Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Realizing method for preventing point-to point protocol recognization from being attacked in wideband cut-in network

A technology for accessing networks and implementing methods, applied in data exchange networks, user identity/authority verification, digital transmission systems, etc., can solve problems such as manual intervention, large manpower, and cost, to prevent attacks, suppress illegal attacks, and avoid The effect of the attack

Inactive Publication Date: 2008-05-14
HUAWEI TECH CO LTD
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 2. Unable to effectively locate authentication attack users
Therefore, the number of authentication failures cannot be counted effectively on the authentication server, so it cannot be determined as an attacking user
[0011] 3. Human intervention is required
When the attacking user is located, bureau personnel need to communicate with the user to stop the attack, which requires a lot of manpower

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Realizing method for preventing point-to point protocol recognization from being attacked in wideband cut-in network
  • Realizing method for preventing point-to point protocol recognization from being attacked in wideband cut-in network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Below according to accompanying drawing and embodiment the present invention will be described in further detail:

[0032] The invention provides a method for preventing PPP authentication attacks on BRAS (Broadband Remote Access Server) equipment, which can automatically identify PPP authentication attack users according to configured judgment conditions, and filter attack messages, thereby preventing illegal online access The process uses authentication packets to attack BRAS devices and authentication servers.

[0033] The present invention is a solution combining software and hardware, and the whole solution is all realized on the BRAS. Such as figure 2 The structure diagram of the PPP authentication attack defense system is shown. The authentication anti-attack software module, the authentication failure tracking database, and the attack disabled user table are added to the BRAS device. The MAC address filtering table is added to the hardware part of the access s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention is a kind of point-to-point protocol identification attacking prevention method in the board-band network. This invention overcomes the question that current techniques do not have effective means to restrain PPP identification attacking. It can automatically identify PPP identification attacked users and filter the attacking messages. It avoids that the illegal internet-accessing process uses identification messages to attack BRAS devices and identification server.

Description

technical field [0001] The invention relates to the technical field of broadband access networks, in particular to a realization method for preventing point-to-point protocol authentication attacks in broadband access networks. Background technique [0002] The current broadband access network is an operational and manageable network. The operability and manageability of the broadband access network is based on the user authentication and authorization technology, and the authentication and authorization of the broadband access network usually adopts the PPP (Point-to-Point Protocol) authentication mechanism. The PPP protocol recommends that users go online through three stages, namely, the link layer negotiation stage, the authentication stage, and the network layer negotiation stage. When the user goes online and reaches the authentication stage, the user and the BRAS (Broadband Remote Access Server) exchange messages containing authentication information, and the BRAS ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/06H04L9/32
Inventor 熊宇怀南
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products