Inter-domain prefix hijacking detection method for error configuration

A misconfiguration and prefix technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as lack of automatic detection, and achieve the effect of avoiding misconfiguration and maintaining network security

Inactive Publication Date: 2011-10-19
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in the prior art, there is a lack of relevant methods for each AS to automatically detect misconfigurations in the area

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Inter-domain prefix hijacking detection method for error configuration
  • Inter-domain prefix hijacking detection method for error configuration
  • Inter-domain prefix hijacking detection method for error configuration

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The present invention will be described below in conjunction with the accompanying drawings and specific embodiments.

[0037] Before describing the implementation process of the method of the present invention, the composition of the network system capable of realizing the method of the present invention is firstly explained. figure 2 For the structural diagram of the network system that can realize the method of the present invention, in figure 2It can be seen from the example shown that the entire network system includes a first autonomous system 3 , a second autonomous system 6 and a third autonomous system 9 . A first border router 1 and a first monitoring probe 2 are included in the first autonomous system 3. Similarly, a second border router 4 and a second monitoring probe 5 are included in the second autonomous system 6. In the third The autonomous system 9 includes a third border router 7 and a third monitoring probe 8 . Wherein, the monitoring probe in the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an inter-domain prefix hijacking detection method for error configuration in a network system which at least comprises one autonomous system; the autonomous system comprises a monitoring probe which comprises a network prefix information list for storing prefix information in the autonomous system; the method comprises the following steps: the monitoring probe obtains a routing update message which is transmitted outwards by the autonomous system; all items of the routing update message is analyzed, and the item for adding types carries out the next step, and the items which exist in the network prefix information list and have completely consistent prefix information are not operated additionally, and the next item in the routing update message is directly processed; for the items which do not exist in the network prefix information list or although the items exist in the network prefix information list, the prefix information is conflicted, the validity of theitems is actively detected; the network prefix information list is updated according to the verified items for adding types. The method can avoid error configuration and maintain network safety.

Description

technical field [0001] The invention relates to the field of inter-domain network security, in particular to a misconfiguration-oriented inter-domain prefix hijacking detection method. Background technique [0002] Currently, the Internet and the networks of large Internet Service Providers (ISPs) are divided into a large number of autonomous systems (Autonomous System, AS), which define management areas and act on routing policies within the autonomous system. Today's Internet consists of more than 25,000 autonomous systems that communicate routing updates via the Border Gateway Protocol (BGP). The BGP protocol runs on the border routers of each autonomous system. It completes inter-domain routing through the AS-level routing reachability information exchanged between the border routers of each autonomous system, thereby realizing the reachability of network information between autonomous systems. . According to the BGP protocol, the border routers of each autonomous syst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26H04L12/56H04L29/08H04L29/06
Inventor 刘冰毕经平
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products