Automatic locating and isolating method of internal attack source of local area network

An internal attack and automatic positioning technology, applied in the field of network communication, can solve problems such as heavy maintenance workload, error-prone, cumbersome judgment process, etc., and achieve the effects of improving work efficiency, ensuring network security, and shortening processing time

Inactive Publication Date: 2017-09-29
SHANTOU UNIV
View PDF3 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In particular, under normal circumstances, the correspondence between IP addresses and MAC addresses, and between MAC addresses and switch ports is a complex many-to-many relationship. Complex judgments are required to establish the correct correspondence. The judgment process is cumbersome and error-prone.
[0004] Existing network protocols cannot solve the above problems. For example, some LANs enable 802.1x protocol, which can realize authentication based on MAC address and port. The administrator can also control whether a certain MAC address is allowed to access the network, but it is not suitable for LAN There are three reasons for the location and isolation of attack sources: First, some old switches do not support the 802.1x protocol; second, the 802.1x configuration is complex and requires background support such as Radius and AD; the most important thing is that 802.1x is a pure Layer 2 protocol. The positioning of network attacks requires a combination of Layer 2 and Layer 3 protocols.
[0005] Now there are some software that can solve a certain link of the above problems, but no overall solution is given
For example, some software can automatically collect the ARP table of the third-layer device or the MAC address table of the second-layer device and save it to the database. Some software, such as the User Tracking of the LAN Management Solution (LMS) of CiscoWorks, realizes the IP, MAC, and port positioning functions. Some software provides the function of automatically operating switch ports (via CLI command line or SNMP), etc., but no system automatically integrates the processes of network device data collection, IP-MAC location, MAC-switch port location, and attack source isolation Especially since there is no complex many-to-many correspondence between IP addresses and MAC addresses and MAC addresses and switch ports, it is impossible to automatically locate and isolate LAN attack sources.
[0006] In order to solve the complex correspondence between IP-MAC and MAC-switch ports in LANs, some LANs have adopted a "binding" method, including binding IP-MAC addresses on routers, binding IP-MAC addresses on DHCP servers, and The switch binds the MAC address and the switch port, etc. Although this can realize the one-to-one correspondence between the IP address and the MAC address and the MAC address and the switch port, it will make the use of the network very inflexible, especially the binding maintenance workload is huge and easy to make mistakes

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Automatic locating and isolating method of internal attack source of local area network
  • Automatic locating and isolating method of internal attack source of local area network
  • Automatic locating and isolating method of internal attack source of local area network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0020] A method for automatically locating and isolating an internal attack source in a local area network according to an embodiment of the present invention includes the following steps.

[0021] combine figure 1 shown.

[0022] Data collection steps:

[0023] The data acquisition program automatically collects the data of the network equipment and saves it to the database. The data acquisition program uses SNMP to obtain the data of the MIB (Management Information Base) of the network equipment. The current network equipment supports the SNMP protocol. The operation of the network equipment through SNMP and the manufacturer model of the equipment (except private MIB) and software configuration have nothing to do. SNMPv2 provides With the Get-Bulk primitive (...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an automatic locating and isolating method of an internal attack source of a local area network. The method comprises the following steps: automatically collecting data of a network device, and storing the data in a database, inquiring an MAC address of the network device according to an IP address of the attack source, detecting ARP fraud counterfeiting the host and matching the timestamps of different IP-MAC items to automatically process the situation that one IP address corresponds to a plurality of MAC addresses, locating a switch port according to the MAC address, and filtering a cascade port of the switch and matching the timestamps of different MAC-switch port items to automatically process the situation that one MAC address corresponds to a plurality of switch ports, and operating the switch to isolate the attack source. The automatic locating and isolating method can be applicable to all kinds of network environments without any manual operation, the larger the network scale is, the more obvious the effect of the automatic locating and isolating method is, by adoption of the automatic locating and isolating method, the processing time of a network security event can be shortened, the working efficiency of a network administrator is improved, and the network security of the local area network is ensured.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method for automatically locating and isolating attack sources inside a local area network. Background technique [0002] The security of the LAN is a very important part of network security. There are various network threats in the LAN: such as ARP (Address Resolution Protocol) spoofing, DHCP (Dynamic Host Configuration Potocal) server interference, UDP Flood flood attacks, etc., external Hackers will also make waves in the local area network after intrusion. During the daily operation and maintenance of the network, the ARP firewall, IDS (Intrusion Detection System), Internet behavior management and manual packet capture at the client end can detect network attacks and obtain the attacker's IP (Internet Protocol) address or MAC address. (Media Access Control) address, and then the network administrator needs to locate the network port and computer of the attack...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L61/103H04L63/0236H04L63/0272H04L63/1441
Inventor 吉杰林洽欣张培炜姚佑川
Owner SHANTOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products