Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Active hiding method of router identity feature information

A technology of identity feature information and feature information, which is applied in the field of active hiding of router identity feature information, can solve problems such as router identity leakage, and achieve the effect of increasing the difficulty of identification.

Active Publication Date: 2018-06-22
THE PLA INFORMATION ENG UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Aiming at the deficiencies in the prior art, the present invention provides a method for actively hiding router identity feature information, starting from the perspective of improving network security capabilities and network protection capabilities, aiming at the problems existing in the router management plane, by randomizing pseudo-identity response generation algorithms Solve the problem of various identities leaked by the current routers due to the loopholes in the relevant protocols. When the illegal information detection message enters the router management plane, the identity hiding technology is used through mimicry, that is, the pseudo-identity response generation algorithm is randomized to generate a pseudo-identity The response message is sent to the peer to hide the identity of the attacker

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Active hiding method of router identity feature information
  • Active hiding method of router identity feature information
  • Active hiding method of router identity feature information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0020] Embodiment one, see Figure 1~2 As shown, a method for actively hiding router identity feature information includes the following steps:

[0021] Step 1. Analyze the detected detection message to determine whether the detection message is legal. If it is a legal detection message, the router normally responds with correct characteristic information. Otherwise, determine that the detection message is an illegal detection message, and extract the illegal Detect message information, go to step 2;

[0022] Step 2. For the illegal detection message information extracted in step 1, take randomization pseudo-identity response generation algorithm to generate corresponding pseudo-identity information, select the corresponding pseudo-identity information object group in the pseudo-MIB information pool;

[0023] Step 3. According to the pseudo-identity information generated in step 2, random and unpredictable pseudo-identity response information is dynamically generated through ...

Embodiment 2

[0025] Embodiment 2 is basically the same as Embodiment 1, except that the pseudo-MIB information pool is randomly generated in the router management plane according to the standard MIB tree structure, and responds to corresponding illegal detection messages according to pseudo-identity information .

Embodiment 3

[0026] Embodiment 3 is basically the same as Embodiment 1, except that the extraction of illegal detection message information in step 1 includes extraction of feature information of illegal detection messages, and the feature information includes IP addresses and detection content features.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an active hiding method of router identity characteristic information. Through a message parsing mechanism, arrived detection messages are parsed and legal detection messages and illegal detection messages are distinguished. Through a randomization pseudonym information scheduling mechanism, corresponding pseudonym information is scheduled according to an illegal message detection demand so that a hiding purpose is reached. Through dynamic perception learning, a fake identity information pool is generated so that an attacker identity which is responded and given by the router is highly similar with a node identity in a surrounding network environment and attacker identification difficulty is increased. When an identity characteristic needs to be hidden, the router adopts a Hash mapping mode to randomly select the identity characteristic to respond from the fake identity information pool according to an identity characteristic of an attacker. A consistent strategy is used so as to ensure that response contents which are given to the same attacker are consistent so that the attacker is deceived.

Description

technical field [0001] The invention relates to the field of computer network security, in particular to a method for actively hiding router identity feature information. Background technique [0002] At present, the network has become one of the infrastructures of the information society and plays an increasingly important role in people's daily life. In this context, network security, especially the security of the core network, is particularly important. Network attackers are the main threat to network security at present. Network attackers often use the relevant protocol vulnerabilities of routers to illegally detect the characteristic information of routers, and then use the characteristic information of routers to attack and control routers to achieve the purpose of attacking and destroying the entire network. . [0003] The existence of router characteristic information is to facilitate administrators to configure, manage and maintain routers. Network attackers use ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0407
Inventor 胡宇翔王鹏李玉峰刘宗海杜飞张风雨李晨晖张霞陈祥
Owner THE PLA INFORMATION ENG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products