Unlock instant, AI-driven research and patent intelligence for your innovation.

A routing security detection method and system

A security detection and routing technology, applied in computer security devices, instruments, computing, etc., can solve problems such as digital cannon attacks, declaring routers and routing paths authenticity and integrity cannot be verified, information eavesdropping and tampering with network communications, etc.

Active Publication Date: 2021-07-09
INST OF COMPUTING TECH CHINESE ACAD OF SCI
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In view of the fact that the current Internet lacks a source routing legality verification mechanism, the authenticity and integrity of the originating autonomous system, the network prefix source, the declaring router, and the route routing path cannot be verified. Confirm the method and system of routing attack, solve the problems of routing DDoS, digital cannon attack, information eavesdropping and tampering, and network communication interruption caused by routing security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A routing security detection method and system
  • A routing security detection method and system
  • A routing security detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the above-mentioned features and effects of the present invention more clear and understandable, the following specific examples are given together with the accompanying drawings for detailed description as follows.

[0032] In order to ensure the security of the routing system, respond to various network routing security incidents in a timely manner, reduce the losses suffered by the routing system when it is attacked, and at the same time, considering the limited memory space in the router device, the present invention proposes a programmable network device based on Cardinality counting routing security detection technology CCRSD (Routing Security DetectionBasedOn Cardinality Counting). The function of the present invention on network construction and maintenance is mainly reflected in improving the security and stability of the network, and at the same time can provide a basis for the security diagnosis and security prevention of the routing system. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a routing security detection method and system, comprising: obtaining a routing table of a routing system, the routing table includes a plurality of routing items; using the binary hash value of the routing item as a check value, and the number of bits of the check value is n , remember that the first m digits of the verification value are the bucketing unit, and the number of buckets M is 2 m , the last n-m bits of the check value are metadata, and the leading zeros of the metadata are counted; until the leading zeros of each routing item in the routing table are obtained, the leading zeros of each routing item are collected, and the statistics of the Maximum value as the maximum number of leading zeros M i ;According to the following formula to get the base number, where M refers to the number of buckets; M i Refers to the number of leading zeros of the i-th bucket; u refers to the expected number of leading zeros. It is judged whether the base is greater than the preset threshold. If it is greater, it is determined that the routing system is under attack, otherwise it is determined that the routing system is operating normally.

Description

technical field [0001] The invention belongs to the field of routing security in network security, and in particular relates to a routing security detection method and system. Background technique [0002] Computer network is the product of the fusion of computer technology and communication technology. After nearly 40 years of development, especially since the mid-1990s, the number of applications on the network has increased, the scale of the network has grown rapidly, and the number of network users has increased sharply. The Internet is gradually evolving into the information infrastructure of human society. However, in recent years, many routing security incidents have occurred in the routing system of the Internet, which makes people worry about the security status of Internet routing facilities. The security of routing systems has attracted great attention from industry and academia. [0003] The routing system is the infrastructure and key support of the Internet. W...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/55G06F21/56
CPCG06F21/55G06F21/565
Inventor 元国军许刚王展邵恩安学军谭光明张佩珩孙凝晖
Owner INST OF COMPUTING TECH CHINESE ACAD OF SCI