A method and device for defending against attacks

A technology for preventing attacks and attacking packets, applied in the field of network communication, can solve the problem of BRAS being vulnerable to attacks, and achieve the effect of accurate statistics and reduction of the number of

Active Publication Date: 2021-05-07
NEW H3C TECH CO LTD
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Broadband Remote Access Server (BRAS) is an access network management oriented to broadband network applications. It is a bridge between the broadband access network and the backbone network, providing basic access means and Management function; whether users in the broadband access network send data packets to the backbone network side, or users on the backbone network side send data packets to the broadband access network, they will be aggregated to the BRAS and forwarded by the BRAS, resulting in BRAS very vulnerable to attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for defending against attacks
  • A method and device for defending against attacks
  • A method and device for defending against attacks

Examples

Experimental program
Comparison scheme
Effect test

example 1

[0041] When the BRAS performs layer-1 VLAN statistics on the protocol packets, it is based on the layer-1 anti-attack temporary statistical table; the layer-1 anti-attack temporary statistical table includes multiple layer-1 attack temporary statistical table items. A layer-1 attack defense temporary statistics table item carries a MAC address, a layer-1 VLAN ID, a receiving port ID of a protocol packet, and a first statistical bit, which is used to record the layer-1 VLAN statistics on the protocol packet The current number of statistical packets at that time.

[0042] For example, the temporary statistical table of layer 1 defense attack is shown in Table 1:

[0043] Table 1

[0044] Index MAC Svlan interface first statistic 1 mac1 1 port1 40 2 mac2 1 port1 21

[0045] Among them, Index is the serial number of the first-layer anti-attack temporary statistical entry; MAC is the MAC address; Svlan is the VLAN ID of the first layer; I...

example 2

[0048] A new classification control table is added on the BRAS; the classification control table includes multiple classification control entries; each classification control entry carries a MAC address, a layer of VLAN identification, a receiving port identification, and classification statistics flag bits; if the classification If the value of the statistics flag bit is 0, it indicates that layer-1 VLAN statistics are performed on the newly received protocol packets corresponding to the hierarchical control entries; if the value of the hierarchical statistics flag bit is 1, it indicates that the newly received Layer 2 VLAN statistics are performed on protocol packets corresponding to hierarchical control entries. The protocol message corresponding to the hierarchical control table item refers to the protocol message whose MAC address, first-level VLAN ID, and receiving port ID are the same as those carried in the hierarchical control table item. .

[0049] For example, the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure relates to the technical field of network communication, and in particular to an attack prevention method and device, which are used to combine layer-1 VLAN statistics with layer-2 VLAN statistics when performing attack-defense statistics on protocol packets, and perform roughly based on layer-1 VLAN After the statistics reach a certain threshold, accurate statistics are performed based on the Layer 2 VLAN to realize accurate statistics of the protocol packets to be counted. The anti-attack method comprises: after receiving the protocol message to be counted, detecting whether the statistical message quantity of the one-layer virtual local area network VLAN corresponding to the protocol message to be counted reaches the first statistical threshold; if the first statistical threshold is not reached, then Perform Layer 1 VLAN statistics on the protocol packets to be counted; if the first statistical threshold is reached, perform Layer 2 VLAN statistics on the protocol packets to be counted, and when the number of statistical packets in the Layer 2 VLAN reaches the second statistical threshold, count Protocol packets are treated as attack packets for attack prevention.

Description

technical field [0001] The present disclosure relates to the technical field of network communication, and in particular to an attack defense method and device. Background technique [0002] Broadband Remote Access Server (BRAS) is an access network management oriented to broadband network applications. It is a bridge between the broadband access network and the backbone network, providing basic access means and Management function; whether users in the broadband access network send data packets to the backbone network side, or users on the backbone network side send data packets to the broadband access network, they will be aggregated to the BRAS and forwarded by the BRAS, resulting in BRAS very vulnerable to attack. Double Virtual Local Area Network (Double Virtual Local Area Network, QINQ) realizes the encapsulation of the user's private network virtual local area network (Virtual Local Area Network, VLAN) label in the public network VLAN label, so that the message with ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1441
Inventor 王阳廖以顺章靠
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products