A Source IP Protection Method Based on Scanning Probe Behavior

A technology for scanning probes and behaviors, applied in the field of communications, to solve problems such as the inability to record the source IP address in time and the inability of network administrators to detect it all the time.

Active Publication Date: 2020-09-11
TIANJIN ZANPU TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, when the network service provider provides external services, some malicious users will use the source IP address provided by the network service provider to access the probe software. These abnormal traffic is invisible, and the network administrator cannot always be aware of it. It is also impossible to record the source IP addresses borrowed by these malicious users in time, and to ensure the normal use of these source IP addresses by normal users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Source IP Protection Method Based on Scanning Probe Behavior
  • A Source IP Protection Method Based on Scanning Probe Behavior
  • A Source IP Protection Method Based on Scanning Probe Behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] It should be noted that, in the case of no conflict, the embodiments of the present invention and the features in the embodiments can be combined with each other.

[0032] The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0033] A source IP protection method based on scanning probe behavior, comprising the following content:

[0034] After the uplink port receives the message, it does not need to be modified, and the message is copied to the downlink port intact. The processing flow of the uplink port receiving the message is as follows: figure 1 shown;

[0035] Because the uplink port does not need IP protection to receive packets. The so-called IP protection protects the online behavior of intranet users. Therefore, the task of the uplink port is to copy the message to the downlink port intact and send it to the intranet user, which is equivalent to sending the message to the peer end in bridge mode, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a source IP protection method based on the behavior of a scanning probe. The method comprises the steps that after an uplink port receives a message, the message is intactly copied to a lower-link port; after the lower-link port receives the message, the protocol type of the message is analyzed, if abnormity exists, VLANDID of the message is modified into the VLANDID of an abnormal branch, and the message is sent onto the abnormal branch and sent out, otherwise the message is sent onto a normal branch and sent out. The method has the advantages that service quality of normally getting online by a user is guaranteed, for actions that the user borrows a source IP address to access to a probe software, the software can automatically detect the abnormity of the IP, and under the context that the user source IP is not closed, abnormal traffic is automatically switched onto the abnormal branch to be processed, so that an IP is protected, and it is guaranteed that the user can further use the IP to switch onto a normal link to get online normally.

Description

technical field [0001] The invention belongs to the technical field of communication, and in particular relates to a source IP protection method based on scanning probe behavior. Background technique [0002] At present, when the network service provider provides external services, some malicious users will use the source IP address provided by the network service provider to access the probe software. These abnormal traffic is invisible, and the network administrator cannot always be aware of it. The source IP addresses borrowed by these malicious users cannot be recorded in time, and the normal use of these source IP addresses by normal users must also be guaranteed. Then, in order to better detect the source IP addresses of these malicious users, it is imperative to take measures to protect the source IP based on access probe software. Therefore, this software is produced under this background. Contents of the invention [0003] In view of this, the present invention a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0485H04L63/1441
Inventor 张寿权杨国栋张冬梅
Owner TIANJIN ZANPU TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products