Method for enhancing multicast security

A security and multicast technology, applied in the field of network security, can solve problems such as denial of service, difficulty in secure multicast, network congestion, etc.

Inactive Publication Date: 2012-03-21
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Due to the characteristics of the multicast architecture, multicast communication is more vulnerable to attacks than unicast communication and has greater security risks
This is mainly reflected in: there is no restriction on membership in the group, which makes it easy for attackers to imitate as legal members of a group; the range of multicast group addresses is well known, and it is easy for attackers to find the IP address of a multicast group. And become one of its legal group members; compared with unicast communication, multicast messages will be transmitted on a wider network, which will give attackers more opportunities to intercept and eavesdrop on data messages; multicast uses UDP For communication, there is no mechanism to prevent group members or non-members from sending data to this group. If an attacker maliciously sends a large number of data packets to this group, since the group size may be relatively large, it is easy to cause network congestion and thus cause denial of service
Existing multicast routing technology is difficult to guarantee this, and secure multicast is still a technical difficulty

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for enhancing multicast security
  • Method for enhancing multicast security
  • Method for enhancing multicast security

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Specific embodiments of the present invention are described below for a better understanding of the present invention. It should be noted that in the following description, when detailed descriptions of known functions and designs may dilute the main content of the present invention, these descriptions will be omitted here.

[0021] figure 1 It is a schematic diagram of a specific implementation of the method for enhancing multicast security in the present invention.

[0022] The multicast management server passes through the aggregation router and the core router CR 1 、CR 2 , the edge router ER 1 、ER 2 、ER 3 、ER 4 form a multicast network. Multicast user P 1 ,P 2 ,P 3 ,P 4 ----P i ----P n Access to the multicast network through the edge router.

[0023] (1), for multicast management server, edge router ER 1 、ER 2 、ER 3 、ER 4 and convergence server to perform initialization settings, in this embodiment, also includes the core router CR 1 、CR 2 Perfor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for enhancing the multicast security. For the structural security, building an end-to-end virtual circuit from a multicast user to a server not only supports the existing security mechanism of Internet, but also has a unique security mechanism based on the network structure, namely, security is embedded. Using a virtual circuit indicator and hiding multicast address during the multicast process cause the attacker difficult to attack, so as to efficiently manage and control multicast data transmission. In addition, the multicast user qualification is validated,so the attacker cannot imitate a qualified member in a group to receive multicast data, so as to enhance the security of the multicast network.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method for enhancing multicast security. Background technique [0002] The Internet has fundamentally changed the world's information infrastructure in a relatively short period of time since its inception more than 30 years ago. However, due to the continuous emergence of new applications, the abuse of the Internet, and the fact that it is gradually commercialized, the disadvantages of the Internet are gradually emerging and expanding. Among them, network security issues are the most prominent. [0003] The early methods of ensuring network security mainly focused on system vulnerability security, such as anti-virus systems, firewalls, intrusion detection systems, anti-malicious codes, and patching, and a series of security mechanisms related to system vulnerabilities. The focus of terminal security protection. However, the research on system vulnerability security cannot me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/56H04L12/46H04L12/18H04L45/16
Inventor 龚海刚易发胜王焱曾家智吴跃
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products