WO2008064562A1 - Procédé de traitement de service, dispositif de réseau et système de traitement de service - Google Patents

Procédé de traitement de service, dispositif de réseau et système de traitement de service Download PDF

Info

Publication number
WO2008064562A1
WO2008064562A1 PCT/CN2007/003336 CN2007003336W WO2008064562A1 WO 2008064562 A1 WO2008064562 A1 WO 2008064562A1 CN 2007003336 W CN2007003336 W CN 2007003336W WO 2008064562 A1 WO2008064562 A1 WO 2008064562A1
Authority
WO
WIPO (PCT)
Prior art keywords
service request
service
server
request
control table
Prior art date
Application number
PCT/CN2007/003336
Other languages
English (en)
French (fr)
Inventor
Jvye Wu
Original Assignee
Huawei Technologies Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd. filed Critical Huawei Technologies Co., Ltd.
Priority to EP07816891A priority Critical patent/EP2086168A4/en
Publication of WO2008064562A1 publication Critical patent/WO2008064562A1/zh
Priority to US12/471,615 priority patent/US20090234952A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Definitions

  • the present invention relates to the field of communication technologies, and in particular, to a service processing method, a network device, and a service processing system. Background technique
  • DSLAM Digital Subscriber Line Access Multiplexer
  • Lanswitch Layer 2 Switch
  • BAS Broadband Access Server
  • BRAS Broadband Remote Access Server
  • S Service Router
  • Router Router
  • the network status of the network device that manages the access device of the user is higher and higher, from the access layer (ie, the interface directly facing the user access, Here is the starting point of the network, which is also the end point of the network) to the edge convergence layer, from the edge convergence layer to the convergence layer (ie: convergence of various devices on the access layer), from the convergence layer to the core edge layer.
  • the network status not only the higher requirements of the various functions and performances of the network equipment itself, but also the more stringent requirements on the stability and security of these network equipments, if its stability is low, The network will be interrupted frequently, which will affect the normal use of the network by the user, which will cause serious losses to the user and reduce the customer's satisfaction with the network operator. If the security of the network device is low, It is very easy to be attacked by various intentional or unintentional attacks on the network, and the network will often be interrupted, which will also bring losses to users. In addition, the various servers running on the network are incomplete in performance and security. If the network device lacks protection for various servers on the upper layer (for example, to prevent attacks such as large numbers of authentication or accounting), the server will fail.
  • the uplink server is protected by the following methods:
  • the network device protects the server by limiting the traffic sent to the server. However, because the user is suppressed before receiving the service request from the user, after the user fails to send the service request, the service request is continuously re-initiated. The device also continuously responds to the service request, which in turn leads to greater congestion of the network, directly affecting the service requests of other users.
  • the network device is connected to the primary server and the standby server at the same time.
  • the primary server provides services.
  • the network device switches the service request to the standby server, and the standby server requests the service. Processing, however, the standby server will also be attacked, resulting in termination of the service, rendering all servers unavailable, affecting the normal operation of the network.
  • the network device is connected to multiple servers at the same time, and allocates new service requests according to the current service request processing situation on each server, so that the load of the server is balanced, so that each network server is lightened when the network service is not very busy.
  • the burden in the case of a user attacking the server, if the number of attacks reaches a certain level, even if multiple servers are simultaneously load-balanced, all services will be terminated due to all attacks, and the upper-layer server cannot be fundamentally prevented from being attacked.
  • the technical problem to be solved by the embodiment of the present invention is that the server is required to process a large number of illegal packets, which causes network congestion, thereby affecting the processing of normal service requests.
  • a service processing method provided by an embodiment of the present invention includes the following steps:
  • the service request is sent if the frequency of the service does not exceed the set value.
  • determining whether the frequency at which the user initiates the service request exceeds a set value is: querying whether there is a control table corresponding to user information and service content carried in the service request, if the Controlling, according to the control table, determining whether the frequency of the service request exceeds a set value; if the control table does not exist, establishing a control table of the service request according to the user information and service content, where The user information, the service content of the service request, the start time, the number of requests, and the set value are recorded in the control table, and the service request is sent.
  • the user information is a MAC address, a username, or an IP address.
  • the last request time and the number of requests of the service request in the control table are also updated.
  • the above method further includes: if the service request sent by the user is not received within a predetermined time from the last request time, deleting the control table of the service request.
  • the foregoing service processing method further includes: after receiving the service request, the network device determines whether the service request is supported, and if the service request is supported, performing the determining according to the user information carried in the received service request. The step of the user initiating whether the frequency of the service request exceeds a set value; if the service request is not supported, forwarding the service request to another network device supporting the service request; and another network device receiving the service And the step of determining whether the frequency of the user initiating the service request exceeds a set value according to the user information carried in the received service request. After receiving the service request, the network device determines, according to the address of the server that processes the service request carried in the service request, whether the number of service requests currently processed by the server is less than a preset number.
  • the sending the service request is specifically: the network device determines whether the working state of the server that currently processes the service request is normal, and if the working state of the server that currently processes the service request is normal, sending the service request to the server And if the work of the server currently processing the service request or sending the service request is specifically: the network device sends the service request to a server with the least load among the plurality of servers that can process the service request.
  • a receiving module configured to receive a service request
  • a querying module configured to query, in the control table storage module, a control table corresponding to the received user information and service content carried in the service request;
  • control table establishing module configured to establish a control table of the service request, and record, in the control table, a service content, a start time, a last request time, a request times, and a set value of the service request; a frequency comparison module, And determining, according to the control table, whether the frequency of the service request exceeds a set value;
  • a suppression module configured to discard a service request whose frequency exceeds a set value
  • the sending module is configured to send a service request whose frequency does not exceed the set value.
  • the network device further includes a control table storage module, configured to store a control table, the control table includes user information, a service content requested by the user, a start time of the service request, a last request time, a request number, and a set value.
  • a control table storage module configured to store a control table, the control table includes user information, a service content requested by the user, a start time of the service request, a last request time, a request number, and a set value.
  • the network device further includes an update module, configured to update a last request time and a request number of the service request in the control table.
  • the network device further includes a deleting module, configured to delete the control table of the service request when the service request sent by the user is not received within a predetermined time from the last request time.
  • the network device further includes a network device, and further includes an authentication module, configured to determine whether the service request is supported, and if not, forward the service request to another network device that supports the service request.
  • the network device further includes a quantity comparison module, configured to determine, according to an address of a server that processes the service request carried in the service request, whether the number of currently processed service requests of the server is less than a preset quantity, if the server Sending the service request to the query module, if the number of currently processed service requests is less than a preset number, sending the service request to the suppression module if the number of currently processed service requests of the server is not less than a preset number The business request.
  • a quantity comparison module configured to determine, according to an address of a server that processes the service request carried in the service request, whether the number of currently processed service requests of the server is less than a preset quantity, if the server Sending the service request to the query module, if the number of currently processed service requests is less than a preset number, sending the service request to the suppression module if the number of currently processed service requests of the server is not less than a preset number The business request.
  • the network device further includes a state detecting module, configured to determine whether a working state of the server that currently processes the service request is normal, and if the working state of the server that currently processes the service request is normal, sending the service to the server And if the working state of the server that currently processes the service request is abnormal, sending the service request to the standby server.
  • a state detecting module configured to determine whether a working state of the server that currently processes the service request is normal, and if the working state of the server that currently processes the service request is normal, sending the service to the server And if the working state of the server that currently processes the service request is abnormal, sending the service request to the standby server.
  • the network device further includes a forwarding module, configured to send the service request to a server with the least load among the plurality of servers that can process the service request.
  • a service processing system provided by the embodiment of the present invention includes a server for processing a service request, and a network device, where the network device includes:
  • a receiving module configured to receive a service request
  • control table storage module configured to store a control table, where the control table includes user information, a service content requested by the user, a start time of the service request, a last request time, a request number, and a set value; and a query module, configured to query the Whether a control table corresponding to the user information and the service content carried in the received service request exists in the control table storage module;
  • a frequency comparison module configured to determine, according to the control table, whether a frequency of the service request exceeds a set value
  • a suppression module configured to discard a service request whose frequency exceeds a set value
  • the sending module is configured to send a service request whose frequency does not exceed the set value.
  • the network device further includes a control table establishing module, configured to establish a control table of the service request, and record, in the control table, a service content, a start time, and a last request time of the service request. , the number of requests and the set value.
  • the network device further includes an update module, configured to use the last request time and the number of requests of the service request in the control table.
  • the network device further includes a deleting module, configured to delete the control of the service request when the service request sent by the user is not received within a predetermined time from the last request time. table.
  • the network device further includes an authentication module, configured to determine whether the service request is supported.
  • the network device further includes a quantity comparison module, configured to determine, according to an address of a server that processes the service request carried in the service request, whether the number of currently processed service requests of the server is less than a preset a quantity value, if the number of currently processed service requests of the server is less than a preset quantity, sending the service request to the query module, if the number of currently processed service requests of the server is not less than a preset quantity And sending the service request to the suppression module.
  • a quantity comparison module configured to determine, according to an address of a server that processes the service request carried in the service request, whether the number of currently processed service requests of the server is less than a preset a quantity value, if the number of currently processed service requests of the server is less than a preset quantity, sending the service request to the query module, if the number of currently processed service requests of the server is not less than a preset quantity And sending the service request to the suppression module.
  • the service processing system further includes a standby server that is mutually standby with the server; the network device further includes a state detecting module, configured to determine whether a working state of the server currently processing the service request is normal, if the current processing If the working status of the server of the service request is normal, the service request is sent to the server; if the working status of the server currently processing the service request is abnormal, sending the service request to the standby server. .
  • the server in the foregoing service processing system is a plurality of servers; the network device further includes a forwarding module, configured to send the service request to a server with the least load among the plurality of servers that can process the service request.
  • the present invention has the following beneficial technical effects:
  • FIG. 1 is a flowchart of an embodiment of a service processing method according to the present invention.
  • FIG. 2 is a schematic structural diagram of an embodiment of a network device according to the present invention.
  • FIG. 3 is a schematic structural diagram of an embodiment of a service processing system formed by the network device of FIG. 2.
  • FIG. 4 is a schematic structural diagram of another embodiment of a network device according to the present invention.
  • FIG. 5 is a schematic structural diagram of another embodiment of a service processing system formed by the network device of FIG. 4.
  • FIG. 6 is a schematic structural diagram of still another embodiment of a network device according to the present invention.
  • FIG. 7 is a schematic structural diagram of still another embodiment of a service processing system formed by the network device of FIG. 6.
  • 8 is a schematic diagram of a service processing system composed of a plurality of network devices and a plurality of servers.
  • FIG. 9 is a schematic diagram of a service processing system composed of a network device and a plurality of mutually standby servers. detailed description
  • the present invention establishes a control table in the network device and records the same user.
  • the frequency of the same service request sent to the server is suppressed by the method of discarding the service request of the same user whose frequency is greater than the set value to protect the upper server.
  • FIG. 1 is a flowchart of an embodiment of a service processing method according to the present invention, which may be implemented by using the network device shown in FIG. 2, and specifically includes the following steps:
  • Step 101 Receive service request information sent by the user, and query whether there is a control table corresponding to the user information and the service content carried in the received service request. If yes, go to step 102; otherwise, go to step 104.
  • the user information may be the MAC address, user name or IP address of the user.
  • a control table includes at least user information, business content, and service request opening. The starting time, the number of times of the service request (including the number of timeouts or failures of the service request), the last request time and the set value of the frequency indicating the permission request set in advance, and may also include the identification number indicating the control table. Table ID.
  • Step 102 Determine, according to the description of the control table, whether the frequency of the same service request sent by the user exceeds a set value, and step 103 is performed; otherwise, step 105 is performed.
  • the service request is restricted by the frequency of the service request of the same content sent by the same user, and the service request whose frequency is greater than the set value is discarded, thereby effectively preventing the user from attacking the server, increasing the attack difficulty and reducing the attack strength; Reduce the impact of invalid business requests on the server, as well as malicious DDOS attacks on the server.
  • Step 103 Discard the service request, and then perform step 106.
  • the business request is restricted between sending a service request to the server, which reduces the impact of the service request on the server.
  • the control table of the service request is further updated, that is, the last request time and the number of requests of the service request are updated, and the last request time is updated to be the request of the discarded service request. At the moment, the number of requests is incremented by one on the original basis.
  • the control table is updated, after receiving the service request in the subsequent process, the frequency of the service request can be correctly calculated to determine whether to limit the service request.
  • Step 104 Establish a control table of the service request according to the user information and the service content carried in the service request, and record, in the control table, the service content, the start time, the last request time, and the number of requests of the current service request.
  • Step 105 Send the service request to a server.
  • the related information of the service request recorded in the control table is also updated, including the last request time and the number of requests. Specifically, the last request time is updated to the request time of the discarded service request, and the number of requests is accumulated by one on the original basis.
  • the control table is updated, after receiving the service request in the subsequent process, the frequency of the service request can be correctly calculated to determine whether to limit the service request.
  • Step 106 the end.
  • step 101 if the control table of the service request does not exist, it indicates that the user sends the service request for the first time, and in general, for example, the number of service requests currently processed by the server that processes the service request is not greater than The maximum number of values supported) can be sent directly to the server.
  • the requested control table that is, the information related to the service request in the control table, including the service content of the service request, the start time, the last request time, the number of requests, and the set value, to release the storage space.
  • the network device may further determine whether the service request is supported, including: whether the network device receives the service request of the type and whether the server connected to the server can process the service request, for example, Step 101 is performed; otherwise, the service request is forwarded to another network device connected to the network device and supports the service request; another network device receives the service request, and processes according to the process of the foregoing embodiment.
  • the business request includes: whether the network device receives the service request of the type and whether the server connected to the server can process the service request, for example, Step 101 is performed; otherwise, the service request is forwarded to another network device connected to the network device and supports the service request; another network device receives the service request, and processes according to the process of the foregoing embodiment.
  • the business request is performed
  • the network device determines, according to the address of the server that processes the service request carried in the service request, whether the number of service requests currently processed by the server is less than a preset. The quantity value, if yes, go to step 101; otherwise, go to step 103.
  • the step 105 may be specifically implemented by: the network device determining whether the working state of the server currently processing the service request is normal, and Sending the service request to the server; otherwise, The server of the server sends the service request.
  • step 105 the network device compares the current load status of each server, and sends the service request to the server with the smallest load.
  • FIG. 2 is a schematic structural diagram of an embodiment of a network device according to the present invention, which includes a receiving module 01, a query module 02, a frequency comparison module 03, a suppression module 04, and a control table storage module 05 connected to the query module 02.
  • the transmitting module 06 which is connected to the frequency comparison module 03, is also connected to the transmitting module 06.
  • a control table establishing module 07 is further disposed between the query module 02 and the control table storage module 05.
  • the receiving module 01 is configured to receive a service request.
  • the control table storage module 05 is configured to store a control table.
  • the information that can be stored in the control table is as shown in Table 1 above.
  • the query module 02 is configured to query whether the control table storage module 05 exists.
  • the frequency comparison module 03 is configured to determine, according to the information stored in the control table, whether the frequency of the service request exceeds a set value; 04 is used to discard the service request whose frequency exceeds the set value; the sending module 06 is configured to send a service request whose frequency does not exceed the set value, where the service request does not exist in the control table, because there is no corresponding to the user information and the service content
  • the control table that is, the service request is considered to be the service request sent for the first time;
  • the control table establishing module 07 is configured to be in the control table storage module 05 when there is no control table corresponding to the service request in the control table storage module 05. Establishing a control table for the business request, and recording the start of the business request in the control table , The last request time, the request number and the set value.
  • FIG. 3 is a schematic structural diagram of an embodiment of a service processing system of the present invention, which is composed of the network device and a server for processing a service request, and uses the network device to limit the service request sent to the server, when the frequency comparison module 03 If the number of times the same service request sent by the same user to the server exceeds the set value, the suppression module 04 discards the service request to implement protection for the server, if the same service request sent by the same user to the server is not When the set value is exceeded, the sending module 06 sends the service request to the server to maintain the normal service.
  • FIG. 4 is a schematic structural diagram of another embodiment of a network device according to the present invention, where the network device further includes The update module 08 is connected to the suppression module 04, the sending module 06, and the control table storage module 05 respectively, and after discarding or transmitting the service request, updating the last request time and the number of requests of the service request stored in the control table.
  • FIG. 5 is a schematic structural diagram of another embodiment of the service processing system of the present invention, which is composed of the network device and a server for processing a service request. After the suppression module 04 discards the service request or the sending module 06 sends a service request to the server.
  • the update module 08 updates the number of requests for the service request and the last request time information, so that after receiving the service request in the subsequent process, the frequency of the service request can be correctly calculated to determine whether to limit the service request.
  • FIG. 6 is a schematic structural diagram of still another embodiment of a network device according to the present invention.
  • the network device further includes a deleting module 09, which is respectively connected to the receiving module 01 and the control table storage module 05, and records in a control table from the service request. If the service request sent by the same user (that is, the same user information) is not received within the predetermined time of the last request time, the control table of the service request is deleted, that is, the start time of the service request in the control table is deleted. , the last request time, the number of requests, and the set value.
  • FIG. 09 is respectively connected to the receiving module 01 and the control table storage module 05, and records in a control table from the service request. If the service request sent by the same user (that is, the same user information) is not received within the predetermined time of the last request time, the control table of the service request is deleted, that is, the start time of the service request in the control table is deleted. , the last request time, the number of requests, and the set value.
  • FIG. 7 is a schematic structural diagram of still another embodiment of the service processing system of the present invention, which is composed of the network device and a server for processing a service request, if the deletion module 09 is in the last request time of the service request recorded in the distance control table. If the same service request sent by the same user to the server is not received within the predetermined time, the control table of the service request is deleted to release the storage space.
  • an authentication module 10 may be further configured to determine whether the network device supports the received service request, including: whether the network device receives the type The service request and the server to which it is connected can process the service request, and if so, send the service request to the query module 02; if not, forward the service request to another network connected to the network device and supporting the service request device.
  • Figure 8 shows a schematic diagram of a service processing system consisting of multiple network devices and multiple servers. The network device can connect to the server and the network device, or can only connect to the server. Each server can support different types of service requests.
  • the network service device may send the service request to the server supporting the service request or the network device supporting the service request, where the network device re- Send to the server to which it is connected.
  • the quantity comparison module 11 is further configured to be connected to the suppression module 04, and configured to determine the number of service requests currently processed by the server according to the address of the server that processes the service request carried in the service request. If the value is less than the preset quantity, if yes, the service request is sent to the query module 02; if not, the service request is directly sent to the suppression module 04 for discarding.
  • a state detecting module 12 may be further configured to determine the working state of the server currently processing the service request. Whether it is normal, if yes, sending the service request to the server; if not, sending the service request to the standby server that is standby with the server or selecting one of the standby servers.
  • Figure 9 is a schematic diagram of a service processing system consisting of the network device and a plurality of mutually standby servers, wherein each server can be used as a backup for each other, or one or more servers can be operated, and the remaining servers are designated.
  • the state detecting module 12 determines that the working state of the server currently processing the service request is normal, and sends the service request to the server; If the working state is not normal, the sending module 06 can send the service request to the standby server of the server.
  • the sending module 06 in any of the network devices shown in FIG. 2, FIG. 4, and FIG. 6 may also be connected to the forwarding module 13 for comparing the load of the connected multiple servers that can handle the service request.
  • the service request is sent to one of the servers with the least load.
  • the general beneficial effect of the invention is: effectively avoiding the user's attack on the server, increasing the attack difficulty and reducing the attack strength; reducing the impact of the invalid service request on the server, and the malicious DDOS attacking the server, ensuring the network
  • the normal operation of the user improves the user's satisfaction; in addition, there is no need to improve the server, which saves the operator's cost.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Description

业务处理方法、 网络设备及业务处理*** 技术领域
本发明涉及通信技术领域, 尤其是一种业务处理方法、 网络设备及业务处 理***。 背景技术
随着 Internet网络的不断扩大, Internet上的用户数量不断增加, 网络中的 各种设备, 例如: DSLAM ( Digital Subscriber Line Access Multiplexer, 数字用户 线路接入复用器)、 Lanswitch (二层交换机)、 BAS ( Broadband access server, 宽带接入服务器)、 BRAS ( Broadband remote access server, 宽带远程接入服务 器)、 S ( Service router, 业务路由器)、 Router (路由器)等的数量越来越多, 其功能越来越强, 性能也越来越高。 接入设备在网络中的层次越低, 对其安全 性要求就越低, 但网上的接入设备就会越多, 就越不容易管理。 随着设备性能 的提高以及各种可靠性技术的发展, 使对用户的接入设备进行管理的网络设备 的网络地位越来越高, 从接入层 (即: 直接面向用户接入的接口, 这里是网络 的起点, 也是网络的终点) 到边缘会聚层、 从边缘会聚层到会聚层 (即: 对接 入层各种设备的汇聚)、 从会聚层到核心边缘层。 随着网络地位的提高, 不但对 网络设备本身的各种功能与性能提出了更高的要求, 而且对这些网络设备的稳 定性与安全性也提出了更加苛刻的要求, 如果其稳定性较低, 网络便会经常发 生中断, 就会影响用户对网络的正常使用, 便会因此给用户造成严重的损失, 也降低了客户对网络运营商的满意度; 而如果网络设备的安全性较低的话, 就 非常容易受到网络上各种有意或无意的 "攻击", 网络也会经常被迫中断, 同样 会给用户带来损失。 另外, 网络中运行的各种服务器在性能和安全上都不完备, 如果网络设备缺少对上层各种服务器的保护 (例如: 防止大量认证或计费等报 文的攻击), 服务器就会因为无法同时处理数量庞大的业务请求而导致其他正常 的业务请求的终止, 严重时甚至会直接导致全部服务的终止, 同样会导致网络 的不正常或不可用, 因此, 对网络设备的网络抑制能力也提出了一定的要求, 就是不但网络设备本身不能容易受到攻击, 而且还要提供一定的手段对上层各 种月 务器 (1"列^口: AAA ( Authorization, Authentication and Accounting, 4受权、 鉴权和计费)服务器) 的攻击进行抑制, 以减小对这些服务器的攻击, 使其能 够正常工作, 继续为其他用户提供服务。 因此, 随着网络的发展, 网络提供商、 内容提供商越来越关注网络的稳定和安全, 一个稳定、 安全的网络对提高服务 质量、 提升整体客户满意度至关重要, 对降低网络运营成本、 提高网络盈利也 甚为关键。
在现有技术中, 通过以下几种方法对上行服务器进行保护:
1 , 网络设备通过限制发送到服务器的流量来对服务器进行保护, 但是, 因 为是在接收用户的业务请求前对其进行抑制, 用户发送业务请求失败后, 会不 断的重新发起该业务请求, 网络设备也就不断的对该业务请求进行响应, 这反 而导致了网络的更大拥塞, 直接影响了其他用户的业务请求。
2 , 网络设备同时连接主服务器与备用服务器, 正常情况下, 由主服务器提 供业务, 在主服务器受到攻击出现异常的情况下, 网络设备便将业务请求切换 到备用服务器, 由备用服务器对业务请求进行处理, 但是, 备用服务器同样也 会受到攻击从而导致终止服务, 致使所有的服务器的都不可用, 影响了网絡的 正常运营。
3, 网络设备同时连接多个服务器, 根据当前各服务器上的业务请求处理情 况向其分配新的业务请求, 使得服务器的负载均衡, 这样, 在网络业务不很繁 忙的情况下, 减轻了各个服务器的负担。 但是, 在用户对服务器进行攻击的情 况下, 若攻击数量达到一定的程度, 即使多个服务器同时负载均衡工作, 也会 因为全部受到攻击而全部终止服务, 无法从根本上防止上层服务器被攻击。
4 , 对服务器进行改进, 增加服务器的抑制功能, 对其连接的下游网络设备 传送的业务请求进行抑制, 这样会限制正常的业务请求, 影响正常的业务, 并 且, 对服务器进行改进增加了服务器的成本, 加重了运营商的经济负担。 发明内容
本发明实施例所要解决的技术问题是: 服务器因需处理大量的非法报文而 导致网络拥塞, 从而影响对正常的业务请求的处理。
为解决上述技术问题, 本发明实施例提供的一种业务处理方法, 包括以下 步骤:
根据接收的业务请求中携带的用户信息, 判断所述用户发起所述业务请求 的频率是否超过设定值, 若所述业务情求的频率超过设定值, 则丟弃所述业务 请求; 若所述业务倚求的频率未超过设定值, 则发送所述业务请求。
上述业务处理方法中, 判断所述用户发起所述业务请求的频率是否超过设 定值具体为: 查询是否存在与所述业务请求中携带的用户信息及业务内容相应 的控制表, 若存在所述控制表, 则根据所述控制表判断所述业务请求的频率是 否超过设定值; 若不存在所述控制表, 则根据所述用户信息及业务内容建立所 述业务请求的控制表, 在该控制表中记录所述用户信息、 所述业务请求的业务 内容、 开始时刻、 请求次数与所述设定值, 并发送所述业务请求。
所述用户信息为 MAC地址、 用户名或 IP地址。
丟弃所述业务请求或发送所述业务请求后, 还更新所述控制表中所述业务 请求的最后一次请求时刻与请求次数。
上述方法还包括: 若在距离所述最后一次请求时刻的预定时间内未收到所 述用户发送的所述业务请求, 删除所述业务请求的控制表。
另外, 上述业务处理方法还包括: 网络设备接收到业务请求后, 判断是否 支持所述业务请求, 若支持所述业务请求, 则根据接收的业务请求中携带的用 户信息, 执行所述判断所述用户发起所述业务请求的频率是否超过设定值的步 骤; 若不支持所述业务请求, 则将该业务请求转发给支持所述业务请求的另一 网络设备; 另一网络设备接收所述业务请求, 然后根据接收的业务请求中携带 的用户信息, 执行所述判断所述用户发起所述业务请求的频率是否超过设定值 的步骤。 网络设备接收到业务请求后, 根据该业务请求中携带的处理该业务请 求的服务器的地址, 判断该服务器当前处理的业务请求的数量是否小于预设数 量值, 若所述服务器当前处理的业务请求的数量小于预设数量值, 则根据接收 的业务请求中携带的用户信息, 执行所述判断所述用户发起所述业务请求的频 率是否超过设定值的步骤; 若所述服务器当前处理的业务请求的数量不小于预 设数量值, 则丟弃所述业务请求。
发送所述业务请求具体为: 网络设备判断当前处理所述业务请求的服务器 的工作状态是否正常, 若所述当前处理所述业务请求的服务器的工作状态正常, 则向该服务器发送所述业务请求; 若所述当前处理所述业务请求的服务器的工 或者发送所述业务请求具体为: 网絡设备将所述业务请求发送给可处理该业务 请求的多个服务器中负载最小的服务器。
本发明实施例提供的一种网络设备, 包括:
接收模块, 用于接收业务请求;
查询模块, 用于查询所述控制表存储模块中是否存在与接收到的所述业务 请求中携带的用户信息及业务内容相应的控制表;
控制表建立模块, 用于建立所述业务请求的控制表, 并在该控制表中记录 所述业务请求的业务内容、 开始时刻、 最后一次请求时刻、 请求次数与设定值; 频率比较模块, 用于根据所述控制表判断所述业务请求的频率是否超过设 定值;
抑制模块, 用于丢弃频率超过设定值的业务请求;
发送模块, 用于发送频率未超过设定值的业务请求。
上述网络设备还包括控制表存储模块, 用于存储控制表, 该控制表包括用 户信息、 用户请求的业务内容、 业务请求的开始时刻、 最后一次请求时刻、 请 求次数与设定值。
上述网络设备还包括更新模块, 用于更新所述控制表中所述业务请求的最 后一次请求时刻与请求次数。
上述网络设备还包括删除模块, 用于在距离所述最后一次请求时刻的预定 时间内未收到所述用户发送的所述业务请求时, 删除所述业务请求的控制表。 上述网络设备还包括网络设备, 还包括鉴权模块, 用于判断是否支持所述 业务请求, 若否, 将所述业务请求转发给支持所述业务请求的另一网络设备。
上述网络设备还包括数量比较模块, 用于根据所述业务请求中携带的处理 该业务请求的服务器的地址, 判断该服务器的当前处理的业务请求的数量是否 小于预设数量值, 若该服务器的当前处理的业务请求的数量小于预设数量值, 则向所述查询模块发送所述业务请求, 若该服务器的当前处理的业务请求的数 量不小于预设数量值 , 则向所述抑制模块发送所述业务请求。
上述网络设备还包括状态检测模块, 用于判断当前处理所述业务请求的服 务器的工作状态是否正常, 若所述当前处理所述业务请求的服务器的工作状态 正常, 则向该服务器发送所述业务请求; 若所述当前处理所述业务请求的服务 器的工作状态不正常, 则向与所述备用服务器发送所述业务请求。
上述网络设备还包括转发模块, 用于将所述业务请求发送给可处理该业务 请求的多个服务器中负载最小的服务器。
本发明实施例提供的一种业务处理***, 包括用于处理业务请求的服务器, 还包括网络设备, 该网络设备包括:
接收模块, 用于接收业务请求;
控制表存储模块, 用于存储控制表, 该控制表包括用户信息、 用户请求的 业务内容、 业务请求的开始时刻、 最后一次请求时刻、 请求次数与设定值; 查询模块, 用于查询所述控制表存储模块中是否存在与接收到的所述业务 请求中携带用户信息及业务内容相应的控制表;
频率比较模块, 用于根据所述控制表判断所述业务请求的频率是否超过设 定值;
抑制模块, 用于丢弃频率超过设定值的业务请求;
发送模块, 用于发送频率未超过设定值的业务诸求。
上述业务处理***中, 所述网络设备还包括控制表建立模块, 用于建立所 述业务请求的控制表, 并在该控制表中记录所述业务请求的业务内容、 开始时 刻、 最后一次请求时刻、 请求次数与设定值。 上述业务处理***中, 所述网络设备还包括更新模块, 用于所述控制表中 所述业务请求的最后一次请求时刻与请求次数。
上述业务处理***中, 所述网络设备还包括删除模块, 用于在距离所述最 后一次请求时刻的预定时间内未收到所述用户发送的所述业务请求时, 删除所 述业务请求的控制表。
上述业务处理***中, 所述网絡设备还包括鉴权模块, 用于判断是否支持 所述业务请求。
上述业务处理***中, 所述网络设备还包括数量比较模块, 用于根据所述 业务请求中携带的处理该业务请求的服务器的地址, 判断该服务器的当前处理 的业务请求的数量是否小于预设数量值, 若所述服务器的当前处理的业务请求 的数量小于预设数量值, 则向所述查询模块发送所述业务请求, 若所述服务器 的当前处理的业务请求的数量不小于预设数量值, 则向所述抑制模块发送所述 业务请求。
上述业务处理***还包括与所述服务器的互为备用的备用服务器; 所述网 络设备还包括状态检测模块, 用于判断当前处理所述业务请求的服务器的工作 状态是否正常, 若所述当前处理所述业务请求的服务器的工作状态正常, 则向 该服务器发送所述业务请求; 若所述当前处理所述业务请求的服务器的工作状 态不正常, 则向与所述备用服务器发送所述业务请求。
上述业务处理***中的所述服务器为多个; 所述网络设备还包括转发模块, 用于将所述业务请求发送给可处理该业务请求的多个服务器中负载最小的服务 器。
基于上述技术方案, 本发明具有以下有益的技术效果:
建立同一用户发起的同一业务请求的控制表, 记录该用户在一定时间内发 起同一业务请求的次数, 当其业务请求频率超过设定值时, 网络设备就丟弃该 业务请求, 而不向服务器转发, 从而实现对业务请求的限制, 与现有技术相比, 有效避免了用户对服务器的攻击, 增加了攻击难度, 减小了攻击强度, 降低了 对服务器的冲击; 减小了无效业务请求对服务器的冲击, 以及恶意的 DDOS ( Distributed Denial of Service,分布式拒绝服务)攻击,保证了网络的正常运行; 另外, 不需要改进服务器, 与现有技术相比, 节省了运营商的成本。
下面通过附图和实施例 , 对本发明的技术方案做进一步的详细描述。 附图说明
图 1为本发明业务处理方法实施例的流程图。
图 2为本发明网络设备实施例的结构示意图。
图 3为由图 2网络设备构成的业务处理***实施例的结构示意图。
图 4为本发明网络设备另一实施例的结构示意图。
图 5为由图 4网络设备构成的业务处理***另一实施例的结构示意图。 图 6为本发明网络设备再一实施例的结构示意图。
图 7为由图 6网络设备构成的业务处理***再一实施例的结构示意图。 图 8为由多个网络设备及多个服务器构成的业务处理***的原理图。
图 9为由网络设备及多个互为备用的服务器构成的业务处理***的原理图。 具体实施方式
由于网络设备相对网络中的服务器来说, 具有较高的数据处理能力及性能 优势, 并且对网络中各种攻击都具有较好的抑制能力, 本发明在网络设备中建 立控制表, 记录同一用户发往服务器的同一业务请求的频率, 通过丟弃频率大 于设定值的同一用户的业务请求的方法对发送服务器的业务请求进行抑制, 以 保护上层服务器。
图 1所示为本发明业务处理方法实施例的流程图, 其可通过图 2所示的网 络设备实现, 具体包括以下步骤:
步骤 101 , 接收用户发送的业务请求信息, 查询是否存在与接收的业务请求 中携带的用户信息及业务内容相应的控制表, 是, 执行步骤 102; 否则, 执行步 骤 104。 其中的用户信息可以是该用户的 MAC地址、 用户名或者 IP地址。 如下 表 1 所示为一控制表, 该控制表至少包括用户信息、 业务内容、 业务请求的开 始时刻、 该业务请求的次数(包括业务请求超时或失败的次数)、 最后一次请求 时刻与事先设定的表示允许请求的频率的设定值, 另外, 也可以包括表示控制 表的标识号码的 Table ID。
表 1
Figure imgf000011_0001
步骤 102 , 根据控制表的记载, 判断所述用户发送的同一业务请求的频率是 否超过设定值, 是, 执行步骤 103 ; 否则, 执行步骤 105。
通过同一用户发送的相同内容的业务请求的频率来对业务请求进行限制, 丟弃频率大于设定值的业务请求, 有效避免了用户对服务器的攻击, 增加了攻 击难度, 减小了攻击强度; 减小了无效业务请求对服务器的冲击, 以及恶意的 DD0S对服务器的攻击。
步骤 103 , 丟弃所述业务请求, 然后执行步骤 106。
在向服务器发送业务请求之间即对业务请求进行限制, 降低了业务请求对 服务器的冲击。
具体的, 丢弃所述业务请求后, 还更新该业务请求的控制表, 即更新其中 的业务请求的最后一次请求时刻与请求次数, 将最后一次请求时刻更新为本次 被丢弃的业务请求的请求时刻, 将请求次数在原来的基础上累加 1。 更新控制表 后, 在后续流程中接收到业务请求后, 可以正确的对业务请求的频率进行计算, 从而确定是否限制业务请求。
步骤 104 ,根据业务请求中携带的用户信息及业务内容建立该业务请求的控 制表, 在该控制表中记录本次业务请求的业务内容、 开始时刻、 最后一次请求 时刻与请求次数。
步骤 105 , 向服务器发送所述业务请求。 向服务器发送所述业务请求后, 还更新控制表中记录的所述业务请求的相 关信息, 包括最后一次请求时刻与请求次数。 具体的, 将最后一次请求时刻更 新为本次被丢弃的业务请求的请求时刻, 将请求次数在原来的基础上累加 1。 更 新控制表后, 在后续流程中接收到业务请求后, 可以正确的对业务请求的频率 进行计算, 从而确定是否限制业务请求。
步骤 106, 结束。
步骤 101 中, 若不存在所述业务请求的控制表, 说明该用户是首次发送所 述业务请求, 一般情况下 (例如: 处理该业务请求的服务器当前处理的业务请 求的数量不大于其所能支持的最大数量值), 便可以直接向服务器发送该业务请 求。
具体的, 在发送所述业务请求后, 若在距离控制表中记录的所述业务请求 的最后一次请求时刻的预定时间内未收到同一用户再次发送的所述业务请求, 则删除所述业务请求的控制表, 即删除控制表中与所述业务请求相关信息, 包 括业务请求的业务内容、 开始时刻、 最后一次请求时刻、 请求次数与设定值, 以释放存储空间。
在上述实施例中, 网络设备接收到业务请求后, 还可以先判断是否支持所 述业务请求, 包括: 该网络设备是否接收该类型的业务请求以及其连接的服务 器能否处理该业务请求, 如是, 则执行步骤 101 ; 否则, 将所述业务请求转发给 该网路设备连接的、 支持该业务请求的另一网络设备; 另一网络设备接收所述 业务请求, 并按照上述实施例的流程处理所述业务请求。
此外, 在上述步骤 101 之前, 网络设备接收到所述业务请求后, 还根据该 业务请求中携带的处理该业务请求的服务器的地址, 判断处理该服务器当前处 理的业务请求的数量是否小于预设数量值, 如是, 执行步骤 101 ; 否则, 执行步 骤 103。
另外, 在处理所述业务请求的服务器存在互为备用的备用服务器的情况下, 步骤 105 具体可以通过如下操作实现: 网络设备判断当前处理所述业务请求的 服务器的工作状态是否正常, 是, 则向该服务器发送所述业务请求; 否则, 向 该服务器的备用服务器发送所述业务请求。
若网络设备同时连接了多个可处理所述业务请求的服务器,则上述步骤 105 中, 网络设备比较各服务器当前的负载情况, 将所述业务请求发送给其中负载 最小的服务器。
图 2 所示为本发明网络设备实施例的结构示意图, 其包括依次连接的接收 模块 01、 查询模块 02、 频率比较模块 03、 抑制模块 04 , 以及与查询模块 02连 接的控制表存储模块 05 , 和与频率比较模块 03连接的发送模块 06 , 查询模块 02还与发送模块 06连接。 另外, 查询模块 02与控制表存储模块 05之间还设有 控制表建立模块 07。
其中, 接收模块 01用于接收业务请求; 控制表存储模块 05用于存储控制 表, 该控制表中可以存储的信息如上表 1所示; 查询模块 02用于查询控制表存 储模块 05中是否存在与接收到的所述业务请求中携带的用户名及业务内容相应 的控制表; 频率比较模块 03用于根据控制表中存储的信息, 判断所述业务请求 的频率是否超过设定值; 抑制模块 04用于丟弃频率超过设定值的业务请求; 发 送模块 06用于发送频率未超过设定值的业务请求, 其中包括不存在控制表的业 务请求, 因为不存在与用户信息及业务内容相应的控制表, 即认为该业务请求 为首次发送的业务请求; 控制表建立模块 07用于在控制表存储模块 05 中不存 在与所述业务请求相应的控制表时, 在控制表存储模块 05中建立该业务请求的 控制表, 并在该控制表中记录所述业务请求的开始时刻、 最后一次请求时刻、 请求次数与设定值。
图 3 所示为由该网络设备及用于处理业务请求的服务器构成的本发明业务 处理***实施例的结构示意图, 利用其中的网络设备对发往服务器的业务请求 进行限制, 当频率比较模块 03发现同一用户发往该服务器的相同业务请求的次 数超过设定值时, 抑制模块 04便丟弃该业务请求, 以实现对服务器的保护, 若 同一用户发往该服务器的相同业务请求的次数未超过设定值时, 则由发送模块 06将该业务情求发送给服务器, 以维护正常的业务。
图 4 所示为本发明网络设备另一实施例的结构示意图, 该网络设备还包括 更新模块 08 , 分别与抑制模块 04、 发送模块 06及控制表存储模块 05连接, 在 丢弃或发送所述业务请求后, 更新控制表中存储的所述业务请求的最后一次请 求时刻与请求次数。 图 5 所示为由该网络设备及用于处理业务请求的服务器构 成的本发明业务处理***另一实施例的结构示意图, 在抑制模块 04丟弃业务请 求或者发送模块 06向服务器发送业务请求后, 更新模块 08更新该业务请求的 请求次数与最后一次请求时刻信息, 以便在后续流程中接收到业务请求后, 可 以正确的对业务请求的频率进行计算, 从而确定是否限制业务请求。
图 6 所示为本发明网络设备再一实施例的结构示意图, 该网络设备还包括 删除模块 09, 分别与接收模块 01及控制表存储模块 05连接, 在距离所述业务 请求的控制表中记录的最后一次请求时刻的预定时间内未收到同一用户 (即用 户信息相同)再次发送的所述业务请求, 则删除所述业务请求的控制表, 即删 除控制表中所述业务请求的开始时刻、 最后一次请求时刻、 请求次数与设定值。 图 7 所示为由该网络设备及用于处理业务请求的服务器构成的本发明业务处理 ***再一实施例的结构示意图, 若删除模块 09在距离控制表中记录的业务请求 的最后一次请求时刻的预定时间内未收到同一用户再次发往服务器的同一业务 请求, 则删除该业务请求的控制表, 以释放存储空间。
在上述任一网络设备中的接收模块 01 与查询模块 02之间, 还可以设置有 鉴权模块 10 , 用于判断该网络设备是否支持接收到的业务请求, 包括: 该网络 设备是否接收该类型的业务请求以及其连接的服务器能否处理该业务请求, 若 是, 将该业务请求发送给查询模块 02; 若否, 将该业务请求转发给该网络设备 连接的、 支持该业务请求的另一网络设备。 图 8 所示为由多个网络设备及多个 服务器构成的业务处理***的原理图, 其中的网络设备可以连接服务器与网络 设备, 也可以只连接服务器, 各服务器可以支持不同类型的业务请求, 某一网 络设备接收到业务请求后, 若发现其连接的服务器不支持该业务请求, 便可以 将该业务请求发送给支持该业务请求的服务器或者支持该业务请求的网络设 备, 由该网络设备再发送给其连接的服务器。
在图 2、图 4与图 6所示的任一网络设备中的接收模块 01与查询模块 02之 间, 还可以设置数量比较模块 11 , 数量比较模块 11还与抑制模块 04连接, 用 于根据所述业务请求中携带的处理该业务请求的服务器的地址, 判断该服务器 当前处理的业务请求的数量是否小于预设数量值, 如是, 则将该业务请求发送 给查询模块 02; 若否, 直接将该业务请求发送给抑制模块 04以丟弃。
此外, 图 2、 图 4与图 6所示的任一网络设备中的频率比较模块 03与发送 模块 06之间, 还可以设置状态检测模块 12, 用于判断当前处理业务请求的服务 器的工作状态是否正常, 如是, 则向该服务器发送所述业务请求; 如否, 向与 该服务器互为备用的备用服务器或选择其中一个备用服务器发送所述业务请 求。 图 9 所示为由该网络设备及多个互为备用的服务器构成的业务处理***的 原理图, 其中的各服务器可以两两互为备用, 也可以一个或多个服务器工作, 其余服务器作为指定的服务器或者当前工作的服务器的共同备用服务器, 当业 务请求满足发往服务器的条件时, 通过状态检测模块 12确定当前处理业务请求 的服务器的工作状态正常, 便将该业务请求发送给该服务器; 如果其工作状态 不正常, 发送模块 06便可以将该业务请求发送给该服务器的备用服务器。
另外, 图 2、 图 4与图 6所示的任一网络设备中的发送模块 06还可以连接 转发模块 13, 用于比较连接的、 可以处理所述业务奇求的多个服务器的负载, 将所述业务请求发送给其中负载最小的一个服务器。
本发明总的有益效果: 有效避免了用户对服务器的攻击, 增加了攻击难度, 减小了攻击强度; 减小了无效业务请求对服务器的冲击, 以及恶意的 DDOS对 服务器的攻击, 保证了网络的正常运行, 提高了用户的满意度; 另外, 不需要 改进服务器, 节省了运营商的成本。
最后所应说明的是: 以上实施例仅用以说明本发明的技术方案,而非对本发 明作限制性理解。 尽管参照上述较佳实施例对本发明进行了详细说明, 本领域 的普通技术人员应当理解: 其依然可以对本发明的技术方案进行修改或者等同 替换, 而这种修改或者等同替换并不脱离本发明技术方案的精神和范围。

Claims

权 利 要 求
1、 一种业务处理方法, 其特征在于包括以下步骤:
根据接收的业务请求中携带的用户信息, 判断所述用户发起所述业务请求 的频率是否超过设定值, 若所述业务请求的频率超过设定值, 则丢弃所述业务 请求; 若所述业务请求的频率未超过设定值, 则发送所述业务请求。
2、 根据权利要求 1所述的业务处理方法, 其特征在于判断所述用户发起所 述业务请求的频率是否超过设定值具体为:
查询是否存在与所述业务请求中携带的用户信息及业务内容相应的控制 表, 若存在所述控制表, 则根据所述控制表判断所述业务请求的频率是否超过 设定值; 若不存在所述控制表, 则根据所述用户信息及业务内容建立所述业务 请求的控制表, 在该控制表中记录所述用户信息、 所述业务请求的业务内容、 开始时刻、 请求次数与所述设定值, 并发送所述业务请求。
3、 根据权利要求 1或 2所述的业务处理方法, 其特征在于所述用户信息为 MAC地址、 用户名或 IP地址。
4、 根据权利要求 1或 2所述的业务处理方法, 其特征在于丢弃所述业务请 求或发送所述业务请求后, 还更新所述控制表中所述业务请求的最后一次请求 时刻与请求次数。
5、 根据权利要求 4所述的业务处理方法, 其特征在于还包括: 若在距离所 述最后一次请求时刻的预定时间内未收到所述用户发送的所述业务请求, 删除 所述业务请求的控制表。
6、 根据权利要求 1所述的业务处理方法, 其特征在于还包括:
网络设备接收到业务请求后, 判断是否支持所述业务请求, 若支持所述业 务请求, 则根据接收的业务请求中携带的用户信息, 执行所述判断所述用户发 起所述业务请求的频率是否超过设定值的步骤; 若不支持所述业务请求, 则将 该业务请求转发给支持所述业务请求的另一网絡设备; 另一网络设备接收所述 业务请求, 然后根据接收的业务 Ϊ會求中携带的用户信息, 执行所述判断所述用 户发起所述业务请求的频率是否超过设定值的步骤。
7、 根据权利要求 1所述的业务处理方法, 其特征在于还包括: 网络设备接收到业务请求后, 根据该业务请求中携带的处理该业务请求的 服务器的地址, 判断该服务器当前处理的业务请求的数量是否小于预设数量值, 若所述服务器当前处理的业务请求的数量小于预设数量值, 则根据接收的业务 请求中携带的用户信息, 执行所述判断所述用户发起所述业务请求的频率是否 超过设定值的步骤; 若所述服务器当前处理的业务请求的数量不小于预设数量 值, 则丟弃所述业务诸求。
8、 根据权利要求 1所述的业务处理方法, 其特征在于发送所述业务请求具 体为:
网络设备判断当前处理所述业务请求的服务器的工作状态是否正常, 若所 述当前处理所述业务请求的服务器的工作状态正常, 则向该服务器发送所述业 务请求; 若所述当前处理所述业务请求的服务器的工作状态不正常, 则向与所 述服务器的互为备用的备用服务器发送所述业务请求;
或者发送所述业务请求具体为: 网络设备将所述业务请求发送给可处理该 业务请求的多个服务器中负载最小的服务器。
9、 一种网络设备, 其特征在于包括:
接收模块, 用于接收业务请求;
控制表存储模块, 用于存储控制表, 该控制表包括用户信息、 用户请求的 业务内容、 业务请求的开始时刻、 最后一次请求时刻、 请求次数与设定值; 查询模块, 用于查询所述控制表存储模块中是否存在与接收到的所述业务 请求中携带的用户信息及业务内容相应的控制表;
频率比较模块, 用于根据所述控制表判断所述业务请求的频率是否超过设 定值;
抑制模块, 用于丟弃频率超过设定值的业务请求;
发送模块, 用于发送频率未超过设定值的业务请求。
10、 根据权利要求 9所述的网络设备, 其特征在于还包括控制表建立模块, 用于建立所述业务请求的控制表, 并在该控制表中记录所述业务请求的业务内 容、 开始时刻、 最后一次请求时刻、 请求次数与设定值。
11、 根据权利要求 9 所述的网络设备, 其特征在于还包括更新模块, 用于 更新所述控制表中所述业务请求的最后一次请求时刻与请求次数。
12、 根据权利要求 9 所述的网络设备, 其特征在于还包括删除模块, 用于 在距离所述最后一次请求时刻的预定时间内未收到所述用户发送的所述业务请 求时, 删除所述业务倚求的控制表。
13、 根据权利要求 9至 12任意一项所述的网络设备, 其特征在于还包括鉴 权模块, 用于判断是否支持所述业务请求, 若否, 将所述业务请求转发给支持 所述业务请求的另一网络设备。
14、 根据权利要求 9至 12任意一项所述的网络设备, 其特征在于还包括数 量比较模块, 用于根据所述业务请求中携带的处理该业务请求的服务器的地址, 判断该服务器的当前处理的业务请求的数量是否小于预设数量值, 若该服务器 的当前处理的业务请求的数量小于预设数量值, 则向所述查询模块发送所述业 务请求, 若该服务器的当前处理的业务请求的数量不小于预设数量值, 则向所 述抑制模块发送所述业务请求。
15、 根据权利要求 9至 12任意一项所述的网络设备, 其特征在于还包括状 态检测模块, 用于判断当前处理所述业务请求的服务器的工作状态是否正常, 若所述当前处理所述业务请求的服务器的工作状态正常, 则向该服务器发送所 述业务请求; 若所述当前处理所述业务请求的服务器的工作状态不正常, 则向 与所述备用服务器发送所述业务请求。
16、 根据权利要求 9至 12任意一项所述的网络设备, 其特征在于还包括转 发模块, 用于将所述业务请求发送给可处理该业务请求的多个服务器中负载最 小的服务器。
17、 一种业务处理***, 包括用于处理业务请求的服务器, 其特征在于还 包括网络设备, 该网络设备包括:
接收模块, 用于接收业务请求;
控制表存储模块, 用于存储控制表, 该控制表包括用户信息、 用户请求的 业务内容、 业务请求的开始时刻、 最后一次请求时刻、 请求次数与设定值; 查询模块, 用于查询所述控制表存储模块中是否存在与接收到的所述业务 请求中携带用户信息及业务内容相应的控制表;
频率比较模块, 用于根据所述控制表判断所述业务请求的频率是否超过设 定值;
抑制模块, 用于丢弃频率超过设定值的业务请求;
发送模块, 用于发送频率未超过设定值的业务诸求。
18、 根据权利要求 17所述的业务处理***, 其特征在于所述网络设备还包 括控制表建立模块, 用于建立所述业务请求的控制表, 并在该控制表中记录所 述业务请求的业务内容、 开始时刻、 最后一次请求时刻、 请求次数与设定值。
19、 根据权利要求 17所述的业务处理***, 其特征在于所述网络设备还包 括更新模块, 用于所述控制表中所述业务请求的最后一次请求时刻与请求次数。
20、 根据权利要求 17所述的业务处理***, 其特征在于所述网络设备还包 括删除模块, 用于在距离所述最后一次请求时刻的预定时间内未收到所述用户 发送的所述业务请求时, 删除所述业务请求的控制表。
21、 根据权利要求 17至 20任意一项所述的业务处理***, 其特征在于所 述网络设备还包括鉴权模块, 用于判断是否支持所述业务请求。
22、 根据权利要求 17至 20任意一项所述的业务处理***, 其特征在于所 述网络设备还包括数量比较模块, 用于根据所述业务请求中携带的处理该业务 请求的服务器的地址, 判断该服务器的当前处理的业务请求的数量是否小于预 设数量值, 若所述服务器的当前处理的业务请求的数量小于预设数量值, 则向 所述查询模块发送所述业务请求, 若所述服务器的当前处理的业务请求的数量 不小于预设数量值, 则向所述抑制模块发送所述业务请求。
23、 根据权利要求 17至 20任意一项所述的业务处理***, 其特征在于还 包括与所述服务器的互为备用的备用服务器; 所述网络设备还包括状态检测模 块, 用于判断当前处理所述业务情求的服务器的工作状态是否正常, 若所述当 前处理所述业务请求的服务器的工作状态正常, 则向该服务器发送所述业务请 求; 若所述当前处理所述业务请求的服务器的工作状态不正常, 则向与所述备 用服务器发送所述业务请求。
24、 根据权利要求 17至 20任意一项所述的业务处理***, 其特征在于所 述服务器为多个; 所述网络设备还包括转发模块, 用于将所述业务请求发送给 可处理该业务请求的多个服务器中负载最小的服务器。
PCT/CN2007/003336 2006-11-27 2007-11-26 Procédé de traitement de service, dispositif de réseau et système de traitement de service WO2008064562A1 (fr)

Priority Applications (2)

Application Number Priority Date Filing Date Title
EP07816891A EP2086168A4 (en) 2006-11-27 2007-11-26 SERVICE PROCESSING METHOD, NETWORK DEVICE, AND SERVICE PROCESSING SYSTEM
US12/471,615 US20090234952A1 (en) 2006-11-27 2009-05-26 Service processing method, network device and service processing system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN2006101403289A CN1968147B (zh) 2006-11-27 2006-11-27 业务处理方法、网络设备及业务处理***
CN200610140328.9 2006-11-27

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US12/471,615 Continuation US20090234952A1 (en) 2006-11-27 2009-05-26 Service processing method, network device and service processing system

Publications (1)

Publication Number Publication Date
WO2008064562A1 true WO2008064562A1 (fr) 2008-06-05

Family

ID=38076712

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2007/003336 WO2008064562A1 (fr) 2006-11-27 2007-11-26 Procédé de traitement de service, dispositif de réseau et système de traitement de service

Country Status (4)

Country Link
US (1) US20090234952A1 (zh)
EP (1) EP2086168A4 (zh)
CN (1) CN1968147B (zh)
WO (1) WO2008064562A1 (zh)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9122519B1 (en) * 2008-03-12 2015-09-01 Lockheed Martin Corporation Governor for elimination of repetitive requests
CH700308A2 (de) 2009-01-22 2010-07-30 Martin Blapp Ein technisches System in der Hardware oder im Kernel eines E-Mail Gateways, um die Betriebs-Infrastruktur oder das Betriebs-System gegen DDos-Angriffe aus dem Internet zu schützen.
CN101511131B (zh) * 2009-03-04 2010-09-22 上海华为技术有限公司 一种路由方法及装置及***
CN102137059B (zh) * 2010-01-21 2014-12-10 阿里巴巴集团控股有限公司 一种恶意访问的拦截方法和***
US9058210B2 (en) * 2010-03-23 2015-06-16 Ebay Inc. Weighted request rate limiting for resources
CN102611597A (zh) * 2012-04-10 2012-07-25 中山爱科数字家庭产业孵化基地有限公司 一种在不同家庭环境中免输入账号和密码的宽带上网方法
CN103746821B (zh) * 2013-12-30 2017-10-31 广州华多网络科技有限公司 频道创建方法、装置、客户端、服务器及***
CN105337931B (zh) * 2014-06-30 2019-08-20 北京新媒传信科技有限公司 一种限额控制方法及分布式限额控制***
CN105025080B (zh) * 2015-06-02 2018-11-06 深圳市创梦天地科技有限公司 一种分布式***的过载保护方法和服务器
US20170195250A1 (en) * 2016-01-06 2017-07-06 Google Inc. Automatic data restrictions based on signals
CN106790134B (zh) * 2016-12-28 2021-01-29 浙江宇视科技有限公司 一种视频监控***的访问控制方法及安全策略服务器
CN106878335B (zh) * 2017-03-28 2020-10-16 武汉斗鱼网络科技有限公司 一种用于登录验证的方法及***
CN109076024A (zh) * 2018-07-20 2018-12-21 威富通科技有限公司 数据控制方法及终端设备
CN113516811B (zh) * 2021-04-23 2023-03-14 摩拜(北京)信息技术有限公司 一种物品使用方法和装置

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002019661A2 (en) 2000-09-01 2002-03-07 Top Layer Networks, Inc. System and process for defending against denial of service attacks on network nodes
EP1298883A2 (en) 2001-09-27 2003-04-02 Kabushiki Kaisha Toshiba Server computer protection apparatus, method, program product, and server computer apparatus
CN1642107A (zh) * 2004-01-15 2005-07-20 中兴通讯股份有限公司 一种防止地址耗尽型攻击的方法
JP2006100874A (ja) * 2004-09-28 2006-04-13 Nippon Telegr & Teleph Corp <Ntt> アプリケーション型サービス不能攻撃に対する防御方法およびエッジ・ルータ
CN1848754A (zh) * 2005-04-13 2006-10-18 华为技术有限公司 一种切换服务器的控制方法

Family Cites Families (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4937743A (en) * 1987-09-10 1990-06-26 Intellimed Corporation Method and system for scheduling, monitoring and dynamically managing resources
US5249290A (en) * 1991-02-22 1993-09-28 At&T Bell Laboratories Method of and apparatus for operating a client/server computer network
US5796952A (en) * 1997-03-21 1998-08-18 Dot Com Development, Inc. Method and apparatus for tracking client interaction with a network resource and creating client profiles and resource database
US6327622B1 (en) * 1998-09-03 2001-12-04 Sun Microsystems, Inc. Load balancing in a network environment
US6938057B2 (en) * 1999-05-21 2005-08-30 International Business Machines Corporation Method and apparatus for networked backup storage
US6662230B1 (en) * 1999-10-20 2003-12-09 International Business Machines Corporation System and method for dynamically limiting robot access to server data
US6751668B1 (en) * 2000-03-14 2004-06-15 Watchguard Technologies, Inc. Denial-of-service attack blocking with selective passing and flexible monitoring
US7032023B1 (en) * 2000-05-16 2006-04-18 America Online, Inc. Throttling electronic communications from one or more senders
US7289519B1 (en) * 2002-05-01 2007-10-30 Cisco Technology, Inc. Methods and apparatus for processing content requests using domain name service
CN100375480C (zh) * 2002-09-18 2008-03-12 中兴通讯股份有限公司 一种限制用户使用代理上网的方法
CN1585341A (zh) * 2003-08-23 2005-02-23 华为技术有限公司 网络会话管理方法
US7730137B1 (en) * 2003-12-22 2010-06-01 Aol Inc. Restricting the volume of outbound electronic messages originated by a single entity
CN100414901C (zh) * 2003-12-26 2008-08-27 上海艾泰科技有限公司 在nat环境下解决端口扫描和拒绝攻击的方法
US7206845B2 (en) * 2004-12-21 2007-04-17 International Business Machines Corporation Method, system and program product for monitoring and controlling access to a computer system resource

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2002019661A2 (en) 2000-09-01 2002-03-07 Top Layer Networks, Inc. System and process for defending against denial of service attacks on network nodes
EP1298883A2 (en) 2001-09-27 2003-04-02 Kabushiki Kaisha Toshiba Server computer protection apparatus, method, program product, and server computer apparatus
CN1642107A (zh) * 2004-01-15 2005-07-20 中兴通讯股份有限公司 一种防止地址耗尽型攻击的方法
JP2006100874A (ja) * 2004-09-28 2006-04-13 Nippon Telegr & Teleph Corp <Ntt> アプリケーション型サービス不能攻撃に対する防御方法およびエッジ・ルータ
CN1848754A (zh) * 2005-04-13 2006-10-18 华为技术有限公司 一种切换服务器的控制方法

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP2086168A4

Also Published As

Publication number Publication date
CN1968147A (zh) 2007-05-23
EP2086168A4 (en) 2010-01-20
EP2086168A1 (en) 2009-08-05
CN1968147B (zh) 2010-04-14
US20090234952A1 (en) 2009-09-17

Similar Documents

Publication Publication Date Title
WO2008064562A1 (fr) Procédé de traitement de service, dispositif de réseau et système de traitement de service
US8125980B2 (en) User terminal connection control method and apparatus
US7480707B2 (en) Network communications management system and method
US8320242B2 (en) Active response communications network tap
WO2008080314A1 (fr) Procédé, moteur de retransmission et dispositif de communication pour la commande d&#39;accès aux messages
US20170310669A1 (en) Device Blocking Tool
US7970878B1 (en) Method and apparatus for limiting domain name server transaction bandwidth
EP2309685B1 (en) A method and apparatus for realizing forwarding the reversal transmission path of the unique address
WO2007116605A1 (ja) 通信端末装置、ルール配布装置およびプログラム
WO2008141584A1 (en) Message processing method, system, and equipment
US8514845B2 (en) Usage of physical layer information in combination with signaling and media parameters
WO2008131667A1 (fr) Procédé, dispositif d&#39;identification des flux de services et procédé, système de protection contre une attaque par déni de service
KR20120060655A (ko) 서버 공격을 탐지할 수 있는 라우팅 장치와 라우팅 방법 및 이를 이용한 네트워크
US9001650B2 (en) TCP relay apparatus
JP3987539B2 (ja) セッション情報管理方法およびセッション情報管理装置
WO2012122773A1 (zh) 基于代理网关对访问请求进行控制的方法及装置
US20070121833A1 (en) Method of Quick-Redial for Broadband Network Users and System Thereof
WO2011140795A1 (zh) 一种防止介质访问控制地址欺骗攻击的方法和交换设备
WO2022206252A1 (zh) 一种网络攻击的处理方法、装置、设备、计算机可读存储介质及计算机程序产品
WO2009021460A1 (fr) Procédé de rapport d&#39;un résultat de mise en œuvre de politique, système de communication par réseau et équipement
WO2008141572A1 (fr) Procédé et système servant à réaliser un contrôle d&#39;entretien sur des sessions clients
US7565694B2 (en) Method and apparatus for preventing network reset attacks
JP5966488B2 (ja) ネットワークシステム、スイッチ、及び通信遅延短縮方法
WO2005004410A1 (fr) Procede pour controler la retransmission d&#39;un message de donnees dans un dispositif d&#39;acheminement
WO2008131650A1 (fr) Procédé de furetage de dhcp et dispositif associé

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 07816891

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

WWE Wipo information: entry into national phase

Ref document number: 2007816891

Country of ref document: EP