首页> 外国专利> PROCESS TO THWART DENIAL OF SERVICE ATTACKS ON THE INTERNET

PROCESS TO THWART DENIAL OF SERVICE ATTACKS ON THE INTERNET

机译:互联网上全面拒绝服务攻击的过程

摘要

Coordinated SYN denial of service (CSDoS) attacks are reduced or eliminated by a process that instructs a layer 4-7 switch to divert a small fraction of SYN packets destined to a server S to a web guard processor. The web guard processor acts as a termination point in the connection with the one or more clients from which the packets originated, and upon the establishment of a first TCP connection with a legitimate client, opens a new TCP connection to the server and transfers the data between these two connections. It also monitors the number of timed-out connections to each client. When a CSDoS attack is in progress, the number of the forged attack packets and hence the number of timed-out connections increases significantly. If this number exceeds a predetermined threshold amount, the web guard processor declares that this server is under attack. It then reprograms the switch to divert all traffic (i.e. SYN packets) destined to this server to the web guard processor, or to delete all SYN packets to the server in question. If the number of timed-out connections increases, it can also inform other web guard processor arrangements, and/or try to find the real originating hosts for the forged packets. In either event, the server is thus shielded from, and does not feel the effects of, the DoS attack. Alternatively, a simpler approach is to arrange layer 4-7 switches to forward SYN packets to respective “null-cache” TCP proxies that each are arranged to operate without an associated cache, and therefore be inexpensive to install and operate. These null-cache TCP proxies, when subject to a CSDoS attack, will not successfully establish a TCP connection with a malicious host, due to the nature of the attack itself. Accordingly, no connections will be made from the null-cache TCP proxies to the server under attack, and the server will be protected.
机译:通过指示4-7层交换机将发往服务器S的一小部分SYN数据包转移到Web防护处理器的过程,可以减少或消除协调的SYN拒绝服务(CSS)攻击。 Web防护处理器充当与一个或多个客户端(数据包源自该客户端)的连接的终止点,并在与合法客户端建立第一个TCP连接后,打开与服务器的新TCP连接并传输数据这两个连接之间。它还监视与每个客户端的超时连接数。当进行CSS攻击时,伪造攻击数据包的数量以及因此超时连接的数量将大大增加。如果该数量超过预定的阈值量,则Web保护处理器将声明该服务器受到攻击。然后,它会对交换机进行重新编程,以将发往该服务器的所有流量(即SYN数据包)转移到Web保护处理器,或删除所有到该服务器的SYN数据包。如果超时连接的数量增加,它也可以通知其他Web Guard处理器安排,和/或尝试查找伪造数据包的真实始发主机。无论哪种情况,服务器都可以抵御DoS攻击,并且不会受到DoS攻击的影响。替代地,一种更简单的方法是安排第4-7层交换机将SYN数据包转发到各自的“空缓存” TCP代理,每个代理均被安排为在没有关联的缓存的情况下运行,因此安装和运行成本低廉。这些空缓存的TCP代理受到CSS攻击时,由于攻击本身的性质,将无法成功与恶意主机建立TCP连接。因此,将不会从零缓存TCP代理到受到攻击的服务器建立任何连接,并且服务器将受到保护。

著录项

  • 公开/公告号US2008016566A1

    专利类型

  • 公开/公告日2008-01-17

    原文格式PDF

  • 申请/专利权人 DANNY RAZ;

    申请/专利号US20070774060

  • 发明设计人 DANNY RAZ;

    申请日2007-07-06

  • 分类号G06F11/00;

  • 国家 US

  • 入库时间 2022-08-21 20:14:57

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号