首页> 外国专利> NETWORK ATTACK DETECTION METHOD, NETWORK ATTACK SOURCE IDENTIFICATION METHOD, NETWORK APPARATUS, NETWORK ATTACK DETECTING PROGRAM, AND NETWORK ATTACK SOURCE IDENTIFICATION PROGRAM

NETWORK ATTACK DETECTION METHOD, NETWORK ATTACK SOURCE IDENTIFICATION METHOD, NETWORK APPARATUS, NETWORK ATTACK DETECTING PROGRAM, AND NETWORK ATTACK SOURCE IDENTIFICATION PROGRAM

机译:网络攻击检测方法,网络攻击源识别方法,网络设备,网络攻击检测程序和网络攻击源识别程序

摘要

PROBLEM TO BE SOLVED: To provide a technology of detecting the occurrence of a network attack and identifying an attack source carrying out the network attack without stopping transfer of packets and independently of simple comparison between past traffic and present traffic .;SOLUTION: A network attack detection method includes the steps of: performing control of a delay time from the reception of a packet to the transmission of the packet depending on a transmission destination when the packet returned from the transmission destination to a transmission source is received and transmitted; and judging whether or not an attack is applied to the transmission destination by making evaluation of variations in a packet amount transmitted to the transmission destination while relating the evaluation to the above control, and a network attack source identification method includes the steps of: performing control of a delay time from the reception of a packet to the transmission of the packet depending on the transmission source when the packet returned from the transmission destination to the transmission source is received and transmitted; and identifying the transmission source for applying an attack to the transmission destination by making evaluation of variations in a packet amount transmitted to the transmission destination for each transmission source while relating the evaluation to the above control.;COPYRIGHT: (C)2005,JPO&NCIPI
机译:解决的问题:提供一种检测网络攻击的发生并识别出进行网络攻击的攻击源而不停止数据包传输并且独立于过去流量和当前流量之间的简单比较的技术。解决方案:网络攻击检测方法包括以下步骤:当接收并发送从发送目的地返回到发送源的分组时,根据发送目的地来控制从分组的接收到分组的发送的延迟时间。网络攻击源识别方法包括以下步骤:通过在评估与上述控制相关的同时,评估发送到发送目的地的分组量的变化,来判断是否对发送目的地施加了攻击,网络攻击源识别方法包括以下步骤:当接收和发送从传输目的地返回到传输源的分组时,取决于传输源,从接收分组到传输分组的延迟时间;通过评估与每个控制源相关的传输到传输目的地的数据包数量的变化,同时评估与上述控制相关,确定对传输目的地施加攻击的传输源。版权所有:(C)2005,JPO&NCIPI

著录项

相似文献

  • 专利
  • 外文文献
  • 中文文献
获取专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号