Unlock instant, AI-driven research and patent intelligence for your innovation.

An anti-replay attack method for whole network udp port scanning

A port scanning and anti-replay technology, applied in the transmission system, electrical components, etc., can solve the problems of IP device port information not being collected, scan end memory space exhausted, and difficult to defend against attackers, etc., to improve security surveying and mapping, Good scanning results, improved accuracy and efficiency

Active Publication Date: 2021-03-30
HANGZHOU ANHENG INFORMATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) Add the IP address that has initiated the replay attack to the blacklist through the black and white list. When the packet is received by the scanning end, first check whether the source IP of the packet is in the blacklist. If it exists, it will be discarded. If it does not exist, it will be discarded is reserved; although this method can defend against the replay attack of the fixed IP list, most attackers now disguise their own source IP. The source IP is a variable that can be changed at will for the attacker, especially in the entire network. When defending against replay attacks internally, it is not only difficult to defend against attackers by using the black and white list method, but even the port information of the IP devices in the blacklist cannot be collected;
[0007] (2) The source IP address and source port of the received message are used as keywords, and the AVL tree structure is established with the number of times received as the value. When the scanning end receives the message, it directly queries the AVL tree according to the source IP address and source port. If the number of corresponding receiving times exceeds the set upper limit, it will be judged as a replay attack and discarded; if it is not exceeded, it will be kept; in this way, the source IP address of the UDP protocol is 32 bits, the source port is 16 bits, and the source IP address and If the source port is a keyword, it is necessary to maintain an AVL tree whose keyword is a 48-bit integer. It may need to save 2 to the 48th power nodes at most. When the scanning end scans the entire network, replay attacks come from any port of any IP, and maintenance This AVL tree will consume a lot of space and even exhaust the memory space of the scanning end

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An anti-replay attack method for whole network udp port scanning
  • An anti-replay attack method for whole network udp port scanning

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be further described in detail below with reference to the embodiments, but the protection scope of the present invention is not limited thereto.

[0033] The invention relates to an anti-replay attack method for UDP port scanning of the whole network. The whole network in the invention is based on IPv4, which is the fourth edition of the Internet Protocol (Internet Protocol, IP), and is also the first widely used one. The underlying protocols of Internet technology.

[0034] The method includes the following steps.

[0035] Step 1: Module initialization; circular AVL tree array initialization.

[0036] In the present invention, the scanning terminal actually involves a sending module, a receiving module and a verification module, which respectively complete the transmission of encrypted UDP packets, the reception of response UDP packets and the verification of replay attack verification for valid response packets. These modules need to read...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a playback attack preventive method of whole-network UDP port scanning. A scanning end forms a UDP message, a UDP message header is encrypted by target IP equipment, a UDP detection data packet in the IPv4 full address space after encryption is sent, the scanning end verifies a response UDP message, the response UDP message is abandoned if not valid, otherwise, keywords are calculated by using the IP address and source port of IP equipment which sends the valid response message, a reception frequency value matches an annular AVL tree array, it is determined to be a playback attack if the keywords exceed the upper limit of the reception frequency, the valid response message is abandoned, and otherwise, the scanning end receives and processes the effective response message. According to the method, two defensive mechanism are included, the maintenance cost is low, a scanning result is accurate, space is occupied less and kept in the controllable range, play attacks o the USP message in any port of any IP address can be defended effectively, the accuracy and efficiency of safety plotting as well as asset scanning in the network space can be improved, and solidtechnical support is provided for space plotting of the global network.

Description

technical field [0001] The invention relates to the transmission of digital information, such as the technical field of telegram communication, in particular to an anti-replay attack method for efficiently defending against replay attacks by UDP port scanning of the whole network. Background technique [0002] The application of network technology has profoundly affected and changed people's production methods and lifestyles, promoted the progress and development of all aspects of society, and played an important role in promoting and supporting various fields of the national economy. [0003] Port scan refers to a method of sending a group of port scan packets to try to access the device and obtain various useful information about the device. Powerful port scanning technology can effectively detect various security risks and vulnerabilities, and generate detailed security detection reports, compatible with various mainstream operating systems, firewalls, routers and other n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0245H04L63/12H04L63/1416H04L63/1466H04L69/164
Inventor 郑威范渊王俊杰莫金友
Owner HANGZHOU ANHENG INFORMATION TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More