Equipment access sensing method based on ARP protocol

A technology of ARP protocol and device access, which is applied in digital transmission system, secure communication device, data exchange through path configuration, etc., and can solve the problem that masquerading as a legitimate device cannot be effectively detected

Active Publication Date: 2015-03-11
STATE GRID CORP OF CHINA +4
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, through ACL to control the network communication of the device, it is impossible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Equipment access sensing method based on ARP protocol
  • Equipment access sensing method based on ARP protocol
  • Equipment access sensing method based on ARP protocol

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0047] The technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, rather than all the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative work shall fall within the protection scope of the present invention.

[0048] figure 1 It is a schematic flow chart of an embodiment of a device access awareness method based on the ARP protocol provided by the present invention. This embodiment is described on the end of the host device. The host device is installed with a proxy module. The following processing steps of the host device are all It is realized by the agent module. Such as figure 1 As shown, the embodiment of the present invention includes th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an equipment access sensing method based on an ARP protocol. The method comprises the following steps: blocking an ARP broadcasting function and a response function of a self operating system; constructing a private ARP request message, wherein the private ARP request message is a message which increases a corresponding private mark with a signature based on an original ARP request message; broadcasting the private ARP request message, at the same time, receiving the private ARP request messages transmitted by other host equipment, and returning a private ARP response message; detecting whether the private ARP request messages transmitted by the other host equipment contain the private mark with the signature or not; if the private ARP request messages transmitted by the other host equipment contain the private mark with the signature and the signature is right, judging the other host equipment as legitimate access equipment, and performing normal communication, and if not, judging the other host equipment as illegal access equipment, and blocking the communication of the illegal access equipment; reporting the information of the illegal access equipment to a server. Through the adoption of the method disclosed by the invention, the equipment access can be quickly and timely found, and the communication of the illegal access equipment is effectively stopped.

Description

technical field [0001] The invention relates to the technical field of computer network data communication, in particular to an access identification method based on the ARP protocol. Background technique [0002] With the increasing popularity of the network, all enterprises and institutions have also established their own internal networks. How to identify the devices connected to the internal network in a timely manner, block the communication of illegally connected devices, and protect the information security of the internal network has become a challenge for network management. Problems to be solved. [0003] At present, the commonly used method for device access perception is basically: for illegal device access, the ACL is mainly used to control its network communication. However, through ACL to control the network communication of devices, it is impossible to effectively detect illegal devices masquerading and deceiving legitimate devices. [0004] Wherein, the ad...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/28
CPCH04L9/3247H04L61/103H04L63/08H04L63/10
Inventor 刘嘉华陈玉慧韩少聪江淞康睿王琪
Owner STATE GRID CORP OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products