[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN109889470B - A method and system for defending against DDoS attacks based on routers - Google Patents

A method and system for defending against DDoS attacks based on routers Download PDF

Info

Publication number
CN109889470B
CN109889470B CN201711279446.2A CN201711279446A CN109889470B CN 109889470 B CN109889470 B CN 109889470B CN 201711279446 A CN201711279446 A CN 201711279446A CN 109889470 B CN109889470 B CN 109889470B
Authority
CN
China
Prior art keywords
router
server
connected device
attack
packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711279446.2A
Other languages
Chinese (zh)
Other versions
CN109889470A (en
Inventor
刘春梅
韩锐
郭志川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Xinrand Network Technology Co ltd
Institute of Acoustics CAS
Original Assignee
Institute of Acoustics CAS
Beijing Intellix Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Acoustics CAS, Beijing Intellix Technologies Co Ltd filed Critical Institute of Acoustics CAS
Priority to CN201711279446.2A priority Critical patent/CN109889470B/en
Publication of CN109889470A publication Critical patent/CN109889470A/en
Application granted granted Critical
Publication of CN109889470B publication Critical patent/CN109889470B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a method and a system for defending DDoS attacks based on a router, wherein the method for defending DDoS attacks based on the router is applied to a system consisting of the router, a connecting device and a server and comprises the following steps: the router periodically reports the equipment information and the flow statistic information of the connection equipment to the server; the server side carries out data analysis and statistics on the information reported by the router and judges whether the connection equipment externally launches DDoS attack or not; when it is determined that a connection device is initiating a DDoS attack to the outside, the server sends a message instruction for capturing the specified connection device to the router, and the router sends the captured message to the server; the server generates a new security protection strategy based on the attack characteristics of the message and informs the router to download the new security protection strategy; and the router executes a new security protection strategy to carry out attack protection. The invention intelligently and dynamically adjusts the security protection strategy aiming at the DDoS attack which is constantly changed through the server side, and prevents the DDoS attack from happening.

Description

一种基于路由器防御DDoS攻击的方法和系统A method and system for defending against DDoS attacks based on routers

技术领域technical field

本发明涉及网络安全技术领域,尤其涉及一种基于路由器防御DDoS攻击的方法和系统。The invention relates to the technical field of network security, in particular to a method and system for defending against DDoS attacks based on routers.

背景技术Background technique

DDoS,全称“Distributed Denial of Service”,中文名叫分布式拒绝服务,其原理是将多个计算机联合起来作为攻击平台,用虚假的访问来耗光攻击目标的全部服务器资源,导致服务系统瘫痪而正常用户无法访问的情况。过去,会成为“肉鸡”的一般都是个人电脑以及少量智能手机。但随着网络安全技术的发展和人们防范意识的提升,这种攻击的成本越来越高了,黑客们逐渐将物联网设备和家庭联网设备作为新的攻击目标。家庭中的智能冰箱、智能摄像头、智能网关等设备普遍存在长时间在线和安全性薄弱的特点,极易被网络黑客利用变成僵尸网络中的“肉鸡”设备,用于大规模的DDoS攻击。DDoS, the full name of "Distributed Denial of Service", the Chinese name is Distributed Denial of Service, its principle is to combine multiple computers as an attack platform, use false access to consume all the server resources of the attack target, causing the service system to be paralyzed and Inaccessible to normal users. In the past, the "broilers" were generally personal computers and a small number of smartphones. However, with the development of network security technology and the improvement of people's awareness of prevention, the cost of such attacks is getting higher and higher, and hackers gradually take IoT devices and home networking devices as new attack targets. Devices such as smart refrigerators, smart cameras, and smart gateways in the home are generally online for a long time and have weak security. They are easily used by network hackers to become "broiler" devices in botnets for large-scale DDoS attacks.

在家庭网络中,家用路由器是物联网设备和家庭智能终端连接网络的第一级设备,是发现这些智能设备正在做什么的最佳位置。如果在路由器上可以及时发现并限制设备对外发送的攻击流量,那么就可以从源头上阻止设备参与DDoS攻击。In the home network, the home router is the first-level device for IoT devices and home smart terminals to connect to the network, and it is the best place to discover what these smart devices are doing. If the router can detect and limit the attack traffic sent by the device in time, then the device can be prevented from participating in the DDoS attack from the source.

现有家用路由器上防范DDoS攻击的方法普遍都是采用本地化防护的方法,例如,在家用路由器的默认防火墙上进行手动配置访问控制列表或者监控网络的本地流量,当总流量超过设定的障碍条件时,判断参与了DDoS攻击,进而实行限流限速等防护措施。然而,现有的这些技术方法存在着一些不足,例如,采用手动配置方法对于防护DDoS攻击具有严重的滞后性,不能根据动态变化的DDoS攻击及时做出响应;总流量阈值检查策略不能根据设备类型进行区分,不能够动态调整总流量阈值,会对部分设备的联网访问造成限制误判等等。因此,研究在家庭路由器上如何防止对外发起DDoS攻击,需要更进一步分析和研究。Existing methods to prevent DDoS attacks on home routers generally use localized protection methods. For example, manually configure the access control list on the default firewall of the home router or monitor the local traffic of the network. When the total traffic exceeds the set barrier When the conditions are met, it is judged that it has participated in a DDoS attack, and then protective measures such as current limiting and speed limiting are implemented. However, these existing technical methods have some shortcomings. For example, the manual configuration method has a serious lag in protecting against DDoS attacks, and cannot respond in time to dynamically changing DDoS attacks; the total traffic threshold inspection strategy cannot be based on device types. To distinguish, the total traffic threshold cannot be dynamically adjusted, which will limit the network access of some devices and cause misjudgment and so on. Therefore, it is necessary to further analyze and study how to prevent DDoS attacks from being launched on home routers.

发明内容SUMMARY OF THE INVENTION

本发明实施例提供了一种基于路由器防御DDoS攻击的方法和系统,用以解决现有技术中基于家庭路由器进行联网的设备被劫持作为“肉鸡”对外进行DDoS攻击时,不能够被及时发现和不能够针对不同的设备实施不同的安全防护策略以及不能够智能动态地更新路由器的安全防护策略的问题。Embodiments of the present invention provide a router-based method and system for defending against DDoS attacks, so as to solve the problem that in the prior art, when a device connected to the Internet based on a home router is hijacked as a "broiler" to carry out DDoS attacks externally, it cannot be discovered and processed in time. The problem of not being able to implement different security protection strategies for different devices and not being able to intelligently and dynamically update the security protection strategies of the router.

为实现上述目的,本发明一方面提供了一种基于路由器防御DDoS攻击的方法,应用于由路由器、连接设备和服务端构成的系统中,包括以下步骤:路由器将连接设备的设备信息和流量统计信息周期性地上报给服务端;服务端对所述路由器上报的信息进行数据分析和统计,判断所述连接设备是否在对外发起DDoS攻击;当判定有连接设备正在对外发起DDoS攻击时,服务端向所述路由器发送抓取指定连接设备的报文指令,所述路由器将抓取的报文发送给服务端;服务端基于所述报文的攻击特征,生成新的安全防护策略并通知所述路由器下载所述新的安全防护策略;所述路由器执行所述新的安全防护策略进行攻击防护。In order to achieve the above object, one aspect of the present invention provides a method for defending against DDoS attacks based on a router, which is applied to a system formed by a router, a connecting device and a server, including the following steps: the router will connect the device information and traffic statistics of the device. The information is periodically reported to the server; the server performs data analysis and statistics on the information reported by the router, and determines whether the connected device is launching a DDoS attack externally; when it is determined that a connected device is launching a DDoS attack, the server Send a packet instruction for grabbing a specified connected device to the router, and the router sends the grabbed packet to the server; the server generates a new security protection strategy based on the attack characteristics of the packet and notifies the The router downloads the new security protection policy; the router executes the new security protection policy for attack protection.

优选地,服务端判断所述连接设备是否在对外发起DDoS攻击,具体包括:所述路由器根据在最近N个上报周期中上报给服务端的流量统计数据进行判断;当最近N个上报周期中的每个周期内的流量统计数据中,所述连接设备的流量数据都大于给定的监控流量阈值,则判定所述连接设备正在对外发起DDoS攻击。Preferably, the server determines whether the connected device is launching a DDoS attack externally, which specifically includes: the router determines according to the traffic statistics reported to the server in the last N reporting periods; In the traffic statistics data within a period, if the traffic data of the connected device is all greater than the given monitoring traffic threshold, it is determined that the connected device is launching a DDoS attack externally.

优选地,还包括:当最近N个上报周期中的至少N/2个周期内的流量统计数据中,所述连接设备的流量数据都大于给定的监控流量阈值,则判定所述连接设备可能正在对外发起DDoS攻击;服务端向路由器发送抓取报文指令后,分析所述路由器抓取的报文,判断所述报文是否存在攻击流量报文;当所述报文存在攻击流量报文,则判定所述连接设备正在对外DDoS攻击,并通知所述路由器调整流量统计的上报周期间隔为原来的1/2。Preferably, it also includes: when the traffic data of the connected device in at least N/2 of the last N reporting cycles is greater than a given monitoring traffic threshold, it is determined that the connected device may be A DDoS attack is being launched externally; after the server sends a packet capture command to the router, it analyzes the packet captured by the router to determine whether the packet contains an attack traffic packet; when the packet contains an attack traffic packet , then it is determined that the connected device is attacking external DDoS, and the router is notified to adjust the reporting period interval of the traffic statistics to 1/2 of the original.

优选地,所述连接设备的监控流量阈值,包括:服务端在初始化时,给所述路由器的每个连接设备分配一个初始监控流量阈值;在运行期间,当服务端检测到所述连接设备在最近的历史周期M内都没有对外发起DDoS攻击,则调整所述连接设备的监控流量阈值;更新所述监控流量阈值为历史周期M内各上报周期统计时间段内的平均值;服务端保存所述连接设备更新后的各个时间段的监控流量阈值。Preferably, the monitoring traffic threshold of the connected device includes: when the server is initialized, assigning an initial monitoring traffic threshold to each connected device of the router; during operation, when the server detects that the connected device is in If no DDoS attack was launched in the recent historical period M, the monitoring traffic threshold of the connected device is adjusted; the monitoring traffic threshold is updated to the average value in the statistical time period of each reporting period in the historical period M; the server saves all The monitoring traffic threshold for each time period after the connected device is updated.

优选地,服务端向所述路由器发送抓取指定连接设备的报文指令,具体包括:服务端向所述路由器发送周期性抓取指定设备的报文指令;所述抓取报文指令中通过连接设备的MAC地址来指定路由器的具体连接设备;所述抓取报文指令中包含多个路由器的连接设备的MAC地址。Preferably, the server sends a packet instruction to the router to grab the specified connected device, which specifically includes: the server sends to the router a packet instruction to periodically grab the designated device; The MAC address of the connecting device is used to specify the specific connecting device of the router; the grabbing packet instruction includes the MAC addresses of the connecting devices of multiple routers.

优选地,服务端基于所述路由器抓取报文的攻击特征,具体包括:所述新的安全防护策略限定用于正在对外发起DDoS攻击的连接设备;服务端根据所述路由器回复的周期性报文,持续地生成更所述新的安全防护策略;当服务端重新检测到所述路由器指定连接设备的流量统计数据不满足预设的故障条件时,服务端向所述路由器发送停止抓取指定连接设备的报文指令;当所述路由器的上报周期间隔有被调整,则通知所述路由器将上报周期间隔恢复为默认值。Preferably, the server captures attack characteristics of packets based on the router, specifically including: the new security protection policy is limited to connecting devices that are initiating DDoS attacks externally; The new security protection policy is continuously generated and updated; when the server re-detects that the traffic statistics data of the connected device specified by the router does not meet the preset fault conditions, the server sends a stop crawling designation to the router. The message instruction of the connection device; when the reporting period interval of the router is adjusted, the router is notified to restore the reporting period interval to the default value.

另一方面提供了一种一种基于路由器防御DDoS攻击的系统,包括:路由器、连接设备和服务端构成;路由器将连接设备的设备信息和流量统计信息周期性地上报给服务端;服务端对所述路由器上报的信息进行数据分析和统计,判断所述连接设备是否在对外发起DDoS攻击;当判定有连接设备正在对外发起DDoS攻击时,服务端向所述路由器发送抓取指定连接设备的报文指令,所述路由器将抓取的报文发送给服务端;服务端基于所述报文的攻击特征,生成新的安全防护策略并通知所述路由器下载所述新的安全防护策略;所述路由器执行所述新的安全防护策略进行攻击防护。On the other hand, a system for defending against DDoS attacks based on a router is provided, including: a router, a connecting device and a server; the router periodically reports the device information and traffic statistics of the connecting device to the server; Data analysis and statistics are performed on the information reported by the router to determine whether the connected device is launching a DDoS attack externally; when it is determined that a connected device is launching a DDoS attack externally, the server sends a report to the router to capture the specified connected device. The router sends the captured message to the server; the server generates a new security protection strategy based on the attack characteristics of the message and notifies the router to download the new security protection strategy; the The router executes the new security protection policy for attack protection.

优选地,所述服务端包括:接收模块,用于接收所述路由器的数据请求相关信息、周期性上报的数据信息和所述路由器抓取的报文;分析模块,用于分析所述路由器上报的设备信息、流量统计信息和所述路由器抓取的报文;存储模块,用于存储所述路由器的上报周期间隔、连续判定周期数N、各个连接设备在运行周期M内各时间段的监控流量阈值和所述路由器最新的安全防护策略;判断模块,用于根据所述路由器上报的设备信息、流量统计信息和所述连接设备的监控流量阈值,判断所述连接设备是否在对外发起DDoS攻击;用于根据所述路由器抓取的报文,判断是否存在攻击;策略生成模块,根据所述路由器抓取的报文的攻击特征,生成新的安全防护策略;发送模块,用于向所述路由器发送相关信息和消息指令,包括抓取所述路由器指定连接设备的报文指令、调整所述路由器上报周期间隔的指令和通知所述路由器下载新的安全防护策略的指令。Preferably, the server includes: a receiving module for receiving data request-related information from the router, periodically reported data information, and packets captured by the router; an analysis module for analyzing the router's report The device information, traffic statistics information and the packets captured by the router; the storage module is used to store the reporting period interval of the router, the number of continuous judgment periods N, and the monitoring of each connected device in each time period in the operating period M. The traffic threshold and the latest security protection policy of the router; the judgment module is used to judge whether the connected device is initiating a DDoS attack externally according to the device information and traffic statistics reported by the router and the monitored traffic threshold of the connected device ; Be used for judging whether there is an attack according to the message captured by the router; the strategy generation module generates a new security protection strategy according to the attack feature of the message captured by the router; The router sends relevant information and message instructions, including an instruction to grab a packet specified by the router to connect to a device, an instruction to adjust the reporting period interval of the router, and an instruction to notify the router to download a new security protection policy.

优选地,所述路由器包括:数据接收模块,用于接收服务端向所述路由器发送的抓取指定连接设备的报文指令和调整数据上报周期间隔的指令;数据统计模块,用于周期性地统计所述路由器连接设备的设备信息和流量统计信息;报文抓取模块,用于根据从服务端收到的抓取报文指令对所述路由器进行抓取报文;安全防御模块,用于下载和执行服务端下载的所述新的安全防护策略,对所述路由器上正在对外发起的DDoS攻击的连接设备进行访问限制;数据发送模块,用于向服务端请求所述路由器的相关属性信息、周期性地向服务端发送所述路由器连接设备的设备信息和流量统计信息、向服务器发送抓取的报文和下载所述新的安全防护策略。Preferably, the router includes: a data receiving module for receiving a packet instruction for grabbing a specified connected device and an instruction for adjusting a data reporting period interval sent by a server to the router; a data statistics module for periodically Statistics on the device information and traffic statistics of the devices connected to the router; the packet capture module is used to capture packets from the router according to the packet capture instruction received from the server; the security defense module is used for Downloading and executing the new security protection policy downloaded by the server, and restricting the access to the connected device of the DDoS attack that is being launched externally on the router; the data sending module is used to request the server for the relevant attribute information of the router , periodically send the device information and traffic statistics information of the router connected device to the server, send the captured message to the server, and download the new security protection policy.

本发明实施例提供的一种基于路由器防御DDoS攻击的方法和系统,可以从源头上阻止路由器的连接设备对外发起DDoS攻击,服务端可以动态地更新路由器的安全防护参数,有效保护路由器连接设备不被恶意劫持作为攻击源。The method and system for defending against DDoS attacks based on routers provided by the embodiments of the present invention can prevent the connected devices of the routers from launching DDoS attacks externally from the source, and the server can dynamically update the security protection parameters of the routers to effectively protect the connected devices of the routers. Maliciously hijacked as an attack source.

附图说明Description of drawings

为了更清楚地说明本发明实施例的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍。显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to illustrate the technical solutions of the embodiments of the present invention more clearly, the following briefly introduces the accompanying drawings that are used in the description of the embodiments. Obviously, the drawings in the following description are only some embodiments of the present invention, and for those of ordinary skill in the art, other drawings can also be obtained from these drawings without creative effort.

图1为本发明实施例提供的基于路由器防御DDoS攻击的方法的系统架构关系示意图;1 is a schematic diagram of a system architecture relationship of a router-based method for defending against DDoS attacks provided by an embodiment of the present invention;

图2为本申请实施例提供的基于路由器防御DDoS攻击的方法流程图;2 is a flowchart of a router-based method for defending against DDoS attacks provided by an embodiment of the present application;

图3为本申请实施例提供的服务端判断路由器的连接设备是否正在对外发送DDOS攻击的流程图;Fig. 3 is the flow chart that the server that the embodiment of this application provides judging whether the connection device of the router is sending DDOS attack externally;

图4为本申请实施例提供的服务端动态调整路由器连接设备的监控流量阈值的流程图;4 is a flowchart of a server dynamically adjusting a monitoring traffic threshold of a router-connected device according to an embodiment of the present application;

图5为本申请实施例提供的基于路由器防御DDoS攻击的服务端的组成结构图;5 is a structural diagram of the composition of a server based on a router-based defense against DDoS attack provided by an embodiment of the present application;

图6为本申请实施例提供的基于路由器防御DDoS攻击的路由器的组成结构图。FIG. 6 is a structural diagram of a router for defending against DDoS attacks based on a router according to an embodiment of the present application.

具体实施方式Detailed ways

为使本发明实施例的技术方案以及优点表达的更清楚,下面通过附图和实施例,对本发明的技术方案做进一步的详细描述。In order to express the technical solutions and advantages of the embodiments of the present invention more clearly, the technical solutions of the present invention are further described in detail below through the accompanying drawings and embodiments.

图1为本发明实施例提供的基于路由器防御DDoS攻击的方法的系统架构关系示意图。如图1所示,家庭环境下相关的物联网设备和部分其他智能终端设备,通过连接家庭路由器进行外部访问。现实的环境中经常发现除了正常的流量访问以外,黑客会利用物联网设备和家庭联网设备作为攻击源,对互联网发送大量的攻击流量。本发明利用路由器的技术特点,可以在网络中及时发现联网的设备并且可以收集他们的流量,然后周期性地将设备的流量统计数据上报给服务端,进一步地,服务端根据路由器上报的流量统计数据和由历史流量数据确定的路由器连接设备的流量监控阈值,判断路由器的连接设备是否在对外发起DDOS攻击,如果判定发生了DDoS攻击,服务端通过路由器抓取报文分析攻击报文的特征,生成对应的安全防护策略限制攻击流量的产生,这样可以及时阻止设备加入僵尸网络参与DDoS攻击。因此,在家用路由器上安装本发明装置可以从源头上阻止家庭环境下的设备参与DDoS攻击。FIG. 1 is a schematic diagram of a system architecture relationship of a router-based method for defending against DDoS attacks according to an embodiment of the present invention. As shown in Figure 1, related IoT devices and some other smart terminal devices in the home environment are accessed externally by connecting to a home router. In the real environment, it is often found that in addition to normal traffic access, hackers will use IoT devices and home networking devices as attack sources to send a large amount of attack traffic to the Internet. The invention utilizes the technical characteristics of routers, can timely discover networked devices in the network and collect their traffic, and then periodically report the traffic statistics of the devices to the server, and further, the server according to the traffic statistics reported by the router The data and the traffic monitoring threshold of the router-connected device determined by the historical traffic data determine whether the router-connected device is launching a DDoS attack externally. Generate corresponding security protection policies to limit the generation of attack traffic, so as to prevent devices from joining botnets and participating in DDoS attacks in time. Therefore, installing the device of the present invention on a home router can prevent devices in the home environment from participating in DDoS attacks from the source.

图2为本申请实施例提供的基于路由器防御DDoS攻击的方法流程图。如图2所示,本发明一方面提供了一种基于路由器防御DDoS攻击的方法,应用于由路由器、连接设备和服务端构成的系统中,包括以下步骤:FIG. 2 is a flowchart of a method for defending against a DDoS attack based on a router according to an embodiment of the present application. As shown in Figure 2, one aspect of the present invention provides a router-based method for defending against DDoS attacks, which is applied to a system composed of a router, a connection device and a server, including the following steps:

步骤S201,路由器将连接设备的设备信息和流量统计信息周期性地上报给服务端。Step S201, the router periodically reports the device information and traffic statistics information of the connected device to the server.

具体的,路由器搜集路由器连接设备的设备信息和流量统计信息,然后根据收集的信息周期性上传给服务端。Specifically, the router collects device information and traffic statistics information of devices connected to the router, and then periodically uploads the collected information to the server.

其中,设备信息包括Mac地址、设备类型、设备名称、设备的IP地址等基本信息。The device information includes basic information such as Mac address, device type, device name, and device IP address.

步骤S202,服务端对所述路由器上报的信息进行数据分析和统计,判断所述连接设备是否在对外发起DDoS攻击。Step S202, the server performs data analysis and statistics on the information reported by the router, and determines whether the connected device is launching a DDoS attack externally.

具体的,路由器根据在最近N个上报周期中上报给服务端的流量统计数据进行判断;Specifically, the router makes judgments according to the traffic statistics reported to the server in the last N reporting periods;

当最近N个上报周期中的每个周期内的流量统计数据中,连接设备的流量数据都大于给定的监控流量阈值,则判定连接设备正在对外发起DDoS攻击;When the traffic statistics data in each of the last N reporting cycles are greater than the given monitoring traffic threshold, it is determined that the connected device is launching a DDoS attack.

当最近N个上报周期中的至少N/2个周期内的流量统计数据中,连接设备的流量数据都大于给定的监控流量阈值,则判定连接设备可能正在对外发起DDoS攻击;When the traffic statistics of the connected device in at least N/2 of the last N reporting cycles are greater than the given monitoring traffic threshold, it is determined that the connected device may be launching a DDoS attack externally;

服务端向路由器发送抓取报文指令后,分析路由器抓取的报文,判断报文是否存在攻击流量报文;After the server sends a packet capture command to the router, it analyzes the packets captured by the router to determine whether the packets contain attack traffic packets;

当报文存在攻击流量报文,则判定连接设备正在对外DDoS攻击,通知路由器调整流量统计的上报周期间隔为原来的1/2,否则判定连接设备没有对外发起DDoS攻击。When there is attack traffic in the packet, it is determined that the connected device is under DDoS attack, and the router is notified to adjust the reporting period of traffic statistics to 1/2 of the original. Otherwise, it is determined that the connected device has not launched a DDoS attack.

本发明判断连接设备是否在对外发起DDoS攻击的过程中,连接设备的监控流量阈值是一个重要判断依据,下面结合附图3说明服务端是如何确定连接设备的监控流量阈值以及如何进行动态调整。The present invention determines whether the connected device is in the process of launching a DDoS attack externally, and the monitoring traffic threshold of the connected device is an important basis for judgment. The following describes how the server determines the monitoring traffic threshold of the connected device and how to dynamically adjust it with reference to FIG. 3 .

步骤S401,服务端在初始化时,给路由器的每个连接设备分配一个初始监控流量阈值,然后到步骤S402;Step S401, during initialization, the server assigns an initial monitoring traffic threshold to each connected device of the router, and then goes to step S402;

步骤S402,在运行期间,服务端检测路由器的连接设备,在最近的历史周期M内是否有对外发起DDoS攻击;如果是,则保持监控流量阈值不变,继续执行S402,如果否,则执行步骤S403;Step S402, during operation, the server detects the connected device of the router, whether there is a DDoS attack launched externally in the recent historical period M; if so, keep the monitoring traffic threshold unchanged, continue to execute S402, if not, execute step S402 S403;

步骤S403:更新所述监控流量阈值为历史周期M内各上报周期统计时间段内的平均值,然后到步骤S404;Step S403: Update the monitoring traffic threshold value as the average value in the statistical time period of each reporting period in the historical period M, and then go to step S404;

步骤S404:服务端保存连接设备更新后的各个时间段的监控流量阈值。Step S404: The server saves the monitoring traffic thresholds of each time period after the connected device is updated.

在一优选的实施方式中,服务端在最开始没有路由器各个连接设备的监控流量阈值时,会给各个连接设备分别预分配一个较大的监控流量阈值;在运行一定周期M时间内,如果检测到连接的设备没有对外发起DDoS攻击,则可以将监控流量阈值调低;如果检测到连接设备可能存在DDoS攻击,通过抓取报文分析报文特征又不存在攻击,则说明连接设备运行过程中的流量有增大,则可以将监控流量阈值调高;如果运行过程中检测有发生DDoS攻击,监控流量阈值保持不变;上述调整的监控流量阈值大小都等于历史周期M内各上报周期统计时间段内的平均值。In a preferred embodiment, when the server does not have the monitoring traffic threshold of each connected device of the router at the beginning, it will pre-allocate a larger monitoring traffic threshold to each connected device; If the connected device does not initiate a DDoS attack externally, you can lower the monitoring traffic threshold; if it is detected that the connected device may have a DDoS attack, and no attack exists by capturing the packet and analyzing the packet characteristics, it means that the connected device is running. If DDoS attacks are detected during operation, the monitoring traffic threshold will remain unchanged; the above-mentioned adjusted monitoring traffic thresholds are equal to the statistical time of each reporting period in the historical period M. Average value within the segment.

步骤S203,当判定有连接设备正在对外发起DDoS攻击时,服务端向所述路由器发送抓取指定连接设备的报文指令,所述路由器将抓取的报文发送给服务端。Step S203, when it is determined that a connected device is initiating a DDoS attack externally, the server sends a packet command to the router to capture the specified connected device, and the router sends the captured packet to the server.

服务端向路由器发送抓取指定设备的报文指令,具体可以向路由器发送周期性抓取指定连接设备的报文指令;在抓取报文指令中通过设备的MAC地址来指定路由器的具体连接设备,报文中可以包含多个路由器连接设备的MAC地址。The server sends a packet command to the router to capture the specified device. Specifically, it can send a command to periodically capture the packet of the specified connected device to the router; in the command to capture the packet, the MAC address of the device is used to specify the specific connected device of the router. , the message can contain the MAC addresses of multiple routers connected to the device.

步骤S204,服务端基于报文的攻击特征,生成新的安全防护策略并通知路由器下载新的安全防护策略;路由器执行新的安全防护策略进行攻击防护。Step S204, the server generates a new security protection strategy based on the attack characteristics of the message and notifies the router to download the new security protection strategy; the router executes the new security protection strategy for attack protection.

服务端基于路由器抓取报文的攻击特征,生成新的安全防护策略,可以限定只用于正在对外发起DDoS攻击的设备;根据路由器回复的周期性报文,持续地生成更新的安全防护策略;当服务端重新检测到路由器指定设备的流量统计数据不满足预设的故障条件时,向路由器发送停止抓取指定设备的报文指令。如果路由器的上报周期间隔有被调整,则通知路由器将上报周期间恢复为默认值。The server generates a new security protection policy based on the attack characteristics of the packets captured by the router, which can be limited to only the devices that are launching DDoS attacks externally; based on the periodic packets replied by the router, it continuously generates updated security protection policies; When the server re-detects that the traffic statistics data of the device specified by the router do not meet the preset fault conditions, it sends a command to stop capturing the packets of the specified device to the router. If the reporting cycle interval of the router has been adjusted, the router will be notified to restore the reporting cycle interval to the default value.

在一优先的实施方式中,当判断连接设备是否在对外发起DDoS攻击时,如果结论是一个模糊的判定结果即判定路由器可能在对外发起DDoS攻击,这种情况下需要通过路由器抓取报文来进一步分析确定。如果服务端通过抓取报文分析存在攻击报文,那么攻击方的攻击流量发送间隔比我们上报的流量间隔小,此时服务端通知路由器调小数据的上报周期间隔,每次调整的值等于原来的1/2,服务端同时根据攻击报文的特征生成相应的安全防护策略,路由器下载新的安全防护策略后,根据路由器新上报的流量统计数据判定攻击流量已经消除或限制后,服务端再将路由器的上报周期间隔恢复成默认值。In a preferred embodiment, when judging whether the connected device is launching a DDoS attack externally, if the conclusion is a vague judgment result, it is determined that the router may launch a DDoS attack externally. Confirmed by further analysis. If the server analyzes the presence of attack packets by grabbing the packets, the attack traffic sending interval of the attacker is smaller than the traffic interval we report. At this time, the server informs the router to adjust the data reporting period interval, and the value of each adjustment is equal to For the original 1/2, the server generates corresponding security protection policies according to the characteristics of the attack packets. After the router downloads the new security protection policy, it determines that the attack traffic has been eliminated or restricted according to the traffic statistics newly reported by the router. Then restore the router's reporting cycle interval to the default value.

本发明另一方面提供了一种基于路由器防御DDoS攻击的系统,包括:路由器、连接设备和服务端构成;Another aspect of the present invention provides a system for defending against DDoS attacks based on a router, comprising: a router, a connection device and a server;

路由器将连接设备的设备信息和流量统计信息周期性地上报给服务端;The router periodically reports the device information and traffic statistics of the connected device to the server;

服务端对路由器上报的信息进行数据分析和统计,判断连接设备是否在对外发起DDoS攻击;The server performs data analysis and statistics on the information reported by the router, and determines whether the connected device is launching a DDoS attack externally;

当判定有连接设备正在对外发起DDoS攻击时,服务端向路由器发送抓取指定连接设备的报文指令,路由器将抓取的报文发送给服务端;When it is determined that a connected device is launching a DDoS attack, the server sends a packet command to the router to capture the specified connected device, and the router sends the captured packet to the server;

服务端基于报文的攻击特征,生成新的安全防护策略并通知路由器所述新的安全防护策略;路由器执行新的安全防护策略进行攻击防护。Based on the attack characteristics of the message, the server generates a new security protection strategy and notifies the router of the new security protection strategy; the router executes the new security protection strategy for attack protection.

具体的,服务端的组成结构如图5所示,包括:Specifically, the composition structure of the server is shown in Figure 5, including:

接收模块,用于接收路由器的数据请求相关信息、周期性上报的数据信息和路由器抓取的报文;The receiving module is used to receive the data request related information of the router, the data information reported periodically and the packets captured by the router;

分析模块,用于分析路由器上报的设备信息、流量统计信息和路由器抓取的报文;The analysis module is used to analyze the device information reported by the router, the traffic statistics information and the packets captured by the router;

存储模块,用于存储路由器的上报周期间隔、连续判定周期数N、各个连接设备在运行周期M内各时间段的监控流量阈值和路由器最新的安全防护策略;The storage module is used to store the reporting period interval of the router, the number of consecutive judgment periods N, the monitoring traffic thresholds of each connected device in each time period in the operating period M, and the latest security protection policy of the router;

判断模块,用于根据路由器上报的设备信息、流量统计信息和连接设备的监控流量阈值,判断连接设备是否在对外发起DDoS攻击;用于根据路由器抓取的报文,判断是否存在攻击;The judging module is used to judge whether the connected device is launching a DDoS attack externally according to the device information, traffic statistics information and the monitoring traffic threshold of the connected device reported by the router; it is used to judge whether there is an attack according to the packets captured by the router;

策略生成模块,根据路由器抓取的报文的攻击特征,生成新的安全防护策略;The policy generation module generates a new security protection policy according to the attack characteristics of the packets captured by the router;

发送模块,用于向路由器发送相关信息和消息指令,包括抓取路由器指定连接设备的报文指令、调整路由器上报周期间隔的指令和通知路由器下载新的安全防护策略的指令。The sending module is used to send relevant information and message instructions to the router, including the instruction of grabbing the packet of the connected device specified by the router, the instruction of adjusting the reporting period interval of the router, and the instruction of notifying the router to download a new security protection policy.

在下面的具体实施方式中,描述服务端的各模块的工作流程。In the following specific implementation manner, the workflow of each module of the server is described.

首先,接收模块收到路由器周期性上报的流量统计信息,然后,将信息交给分析模块进行分析,分析模块从中得到路由器各连接设备在某个时间段内的流量统计值,将这些信息交给判断模块进行判定,同时存储模块存储各连接设备在某个时间段内的流量统计值;判断模块将路由器上报时间段内连接设备的流量统计值K1和存储模块中的连接设备的监控流量阈值S1进行比较,如果K1大于S1,则标记该周期存在异常,如果连续N个周期都存在异常,则判定连接设备正在对外发起DDoS攻击,则通过发送模块向路由器发送抓取报文指令;接收模块收到路由器的抓取报文数据交给分析模块进行分析,然后判断模块进一步判断是否存在攻击报文,如果有攻击报文,则交给策略生成模块生成新的安全防护策略,再通过发送模块通知路由器下载新的安全防护策略,同时将新的安全防护策略存到存储模块中。First, the receiving module receives the traffic statistics information periodically reported by the router, and then sends the information to the analysis module for analysis. The judgment module makes a judgment, and the storage module stores the traffic statistics value of each connected device in a certain period of time; the judgment module reports the traffic statistics value K1 of the connected equipment in the time period and the monitoring traffic threshold value S1 of the connected equipment in the storage module. For comparison, if K1 is greater than S1, the cycle is marked as abnormal. If there are abnormalities in N consecutive cycles, it is determined that the connected device is launching a DDoS attack externally, and the sending module sends a packet capture command to the router; the receiving module receives the message. The captured packet data to the router is sent to the analysis module for analysis, and then the judgment module further determines whether there is an attack packet. If there is an attack packet, it is handed over to the policy generation module to generate a new security protection policy, and then the sending module notifies the The router downloads the new security protection policy and stores the new security protection policy in the storage module.

上述服务端的策略生成模块为路由器更新的安全防护策略很多,主要列出以下几种:The above server-side policy generation module updates many security protection policies for routers, mainly listed as follows:

(1)设置报文的访问控制策略(1) Set the access control policy of the message

在实际应用中,根据五元组(源IP地址、目的IP地址、源端口号、目的端口号、协议),可以确定放行或丢弃两种不同的访问控制策略;In practical applications, according to the quintuple (source IP address, destination IP address, source port number, destination port number, protocol), two different access control policies can be determined to release or discard;

(2)对报文发送的syn、ack、http、udp等协议报文修改防护参数阈值,其中,防护参数阈值的单位可以是比特每秒bps,也可以是包每秒pps;(2) Modify the protection parameter thresholds for protocol packets such as syn, ack, http, and udp sent by the packets, where the unit of the protection parameter thresholds can be bits per second, bps, or packets per second, pps;

(3)设置协议特征字段的匹配规则(3) Set the matching rule of the protocol feature field

在具体实施过程中,针对某些协议,比如udp协议,可以根据分析模块分析路由器抓取的报文中udp协议的payload特征,在配置防护策略时,可以针对匹配的报文确定是否丢弃还是放行。In the specific implementation process, for some protocols, such as the udp protocol, the payload characteristics of the udp protocol in the packets captured by the router can be analyzed according to the analysis module. When configuring the protection policy, it can be determined whether to discard or release the matching packets. .

(4)设置报文的访问速度(4) Set the access speed of the message

对报文发送的syn、ack、http、udp、icmp等协议报文发送速率设置限速参数。Set rate limit parameters for the sending rate of protocol packets such as syn, ack, http, udp, and icmp.

具体的,路由器的组成结构如图6所示,包括:Specifically, the composition structure of the router is shown in Figure 6, including:

数据接收模块,用于接收服务端向路由器发送的抓取指定连接设备的报文指令和调整数据上报周期间隔的指令;The data receiving module is used to receive the instruction of grabbing the message of the specified connected device and the instruction of adjusting the interval of the data reporting period sent by the server to the router;

数据统计模块,用于周期性地统计路由器连接设备的设备信息和流量统计信息;The data statistics module is used to periodically count the device information and traffic statistics of the devices connected to the router;

报文抓取模块,用于根据从服务端收到的抓取报文指令对路由器进行抓取报文;The packet capture module is used to capture packets from the router according to the packet capture instructions received from the server;

安全防御模块,用于下载和执行服务端下载的新的安全防护策略,对路由器上正在对外发起的DDoS攻击的连接设备进行访问限制;The security defense module is used to download and execute the new security protection strategy downloaded by the server, and restrict the access to the connected devices on the router that are launching DDoS attacks externally;

数据发送模块,用于向服务端请求路由器的相关属性信息、周期性地向服务端发送路由器连接设备的设备信息和流量统计信息、向服务器发送抓取的报文和下载新的安全防护策略。The data sending module is used to request the relevant attribute information of the router from the server, periodically send the device information and traffic statistics information of the router connected to the device to the server, send the captured packets to the server, and download new security protection policies.

在下面的具体实施方式中,描述路由器的各模块的工作流程。In the following specific implementation manner, the workflow of each module of the router is described.

数据统计模块搜集路由器连接设备的信息包括MAC地址、设备类型、设备名称、设备的IP地址等基本信息;同时也搜集路由器的属性信息,至少包括路由器的设备编号、路由器MAC地址,路由器名称以及路由器的IP地址,保证路由器在整个服务端的唯一性。服务端根据路由器上报的设备信息形成对应的路由器信息数据库。路由器根据服务端指定的上报周期间隔,将路由器连接设备的设备信息和流量统计信息周期性地通过数据发送模块发送给服务端;服务端分析路由器的上报信息后,如果判定有连接设备正在发送DDoS攻击,则通知路由器进行抓取报文,路由器通过数据接收模块收到抓取报文指令后,交给报文抓取模块进行抓取报文,抓取报文完成后通过数据发送模块发送给服务端;服务端分析报文的攻击特征后生成新的安全防护策略,通知路由器下载新的安全防护策略,路由器通过数据接收模块收到通知下载新的安全防护策略的指令,然后路由器的安全防御模块通过数据发送模块向服务端发起下载新的安全防护策略的请求,然后再接收新的安全防护策略,最后交给安全防御模块在路由器上执行新的安全防护策略。The data statistics module collects basic information such as the MAC address, device type, device name, and IP address of the device connected to the router; it also collects the attribute information of the router, including at least the device number of the router, the MAC address of the router, the name of the router, and the router. The IP address of the router ensures the uniqueness of the router in the entire server. The server forms a corresponding router information database according to the device information reported by the router. The router periodically sends the device information and traffic statistics information of the devices connected to the router to the server through the data sending module according to the reporting cycle interval specified by the server; after the server analyzes the report information of the router, if it determines that a connected device is sending DDoS If the attack is attacked, the router will be notified to grab the packet. After the router receives the instruction of grabbing the packet through the data receiving module, it will hand it over to the packet grabbing module to grab the packet. Server; the server analyzes the attack characteristics of the packet and generates a new security protection strategy, and notifies the router to download the new security protection strategy. The module initiates a request for downloading a new security protection policy to the server through the data sending module, then receives the new security protection policy, and finally hands it over to the security defense module to execute the new security protection policy on the router.

本发明实施例提供的一种基于路由器防御DDoS攻击的方法和系统,当服务端判定路由器的连接设备在对外发送DDoS攻击时,可以实时动态地为路由器更新防护参数;服务端根据路由器连接设备的运行状态和历史流量数据,可以动态地调整路由器上报数据的周期间隔和连接设备的监控流量阈值,更加智能化地进行监控;服务端向路由器发送周期性抓取报文指令,可以持续地为路由器生成更新的安全防护策略,直到检测到路由器的连接设备已经不满足预设的故障条件时为止。The embodiments of the present invention provide a method and system for defending against DDoS attacks based on a router. When the server determines that a device connected to the router is sending DDoS attacks to the outside world, it can dynamically update protection parameters for the router in real time; The running status and historical traffic data can dynamically adjust the periodic interval of data reported by the router and the monitoring traffic threshold of the connected device, so as to monitor more intelligently; the server sends periodic packet capture instructions to the router, which can continuously provide the router with An updated security protection policy is generated until it is detected that the connected devices of the router no longer meet the preset failure conditions.

综上,服务端可以针对不断变化的DDoS攻击方法,智能动态地调整安全防护策略,减少了人工干预,提前预防了路由器的连接设备成为“肉鸡”的可能,从源头上阻止了DDoS攻击的发生。In summary, the server can intelligently and dynamically adjust the security protection strategy for the ever-changing DDoS attack methods, reducing manual intervention, preventing the possibility of the router connected to the device becoming a "broiler" in advance, and preventing the occurrence of DDoS attacks from the source. .

以上所述的具体实施方式,对本发明的目的、技术方案和有益效果进行了进一步详细说明,所应理解的是,以上所述仅为本发明的具体实施方式而已,并不用于限定本发明的保护范围,凡在本发明的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。The specific embodiments described above further describe the objectives, technical solutions and beneficial effects of the present invention in detail. It should be understood that the above descriptions are only specific embodiments of the present invention, and are not intended to limit the scope of the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention shall be included within the protection scope of the present invention.

Claims (6)

1.一种基于路由器防御DDoS攻击的方法,应用于由路由器、连接设备和服务端构成的系统中,其特征在于,包括以下步骤:1. a method based on router defense DDoS attack, is applied in the system that is made up of router, connecting device and server, it is characterized in that, comprise the following steps: 路由器将连接设备的设备信息和流量统计信息周期性地上报给服务端;The router periodically reports the device information and traffic statistics of the connected device to the server; 服务端对所述路由器上报的信息进行数据分析和统计,判断所述连接设备是否在对外发起DDoS攻击;The server performs data analysis and statistics on the information reported by the router, and determines whether the connected device is launching a DDoS attack externally; 当判定有连接设备正在对外发起DDoS攻击时,服务端向所述路由器发送抓取指定连接设备的报文指令,所述路由器将抓取的报文发送给服务端;When it is determined that a connected device is launching a DDoS attack externally, the server sends a packet instruction to the router to grab the specified connected device, and the router sends the captured packet to the server; 服务端基于所述报文的攻击特征,生成新的安全防护策略并通知所述路由器下载所述新的安全防护策略;所述路由器执行所述新的安全防护策略进行攻击防护;The server generates a new security protection strategy based on the attack characteristics of the message and notifies the router to download the new security protection strategy; the router executes the new security protection strategy for attack protection; 服务端判断所述连接设备是否在对外发起DDoS攻击,具体包括:The server determines whether the connected device is launching a DDoS attack, specifically including: 所述路由器根据在最近N个上报周期中上报给服务端的流量统计数据进行判断;The router judges according to the traffic statistics reported to the server in the most recent N reporting periods; 当最近N个上报周期中的每个周期内的流量统计数据中,所述连接设备的流量数据都大于给定的监控流量阈值,则判定所述连接设备正在对外发起DDoS攻击;When, in the traffic statistics data in each of the most recent N reporting periods, the traffic data of the connected device is greater than the given monitoring traffic threshold, it is determined that the connected device is launching a DDoS attack externally; 所述路由器根据在最近N个上报周期中上报给服务端的流量统计数据进行判断还包括:The router judges according to the traffic statistics reported to the server in the most recent N reporting periods, and further includes: 当最近N个上报周期中的至少N/2个周期内的流量统计数据中,所述连接设备的流量数据都大于给定的监控流量阈值,则判定所述连接设备可能正在对外发起DDoS攻击;When, in the traffic statistics data in at least N/2 of the most recent N reporting cycles, the traffic data of the connected device is greater than the given monitoring traffic threshold, it is determined that the connected device may be launching a DDoS attack externally; 服务端向路由器发送抓取报文指令后,分析所述路由器抓取的报文,判断所述报文是否存在攻击流量报文;After the server sends a packet capture instruction to the router, it analyzes the packet captured by the router, and determines whether the packet contains an attack traffic packet; 当所述报文存在攻击流量报文,则判定所述连接设备正在对外DDoS攻击,并通知所述路由器调整流量统计的上报周期间隔为原来的1/2;When there is an attack traffic packet in the packet, it is determined that the connected device is attacking external DDoS, and the router is notified to adjust the reporting period interval of the traffic statistics to 1/2 of the original; 所述连接设备的监控流量阈值,包括:The monitoring traffic threshold of the connected device, including: 服务端在初始化时,给所述路由器的每个连接设备分配一个初始监控流量阈值;During initialization, the server assigns an initial monitoring traffic threshold to each connected device of the router; 在运行期间,当服务端检测到所述连接设备在最近的历史周期M内都没有对外发起DDoS攻击,则调整所述连接设备的监控流量阈值;During operation, when the server detects that the connected device has not launched a DDoS attack in the most recent historical period M, it adjusts the monitoring traffic threshold of the connected device; 更新所述监控流量阈值为历史周期M内各上报周期统计时间段内的平均值;Updating the monitoring traffic threshold value is the average value in the statistical time period of each reporting period in the historical period M; 服务端保存所述连接设备更新后的各个时间段的监控流量阈值。The server saves the monitoring traffic thresholds for each time period after the connection device is updated. 2.根据权利要求1所述的方法,其特征在于,服务端向所述路由器发送抓取指定连接设备的报文指令,具体包括:2. The method according to claim 1, wherein the server sends to the router a packet instruction for grabbing a designated connected device, specifically comprising: 服务端向所述路由器发送周期性抓取指定设备的报文指令;The server sends a packet instruction to periodically grab the specified device to the router; 所述抓取报文指令中通过连接设备的MAC地址来指定路由器的具体连接设备;The specific connection device of the router is specified by the MAC address of the connection device in the grab message instruction; 所述抓取报文指令中包含多个路由器的连接设备的MAC地址。The fetching packet instruction includes the MAC addresses of the connected devices of the multiple routers. 3.根据权利要求1所述的方法,其特征在于,服务端基于所述路由器抓取报文的攻击特征,具体包括:3. The method according to claim 1, wherein the server captures the attack characteristics of the packet based on the router, specifically comprising: 所述新的安全防护策略限定用于正在对外发起DDoS攻击的连接设备;The new security protection policy is limited to connecting devices that are launching DDoS attacks externally; 服务端根据所述路由器回复的周期性报文,持续地生成更所述新的安全防护策略;The server continuously generates and updates the new security protection policy according to the periodic message replied by the router; 当服务端重新检测到所述路由器指定连接设备的流量统计数据不满足预设的故障条件时,服务端向所述路由器发送停止抓取指定连接设备的报文指令;当所述路由器的上报周期间隔有被调整,则通知所述路由器将上报周期间隔恢复为默认值。When the server re-detects that the traffic statistics data of the connected device designated by the router does not meet the preset fault conditions, the server sends a packet instruction to the router to stop grabbing the designated connected device; when the reporting cycle of the router If the interval is adjusted, the router is notified to restore the reporting period interval to the default value. 4.一种基于路由器防御DDoS攻击的系统,应用于如权利要求1所述的方法,其特征在于,包括:路由器、连接设备和服务端构成;4. a system based on router defense DDoS attack, is applied to the method as claimed in claim 1, is characterized in that, comprises: router, connecting device and server form; 路由器将连接设备的设备信息和流量统计信息周期性地上报给服务端;The router periodically reports the device information and traffic statistics of the connected device to the server; 服务端对所述路由器上报的信息进行数据分析和统计,判断所述连接设备是否在对外发起DDoS攻击;The server performs data analysis and statistics on the information reported by the router, and determines whether the connected device is launching a DDoS attack externally; 当判定有连接设备正在对外发起DDoS攻击时,服务端向所述路由器发送抓取指定连接设备的报文指令,所述路由器将抓取的报文发送给服务端;When it is determined that a connected device is launching a DDoS attack externally, the server sends a packet instruction to the router to grab the specified connected device, and the router sends the captured packet to the server; 服务端基于所述报文的攻击特征,生成新的安全防护策略并通知所述路由器下载所述新的安全防护策略;所述路由器执行所述新的安全防护策略进行攻击防护。The server generates a new security protection policy based on the attack characteristics of the message and notifies the router to download the new security protection policy; the router executes the new security protection policy for attack protection. 5.根据权利要求4所述的系统,其特征在于,所述服务端包括:5. The system according to claim 4, wherein the server comprises: 接收模块,用于接收所述路由器的数据请求相关信息、周期性上报的数据信息和所述路由器抓取的报文;a receiving module, configured to receive the data request-related information of the router, the periodically reported data information, and the message captured by the router; 分析模块,用于分析所述路由器上报的设备信息、流量统计信息和所述路由器抓取的报文;an analysis module, configured to analyze the device information and traffic statistics reported by the router and the packets captured by the router; 存储模块,用于存储所述路由器的上报周期间隔、连续判定周期数N、各个连接设备在运行周期M内各时间段的监控流量阈值和所述路由器最新的安全防护策略;a storage module, used for storing the reporting period interval of the router, the number N of consecutive judgment periods, the monitoring traffic thresholds of each connected device in each time period in the operating period M, and the latest security protection policy of the router; 判断模块,用于根据所述路由器上报的设备信息、流量统计信息和所述连接设备的监控流量阈值,判断所述连接设备是否在对外发起DDoS攻击;用于根据所述路由器抓取的报文,判断是否存在攻击;The judgment module is used for judging whether the connected device is launching a DDoS attack externally according to the device information, the traffic statistics information reported by the router, and the monitoring traffic threshold of the connected device; used for according to the packets captured by the router , to determine whether there is an attack; 策略生成模块,根据所述路由器抓取的报文的攻击特征,生成新的安全防护策略;a strategy generation module, which generates a new security protection strategy according to the attack characteristics of the packets captured by the router; 发送模块,用于向所述路由器发送相关信息和消息指令,包括抓取所述路由器指定连接设备的报文指令、调整所述路由器上报周期间隔的指令和通知所述路由器下载新的安全防护策略的指令。The sending module is used to send relevant information and message instructions to the router, including grabbing the packet instructions specified by the router to connect to the device, adjusting the instructions of the router reporting period interval, and informing the router to download a new security protection policy instruction. 6.根据权利要求4所述的系统,其特征在于,所述路由器包括:6. The system of claim 4, wherein the router comprises: 数据接收模块,用于接收服务端向所述路由器发送的抓取指定连接设备的报文指令和调整数据上报周期间隔的指令;The data receiving module is used for receiving the instruction of grabbing the message of the designated connecting device and the instruction of adjusting the interval of the data reporting period sent by the server to the router; 数据统计模块,用于周期性地统计所述路由器连接设备的设备信息和流量统计信息;A data statistics module, used to periodically count the device information and traffic statistics of the devices connected to the router; 报文抓取模块,用于根据从服务端收到的抓取报文指令对所述路由器进行抓取报文;a packet grabbing module, used for grabbing the message from the router according to the grabbing instruction received from the server; 安全防御模块,用于下载和执行服务端下载的所述新的安全防护策略,对所述路由器上正在对外发起的DDoS攻击的连接设备进行访问限制;A security defense module, used for downloading and executing the new security protection policy downloaded by the server, and restricting access to the connected devices on the router that are initiating the DDoS attack externally; 数据发送模块,用于向服务端请求所述路由器的相关属性信息、周期性地向服务端发送所述路由器连接设备的设备信息和流量统计信息、向服务器发送抓取的报文和下载所述新的安全防护策略。The data sending module is used to request the relevant attribute information of the router from the server, periodically send the device information and traffic statistics information of the router connected to the server to the server, send the captured message to the server, and download the New security protection strategy.
CN201711279446.2A 2017-12-06 2017-12-06 A method and system for defending against DDoS attacks based on routers Active CN109889470B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711279446.2A CN109889470B (en) 2017-12-06 2017-12-06 A method and system for defending against DDoS attacks based on routers

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711279446.2A CN109889470B (en) 2017-12-06 2017-12-06 A method and system for defending against DDoS attacks based on routers

Publications (2)

Publication Number Publication Date
CN109889470A CN109889470A (en) 2019-06-14
CN109889470B true CN109889470B (en) 2020-06-26

Family

ID=66924320

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711279446.2A Active CN109889470B (en) 2017-12-06 2017-12-06 A method and system for defending against DDoS attacks based on routers

Country Status (1)

Country Link
CN (1) CN109889470B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112153649A (en) * 2019-06-28 2020-12-29 北京奇虎科技有限公司 router
CN111953569B (en) * 2020-08-27 2022-04-29 浪潮电子信息产业股份有限公司 State information reporting method, device, equipment and medium
CN114422240B (en) * 2022-01-19 2024-03-15 湖南警察学院 Internet of things cross-layer attack path identification method based on attack behavior analysis

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753381A (en) * 2009-12-25 2010-06-23 华中科技大学 Method for detecting network attack behaviors
CN102821002A (en) * 2011-06-09 2012-12-12 中国移动通信集团河南有限公司信阳分公司 Method and system for network flow anomaly detection
CN106161333A (en) * 2015-03-24 2016-11-23 华为技术有限公司 DDOS attack means of defence based on SDN, Apparatus and system
CN106357685A (en) * 2016-10-28 2017-01-25 北京神州绿盟信息安全科技股份有限公司 Method and device for defending distributed denial of service attack

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9412381B2 (en) * 2010-03-30 2016-08-09 Ack3 Bionetics Private Ltd. Integrated voice biometrics cloud security gateway

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753381A (en) * 2009-12-25 2010-06-23 华中科技大学 Method for detecting network attack behaviors
CN102821002A (en) * 2011-06-09 2012-12-12 中国移动通信集团河南有限公司信阳分公司 Method and system for network flow anomaly detection
CN106161333A (en) * 2015-03-24 2016-11-23 华为技术有限公司 DDOS attack means of defence based on SDN, Apparatus and system
CN106357685A (en) * 2016-10-28 2017-01-25 北京神州绿盟信息安全科技股份有限公司 Method and device for defending distributed denial of service attack

Also Published As

Publication number Publication date
CN109889470A (en) 2019-06-14

Similar Documents

Publication Publication Date Title
US11729209B2 (en) Distributed denial-of-service attack mitigation with reduced latency
US9584531B2 (en) Out-of band IP traceback using IP packets
US11005865B2 (en) Distributed denial-of-service attack detection and mitigation based on autonomous system number
CN104539625B (en) Network security defense system based on software definition and working method thereof
AU2015255980B2 (en) System and methods for reducing impact of malicious activity on operations of a wide area network
WO2017148263A1 (en) Prevention and control method, apparatus and system for network attack
Gkountis et al. Lightweight algorithm for protecting SDN controller against DDoS attacks
US10911473B2 (en) Distributed denial-of-service attack detection and mitigation based on autonomous system number
WO2016150253A1 (en) Sdn-based ddos attack prevention method, device and system
CN106713216A (en) Flow processing method, device and system
EP2880819A1 (en) Network traffic processing system
JP6168977B2 (en) System and method for real-time reporting of abnormal internet protocol attacks
KR20120060655A (en) Routing Method And Apparatus For Detecting Server Attacking And Network Using Method Thereof
Hong et al. Dynamic threshold for DDoS mitigation in SDN environment
CN109889470B (en) A method and system for defending against DDoS attacks based on routers
CN108234473A (en) A kind of message anti-attack method and device
Bogdanoski et al. Wireless network behavior under ICMP ping flood DoS attack and mitigation techniques
Wang et al. Efficient and low‐cost defense against distributed denial‐of‐service attacks in SDN‐based networks
Arafat et al. A practical approach and mitigation techniques on application layer DDoS attack in web server
Dang-Van et al. A multi-criteria based software defined networking system Architecture for DDoS-attack mitigation
CN102075535B (en) Application layer distributed denial of service attack filtering method and system
JP2006067078A (en) Network system and attack defense method
CN106357661B (en) A Distributed Denial of Service Attack Defense Method Based on Switch Rotation
Subbulakshmi et al. A unified approach for detection and prevention of DDoS attacks using enhanced support vector machines and filtering mechanisms
KR101069341B1 (en) Apparatus for preventing distributed denial of service attack creation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210818

Address after: 100190, No. 21 West Fourth Ring Road, Beijing, Haidian District

Patentee after: INSTITUTE OF ACOUSTICS, CHINESE ACADEMY OF SCIENCES

Address before: 100190, No. 21 West Fourth Ring Road, Beijing, Haidian District

Patentee before: INSTITUTE OF ACOUSTICS, CHINESE ACADEMY OF SCIENCES

Patentee before: BEIJING INTELLIX TECHNOLOGIES Co.,Ltd.

Effective date of registration: 20210818

Address after: Room 1601, 16th floor, East Tower, Ximei building, No. 6, Changchun Road, high tech Industrial Development Zone, Zhengzhou, Henan 450001

Patentee after: Zhengzhou xinrand Network Technology Co.,Ltd.

Address before: 100190, No. 21 West Fourth Ring Road, Beijing, Haidian District

Patentee before: INSTITUTE OF ACOUSTICS, CHINESE ACADEMY OF SCIENCES

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210826

Address after: 100190, No. 21 West Fourth Ring Road, Beijing, Haidian District

Patentee after: INSTITUTE OF ACOUSTICS, CHINESE ACADEMY OF SCIENCES

Address before: 100190, No. 21 West Fourth Ring Road, Beijing, Haidian District

Patentee before: INSTITUTE OF ACOUSTICS, CHINESE ACADEMY OF SCIENCES

Patentee before: BEIJING INTELLIX TECHNOLOGIES Co.,Ltd.

Effective date of registration: 20210826

Address after: Room 1601, 16th floor, East Tower, Ximei building, No. 6, Changchun Road, high tech Industrial Development Zone, Zhengzhou, Henan 450001

Patentee after: Zhengzhou xinrand Network Technology Co.,Ltd.

Address before: 100190, No. 21 West Fourth Ring Road, Beijing, Haidian District

Patentee before: INSTITUTE OF ACOUSTICS, CHINESE ACADEMY OF SCIENCES