Unlock instant, AI-driven research and patent intelligence for your innovation.

ARP attack defense method and device

An ARP message and IP address technology, applied in the field of ARP attack defense methods and devices, can solve the problems of inability to resist ARP attacks and insufficient ARP protocol security protection measures.

Inactive Publication Date: 2017-07-25
HANGZHOU DPTECH TECH
View PDF11 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention provides an ARP attack defense method and device to solve the problem in the prior art that cannot resist ARP attacks caused by insufficient security protection measures of the ARP protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • ARP attack defense method and device
  • ARP attack defense method and device
  • ARP attack defense method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0021] The terminology used in the present invention is for the purpose of describing particular embodiments only and is not intended to limit the invention. As used herein and in the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an ARP attack defense method and device. The embodiment of the invention comprises the following steps: after receiving an ARP message, network equipment can determine whether a corresponding relation table item matched with the ARP message exists in a corresponding relation table according to a source IP address and a source MAC address in the ARP message, wherein the corresponding relation table records the corresponding relation between the IP address and the MAC address of a host; and if the corresponding relation table item matched with the ARP message does not exist in the corresponding relation table, which means that the corresponding relation between the source IP address and the source MAC address of the ARP message cannot be matched to any one of the corresponding relation table items, discarding the ARP message. Thereby, ARP attack messages can be discarded, and ARP attacks can be timely defended.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to an ARP attack defense method and device. Background technique [0002] During the communication process, the requesting device generally uses ARP (Address Resolution Protocol, Address Resolution Protocol) to obtain the MAC (Media Access Control, Media Access Control) address of the target device to be communicated. In view of the lack of security protection measures for the ARP protocol, there are also different types of ARP attacks, which threaten the security of user equipment and the network environment. [0003] Currently, ARP attacks mainly include ARP spoofing attacks and ARP flooding attacks. Among them, under the ARP spoofing attack, the attacking device can not only deceive the requesting device by forging the source MAC address and sending a false ARP response message; ARP entries, disrupting the normal communication of the network. Under the ARP flood ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12
CPCH04L61/103H04L63/1466
Inventor 王乾王富涛
Owner HANGZHOU DPTECH TECH