A Defense Method for D-linkdir Series Router Configuration Interface Vulnerabilities
A technology for configuring interfaces and routers. It is applied in the field of cyberspace security technology. It can solve the problems of flexible management of routers, reduced router functionality, and inability to resist intranet penetration. It achieves wide applicability, prevents data access, and ensures functionality. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0021] The present invention will be further described below in conjunction with the accompanying drawings.
[0022] We need the router to be able to defend against both internal and external network attacks, so the protection agent should be connected to the WAN port and LAN port of the router at the same time, and the number can be appropriately increased or decreased according to the needs of users.
[0023] A data structure (DS) is maintained in the protection agent, and a finite state machine is stored in the data structure to mark the states of all IP addresses. The states of the IP address are the initial state (Initial State), the authentication success state (Success State) and the application login verification state (Checking State). All IP addresses have an initial state indicating that they have neither passed login verification nor applied for login verification. Success State indicates that the IP has passed the authentication. CheckingState indicates that the I...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


