Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for cross-domain tracing based on stream fingerprint

A fingerprint and cross-domain technology, which is applied in the field of cross-domain traceability based on flow fingerprints, can solve problems such as false data packet and IP header replacement attacks, misleading suspicious path extraction, and limited marked content, so as to avoid loop deception and build paths Efficient, damage-reducing effect

Inactive Publication Date: 2018-12-07
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, these two methods are vulnerable to loop spoofing, which misleads suspicious path extraction
At the same time, due to the limited capacity of the carrier, the traceability technology based on packet marking has limited marking content, and is vulnerable to false data packets and IP header replacement attacks.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for cross-domain tracing based on stream fingerprint
  • Method for cross-domain tracing based on stream fingerprint
  • Method for cross-domain tracing based on stream fingerprint

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments, but the protection scope of the present invention is not limited thereto.

[0045] The present invention provides a method for cross-domain source tracing based on flow fingerprints. By adopting the idea of ​​multi-layer collaboration, attack path reconstruction and suspicious attack source location are respectively performed from the inter-domain layer and the intra-domain routing layer. The method includes the following steps:

[0046] Step 1: In the inter-domain layer, first construct the global network topology relationship according to the inter-domain SDN controller; on this basis, use the flow fingerprint of the suspicious data flow to realize the association of different data flows, so as to construct the inter-domain suspicious attack path.

[0047] Furthermore, because the construction of suspicious attack paths between domain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method for cross-domain tracing based on a stream fingerprint. The method comprises the steps of: based on the stream fingerprint technology, employing a multilayer synergetic thought to perform reconstruction of an attack path and location of a suspicious attack source from an inter-domain layer and an intra-domain routing layer, comprising: in the inter-domain layer, constructing a global network topology relation, and employing the stream fingerprint information of the suspicious attack source to achieve association for different data streams so as to construct an inter-domain suspicious attack path, and in the intra-domain routing layer, reconstructing an intra-domain suspicious attack path through association of the stream table information; and fusingthe inter-domain suspicious attack path and the intra-domain suspicious attack path to obtain a global suspicious attack path so as to reduce the damaging of a target host. The method for cross-domain tracing based on a stream fingerprint employs the stream table association degree to perform construction of the intra-domain suspicious path and employ the SDN integration control and the stream fingerprint technology to ensure the efficient and accurate construction of the path.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method for cross-domain source tracing based on flow fingerprints. Background technique [0002] With the continuous deepening of informatization in people's daily life, economic development and other fields, the information network has become an important infrastructure of the country. However, risks and benefits always go hand in hand, and cyber threats against data center servers are increasing day by day. The analysis shows that no matter what the principle and means of the attack are, most of them combine the springboard and anonymous communication technology to hide the source and path of the attack. The root cause of this kind of problem is that the identity of the data source is unknown during the data exchange process, which leads to the untraceable malicious attack path. Therefore, the efficient extraction of suspicious attack paths and the accurate locatio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/705H04L12/741H04L12/751H04L45/02H04L45/18H04L45/74
CPCH04L45/02H04L45/18H04L45/745H04L63/1416H04L63/1425H04L63/1441H04L63/1475H04L2463/146
Inventor 雷程刘小虎张玉臣刘璟范钰丹谭晶磊
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products