Method for preventing LAN from cheat aggressing by address analysis protocol

An address resolution protocol, spoofing attack technology, applied in the field of LAN network security maintenance, can solve problems such as time-consuming and low efficiency

Inactive Publication Date: 2009-03-04
SHANGHAI MINHANG HIGH SCHOOL +1
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This is not only time-consuming, but also less efficient

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The invention provides a method for avoiding address resolution protocol spoofing attacks on a local area network, which adopts a two-way binding method to solve and prevent ARP spoofing. The concrete steps of this method are as follows:

[0029] Step 1: Bind the IP and MAC address of the security gateway on the PC; the specific operation is:

[0030] 1) First, obtain the intranet MAC address of the security gateway (for example, the MAC address of the HiPER gateway address 192.168.16.254 is 0022aa0022aa).

[0031] 2) Write a batch file rarp.bat as follows:

[0032] @echo off

[0033] arp-d

[0034] arp -s 192.168.16.25400-22-aa-00-22-aa

[0035] Just change the gateway IP address and MAC address in the file to the actual gateway IP address and MAC address.

[0036] Copy this batch file into the startup group of your operating system.

[0037] 3) If it is an Internet cafe, you can use the paid software server program (pubwin or Vientiane is acceptable) to send the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network security maintenance method of a local area network, in particular to a method for preventing the local area network from being attacked by address resolution protocol spoofing. The method solves and prevents the address resolution protocol spoofing by adopting bidirectional binding. The method comprises the following steps of: binding the IP of a security gateway and an MAC address on a PC; and binding the IP of a user host and the MAC address on the security gateway. The method can guarantee the smoothness and safety in using the network and the facilities in the network.

Description

technical field [0001] The invention relates to a method for maintaining network security of a local area network, in particular to a method for preventing the local area network from being attacked by address resolution protocol deception. Background technique [0002] Address Resolution Protocol (ARP) is a low-level protocol located in the TCP / IP protocol stack, which is responsible for resolving an IP address into a corresponding MAC address. [0003] From the point of view of the ways that affect the smooth network connection, ARP spoofing is divided into two types, one is spoofing the ARP table of the router; the other is spoofing the gateway of the intranet PC. The first principle of ARP spoofing is - intercepting gateway data. It notifies the router of a series of wrong intranet MAC addresses, and proceeds continuously according to a certain frequency, so that the real address information cannot be saved in the router through updating, and as a result, all data of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/00
Inventor 项敏
Owner SHANGHAI MINHANG HIGH SCHOOL
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products