Summary of the invention
The embodiment of the invention provides a kind of degradation attack detection method, can improve the accuracy reduction network congestion that RoQ detects.
For solving the problems of the technologies described above, the embodiment of the invention provides a kind of degradation attack detection method on the one hand, comprising:
At server end message flow is carried out degradation attack stream and detect, when detecting suspicious RoQ stream, will carry out the time period of message information statistics to the subsequent packet of this suspicious RoQ stream and send to the source end;
Receive the subsequent packet statistical information of this suspicious RoQ stream in the said time period of said source end transmission, said suspicious RoQ stream is detected once more according to this statistical information;
When detect confirming that once more said suspicious RoQ stream flows for RoQ, notify said source end that said RoQ is flowed and carry out discard processing.
The embodiment of the invention also provides a kind of degradation attack defence method on the other hand, comprising:
The subsequent packet to suspicious RoQ stream that source end reception server end sends carries out the time period of message information statistics;
The source end is added up the acquisition statistical information to the subsequent packet information of said suspicious RoQ stream in the said time period, and this statistical information is sent so that said suspicious RoQ stream is confirmed to server end;
The said suspicious RoQ stream of the affirmation that the reception server end sends is the information of RoQ stream, and the source end carries out discard processing to said RoQ stream.
The embodiment of the invention also provides a kind of degradation attack checkout equipment on the other hand, comprising:
Receiving element is used for message flow and counting messages information that the reception sources end sends;
Detecting unit, the message flow that is used for that said receiving element is received carry out degradation attack stream and detect, and after detecting suspicious RoQ stream, according to said counting messages information suspicious RoQ stream are detected affirmation once more;
Transmitting element is used for sending processing messages according to the testing result of said detecting unit to said source end.
The embodiment of the invention also provides a kind of access device on the other hand, comprising:
Transmitting element is used for the counting messages information in server end sends message flow and predetermined amount of time;
Receiving element, the subsequent packet to suspicious RoQ stream that is used for the transmission of reception server end carries out the time period of message information statistics;
Processing unit; The subsequent packet that is used in the said time period, suspicious RoQ being flowed carries out the message information statistics; Obtain the counting messages information in the said time period; And suspicious RoQ stream is detected when confirming that said suspicious RoQ stream flows for RoQ once more according to the counting messages information in the said time period at said server end, said RoQ is flowed transmit to be used for discard processing.
Embodiment of the invention access device after server end confirms that suspicious RoQ stream is for RoQ stream, is transmitted to be used for discard processing said RoQ stream.End is realized the defence to RoQ stream in the source like this, can prevent that attack message from getting into backbone network, reduces network congestion.
Embodiment
To combine the accompanying drawing in the embodiment of the invention below, the technical scheme in the embodiment of the invention is carried out clear, intactly description, obviously, described embodiment only is the present invention's part embodiment, rather than whole embodiment.Based on the embodiment among the present invention, those of ordinary skills are not making the every other embodiment that is obtained under the creative work prerequisite, all belong to the scope of the present invention's protection.
Fig. 2 is the flow chart of embodiment of the invention degradation attack detection method.Referring to shown in Figure 2, embodiment of the invention degradation attack detection method comprises:
S10, at server end message flow is carried out degradation attack RoQ stream and detect, when detecting suspicious RoQ stream, confirm and Xiang Yuanduan sends the time period of the subsequent packet of this suspicious RoQ stream being carried out the message information statistics;
The subsequent packet statistical information of this suspicious RoQ stream in the said time period that S11, the said source of reception end send detects said suspicious RoQ stream according to this statistical information once more;
S12, when when detect confirming that once more said suspicious RoQ stream flows for RoQ, notify said source end that said RoQ is flowed and carry out discard processing.
In the embodiment of the invention degradation attack detection method; After detecting suspicious RoQ stream; The information of the subsequent packet of this suspicious RoQ stream being added up according to the source end detects said suspicious RoQ stream once more; When detect confirming that once more said suspicious RoQ stream flows for RoQ, notify said source end that said RoQ is flowed and carry out discard processing.Can improve the accuracy that RoQ detects like this.
Further; In said step S10; When server end carries out the detection of degradation attack stream to message flow, can the characteristic of message flow be detected, like periodicity, high speed property and the short-time characteristic of detection messages stream; When the characteristic of the characteristic conforms RoQ of detected message flow stream, can confirm that then said message flow to be detected is suspicious RoQ stream.When detecting suspicious RoQ stream; The time period that then will carry out the message information statistics to the subsequent packet of this suspicious RoQ stream sends to the source end; So that the source end carries out Information Statistics to the subsequent packet of suspicious RoQ stream in the said time period, like the quantity of the subsequent packet that obtains the suspicious RoQ stream in the said time period.
Time period that the subsequent packet of will be to this suspicious RoQ stream carries out the message information statistics when the source end sends, can also send the instruction that this suspicious RoQ stream is stamped special tag to the source end.Be convenient to the source end like this and according to this instruction suspicious RoQ stream stamped special tag and make it to distinguish, so that suspicious RoQ stream is defendd targetedly with normal message stream.
Wherein, among the above-mentioned steps S11, according to the subsequent packet statistical information of suspicious RoQ stream said suspicious RoQ stream being detected once more, can be that disclosed method is carried out in the U.S. Patent application of US20080320585 according to publication number.Specifically be said suspicious RoQ stream to be detected once more in the present embodiment, when said message amount reaches predetermined threshold, confirm that then said suspicious RoQ stream flows for real RoQ according to the message amount that the suspicious RoQ in the said time period flows.Certainly, also can said suspicious RoQ stream be detected once more according to the message amount of this suspicious RoQ stream of the response in the said time period.
In above-mentioned steps S12; When detect confirming that once more said suspicious RoQ stream flows for RoQ; Notifying said source end that said RoQ stream is carried out discard processing comprises: when through detecting once more when confirming that said suspicious RoQ stream flow for RoQ, notify said source end to carry out discard processing to flowing at said suspicious RoQ that the said special tag of stamping is confirmed and said RoQ being flowed.Like this can be through message flow being detected at server end, end prevents that to effectively defending through detecting the RoQ attack of confirming attack message from getting into backbone network, reduces network congestion in the source.
When detect confirming that once more said suspicious RoQ stream is not RoQ stream, notify said source end that the said special tag of stamping at said suspicious RoQ stream is cancelled processing.
Fig. 3 is the flow chart of embodiment of the invention degradation attack defence method.Referring to shown in Figure 3, corresponding with above-mentioned degradation attack detection method, the embodiment of the invention provides a kind of degradation attack defence method, comprising:
The subsequent packet to suspicious RoQ stream that S21, source end reception server end send carries out the time period of message information statistics;
S22, source end are added up the acquisition statistical information to the subsequent packet information of said suspicious RoQ stream in the said time period, and this statistical information is sent so that server is confirmed said suspicious RoQ stream to server end;
The said suspicious RoQ stream of the affirmation that S23, source end reception server end send is the information of RoQ stream, and the source end carries out discard processing to said RoQ stream.
The degradation attack defence method that the embodiment of the invention provides, after server end confirmed that suspicious RoQ stream is for RoQ stream, the source end carried out discard processing to said RoQ stream.End is realized the defence to RoQ stream in the source like this, can prevent that attack message from getting into backbone network, reduces network congestion.
In said step S21, when the subsequent packet to suspicious RoQ stream that the reception server end sends carries out the time period of message information statistics, also comprise: what the reception server end sent flows the instruction of stamping special tag to suspicious RoQ;
Said suspicious RoQ stream is stamped special tag, and the suspicious RoQ stream that will have this special tag carries out smoothing processing.Suspicious RoQ stream to having special tag carries out smoothing processing, can prevent that the RoQ erroneous judgement from causing losing of legal message.
In above-mentioned steps S22; In the said time period, the subsequent packet information of said suspicious RoQ stream being added up the acquisition statistical information comprises: in the said time period, the subsequent packet information of said suspicious RoQ stream is added up, obtain the message amount in the said time period.
In above-mentioned steps S23; The said suspicious RoQ stream of the affirmation that said reception server end sends is the information of RoQ stream, and the source end carries out discard processing to said RoQ stream and comprises: the information that added special tag on the said suspicious RoQ stream is confirmed of reception server end transmission; The source end confirms added special tag on the said suspicious RoQ stream, and the RoQ stream that will have a said special tag carries out discard processing.Like this, end can be attacked RoQ and be on the defensive in the source, can prevent that attack message from getting into backbone network, reduces network congestion.
According to embodiment of the invention degradation attack defence method on the other hand, described degradation attack defence method also comprises: what the reception server end sent cancels information processed to added said special tag on the said suspicious RoQ stream; The source end is cancelled added said special tag on the said suspicious RoQ stream, and the message flow after special tag cancelled is stamped common label and normally transmitted.
Below with in the network of being formed by source end and server end to RoQ stream detect with defence be example, embodiment of the invention degradation attack is detected and defence method specifies.In embodiments of the present invention, said source end comprises client, access device and flow management apparatus; Said server end comprises server apparatus and gateway device.
Shown in Figure 4ly detect and message flow handling process when confirming that suspicious RoQ stream flows for RoQ for server end.Referring to shown in Figure 4, said flow process comprises step:
31) client is sent message flow to access device, possibly flow for RoQ in the said message flow;
32) after access device is stamped common label or stamped common label said message flow, said message flow is sent to flow management apparatus;
33) flow management apparatus is transmitted to gateway device with said message flow;
34) gateway device detects said message flow; When detecting said message flow when being suspicious RoQ stream; The instruction that to stamp special tag to this suspicious RoQ stream, and the time period that the subsequent packet of this suspicious RoQ stream carries out the message information statistics sent to said access device;
When detecting said message flow when being non-RoQ stream, said gateway device normally is transmitted to server with said message flow.
35) said access device is according to said instruction of stamping special tag, and said suspicious RoQ stream is stamped special tag, and the suspicious RoQ circulation that will have this special tag is issued flow management apparatus and carried out smoothing processing.
36) said access device was added up the message amount of the subsequent packet of suspicious RoQ stream according to the said time period, and the message amount that will in the said time period, add up sends to gateway device;
37) gateway device detects said suspicious RoQ stream according to said message amount once more, when through detecting once more when confirming that said suspicious RoQ stream flows for RoQ, notifies said access device that the special tag that said RoQ flows is confirmed;
38) access device is confirmed the special tag of said RoQ stream, and the RoQ circulation that will have a said special tag issues flow management apparatus, and said flow management apparatus carries out discard processing to said RoQ stream.
Shown in Figure 5ly detect and message flow handling process when confirming suspicious RoQ stream for server end for non-RoQ stream.Referring to shown in Figure 5, said flow process comprises step:
41) client is sent message flow to access device, possibly flow for RoQ in the said message flow;
42) after access device is stamped common label or stamped common label said message flow, said message flow is sent to flow management apparatus;
43) flow management apparatus is transmitted to gateway device with said message flow;
44) gateway device detects said message flow; When detecting said message flow when being suspicious RoQ stream; The instruction that to stamp special tag to this suspicious RoQ stream, and the time period that the subsequent packet of this suspicious RoQ stream carries out the message information statistics sent to said access device;
When detecting said message flow when being non-RoQ stream, said gateway device normally is transmitted to server with said message flow.
45) said access device is according to said instruction of stamping special tag, and said suspicious RoQ stream is stamped special tag, and the suspicious RoQ circulation that will have this special tag is issued flow management apparatus and carried out smoothing processing.
46) said access device was added up the message amount of the subsequent packet of suspicious RoQ stream according to the said time period, and the message amount that will in the said time period, add up sends to gateway device;
47) gateway device detects said suspicious RoQ stream according to said message amount once more, when through detecting once more when confirming said suspicious RoQ stream for non-RoQ stream, notifies said access device that the special tag of said RoQ stream is cancelled;
48) access device is cancelled the special tag of said RoQ stream, and stamps common label and send to flow management apparatus cancelling message flow after the special tag, and flow management apparatus is normally transmitted the message flow of having stamped common label.
Shown in Figure 6 is the block diagram of embodiment of the invention degradation attack checkout equipment.Referring to shown in Figure 6, the embodiment of the invention also provides a kind of degradation attack checkout equipment 60, is used to realize said method embodiment of the present invention, comprising:
Receiving element 61 is used for message flow and counting messages information that the reception sources end sends;
Detecting unit 62, the message flow that is used for that said receiving element is received carry out degradation attack stream and detect, and according to said counting messages information suspicious RoQ stream are confirmed;
Transmitting element 63 is used for sending processing messages according to the testing result of said detecting unit to said source end.
Embodiment of the invention degradation attack checkout equipment can carry out degradation attack stream to message flow and detect, and when detecting suspicious RoQ stream, can detect affirmation once more to suspicious RoQ stream according to counting messages information.Can improve the accuracy that RoQ detects like this.
Shown in Figure 7 for the block diagram of another embodiment of degradation attack checkout equipment of the present invention.Referring to shown in Figure 7, on Fig. 6 basis, said detecting unit 62 comprises:
Whether first detection module 621, the message flow that is used for that said receiving element is received carry out degradation attack stream and detect, be suspicious RoQ stream to confirm said message flow;
Whether second detection module 622 is used for according to said counting messages information suspicious RoQ stream being detected once more, be RoQ stream to confirm said suspicious RoQ stream.
Shown in Figure 8 is the block diagram of embodiment of the invention access device.Referring to shown in Figure 8, the embodiment of the invention also provides a kind of access device 80,, be used to realize that said method embodiment of the present invention comprises:
Transmitting element 81 is used for the counting messages information in server end sends message flow and predetermined amount of time;
Receiving element 82, the subsequent packet to suspicious RoQ stream that is used for the transmission of reception server end carries out the time period of message information statistics;
Processing unit 83; The subsequent packet that is used in the said time period, suspicious RoQ being flowed carries out the message information statistics; Obtain the counting messages information in the said time period; And suspicious RoQ stream is detected when confirming that said suspicious RoQ stream flows for RoQ once more according to the counting messages information in the said time period at said server end, said RoQ is flowed transmit to be used for discard processing.
Embodiment of the invention access device after server end confirms that suspicious RoQ stream is for RoQ stream, is transmitted to be used for discard processing said RoQ stream.End is realized the defence to RoQ stream in the source like this, can prevent that attack message from getting into backbone network, reduces network congestion.
Shown in Figure 9 for the block diagram of another embodiment of access device of the present invention.With reference to shown in Figure 9, wherein, on Fig. 8 basis, said receiving element 82, the instruction that said special tag is confirmed that suspicious RoQ stream is stamped that instruction and the reception server end of special tag send that is used for also that the reception server end sends.
Said processing unit 83 further comprises:
Special tag processing module 831; Be used for suspicious RoQ being flowed the instruction of stamping special tag according to what said server end sent; Said suspicious RoQ stream is stamped special tag, and said special tag is confirmed according to the instruction that said special tag is confirmed that said receiving element receives;
Module 832 is sent out in circulation, is used for the suspicious RoQ stream of confirming through special tag is transmitted to be used for discard processing.
Further, module 832 is sent out in said circulation, also is used for suspicious RoQ stream is transmitted to be used for smoothing processing.
The above; Be merely embodiment of the present invention, but protection scope of the present invention is not limited thereto, any technical staff who is familiar with the present technique field is in the technical scope that the present invention discloses; Can expect easily changing or replacement, all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion by said protection range with claim.