[go: up one dir, main page]

CN105991637B - The means of defence and device of network attack - Google Patents

The means of defence and device of network attack Download PDF

Info

Publication number
CN105991637B
CN105991637B CN201510330425.3A CN201510330425A CN105991637B CN 105991637 B CN105991637 B CN 105991637B CN 201510330425 A CN201510330425 A CN 201510330425A CN 105991637 B CN105991637 B CN 105991637B
Authority
CN
China
Prior art keywords
message
flow
attack
network device
session characteristics
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510330425.3A
Other languages
Chinese (zh)
Other versions
CN105991637A (en
Inventor
邢涛
杨学良
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou DPTech Technologies Co Ltd
Original Assignee
Hangzhou DPTech Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou DPTech Technologies Co Ltd filed Critical Hangzhou DPTech Technologies Co Ltd
Priority to CN201510330425.3A priority Critical patent/CN105991637B/en
Publication of CN105991637A publication Critical patent/CN105991637A/en
Application granted granted Critical
Publication of CN105991637B publication Critical patent/CN105991637B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/12Avoiding congestion; Recovering from congestion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

The present invention provides the means of defence and device of a kind of network attack, it applies in flow cleaning equipment, the described method includes: receiving the first filter NOTIFY that flow detection device is sent, first filter NOTIFY includes the session characteristics of first kind attack message, and the first kind attack message is the message that flow is greater than first threshold;Indicate that upstream network device filtering matches the first kind object message of the session characteristics, wherein message reaches Ingress Network equipment by the upstream network device.Using the embodiment of the present invention, the attack message of specified type can be filtered by session characteristics, to improve the filtering accuracy to message, and attack message is filtered from upstream network device, prevent attack message from reaching Ingress Network equipment, to avoid ingress bandwidth from blocking, ensure that externally service is not disrupted server, improves user experience.

Description

The means of defence and device of network attack
Technical field
The present invention relates to network security technology more particularly to the means of defences and device of a kind of network attack.
Background technique
DoS (Denial of Service, Denial of Service attack) refers to the system that network is exhausted using various service requests Resource, to make network that can not handle legal message.And with the rise of Botnet, simultaneously because the attack method of DoS Simply, it is affected, is difficult to the features such as tracing, so that DDoS (refuse by Distributed Denial of Service, distribution Exhausted service attack) it obtains quickly growing and increasingly spreading unchecked, the Botnet of thousands of host compositions provides for ddos attack Required bandwidth and host, forms a large amount of attack message, causes great harm to network.
For the harm for reducing this kind of network attack of DDoS, in the related technology, by the Ingress Network equipment of network (such as: ingress router or interchanger) the professional flow cleaning equipment of deployment is concatenated or bypasses, attack message is carried out Filtering.However, above-mentioned flow cleaning scheme, is all to be filtered from Ingress Network equipment to attack message, works as attack message Flow be less than Ingress Network equipment ingress bandwidth when, can have preferable cleaning effect, however, work as attack message flow Have been above or be equal to ingress bandwidth when, ingress bandwidth will Severe blockage, at this moment, relying solely on flow cleaning equipment will not Attack message flow can be effectively cleaned, so that ingress bandwidth Severe blockage, eventually leads to the external service disruption of server, is reduced User experience.
Summary of the invention
In view of this, the present invention provides the means of defence and device of a kind of network attack, to solve the stream in attack message When amount is more than or equal to ingress bandwidth, the problem of ingress bandwidth Severe blockage leads to server external service disruption, improves and use Family experience.
Specifically, the present invention is achieved through the following technical solutions:
The present invention provides a kind of means of defence of network attack, applies in flow cleaning equipment, which comprises
The first filter NOTIFY that flow detection device is sent is received, first filter NOTIFY includes first kind attack message Session characteristics, the first kind attack message be flow be greater than first threshold message;
Indicate that upstream network device filtering matches the first kind object message of the session characteristics, wherein message passes through institute It states upstream network device and reaches Ingress Network equipment.
The present invention provides the means of defence of another network attack, applies on flow detection device, which comprises
The flow of every a kind of message of Ingress Network equipment is sent to according to the detection of the session characteristics of message;
When the flow of any sort message is greater than first threshold, confirm that such message is first kind attack message;
It sends the first filter NOTIFY and gives flow cleaning equipment, first filter NOTIFY includes the first kind attack message Session characteristics so that flow cleaning equipment instruction upstream network device filtering matches the first classification of the session characteristics Mark message, wherein message reaches Ingress Network equipment by the upstream network device.
It the present invention also provides a kind of protective device of network attack, applies in flow cleaning equipment, side's device packet It includes:
Receiving unit, for receiving the first filter NOTIFY of flow detection device transmission, first filter NOTIFY includes The session characteristics of first kind attack message, the first kind attack message are the message that flow is greater than first threshold;
Execution unit is used to indicate the first kind object message that upstream network device filtering matches the session characteristics, In, message reaches Ingress Network equipment by the upstream network device.
The present invention also provides the protective devices of another network attack, apply on flow detection device, side's device Include:
Detection unit, the stream of every a kind of message for being sent to Ingress Network equipment according to the detection of the session characteristics of message Amount;
Confirmation unit, for confirming that such message is attacked for the first kind when the flow of any sort message is greater than first threshold Hit message;
Transmission unit gives flow cleaning equipment for sending the first filter NOTIFY, and first filter NOTIFY includes described The session characteristics of first kind attack message, so that flow cleaning equipment instruction upstream network device filtering matches the session The first kind object message of feature, wherein message reaches Ingress Network equipment by the upstream network device.
Using the embodiment of the present invention, the attack message of specified type can be filtered by session characteristics, to improve to report The filtering accuracy of text, and attack message is filtered from upstream network device, prevent attack message from reaching Ingress Network equipment, To avoid ingress bandwidth from blocking, ensure that externally service is not disrupted server, improves user experience.
Detailed description of the invention
Fig. 1 is a kind of flow diagram of the means of defence of network attack shown in an exemplary embodiment of the invention;
Fig. 2 is the flow diagram of the means of defence of another network attack shown in an exemplary embodiment of the invention;
Fig. 3 is the flow diagram of the means of defence of another network attack shown in an exemplary embodiment of the invention;
Fig. 4 is a kind of application scenarios schematic diagram shown in embodiment illustrated in fig. 3;
Fig. 5 is the flow diagram of the means of defence of another network attack shown in an exemplary embodiment of the invention;
Fig. 6 is a kind of application scenarios schematic diagram shown in embodiment illustrated in fig. 5;
Fig. 7 is a kind of hardware configuration signal of the protective device of network attack shown in an exemplary embodiment of the invention Figure;
Fig. 8 is a kind of structural block diagram of the protective device of network attack shown in an exemplary embodiment of the invention;
Fig. 9 is the structural block diagram of the protective device of another network attack shown in an exemplary embodiment of the invention.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment Described in embodiment do not represent all embodiments consistented with the present invention.On the contrary, they be only with it is such as appended The example of device and method being described in detail in claims, some aspects of the invention are consistent.
It is only to be not intended to limit the invention merely for for the purpose of describing particular embodiments in terminology used in the present invention. It is also intended in the present invention and the "an" of singular used in the attached claims, " described " and "the" including majority Form, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein refers to and wraps It may be combined containing one or more associated any or all of project listed.
It will be appreciated that though various information, but this may be described using term first, second, third, etc. in the present invention A little information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not departing from In the case where the scope of the invention, the first information can also be referred to as the second information, and similarly, the second information can also be referred to as One information.Depending on context, word as used in this " if " can be construed to " ... when " or " when ... When " or " in response to determination ".
In embodiments of the present invention, the message in network can flow through upstream network device and be sent to Ingress Network and set Standby, flow detection device can carry out flow to the message for being sent to Ingress Network equipment in real time according to the session characteristics of message Detection confirms that such message is first kind attack message, flow detection is set when the flow of any sort message is greater than first threshold Standby to send the first filter NOTIFY to flow cleaning equipment, which includes the session characteristics of first kind attack message, Flow cleaning equipment, according to session characteristics therein, indicates upstream network device filtering after receiving the first filter NOTIFY First kind object message with the session characteristics, so that such message be prevented to enter Ingress Network equipment, and is effectively prevented from Ingress bandwidth blocking, and then ensure that externally service is not disrupted server.
It is described in detail below in conjunction with means of defence and device of the Fig. 1 to Fig. 9 to network attack provided by the invention.
Fig. 1 is a kind of flow diagram of the means of defence of network attack shown in an exemplary embodiment of the invention.Such as Shown in Fig. 1, a kind of means of defence of network attack is applied in flow cleaning equipment, described method includes following steps:
Step 101, the first filter NOTIFY that flow detection device is sent is received, wherein the first filter NOTIFY includes first The session characteristics of class attack message, first kind attack message are the message that flow is greater than first threshold.
In this step, session characteristics include one or more in the five-tuple information of message, for example, session characteristics packet Include but be not limited to the combination of source IP address, purpose IP address, source IP address and source port, the group of purpose IP address and destination port It closes.
Step 102, the filtering of instruction upstream network device matches the first kind object message of the session characteristics, wherein report Text can reach Ingress Network equipment by upstream network device.
In this step, an alternative embodiment according to the present invention, when upstream network device is configured with ACL (Access Control List, accesses control list) interface when, can be generated according to the session characteristics of the first kind attack message received First ACL order, and the first ACL order is sent to upstream network device by ACL interface, upstream network device is receiving To when the first ACL order, can be added by session characteristics and to the corresponding relationship of the processing mode (for example, filtering) of message Into local ACL table item, when flowing through the session characteristics of message of upstream network device and being matched to the ACL table item, upstream network Equipment then filters the message.For example, flow cleaning equipment generates the first ACL order according to purpose IP address 1.1.1.1, on The list item that the trip network equipment is generated according to the first ACL order, as shown in table 1:
Table 1
Purpose IP address Processing mode
1.1.1.1 Filtering
According to list item shown in table 1, when upstream network device receives the message that purpose IP address is 1.1.1.1, Such message can be filtered, so that such message be prevented to reach Ingress Network equipment, avoids ingress bandwidth according to the ACL table item Blocking.
After upstream network device is filtered processing a period of time to the message of matching session characteristics, first kind attack message Flow may reduce therewith, may will no longer will cause ingress bandwidth blocking, in this way, can no longer be carried out to such message Filter processing, therefore, can be arranged the first preset time, flow cleaning equipment sends out the first ACL order in flow cleaning equipment After giving upstream network device, it can star timer and start timing, it, can be with when timing time reaches the first preset time Upstream the network equipment sends the 2nd ACL order, to indicate that upstream network device stops the first of filtering matching session characteristics Class object message specifically can be with are as follows: the 2nd ACL order may include that will stop the session of the first kind attack message of filtering Feature, upstream network device will delete the ACL table item for matching the session characteristics, to stop after receiving the 2nd ACL order Filter corresponding message.
The present invention also provides another preferred embodiments, and specifically, flow detection device determines this of matching session characteristics When the present flow rate of class message has been less than first threshold, it can be sent to flow cleaning equipment and eliminate notice, therefore, flow cleaning is set It is standby to be notified to generate the 3rd ACL order according to the elimination, and it is sent to upstream network device, to indicate upstream network device Stop the message of filtering matching session characteristics.Upstream network device receives the processing mode and above-mentioned reception of the 3rd ACL order Processing mode to the 2nd ACL order can be identical, and details are not described herein.
It is special specifically can also to filter matching session by black hole router for another alternative embodiment according to the present invention The first kind object message of sign, specifically, flow cleaning equipment can generate dynamic routing information with dialogue-based feature, In, the next-hop that the first kind object message of the session characteristics is matched in the dynamic routing information is black hole router, and will The dynamic routing information is sent to upstream network device, which is added to local routing by upstream network device In, when receiving first kind object message, which is transmitted to blackhole route, black hole router receives Such message abandons, it should be noted that when upstream network device does not configure corresponding api interface (Application Programming Interface, application programming interface) when, flow cleaning equipment can pass through the dynamic routing information It crosses black hole router and is forwarded to upstream network device, conversely, directly can be sent to the dynamic routing information by api interface Upstream network device.
It is possible to further which the second preset time is arranged in flow cleaning equipment, sent in the upstream network equipment dynamic After state routing iinformation, timer will be started, and start timing, when timing time reaches the second preset time, flow cleaning is set Standby upstream the network equipment to send routing and delete notice, upstream network device receives after the routing deletes notice, will be from The route table items are deleted in local routing table, are sent to stop filtering first kind attack message by the preferred embodiment The next-hop of the message of the Ingress Network equipment reverts to the purpose equipment or destination server of such message.
Based on the above embodiment, if flow detection device detects that the flow of any sort message is less than first threshold and is greater than Second threshold can be confirmed that such message is the second class attack message, therefore, the second filtering can be sent to flow cleaning equipment Notice, second filter NOTIFY includes the session characteristics of the second class attack message, and flow cleaning equipment receives second mistake After filter notice, according to session characteristics therein, such message can be filtered according to default filtering rule, wherein default Filtering rule includes but is not limited to rate limit means of defence, TCP state means of defence, black and white lists means of defence, application layer Means of defence and fingerprint recognition means of defence, by taking fingerprint recognition means of defence as an example, after flow cleaning equipment receives message, Message length field is carried out discretization storage, then periodically counts and be currently sent to entrance net by the length for extracting outgoing packet The length of the message of network equipment, establishes distributed model, when the second class attack occurs for Ingress Network equipment, leads to the second class The distribution of the fingerprint characteristic of the message of attack will appear fluctuation, and be more than the distributed mode offset of the distributed model, in this way The message can be filtered according to this fingerprint characteristic, specifically may refer to the relevant technologies, no longer go to live in the household of one's in-laws on getting married one by one herein It states.
Through the foregoing embodiment, upstream network device filters the message of specified type by matching session characteristics, so as to To improve the filtering accuracy to attack message, furthermore it is possible to which the attack message for matching session characteristics is set in arrival Ingress Network It is abandoned before standby, guarantees that ingress bandwidth is not blocked.
Fig. 2 is the flow diagram of the means of defence of another network attack shown in an exemplary embodiment of the invention. As shown in Fig. 2, a kind of means of defence of network attack, is applied on flow detection device, described method includes following steps:
Step 201, the flow of every a kind of message of Ingress Network equipment is sent to according to the detection of the session characteristics of message.
In this step, the session characteristics of message include one or more in the five-tuple information of message, for example, meeting Words feature can include but is not limited to the combination of source IP address, purpose IP address, source IP address and source port, purpose IP address with The combination etc. of destination port.
Flow detection device can obtain the message for being sent to Ingress Network equipment by mirror image or spectroscopic modes, and can With but be not limited by DPI (Deep Packet Inspection, deep-packet detection) technology or DFI (Deep/Dynamic Flow Inspection, the detection of depth/dynamic stream) technology detection messages session characteristics, the report detected according to above-mentioned technology The session characteristics of text classify to message, and count the flow of every class message.
Step 202, when the flow of any sort message is greater than first threshold, confirm that such message is first kind attack report Text.
User or network administrator can be according to the historical traffic datas of every class message, in advance in flow detection device Configure first threshold, for example, user be purpose IP address 1.1.1.1 with destination port 53 this combine configure first threshold be 4GB, when the flow for the message that flow detection device detection statistics to purpose IP address are 1.1.1.1, destination port is 53 is unexpected Increasing is 5GB, is greater than first threshold 4GB, and therefore, flow detection device can be confirmed that such message is first kind attack message.
Step 203, it sends the first filter NOTIFY and gives flow cleaning equipment, which includes first kind attack report The session characteristics of text, so that the instruction upstream network device filtering of flow cleaning equipment matches the first kind target of the session characteristics Message, wherein message reaches Ingress Network equipment by upstream network device.
In step 203, for still by destination port 53, this is combined with purpose IP address 1.1.1.1, flow detection Destination port 53 and purpose IP address 1.1.1.1 can be sent to flow cleaning equipment by the first filter NOTIFY by equipment, Flow cleaning equipment is set to generate the first ACL order according to the first filter NOTIFY, instruction upstream network device abandons or filtering mesh Port 53, purpose IP address 1.1.1.1 all messages, so that such message be avoided to enter Ingress Network equipment, cause into Port band width blocking.
Further, when the flow of first kind attack message is reduced to less than first threshold, flow detection device can be with It sends to eliminate and notifies to give flow cleaning equipment, so that flow cleaning equipment instruction upstream network device stops filtering such message, It specifically may refer to step 102 as shown in Figure 1, details are not described herein.
Further, when flow detection device detects that the flow of any sort message is less than first threshold and greater than second When threshold value, the second class attack message of such message is can be confirmed in flow detection device, and sends the second filter NOTIFY to flow Cleaning equipment, wherein the second filter NOTIFY may include the session characteristics of the second class attack message, to make flow cleaning equipment Such message is filtered according to the session characteristics, for example, user is purpose port 53, purpose IP address 1.1.1.1 this group Conjunction is configured with two threshold values, respectively first threshold 4GB, second threshold 2GB, when flow detection device detects the combination When flow is 3GB, flow detection device can be sent out destination port 53 and purpose IP address 1.1.1.1 by the second filter NOTIFY Flow cleaning equipment is given, so that it is 53 and purpose that flow cleaning equipment can filter destination port according to default filtering rule IP address is the message of 1.1.1.1, wherein default filtering rule is described in detail in the embodiment illustrated in fig. 1, no longer superfluous herein It states.
It using above-described embodiment, can be classified according to the session characteristics of message to message, and count every class message The session characteristics of attack message so that attack message be accurately positioned, and are sent to flow cleaning equipment, improved to attack by flow The filtering accuracy of message.
Fig. 3 is the flow diagram of the means of defence of another network attack shown in an exemplary embodiment of the invention. As shown in figure 3, the embodiment passes through the friendship between flow detection device, flow cleaning equipment and upstream network device three Mutually, the means of defence of the network attack of one embodiment of the invention is described in detail:
Step 301, flow detection device obtains the message for being sent to Ingress Network equipment.
Step 302, flow detection device detects the flow of every a kind of message according to the session characteristics of message.
Step 303, when the flow of any sort message is greater than first threshold, confirm that such message is first kind attack report Text;
Step 304, flow detection device sends the first filter NOTIFY and gives flow cleaning equipment, wherein the first filter NOTIFY Session characteristics including first kind attack message.
Step 305, flow cleaning equipment receives the first filter NOTIFY that flow detection device is sent.
Step 306, flow cleaning equipment generates the first ACL order according to session characteristics.
Step 307, the first ACL order is sent to upstream network device by flow cleaning equipment.
Step 308, upstream network device receives the first ACL order.
Step 309, upstream network device generates ACL table item according to the first ACL order.
Step 310, when upstream network device receives message, judge whether the session characteristics of the message match ACL table item, If it does, then executing step 311.
Step 311, upstream network device filters the message of matching session characteristics according to ACL table item.
Fig. 4 is a kind of application scenarios schematic diagram shown in embodiment illustrated in fig. 3.As shown in figure 4, being set including upstream network Standby, Ingress Network equipment, flow detection device and flow cleaning equipment, wherein message by upstream network device be sent into The mouth network equipment, enters protected network using Ingress Network equipment.In embodiments of the present invention, flow detection device passes through Mirror image technology or light splitting technology obtain the message for being sent to Ingress Network equipment, and can pass through the detection messages such as DPI technology Session characteristics, to be classified and be counted the flow of every class message to message, when flow detection device detects any sort When the flow of message is greater than first threshold, it can be confirmed that such message is first kind attack message, therefore, flow detection device can It, can be according to the after flow cleaning equipment receives first filter NOTIFY to send the first filter NOTIFY to flow cleaning equipment Session characteristics in one filter NOTIFY generate the first ACL order, and are sent to upstream network device, and upstream network device can root ACL table item is generated according to the first ACL order, when the session characteristics for having message match the ACL table item a period of time, upstream network device The message can be filtered, so that the message be prevented to reach Ingress Network equipment, Ingress Network equipment Severe blockage is avoided, ensures clothes Externally service is not disrupted business device, improves user experience.
Fig. 5 is the flow diagram of the means of defence of another network attack shown in an exemplary embodiment of the invention. As shown in figure 5, the embodiment passes through flow detection device, flow cleaning equipment, upstream network device and black hole router Multi-party interaction, is described in detail the means of defence of the network attack of another embodiment of the present invention:
Step 301, flow detection device obtains the message for being sent to Ingress Network equipment.
Step 302, flow detection device detects the flow of every a kind of message according to the session characteristics of message.
Step 303, when the flow of any sort message is greater than first threshold, confirm that such message is first kind attack report Text;
Step 304, flow detection device sends the first filter NOTIFY and gives flow cleaning equipment, wherein the first filter NOTIFY Session characteristics including first kind attack message.
Step 305, flow cleaning equipment receives the first filter NOTIFY that flow detection device is sent.
Step 312, flow cleaning equipment generates dynamic routing information according to session characteristics, wherein the dynamic routing information The next-hop of the message of middle matching session characteristics is black hole router.
Step 313, dynamic routing information is sent to upstream network device by flow cleaning equipment.
Step 314, upstream network device receives dynamic routing information.
Step 315, when upstream network device receives message, upstream network device judges the session characteristics energy of the message Route table items are enough matched to, if can, then follow the steps 316.
Step 316, message is sent to black hole router by upstream network device.
Step 317, the message that black hole router filtering upstream network device is sent.
Fig. 6 is a kind of application scenarios schematic diagram shown in embodiment illustrated in fig. 5.As shown in fig. 6, and embodiment illustrated in fig. 4 Unlike, on the basis of the embodiment shown in fig. 4, the present embodiment is provided with black hole router.Specifically, flow cleaning is set The standby session characteristics according in the first filter NOTIFY generate dynamic routing information, wherein match session in the dynamic routing information The next-hop of the message of feature is black hole router, and the dynamic routing information is sent to upstream network device, upstream network The dynamic routing information can be added in local routing table by equipment, when receiving message, and the session characteristics of the message When with route table items, black hole router is forwarded the packet to, black hole router will filter the message after receiving the message, from And the message is prevented to enter in Ingress Network equipment.It should be noted that the upstream network equipment forwarding of flow cleaning equipment is dynamic State routing iinformation can select different paths to forward, for example, when upstream network device does not have according to the configuration of upstream network device When having the corresponding api interface of configuration, which can be transmitted to black hole router by flow cleaning equipment, then by black Hole router is transmitted to upstream network device, whereas if flow is clear when upstream network device is configured with corresponding api interface Washing equipment directly can be sent to upstream network device, the invention is not limited in this regard for dynamic routing information.
It should be noted that in embodiments of the present invention, in addition to including flow detection device and flow cleaning equipment, may be used also To include management platform, when in abnormal flow cleaning system including management platform, flow detection device and flow The information such as dependent instruction, order or notice between cleaning equipment can be transmitted by management platform, for example, flow Detection device can be deleted the first filter NOTIFY, elimination notice, the second filter NOTIFY and routing by management platform logical Know and is sent to flow cleaning equipment.
Furthermore it is also possible to which preset time is arranged in management platform, in flow cleaning equipment, upstream the network equipment is sent out After sending the first ACL order or sending dynamic routing information, management platform can start timing, when reaching timing time, lead to Flow cleaning equipment is known, so that flow cleaning equipment instruction upstream network device stops filtering and leads to the report of first kind attack Text.
Management platform can be also used for storage flow detection device and be greater than the in the flow for detecting any sort message One threshold value or the attack alarm log sent less than first threshold and when being greater than second threshold, and storage flow cleaning equipment The cleaning log of transmission, wherein attack alarm log, which can include but is not limited to flow after attacking preceding flow information, cleaning, to be believed The information such as breath, attack traffic size, management platform can analyze these information, generate detailed account, for Family be convenient for awareness network traffic conditions, and can also according to the historical traffic data in the detailed account be arranged first threshold and Second threshold.
Using above-described embodiment, the attack message of specified type can be filtered by session characteristics, to improve to message Filtering accuracy, and from upstream network device filter attack message, prevent attack message from reaching Ingress Network equipment, from And ingress bandwidth is avoided to block, it ensures that externally service is not disrupted server, improves user experience.
Corresponding with the means of defence embodiment of aforementioned network attack, the present invention also provides the protective devices of network attack Embodiment.
The embodiment of the protective device 400 of inventive network attack can be applied respectively in flow cleaning equipment and flow inspection On measurement equipment.Installation practice can also be realized by software realization by way of hardware or software and hardware combining.With It is by the processor of equipment where it by non-volatile memories as the device on a logical meaning for software realization Corresponding computer program instructions are read into memory what operation was formed in device.For hardware view, as shown in fig. 7, for this A kind of hardware structure diagram of the 400 place equipment of protective device of invention network attack, in addition to processor shown in Fig. 7, memory, net Except network interface and nonvolatile memory, equipment in embodiment where the protective device 400 of network attack generally according to The actual functional capability of the equipment can also include other hardware, repeat no more to this.
Fig. 8 is a kind of structural block diagram of the protective device of network attack shown in an exemplary embodiment of the invention.Such as Fig. 8 Shown, a kind of protective device 400 of network attack is applied in flow cleaning equipment, which includes: 401 He of receiving unit Execution unit 402.
Receiving unit 401 is used to receive the first filter NOTIFY of flow detection device transmission, and the first filter NOTIFY includes the The session characteristics of a kind of attack message, first kind attack message are the message that flow is greater than first threshold;Execution unit 402 is used for Indicate the first kind object message of upstream network device filtering matching session characteristics, wherein message is arrived by upstream network device Up to Ingress Network equipment.
Fig. 9 is the structural block diagram of the protective device of another network attack shown in an exemplary embodiment of the invention.Such as Shown in Fig. 9, a kind of protective device 400 of network attack is applied on flow detection device, which includes: detection unit 501, confirmation unit 502 and transmission unit 503.
Detection unit 501 is used to be sent to every a kind of message of Ingress Network equipment according to the detection of the session characteristics of message Flow.
Confirmation unit 502 is used for when the flow of any sort message is greater than first threshold, confirms that such message is the first kind Attack message.
Transmission unit 503 gives flow cleaning equipment for sending the first filter NOTIFY, and first filter NOTIFY includes the The session characteristics of a kind of attack message, so that the first of flow cleaning equipment instruction upstream network device filtering matching session characteristics Class object message, wherein message reaches Ingress Network equipment by upstream network device.
The function of each unit and the realization process of effect are specifically detailed in the above method and correspond to step in above-mentioned apparatus Realization process, details are not described herein.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit The unit of explanation may or may not be physically separated, and component shown as a unit can be or can also be with It is not physical unit, it can it is in one place, or may be distributed over multiple network units.It can be according to actual The purpose for needing to select some or all of the modules therein to realize the present invention program.Those of ordinary skill in the art are not paying Out in the case where creative work, it can understand and implement.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in essence of the invention Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of the present invention.

Claims (11)

1. a kind of means of defence of network attack, which is characterized in that apply in flow cleaning equipment, which comprises
The first filter NOTIFY that flow detection device is sent is received, first filter NOTIFY includes the meeting of first kind attack message Feature is talked about, the first kind attack message is the message that flow is greater than first threshold;
Indicate that upstream network device filtering matches the first kind object message of the session characteristics, wherein message passes through on described It swims the network equipment and reaches Ingress Network equipment;
The second filter NOTIFY that the flow detection device is sent is received, second filter NOTIFY includes the second class attack message Session characteristics, the second class attack message be flow be less than the first threshold be greater than second threshold message;
According to the session characteristics of the second class attack message, according to default filtering rule, the flow is greater than less than first threshold The message of second threshold is filtered.
2. the method according to claim 1, wherein instruction upstream network device filtering matches the session The first kind object message of feature, comprising:
The first ACL order is generated according to the session characteristics, and is sent to the upstream network device, to indicate the upstream net Network equipment matches the first kind object message of the session characteristics according to the first ACL order, filtering.
3. according to the method described in claim 2, it is characterized in that, sending the first ACL to the upstream network device After order, the method also includes:
When reaching the first preset time, Xiang Suoshu upstream network device sends the 2nd ACL order, to indicate the upstream network Equipment stops the first kind object message that filtering matches the session characteristics.
4. according to the method described in claim 2, it is characterized in that, sending the first ACL to the upstream network device After order, the method also includes:
Receive the elimination notice that the flow detection device is sent;
It is notified to generate the 3rd ACL order according to the elimination, and is sent to the upstream network device, to indicate the upstream net Network equipment stops the first kind object message that filtering matches the session characteristics.
5. the method according to claim 1, wherein instruction upstream network device filtering matches the session The first kind object message of feature, comprising:
Dynamic routing information is generated based on the session characteristics, matches the first of the session characteristics in the dynamic routing information The next-hop of class object message is black hole router;
The dynamic routing information is sent to the upstream network device.
6. according to the method described in claim 5, it is characterized in that, the dynamic routing information is sent to the upstream net After network equipment, the method also includes:
When reaching the second preset time, Xiang Suoshu upstream network device sends routing and deletes notice, to indicate the upstream net Network equipment deletes the dynamic routing information.
7. a kind of means of defence of network attack, which is characterized in that apply on flow detection device, which comprises
The flow of every a kind of message of Ingress Network equipment is sent to according to the detection of the session characteristics of message;
When the flow of any sort message is greater than first threshold, confirm that such message is first kind attack message;
It sends the first filter NOTIFY and gives flow cleaning equipment, first filter NOTIFY includes the meeting of the first kind attack message Feature is talked about, so that flow cleaning equipment instruction upstream network device filtering matches the first kind target report of the session characteristics Text, wherein message reaches Ingress Network equipment by the upstream network device;
When the flow of any sort message, which is less than the first threshold, is greater than the message of second threshold, confirm that such message is second Class attack message;
It sends the second filter NOTIFY and gives flow cleaning equipment, second filter NOTIFY includes the meeting of the second class attack message Feature is talked about, so that flow cleaning equipment instruction upstream network device filtering matches the second class target report of the session characteristics Text, wherein message reaches Ingress Network equipment by the upstream network device.
8. the method according to the description of claim 7 is characterized in that send the first filter NOTIFY to flow cleaning equipment it Afterwards, the method also includes:
When the flow of the first kind attack message is reduced to less than the first threshold, sends and eliminate notice to the flow Cleaning equipment, so that the flow cleaning equipment indicates that the upstream network device stops the of the filtering matching session characteristics A kind of object message.
9. the method according to the description of claim 7 is characterized in that the method also includes:
When the flow of any sort message is greater than second threshold and is less than the first threshold, confirm that such message is that the second class is attacked Hit message;
The second filter NOTIFY is sent to the flow cleaning equipment, second filter NOTIFY includes the second class attack message Session characteristics so that the flow cleaning equipment according to the session characteristics filter the second class object message.
10. a kind of protective device of network attack, which is characterized in that apply in flow cleaning equipment, described device includes:
First receiving unit, for receiving the first filter NOTIFY of flow detection device transmission, first filter NOTIFY includes The session characteristics of first kind attack message, the first kind attack message are the message that flow is greater than first threshold;
First execution unit is used to indicate the first kind object message that upstream network device filtering matches the session characteristics, In, message reaches Ingress Network equipment by the upstream network device;
Second receiving unit, the second filter NOTIFY sent for receiving the flow detection device, second filter NOTIFY Session characteristics including the second class attack message, the second class attack message are that flow is less than the first threshold greater than second The message of threshold value;
Second execution unit, for the session characteristics according to the second class attack message, according to default filtering rule, to the flow The message for being greater than second threshold less than first threshold is filtered.
11. a kind of protective device of network attack, which is characterized in that apply on flow detection device, described device includes:
Detection unit, the flow of every a kind of message for being sent to Ingress Network equipment according to the detection of the session characteristics of message;
First confirmation unit, for confirming that such message is attacked for the first kind when the flow of any sort message is greater than first threshold Hit message;
First transmission unit gives flow cleaning equipment for sending the first filter NOTIFY, and first filter NOTIFY includes described The session characteristics of first kind attack message, so that flow cleaning equipment instruction upstream network device filtering matches the session The first kind object message of feature, wherein message reaches Ingress Network equipment by the upstream network device;
Second confirmation unit, for when the flow of any sort message be less than the first threshold be greater than second threshold message when, Confirm that such message is the second class attack message;
Second transmission unit gives flow cleaning equipment for sending the second filter NOTIFY, and second filter NOTIFY includes described The session characteristics of second class attack message, so that flow cleaning equipment instruction upstream network device filtering matches the session Second class object message of feature, wherein message reaches Ingress Network equipment by the upstream network device.
CN201510330425.3A 2015-06-15 2015-06-15 The means of defence and device of network attack Active CN105991637B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510330425.3A CN105991637B (en) 2015-06-15 2015-06-15 The means of defence and device of network attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510330425.3A CN105991637B (en) 2015-06-15 2015-06-15 The means of defence and device of network attack

Publications (2)

Publication Number Publication Date
CN105991637A CN105991637A (en) 2016-10-05
CN105991637B true CN105991637B (en) 2019-06-07

Family

ID=57040006

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510330425.3A Active CN105991637B (en) 2015-06-15 2015-06-15 The means of defence and device of network attack

Country Status (1)

Country Link
CN (1) CN105991637B (en)

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899580A (en) * 2017-02-10 2017-06-27 杭州迪普科技股份有限公司 A kind of flow cleaning method and device
CN108737344B (en) * 2017-04-20 2021-08-24 腾讯科技(深圳)有限公司 Network attack protection method and device
CN107547507B (en) * 2017-06-27 2021-07-09 新华三技术有限公司 Anti-attack method and device, router equipment and machine readable storage medium
CN109756456B (en) * 2017-11-06 2021-12-03 中兴通讯股份有限公司 Method for improving network equipment safety, network equipment and readable storage medium
CN108449314B (en) * 2018-02-02 2020-12-29 杭州迪普科技股份有限公司 Flow traction method and device
CN109040141B (en) * 2018-10-17 2019-11-12 腾讯科技(深圳)有限公司 Detection method, device, computer equipment and the storage medium of abnormal flow
CN110430226B (en) * 2019-09-16 2021-08-17 腾讯科技(深圳)有限公司 Network attack detection method and device, computer equipment and storage medium
CN111031054A (en) * 2019-12-19 2020-04-17 紫光云(南京)数字技术有限公司 CC protection method
CN114268592A (en) * 2020-09-15 2022-04-01 华为技术有限公司 A message processing method, system and device
CN112118271B (en) * 2020-10-29 2023-06-27 杭州迪普科技股份有限公司 Flow cleaning method, device, equipment and computer readable storage medium
CN112565308B (en) * 2021-02-26 2021-05-18 北京邮电大学 Method, device, device and medium for detecting malicious application based on network traffic
CN115412310A (en) * 2022-08-11 2022-11-29 天翼安全科技有限公司 DDoS attack protection method, device, equipment and computer storage medium
CN115883161B (en) * 2022-11-25 2024-10-25 中国联合网络通信集团有限公司 Data flow transmission method, device and storage medium

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7028179B2 (en) * 2001-07-03 2006-04-11 Intel Corporation Apparatus and method for secure, automated response to distributed denial of service attacks
CN101136922B (en) * 2007-04-28 2011-04-13 华为技术有限公司 Service stream recognizing method, device and distributed refusal service attack defending method, system
CN101309150B (en) * 2008-06-30 2012-06-27 成都市华为赛门铁克科技有限公司 Distributed service attack refusing defense method, apparatus and system
CN102111394B (en) * 2009-12-28 2015-03-11 华为数字技术(成都)有限公司 Network attack protection method, equipment and system

Also Published As

Publication number Publication date
CN105991637A (en) 2016-10-05

Similar Documents

Publication Publication Date Title
CN105991637B (en) The means of defence and device of network attack
US9742800B2 (en) System and method for software defined behavioral DDoS attack mitigation
Mahajan et al. Controlling high bandwidth aggregates in the network
CN102143143B (en) Method and device for defending network attack, and router
KR100609170B1 (en) Network Security System and Its Operation Method
KR101574193B1 (en) Apparatus and method for defending DDoS attack
US9479532B1 (en) Mitigating denial of service attacks
WO2018108052A1 (en) Ddos attack defense method, system and related equipment
US20110138463A1 (en) Method and system for ddos traffic detection and traffic mitigation using flow statistics
CN104967588B (en) Protection method, apparatus and system for distributed denial of service DDoS (distributed denial of service) attack
US10142355B2 (en) Protection of telecommunications networks
Nawrocki et al. Down the black hole: dismantling operational practices of BGP blackholing at IXPs
CN108737447B (en) User datagram protocol flow filtering method, device, server and storage medium
You et al. Packet in message based DDoS attack detection in SDN network using OpenFlow
CN102790778A (en) DDos (distributed denial of service) attack defensive system based on network trap
CA2904463C (en) Protection of telecommunications networks
CN108028828B (en) A distributed denial of service DDoS attack detection method and related equipment
CN103428224A (en) Method and device for intelligently defending DDoS attacks
CN106657126B (en) The device and method of detection and defending DDoS (Distributed Denial of Service) attacks
CN101001249A (en) Method and device for preventing IGMP message attack
CN106027497A (en) DDoS (Distributed Denial of Service) tracing and source end filtering method oriented to SDN (Software Defined Networking) and based on OpenFlow-DPM
CN108737344A (en) A kind of network attack protection method and device
JP2006067078A (en) Network system and attack prevention method
JP2005210601A (en) Intrusion detection device
Tanachaiwiwat et al. Differential packet filtering against DDoS flood attacks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Binjiang District and Hangzhou city in Zhejiang Province Road 310051 No. 68 in the 6 storey building

Applicant after: Hangzhou Dipu Polytron Technologies Inc

Address before: Binjiang District and Hangzhou city in Zhejiang Province Road 310051 No. 68 in the 6 storey building

Applicant before: Hangzhou Dipu Technology Co., Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant