Unlock instant, AI-driven research and patent intelligence for your innovation.

A Defense Method for D-linkdir Series Router Configuration Interface Vulnerabilities

A technology for configuring interfaces and routers. It is applied in the field of cyberspace security technology. It can solve the problems of flexible management of routers, reduced router functionality, and inability to resist intranet penetration. It achieves wide applicability, prevents data access, and ensures functionality. Effect

Active Publication Date: 2021-05-14
NANJING UNIV OF POSTS & TELECOMM
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] For the interface vulnerability of this brand of routers, the official released a corresponding patch, but most routers of the Dir series are affected by this vulnerability
However, the official did not release patches for all affected models in a timely manner
In view of this situation, the defensive measures of this series of routers are to open the firewall of the routers and prohibit access to web services from the external network. However, this method cannot allow administrators to manage the routers more flexibly, resulting in reduced functionality of the routers.
Another defensive measure is to set up a whitelist of access addresses to reduce the risk of being attacked. This approach also has some disadvantages, and the whitelist needs to be constantly updated; the existence of NAT or network proxy will block legitimate users and cannot resist intranet penetration

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Defense Method for D-linkdir Series Router Configuration Interface Vulnerabilities
  • A Defense Method for D-linkdir Series Router Configuration Interface Vulnerabilities
  • A Defense Method for D-linkdir Series Router Configuration Interface Vulnerabilities

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described below in conjunction with the accompanying drawings.

[0022] We need the router to be able to defend against both internal and external network attacks, so the protection agent should be connected to the WAN port and LAN port of the router at the same time, and the number can be appropriately increased or decreased according to the needs of users.

[0023] A data structure (DS) is maintained in the protection agent, and a finite state machine is stored in the data structure to mark the states of all IP addresses. The states of the IP address are the initial state (Initial State), the authentication success state (Success State) and the application login verification state (Checking State). All IP addresses have an initial state indicating that they have neither passed login verification nor applied for login verification. Success State indicates that the IP has passed the authentication. CheckingState indicates that the I...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a defense method for D-Link Dir series router configuration interface loopholes, which is mainly used to solve the security problem caused by the interface loopholes of the Dir series routers of this brand. The invention utilizes the protection agent to filter the data packets of the external network and the internal network, so as to ensure that only the IP that has been verified by the router can request the resources of the router, so as to realize the simultaneous defense of the attacks on the external network and the internal network; the protection agent is in a data structure, through Maintain a finite state machine to set the state of the IP address and perform state conversion; the protection agent intercepts the user's request, and the protection agent judges whether the source address of the data packet is safe. If it is a safe IP, its request for resources is allowed, otherwise Guide the user to log in. If the protection agent receives the successful login data packet, it will allow the IP to request router resources, otherwise it will be regarded as a forwarding packet and forwarded.

Description

technical field [0001] The invention relates to a defense method for D-Link Dir series router configuration interface loopholes, which solves the security problem caused by the interface loopholes of D-LinkDir series routers, and belongs to the network space security technology. Background technique [0002] The router is an important device for Internet interconnection, and it undertakes the data forwarding function between different networks. Therefore, the security and reliability of the router directly determine the security and stability of the Internet. In recent years, with the frequent occurrence of router attacks, network security has been threatened more and more. Therefore, research on vulnerability defense for routers has become a hotspot in network security research. According to the survey, there are backdoors in many brands of routers on the market, through which attackers can directly control the routers and further launch attacks such as DNS hijacking, info...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0281H04L63/0876H04L63/0884
Inventor 季一木王舒吴夜曹翔宇薛景刘尚东王汝传
Owner NANJING UNIV OF POSTS & TELECOMM