Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for redirecting network attack by combining route with the tunnel

A network attack and redirection technology, which is applied in the direction of network interconnection, data exchange network, data exchange through path configuration, etc., can solve the problems of difficult software implementation, reduced gateway forwarding speed, troublesome operation, etc.

Inactive Publication Date: 2008-05-28
PEKING UNIV
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 1. The two gateways need to run specially designed third-party software for packaging, unpacking and forwarding of IP packets, which is a great risk for important gateways;
[0011] 2. If the gateway traffic is very large, packaging and unpacking will seriously reduce the forwarding speed of the gateway;
[0012] 3. If the original IP packet is large, the packaged volume may be larger than the minimum MTU of the network, which involves dividing an IP packet into multiple IPs, which is quite troublesome to operate
[0013] In general, the existing popular redirection methods need to install software, which is not easy to implement, and will reduce the forwarding speed of the gateway

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for redirecting network attack by combining route with the tunnel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] Referring to Fig. 2, the present invention will be described in detail in conjunction with examples. The gateway N1 and the gateway N2 in FIG. 2 both run a common version of the linux operating system, and are configured in a router mode rather than a bridge mode. Use LAN 192.168.152.* and 192.168.153.* to simulate the internet, which will not affect the universality of the experiment. Use the LAN 192.168.154.* to connect the internal network host H1, but this LAN and the LAN 192.168.154.* connected to the honeypot host H2 are physically and logically separate networks, and the IP address of the honeypot system is the same as the internal network have the same IP address.

[0049] The specific implementation is as follows:

[0050] 1. Run the following command on the gateway N1 to configure:

[0051] ip tunnel add rd_rt mode ipip remote 192.168.153.4 local 192.168.153.2 ttl 255

[0052] ip link set rd_rt up

[0053] ip addr add 10.0.2.1 dev rd_rt

[0054] ip route...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for network attack redirection by combining route and a tunnel. The network attack is redirected to a honeypot host computer with identical subnetwork address at a far end through arranging the tunnel and configuring a second routing list between a gateway N1 and a gateway N2 connected with the honeypot host computer, and marking a network attack IP package in order to realize the network attack redirection. The method of the invention is easy to be carried out, quick and highly effective, and is especially suitable for the condition of temporary network attack redirection on an important gateway; simultaneously, the method of the invention has the advantages that the risk is low, and the problems of minimum MTU or IP package fragmentation of the network are not required to be worried.

Description

technical field [0001] The invention relates to a method for redirecting network attacks, in particular to a method for redirecting network attacks to a safe honeypot host by changing the flow direction of IP packets through routing and tunnel configuration, and belongs to the technical field of computer network security. Background technique [0002] An internal network is connected to an external network (such as the Internet) through a gateway. A common situation is that an external network host launches a dangerous network attack to an internal network host. If you want to track and research the network attack, you can build another internal network in a safe place, place a honeypot host in it, and then try to redirect the dangerous network attack to the honeypot host. [0003] Assume a network topology diagram as shown in Figure 1, in which the attacked host H1 is in the internal network and connected to the Internet through the gateway N1, and the honeypot host H2 is i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/24H04L12/56H04L12/46
Inventor 诸葛建伟郭晋鹏游红宇叶志远邹维
Owner PEKING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products