Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for processing data link layer flow

A data link layer and processing method technology, applied in the data link layer traffic processing method and system field, can solve problems such as performance degradation, reduce user identification, and insufficient frequency of MAC address modification, and achieve the effect of resisting traffic analysis

Inactive Publication Date: 2014-03-26
SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The identifier-free mechanism can protect the content of the message from being stolen to a large extent and reduce the possibility of user identification. However, since the traffic characteristics of the message have not been changed, such as the distribution of message length, the The time interval of the text, etc., so the user's traffic information may still be used to associate users and leak important private information
At the same time, due to the complexity of the encryption mechanism and key management, it will cause performance degradation
The pseudonym mechanism (Pseudonym) modifies the MAC address in different working hours or idle conditions, but because the modification frequency of the MAC address in the pseudonym mechanism is not high enough, the correlation between traffic and the received signal strength of the message can change the pseudonym of different MAC addresses. associate
The frequency hopping communication method can increase the security of the traffic by dividing the traffic into different frequencies, but also because the operation granularity is coarse, the traffic characteristics on a single frequency may have leaked more clues and private information for correlation
Although the physical layer defense method can prevent attackers from monitoring the channel to a certain extent, it also affects the normal communication process and reduces network performance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for processing data link layer flow
  • Method and system for processing data link layer flow

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0026] see figure 1 , figure 1 The flow chart of the steps of the data link layer traffic processing method 100 provided by the present invention includes the following steps:

[0027] Step S10: setting multiple virtual network interfaces and configuration parameters corresponding to the multiple virtual network interfaces on the network card;

[0028] Specifically, in step S10, multiple virtual network interfaces and parameter configurations corresponding to the multiple virtual network interfaces are set on the network card by using the wireless link virtualization technology.

[0029] Specif...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for processing the data link layer flow. The method for processing data link layer flow comprises the steps that optimal scheduling is carried out on data messages in the mode that a plurality of virtual network interfaces are formed in a network card, and configuration parameters which correspond to the virtual network interfaces are set on the network card, each data message is distributed to the corresponding virtual network interface, and the data messages are transmitted to an upper-layer protocol stack in a transparent mode. Therefore, the flow of each virtual link has different characteristics, original flow characteristics can be covered up, different link transmission parameters such as MAC addresses, the sending power, the sending rate and priority queues are configured, an attacker cannot associate a plurality of virtual links, and cannot tell the difference between the virtual links and real links, and the purpose of effectively resisting flow analysis is achieved.

Description

technical field [0001] The present invention relates to the technical field of information processing, in particular to a data link layer traffic processing method and system. Background technique [0002] Wireless local area networks are widely deployed in residences, public hot spots, enterprises and campus environments to provide network access services for computers and mobile terminals. However, due to the openness and sharing of wireless links, attackers can more easily intercept specific user traffic through a variety of eavesdropping software, and speculate on user behavior characteristics and private information through traffic analysis. In addition, even if user information has been protected by existing common encryption and authentication methods (such as WEP and WPA / WPA), the leakage of private information is still unavoidable. [0003] Attacks against traffic analysis generally use traffic padding and traffic morphing. Traffic stuffing imposes a significant n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/00H04W12/122
Inventor 张帆刘进须成忠
Owner SHENZHEN INST OF ADVANCED TECH CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products