IPv6 network-orientated detection method for counterfeit source address messages

An IP address, ipv6 network technology, applied in electrical components, transmission systems, etc., can solve problems such as denial of service attacks, endangering Internet security, and man-in-the-middle attacks

Inactive Publication Date: 2014-09-24
TSINGHUA UNIV
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, due to the Internet's architecture of message forwarding according to the destination address, the source address of the data message arriving on the Internet will not be checked, which leads to the existence of counterfeit source address attacks, and leads to distributed denial of service attacks, Man-in-the-middle attacks and other issues that seriously endanger Internet security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IPv6 network-orientated detection method for counterfeit source address messages
  • IPv6 network-orientated detection method for counterfeit source address messages
  • IPv6 network-orientated detection method for counterfeit source address messages

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. The following examples are used to illustrate the present invention, but are not intended to limit the scope of the present invention.

[0062] The embodiment of the present invention provides an IPv6 network-oriented method for detecting fake source address packets, and the steps are as follows: figure 1 As shown, it specifically includes the following steps:

[0063] Step S1: the client sends a normal packet to the server. The normal message here is for testing, so you can send a simple "hello" message to the server.

[0064] Step S2: the server sends a response command to the client. The server instructs the client to send a normal message with the specified source port and destination port by responding to the command.

[0065] Step S3: The client sends M normal packets to the server according to th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an IPv6 network-orientated detection method for counterfeit source address messages. According to the method, a client constructs M counterfeit source address messages according to the instruction of a detection command, constructs a detection queue with M normal messages, and sends the detection queue to a server; the server analyses a one-time detection result according to the case of receiving the normal messages and the counterfeit source address messages, and calculates a preliminary filter effect for the counterfeit source address of a host according to the one-time detection result; the server calculates a final filter effect for the counterfeit source address of the host according to the N-time detection results of the single host; the source address filter effect of a subnet is calculated according to the multi-time detection results of a plurality of hosts in the single subnet. According to the method disclosed by the invention, the counterfeit IPv6 source address messages are constructed according to the instruction of the server, and the server analyses and detects whether the client implements fine-grained source address verification while being accessed to the subnet according to the receiving condition of the counterfeit source address messages.

Description

technical field [0001] The invention relates to the field of computer network management, in particular to an IPv6 network-oriented packet detection method for counterfeit source addresses. Background technique [0002] As the Internet Assigned Numbers Authority (IANA) announced in February 2011 that the last batch of IPv4 addresses had been assigned to the Regional Internet Registry, the Asia-Pacific Regional Center announced in April 2011 that it would no longer allocate IPv4 addresses. IPv4 network addresses has been basically exhausted. The Internet will gradually transition to the IPv6 era, and new network construction will fully use IPv6 addresses. In China, driven by China Next Generation Internet (CNGI), IPv6 networks have been widely used. [0003] However, due to the Internet's architecture of message forwarding according to the destination address, the source address of the data message arriving on the Internet will not be checked, which leads to the existence o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
Inventor 杨家海安常青李福亮
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products