Method for generating dynamic host configuration protocol (DHCP) snooping binding information, and device thereof

A dynamic host configuration and protocol technology, applied in the communication field, can solve problems such as migration, DHCP snooping and binding information errors, and achieve the effect of preventing attacks

Inactive Publication Date: 2010-02-24
BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology helps protect against attacks caused by unauthorized access or denial-of service (DoS) attacks without compromising any legitimate communication between devices connected over networks like LTE/WIMAX connections. It uses unique identifiers called discovery packets instead of IP addresses to identify authoritative sources and destinations. When there're no matches found during this process, they generate their own identification codes based upon these identifier numbers. These code values help filter out invalid data transmitted across different ports while still being valid ones.

Problems solved by technology

This patents describes two technical problem addressed during operation of a Distributed Denial-Of-Service (DDS)-based protocol called DNS Squidup® or Intermediate System Border Rouge (ISR). These issues include denyful packet sending caused by malicious accesses made over public networks like internet connections, causing damage to servers connected to them. Additionally, these solutions involve generating bindings only after all requests have been acknowledged but cannot identify invalid ones due to changes in the underlying identifier assigned to each requester's unique physical location.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for generating dynamic host configuration protocol (DHCP) snooping binding information, and device thereof
  • Method for generating dynamic host configuration protocol (DHCP) snooping binding information, and device thereof
  • Method for generating dynamic host configuration protocol (DHCP) snooping binding information, and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0028] image 3 It is a flowchart of an embodiment of a method for generating DHCP snooping binding information in the present invention. Such as image 3 As shown, the generation method of the DHCP snooping binding information of this embodiment includes the following steps:

[0029] Step 101, receiving an acknowledgment ACK message returned by the DHCP server, where the ACK message includes a destination MAC address.

[0030] Step 102, query the MAC entry corr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method for generating dynamic host configuration protocol (DHCP) snooping binding information, and a device thereof, wherein the method comprises: receivingACK message including target MAC address returned by a DHCP server; querying items corresponding to the target MAC address; according to a first identification position and a second identification position in MAC items, if receiving message discover and message request, generating the DHCP snooping binding information according to input port information in the MAC items, and ensuring source MAC address, the input port information and input VLAN ID in the message discover and the message request to be respectively and correspondingly the same as each other. The embodiment of the invention canavoid the pot corresponding to the MAC address in a MAC table not being shifted caused by MAC address spoofing, and effectively guarantees the accuracy of the DHCP snooping binding information.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products