System and method for access network multi-homing
A network access and multi-homing technology, applied in transmission systems, electrical components, etc., can solve problems such as host preference, adverse effects of routing performance, etc., and achieve the effect of efficient switching
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] The ability of a host to interchangeably use different IP addresses when communicating with a peer can be abused by a malicious host to communicate with the peer on behalf of a victim host without appropriate security measures in place. Such a "spoofing attack" requires the malicious host to register with the peer a set of IP addresses, including both the victim host's IP address and the IP address from which the malicious host itself can be reached. The malicious host then exchanges packets with the peer via its own IP address, while transport protocols and applications on the peer see the victim host's IP address and therefore assume they are communicating with the victim host. The interface identifier of the malicious host's IP address must be the same as the interface identifier of the victim host's IP address.
[0029] To protect hosts from exposing victims to such impersonation attacks, peers must be able to verify that all IP addresses in a set belong to the same...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 