Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Collocating method for preventing attack of network, method and apparatus for preventing attack

A network and message technology, applied in the field of communication, can solve problems such as failure and large resources, and achieve the effects of reducing pressure, limited consumption, and preventing specific types of message attacks.

Inactive Publication Date: 2008-09-03
HUAWEI TECH CO LTD
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since this scheme must preserve the access time of all ARP packets, it consumes a lot of resources and may fail when the attacker's address changes frequently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Collocating method for preventing attack of network, method and apparatus for preventing attack
  • Collocating method for preventing attack of network, method and apparatus for preventing attack
  • Collocating method for preventing attack of network, method and apparatus for preventing attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The implementation process of the present invention will be described below in combination with specific embodiments.

[0015] In the IEEE 802.1Q standard, the Ethernet frame format is modified, and a 4-byte 802.1Q Tag is added between the source MAC address (Source Address) field and the protocol length / type field (Length / Typee), which uses The 12 bits identify different VIDs (Virtual Local Area Network Identifier, virtual local area network identifier), as shown in the shaded message field in Table 1.

[0016]

[0017] Table 1 802.1Q-based VLAN frame format

[0018] With the continuous expansion of the network scale, 4K VLAN IDs can no longer meet the current networking applications. In order to achieve more user access, various manufacturers have launched their own solutions, and QinQ is one of them. QinQ is to add an 802.1Q tag in addition to the original 802.1Q tag, and use two layers of VLAN ID to identify a user, that is, 802.1Q in 802.1Q, and add a layer of ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a communication field, especially a network configuring method preventing from attack, a method and a system thereof. In the network configuring method preventing from attack, the network comprises a route device and a user device. The user device configures the network by the network communication of the route device and the access operator. The method comprises: configuring user VLAN ID for the user; configuring the QinQ mode access to the user at the user access interface of the route device; sending the user device message after packed to the QinQ message; configuring the inhibition speed and the default behavior of the specific typed message on the basis of the user VLAN ID of the inner layer of QinQ message. The method and the device can prevent the specific typed message in the communication network from attacking.

Description

technical field [0001] The invention relates to the communication field, in particular to a method for configuring a network for preventing attacks, a method and a device for preventing attacks. Background technique [0002] ARP (Address Resolution Protocol, Address Resolution Protocol) attack is a common form of attack on network devices. The specific attack methods are: (1) Send a large number of ARP request / reply messages to the gateway device. This attack method will occupy the device The port bandwidth and the gateway device are busy processing ARP packets, occupying the CPU resources of the device, causing failures such as network capacity degradation and interruption; (2) sending scanning packets with continuously changing destination addresses to the gateway device, such as PING packets; this attack method will This causes the gateway device to generate a large number of ARP miss messages (messages indicating that the ARP entry does not exist), occupying the CPU reso...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L12/56
CPCH04L63/1441
Inventor 吴迪
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products