Safe multicast listener discovery (MLD) snooping method and device

A discovery protocol and multicast technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as denial of service attacks, occupying software and hardware resources, increasing the CPU burden of multicast routers, etc.

Active Publication Date: 2012-07-04
北京神州数码云科信息技术有限公司
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In addition, even a host with a legal IP may launch an MLD attack. The host sends a large number of MLD member report messages, which increases the CPU burden of the multicast router on the network and occupies a large amount of software and hardware resources. This is also a form of denial. service attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe multicast listener discovery (MLD) snooping method and device
  • Safe multicast listener discovery (MLD) snooping method and device
  • Safe multicast listener discovery (MLD) snooping method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The technical solutions of the present invention will be further described below in conjunction with the accompanying drawings and through specific implementation methods.

[0038] figure 1 It is a schematic flowchart of a method for secure multicast listener discovery protocol snooping provided by Embodiment 1 of the present invention. like figure 1 As shown, the method includes:

[0039]Step S101, receiving an MLD message, and judging the type of the MLD message. The type of the MLD message is determined by reading the information in the MLD message type field.

[0040] Step S102, when the type of the received MLD message belongs to the MLD general group query message, read the port number of the receiving port of the MLD general group query message. The port number of the receiving port is that the packet receiving driver reads from the chip register, and is recorded in the port field in the software format of the MLD general group query message, and the software...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe multicast listener discovery (MLD) snooping method and a safe MLD snooping device. The safe MLD snooping method comprises the following steps of: setting a trusted port, wherein only the MLD general group query message received from the trusted port can be transmitted; starting a repeat address to detect, monitor and acquire host address information and discarding the message if the source host address information of the received MLD member relationship report message is not in the host address information; presetting the maximum number of multicast groups which each internet protocol (IP) address can request, wherein the messages exceeding the maximum request number are discarded. According to the safe MLD snooping method and the safe MLD snooping device, the problems of MLD general group query spoofing, MLD source address spoofing, MLD member report message attack and the like in the network are solved.

Description

technical field [0001] The present invention relates to the field of computer data communication, in particular to a method and device for secure multicast listener discovery protocol snooping (Multicast Listener Discovery Snooping, MLD Snooping). Background technique [0002] Duplicate address detection is the process by which a node determines whether an IP address to be used is used by another node. Before a node automatically configures an IPv6 unicast address for an interface, it must verify within the link-local scope that the temporary address to be used is unique and has not been used by another node. As long as the Neighbor Solicitation (Neighbor Solicitation) message is sent to the local link, if there is no Neighbor Advertisement (Neighbor Advertisement) message to reply within the specified time, the temporary unicast address is considered to be unique on the local link and can be assigned to this interface; otherwise, this temporary address is duplicated and ca...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/56H04L45/16
Inventor 梁小冰
Owner 北京神州数码云科信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products