Method, equipment and system for processing active detection response

A technology of active detection and processing methods, applied in the field of communication technology and security, it can solve problems such as security risks, insecurity, information leakage, etc., and achieve the effect of preventing attack behavior, curbing attack behavior, and avoiding security risks.

Active Publication Date: 2015-05-27
CHINA MOBILE COMM GRP CO LTD
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Therefore, in the prior art, there are problems such as insecurity and information leakage in the feedback of the active det...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, equipment and system for processing active detection response
  • Method, equipment and system for processing active detection response
  • Method, equipment and system for processing active detection response

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] Embodiment 1 of the present invention provides a method for processing active detection responses. By expressing the status of active detection responses in negative logic based on NLS (Negative Logic System), attackers cannot obtain active detection responses. The effective attack exploit information is obtained in the response, such as figure 1 As shown, the processing method of the active probe response includes at least the following steps:

[0033] Step 101 , after receiving an active detection request from a remote device, the local device obtains the IP address of the remote device, and obtains a positive logic active detection response corresponding to the active detection request.

[0034] Wherein, the IP address of the remote device can be obtained from the active detection request, the active detection request is Msg_Request, the active detection response of the forward logic is Msg_Respond_PLS, and the active detection response of the forward logic is based ...

Embodiment 2

[0043] Embodiment 2 of the present invention provides a method for processing active detection responses. By negatively expressing the state of active detection responses based on negative logical thinking NLS (negative logic system), attackers cannot obtain active detection responses. The effective attack exploit information is obtained in the response, such as figure 2 As shown, the processing method of the active probe response includes at least the following steps:

[0044] Step 201, after receiving the active detection request from the remote device, the local device obtains the IP address of the remote device, and obtains a positive logic active detection response corresponding to the active detection request, and sends the IP address and the positive Active probe responses to the logic are output to the trusted decision module.

[0045] Wherein, the IP address of the remote device can be obtained from the active detection request, the active detection request is Msg_R...

Embodiment 3

[0064] Based on the same inventive concept as the above method, an embodiment of the present invention also provides a processing device for an active detection response, such as Figure 4 As shown, the equipment includes:

[0065] The obtaining module 11 is configured to obtain the IP address of the remote device after receiving the active detection request from the remote device, and obtain a positive logic active detection response corresponding to the active detection request;

[0066] A judging module 12, configured to judge whether the IP address is within the IP address trusted domain range;

[0067] The processing module 13 is configured to perform negative logic processing on the active detection response of the positive logic to obtain the active detection response of negative logic when the judgment result is negative;

[0068] The sending module 14 is configured to send the active detection response of the negative logic to the remote device when the judgment resu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, equipment and a system for processing an active detection response. The method comprises the following steps: current equipment receives an active detection request from remote equipment, obtains an IP (internet protocol) address of the remote equipment and obtains the positive logic active detection response corresponding to the active detection request; the current equipment judges whether the IP address is within an IP address credible region range or not; if the IP address is within the IP address credible region range, the current equipment sends the positive logic active detection response to the remote equipment; if the IP address is not within the IP address credible region range, the current equipment performs negative logic treatment on the positive logic active detection response, obtains a negative logic active detection response and sends the negative logic active detection response to the remote equipment. According to the embodiment of the invention, an attacker can be prevented from mining key network data from the active detection response, so that an attack behavior cannot be made, the network security is improved, and insecurity, information leakage and the like caused by positive logic are avoided.

Description

technical field [0001] The present invention relates to the fields of communication technology and security technology, in particular to a processing method, device and system for active detection and response. Background technique [0002] With the rapid development of computer and network technology, the scale of the network is constantly expanding, the bandwidth is constantly increasing, the types of network services are becoming more and more diverse, and various devices in the network are becoming more and more diverse. If the attacker wants to launch an attack, the attacker needs to obtain and collect information on the attack target in advance, that is, the first step of the attack is to obtain and collect information, so as to grasp the system information and network structure of various devices in the target network , services provided and other information to prepare for subsequent attacks. In order to obtain information such as system information, network structu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L43/12H04L63/1466
Inventor 何申程叶霞杨光华刘钢庭蔡伟文李启文
Owner CHINA MOBILE COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products