Method for solving IMS network DNS spoofing attack based on chaos encryption algorithm

A DNS spoofing and chaotic encryption technology, applied in the field of information security, can solve problems such as DNS spoofing attacks, and achieve the effect of ensuring real-time performance and ensuring security

Inactive Publication Date: 2010-02-17
BEIJING JIAOTONG UNIV
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to propose a method based on a chaotic encryption algorithm to solve DNS spoofing attacks in IMS networks, which is used to solve the problem that DNS is prone to spoofing attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for solving IMS network DNS spoofing attack based on chaos encryption algorithm
  • Method for solving IMS network DNS spoofing attack based on chaos encryption algorithm
  • Method for solving IMS network DNS spoofing attack based on chaos encryption algorithm

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] image 3 It is the flowchart of Embodiment 1 provided by the present invention. image 3 Among them, in the method for solving the DNS spoofing attack on the IMS network based on the chaotic encryption algorithm provided in Embodiment 1 of the present invention, the DNS query party specifically uses a user device, that is, a DNS terminal, and the user initiates a DNS query request; the DNS responder specifically uses a DNS server , the DNS server receives the query data packet sent by the user equipment and returns the query result. This embodiment specifically includes the following steps:

[0032]Step 101: When the user equipment initiates a DNS query request, firstly calculate the chaos parameter through the shared key K of the ISIM module.

[0033] As a DNS client, the user equipment can read the shared key from the ISIM module of the smart card. The smart card is the commonly used SIM card (Subscriber Identity Module, Subscriber Identity Module). To register use...

Embodiment 2

[0065] Figure 5 It is the flowchart of Embodiment 2 provided by the present invention. Figure 5 Among them, in the method for solving the DNS spoofing attack on the IMS network based on the chaotic encryption algorithm provided in Embodiment 2 of the present invention, the DNS query party specifically uses a DNS query server to initiate a DNS query request; the DNS responder specifically uses a DNS response server, It is used to receive the query packet sent by the DNS query server and return the query result. This embodiment specifically includes the following steps:

[0066] Step 201: When the DNS query server initiates a DNS query request, the DNS query server and the DNS response server use the key pair distributed by the IMS network domain SA (Security Association), through the formula Calculate the chaotic parameters, and construct chaotic systems with the same parameters on the DNS query server and DNS query responder respectively, which are respectively denoted as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for solving the IMS network DNS spoofing attack based on a chaos encryption algorithm in the technical field of information security. The method comprises the following steps: computing chaos parameters by a shared key K, and constructing a first chaos system; utilizing a first chaos system to encrypt the serial number of a query data packet and then to obtain an E(H, A) (ID1), and combining and transmitting the E(H, A) (ID1) and the query data packet; when a piece of user equipment waits for a DNS answering data packet, computing E(H, A) (ID1) in an iterativemanner to obtain an E(H, A) (ID2); after a DNS server receives the query data packet, constructing a second chaos system with the same parameter by the shared key K and computing the E(H, A) (ID1) inan iterative manner to obtain the E(H, B) (ID2), combining the query results to form the DNS answering data packet, and then returning a DNS query part; and judging the DNS answering data packet by the DNS query part, if the E(H, A) (ID2) is equal to the E(H, B) (ID2), judging that the DNS answering data packet is a legal answering data packet, and executing the regular operation to the DNS answering data packet by the DNS query part. The invention ensures the safety of the IMS network DNS query and the answering communication.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a method for solving IMS network DNS spoofing attacks based on a chaotic encryption algorithm. Background technique [0002] The IMS (IP Multimedia Subsystem, IP Multimedia Subsystem) defined in Release 5 of 3GPP (The 3rd Generation Partnership Project) is the product of deep integration of IP technology and mobile communication. IMS makes full use of the low cost, high broadband utilization and fast service provision of IP networks, as well as the advantages of flexible access and security architecture of mobile communication networks, and draws on the current softswitch-based NGN (Next Generation Network, next-generation Network) in business development has become a consensus on FMC (Fixed Mobile Convergence, Fixed Mobile Convergence) technology in the field of next-generation communication networks. [0003] DNS (Domain Name System, Domain Name System...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12H04L9/00H04W12/04H04W12/06H04W12/03H04W12/041H04W12/0431H04W12/128
Inventor 朱刚陆程遂艾渤
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products