A Method for Source Tracing of IPv6 Attacks

A consistent and information flow technology, applied in the field of network security, can solve the problems of poor practicability and easy tampering of marking methods, and achieve the effects of preventing forgery and tampering of marks, ensuring integrity, and preventing replay attacks

Inactive Publication Date: 2020-12-25
CHINESE PEOPLE'S PUBLIC SECURITY UNIVERSITY +1
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0019] Therefore, the technical problem to be solved by the present invention is to overcome the defects that the attack source tracing method in the prior art is not applicable to IPv6 only, is not practical and the marking method is easy to be tampered with

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Method for Source Tracing of IPv6 Attacks
  • A Method for Source Tracing of IPv6 Attacks
  • A Method for Source Tracing of IPv6 Attacks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] The technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Apparently, the described embodiments are some of the embodiments of the present invention, but not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0069] In the description of the present invention, it should be noted that the terms "center", "upper", "lower", "left", "right", "vertical", "horizontal", "inner", "outer" etc. The indicated orientation or positional relationship is based on the orientation or positional relationship shown in the drawings, and is only for the convenience of describing the present invention and simplifying the description, rather than indicating or implying that the referred device or element must have a specific orientation, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an IPv6 attack source tracing method. The IPv6 attack source tracing method includes an information flow classification step, a message marking step, a verification information generating step, and an information determining step. The IPv6 attack source tracing method proposes a more efficient and reasonable marking probability algorithm to determine the marking probability of messages, marks the messages by taking the flows as objects, and divides the flows into a large flow and a small flow according to the bandwidth occupancy rate. In order to avoid excessive numberof marked messages with the large flow, the marking probability is dynamically adjusted according to the bandwidth occupancy rate while the small flow is marked with a fixed probability to ensure marking for the small flow, so as to facilitate source tracing for a DDoS attack with fewer marked messages. The IPv6 attack source tracing method improves a traditional marking process, combines intra-domain source tracing with inter-domain source tracing, and selects an access network router and an autonomous domain border router to perform related marking to generate marked messages, thus maximally guaranteeing the integrity of a reconstructed path, being conductive to stopping the attack and marking the attack source.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an IPv6 attack source tracing method. Background technique [0002] With the rapid development of the Internet, the disadvantages of the IPv4 protocol are becoming increasingly apparent. There is a serious shortage of IP addresses. Although various solutions have been proposed to temporarily alleviate the contradiction, they cannot solve the problem for a long time. Various network attacks emerge in endlessly. DDoS attack has been an unavoidable form of attack on the network since its birth. Forging the source address of the message has caused great difficulties in attack source tracing and brought great damage to the society. Although the IPv6 protocol solves the problem of insufficient IP addresses in the IPv4 protocol, it still faces security risks. The IPv6 protocol has been widely promoted around the world, with a rapid development momentum. More and more people ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1458H04L2463/146
Inventor 蔡满春芦天亮杜彦辉翟瑞
Owner CHINESE PEOPLE'S PUBLIC SECURITY UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products