and transfers the request to a malicious request acceptance server for hosting.
In the above improvement system, the malicious request acceptance server attempts to reversely encroach the client sending the malicious request by using the malicious parameters of the malicious request client accumulated by random delay response, random disconnection and random response history.
The invention has the beneficial effects that:
1. aiming at protection of malicious attacks, response actions and information processing with lower performance loss and random rules are designed on the premise of updating protection strategy channels based on industry general use, and rules of malicious clients for protecting server safety are disturbed
2. The safety protection capability of the server is improved, the influence on normal service processing is reduced, and even the attack cost of a malicious attack client and the research period of server attack are increased.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application.
In the drawings:
FIG. 1 is a flow chart of an improved method for MQTT service security assurance;
FIG. 2 is a flow chart illustrating the substeps of step S5 in FIG. 1;
FIG. 3 is an application flow diagram of an improved method for MQTT service security assurance;
FIG. 4 is a schematic structural diagram of an improved system suitable for MQTT service security guarantee;
fig. 5 is a block diagram of a computer device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be described and illustrated below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments provided in the present application without any inventive step are within the scope of protection of the present application.
It is obvious that the drawings in the following description are only examples or embodiments of the present application, and that it is also possible for a person skilled in the art to apply the present application to other similar contexts on the basis of these drawings without inventive effort. Moreover, it should be appreciated that in the development of any such actual implementation, as in any engineering or design project, numerous implementation-specific decisions must be made to achieve the developers' specific goals, such as compliance with system-related and business-related constraints, which may vary from one implementation to another.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of ordinary skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments without conflict.
Unless defined otherwise, technical or scientific terms referred to herein shall have the ordinary meaning as understood by those of ordinary skill in the art to which this application belongs. Reference to "a," "an," "the," and similar words throughout this application are not to be construed as limiting in number, and may refer to the singular or the plural. The present application is directed to the use of the terms "including," "comprising," "having," and any variations thereof, which are intended to cover non-exclusive inclusions; for example, a process, method, system, article, or apparatus that comprises a list of steps or modules (elements) is not limited to the listed steps or elements, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus. Reference to "connected," "coupled," and the like in this application is not intended to be limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. The term "plurality" as referred to herein means two or more. "and/or" describes an association relationship of associated objects, meaning that three relationships may exist, for example, "A and/or B" may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. Reference herein to the terms "first," "second," "third," and the like, are merely to distinguish similar objects and do not denote a particular ordering for the objects.
The present invention is described in detail with reference to the embodiments shown in the drawings, but it should be understood that these embodiments are not intended to limit the present invention, and those skilled in the art should understand that functional, methodological, or structural equivalents or substitutions made by these embodiments are within the scope of the present invention.
Before describing in detail the various embodiments of the present invention, the core inventive concepts of the present invention are summarized and described in detail by the following several embodiments.
Referring to fig. 1, fig. 1 is a flowchart of an improved method for MQTT service security assurance. As shown in fig. 1, the method for improving MQTT service security assurance of the present invention includes:
request step S1: the client sends a request to the server;
preprocessing step S2: the server side records the request information of the request and then asynchronously synchronizes the request to the security policy technology computation server;
generating protection policy configuration step S3: the security policy calculation server dynamically calculates and generates protection policy configuration according to the request and the request information;
security policy adaptation processing step S4: the server side stores the protection strategy configuration and performs security strategy adaptation processing when the client side sends a request next time;
malicious request processing step S5: and judging each request and outputting a judgment result, and processing the request by the server according to the judgment result.
Further, wherein the request information includes: request parameters, request IP, and request time.
Referring to fig. 2, fig. 2 is a flowchart illustrating step S5 in fig. 1. As shown in fig. 2, the malicious request processing step S5 includes:
determination step S51: judging whether the request is a malicious request or not, and obtaining a judgment result;
determination result processing step S52: if the judgment result is a non-malicious request, the server side sends the request to a service processing server for processing; if the judgment result is a malicious request, the server actively closes the request and transfers the request to a malicious request acceptance server for hosting.
Still further, the malicious request acceptance server tries to invade the client sending the malicious request reversely by adopting the malicious parameters of the malicious request client accumulated by random delay response, random disconnection and random response history.
Hereinafter, the method for improving MQTT service security according to the present invention will be described in detail with reference to the following examples.
The first embodiment is as follows:
the invention combines the existing MQTT safety protection schemes commonly used in many industries, such as: the front-end gateway records parameters, request frequency, IP, time law and the like of a client request and sends the parameters, the request frequency, the IP, the time law and the like to the back-end strategy calculation server, the back-end strategy calculation server synchronizes to the gateway after calculating the safety protection strategy configuration, and the gateway accepts and actively closes the request. The scheme is characterized in that after the rear-end strategy computing server is computed into the safety protection strategy configuration and is synchronized to the front-end server, when the server identifies that the current request is a malicious request through the strategy configuration, part of the malicious requests can be closed or the malicious requests can be forwarded to a malicious request acceptance server connected to the socket long connection shared by a server cluster for processing, the process belongs to message forwarding in the computer principle, the performance of the server can not be influenced basically, the malicious request acceptance server can disturb and maintain data of the MQTT long connection of the malicious requests and return protected and disturbed data, and all operations of the malicious request acceptance server are pure memory-level operations, so that a malicious request client side is as follows: and performing slow request response processing and error character response processing measures, disturbing the security policy processing logic of the malicious request client to the server, and reversely invading the performance of the malicious request client.
In the security protection of the malicious request, the invention reversely occupies the performance of the malicious request client under the premise of maintaining the normal operation of the server as much as possible, thereby achieving more dynamic security protection.
The following is specifically described with reference to fig. 3, and as shown in the detailed description of the flow of the present invention shown in fig. 3, the specific steps are as follows:
1: client requests server to send message
2: the server accepts/authenticates the client request, records the client request parameters, IP, time and other information
3: the server side asynchronously synchronizes the client request to the security policy technical computation server
4: the security policy calculation server dynamically calculates protection policy configuration by combining parameters such as parameters, IP (Internet protocol), time and the like of a client request group, such as: and the processing of logging more than 3 times in 1 minute, logging error more than 2 times, request more than 5 times in the same IP one minute or request more than 2 times in the same second is randomly closed and randomly forwarded to a malicious request acceptance server for hosting, the policy configuration is actively synchronized to the server, and the process gradually generates stricter configuration aiming at the clients suspected of similar information.
5: the server side stores the security policy configuration of the security policy calculation server, and performs security policy adaptation processing when the client side requests next time.
6: and finally submitting the non-malicious request acceptance to a service server for processing, belonging to normal service operation.
7: the server side is randomly and actively closed and transferred to a malicious request acceptance server for hosting malicious requests
8: the malicious request server randomly delays response, randomly disconnects and randomly responds to malicious parameters of the malicious request client accumulated in history and tries to reversely invade the malicious client.
Example two:
referring to fig. 4, fig. 4 is a schematic structural diagram of an improvement system for MQTT service security assurance. As shown in fig. 4, the present invention further includes an improvement system for MQTT service security assurance, wherein the improvement system includes:
the server receives a request sent by the client and records request information of the request;
and the server side asynchronously synchronizes the request to the security policy technical calculation server, the security policy calculation server dynamically calculates and generates protection policy configuration according to the request and the request information, and the server side stores the protection policy configuration and performs security policy adaptation processing when the client side sends the request next time.
Wherein, improve the system and still include:
and the malicious request processing unit is used for judging each request and outputting a judgment result, and the server side processes the requests according to the judgment result.
Wherein the request information includes: request parameters, request IP, and request time.
Wherein the malicious request processing unit includes:
the judging module is used for judging whether the request is a malicious request or not and obtaining a judging result;
if the judgment result is a non-malicious request, the server sends the request to the service processing server for processing;
and if the judgment result is that the request is a malicious request, the server actively closes the request and transfers the request to a malicious request acceptance server for hosting.
The malicious request acceptance server tries to invade the client sending the malicious request reversely by adopting the malicious parameters of the malicious request client accumulated by random delay response, random disconnection and random response history.
Example three:
referring to FIG. 5, the embodiment discloses an embodiment of a computer device. The computer device may comprise a processor 81 and a memory 82 in which computer program instructions are stored.
Specifically, the processor 81 may include a Central Processing Unit (CPU), or A Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
The memory 82 may be used to store or cache various data files for processing and/or communication use, as well as possible computer program instructions executed by the processor 81.
The processor 81 reads and executes the computer program instructions stored in the memory 82 to implement any one of the above-mentioned embodiments of the improved method for MQTT service security assurance.
In some of these embodiments, the computer device may also include a communication interface 83 and a bus 80. As shown in fig. 5, the processor 81, the memory 82, and the communication interface 83 are connected via the bus 80 to complete communication therebetween.
The communication interface 83 is used for implementing communication between modules, devices, units and/or equipment in the embodiment of the present application. The communication port 83 may also be implemented with other components such as: the data communication is carried out among external equipment, image/data acquisition equipment, a database, external storage, an image/data processing workstation and the like.
The computer device may implement the method described in connection with fig. 1-2 based on an improved method for MQTT service security assurance.
In addition, in combination with the method for managing data in the foregoing embodiments, embodiments of the present application may provide a computer-readable storage medium to implement. The computer readable storage medium having stored thereon computer program instructions; the computer program instructions, when executed by the processor, implement an improved method for MQTT service security assurance in the above embodiments.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
In summary, the method for improving the MQTT service security assurance has the advantages that aiming at protection against malicious attacks, response actions and information processing with lower performance loss and random rules are designed on the premise of updating protection strategy channels commonly used in the industry, and the rules of server security protection by malicious clients are disturbed; the safety protection capability of the server is improved, the influence on normal service processing is reduced, and even the attack cost of a malicious attack client and the research period of server attack are increased.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. An improvement method suitable for MQTT service security guarantee is characterized by comprising the following steps:
a request step: the client sends a request to the server;
a pretreatment step: the server side records the request information of the request and then asynchronously synchronizes the request to the security policy technology computation server;
generating protection strategy configuration: the security policy calculation server dynamically calculates and generates protection policy configuration according to the request and the request information;
security policy adaptation processing step: and the server side stores the protection strategy configuration and performs security strategy adaptation processing when the client side sends a request next time.
2. The method for improving MQTT service security assurance of claim 1, further comprising:
and a malicious request processing step: and judging each request and outputting a judgment result, and processing the request by the server according to the judgment result.
3. The method for improving MQTT service security assurance of claim 1, wherein the request information includes: request parameters, request IP, and request time.
4. The improved method for MQTT service security assurance according to claim 2, wherein the malicious request processing step includes:
a judging step: judging whether the request is a malicious request or not, and obtaining a judgment result;
and a judgment result processing step: if the judgment result is a non-malicious request, the server side sends the request to a service processing server for processing; if the judgment result is a malicious request, the server actively closes the request and transfers the request to a malicious request acceptance server for hosting.
5. The method for improving MQTT service security assurance as claimed in claim 4, wherein the malicious request acceptance server attempts to back-invade the client sending the malicious request by using malicious parameters of the malicious request client accumulated by random delay response, random disconnection and random response history.
6. An improvement system suitable for MQTT service security assurance is characterized by comprising:
the server receives a request sent by the client and records request information of the request;
and the server side asynchronously synchronizes the request to the security policy technical calculation server, the security policy calculation server dynamically calculates and generates protection policy configuration according to the request and the request information, and the server side stores the protection policy configuration and performs security policy adaptation processing when the client side sends the request next time.
7. The system for improving MQTT service security assurance of claim 6, further comprising:
and the malicious request processing unit is used for judging each request and outputting a judgment result, and the server side processes the requests according to the judgment result.
8. The system for improving MQTT service security assurance of claim 6, wherein the request information includes: request parameters, request IP, and request time.
9. The system for improving MQTT service security applicable according to claim 7, wherein the malicious request processing unit includes:
the judging module is used for judging whether the request is a malicious request or not and obtaining a judging result;
if the judgment result is a non-malicious request, the server sends the request to the service processing server for processing;
and if the judgment result is that the request is a malicious request, the server actively closes the request and transfers the request to a malicious request acceptance server for hosting.
10. The system for improving MQTT service security assurance of claim 9, wherein the malicious request acceptance server attempts to back-invade the client sending the malicious request by using malicious parameters of the malicious request client accumulated by random delay response, random disconnection and random response history.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110253977.4A CN112995186A (en) | 2021-03-09 | 2021-03-09 | Improvement method and system suitable for MQTT service safety guarantee |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110253977.4A CN112995186A (en) | 2021-03-09 | 2021-03-09 | Improvement method and system suitable for MQTT service safety guarantee |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112995186A true CN112995186A (en) | 2021-06-18 |
Family
ID=76336066
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110253977.4A Pending CN112995186A (en) | 2021-03-09 | 2021-03-09 | Improvement method and system suitable for MQTT service safety guarantee |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112995186A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113965392A (en) * | 2021-10-25 | 2022-01-21 | 杭州安恒信息技术股份有限公司 | Malicious server detection method, system, readable medium and electronic device |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104519043A (en) * | 2013-09-30 | 2015-04-15 | 瞻博网络公司 | Fuzzing server responses to malicious client devices |
CN108965348A (en) * | 2018-10-12 | 2018-12-07 | 深圳前海微众银行股份有限公司 | Network safety protection method, equipment and computer readable storage medium |
CN111565203A (en) * | 2020-07-16 | 2020-08-21 | 腾讯科技(深圳)有限公司 | Method, device and system for protecting service request and computer equipment |
CN111756761A (en) * | 2020-06-29 | 2020-10-09 | 杭州安恒信息技术股份有限公司 | Network defense system and method based on flow forwarding and computer equipment |
-
2021
- 2021-03-09 CN CN202110253977.4A patent/CN112995186A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104519043A (en) * | 2013-09-30 | 2015-04-15 | 瞻博网络公司 | Fuzzing server responses to malicious client devices |
CN108965348A (en) * | 2018-10-12 | 2018-12-07 | 深圳前海微众银行股份有限公司 | Network safety protection method, equipment and computer readable storage medium |
CN111756761A (en) * | 2020-06-29 | 2020-10-09 | 杭州安恒信息技术股份有限公司 | Network defense system and method based on flow forwarding and computer equipment |
CN111565203A (en) * | 2020-07-16 | 2020-08-21 | 腾讯科技(深圳)有限公司 | Method, device and system for protecting service request and computer equipment |
Non-Patent Citations (1)
Title |
---|
无: "php能不能做到,只给某个用户延迟响应,其它用户不受影响?", 《无》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113965392A (en) * | 2021-10-25 | 2022-01-21 | 杭州安恒信息技术股份有限公司 | Malicious server detection method, system, readable medium and electronic device |
CN113965392B (en) * | 2021-10-25 | 2024-05-28 | 杭州安恒信息技术股份有限公司 | Malicious server detection method, system, readable medium and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10027691B2 (en) | Apparatus and method for performing real-time network antivirus function | |
US8856913B2 (en) | Method and protection system for mitigating slow HTTP attacks using rate and time monitoring | |
US10270792B1 (en) | Methods for detecting malicious smart bots to improve network security and devices thereof | |
US20070245417A1 (en) | Malicious Attack Detection System and An Associated Method of Use | |
CN113556343B (en) | DDoS attack defense method and device based on browser fingerprint identification | |
US9843514B2 (en) | Packet processing method and background server | |
CN114124451A (en) | Internet of things equipment data processing method and system and computer storage medium | |
WO2020037781A1 (en) | Anti-attack method and device for server | |
US20160142432A1 (en) | Resource classification using resource requests | |
US10091226B2 (en) | Method and apparatus for service traffic security using DIMM channel distribution in multicore processing system | |
KR101200906B1 (en) | High Performance System and Method for Blocking Harmful Sites Access on the basis of Network | |
CN110868387B (en) | System and method for operating a networked device | |
CN112995186A (en) | Improvement method and system suitable for MQTT service safety guarantee | |
CN112202717B (en) | HTTP request processing method and device, server and storage medium | |
CN114510711A (en) | Method, device, medium and computer equipment for preventing CC attack | |
CN110198294B (en) | Security attack detection method and device | |
CN113225348B (en) | Request anti-replay verification method and device | |
CN105939315A (en) | Method and device for protecting against HTTP attack | |
US10298606B2 (en) | Apparatus, system, and method for accelerating security inspections using inline pattern matching | |
CN115021960A (en) | Message processing method and network security equipment | |
CN113660260A (en) | Message detection method, system, computer equipment and readable storage medium | |
CN112861188A (en) | Data aggregation system and method for multiple clusters | |
CN106899512A (en) | Multi engine realization method and system based on DPI in FPGA | |
CN114124442B (en) | Method and system for defending DDOS attack | |
CN117938961B (en) | Network request scheduling method, device, cluster and medium based on edge server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210618 |