Attack source tracing method based on frit

A data packet and router technology, applied in digital transmission systems, data exchange networks, electrical components, etc., can solve the problem of high logging time, reduce logging time, quickly and accurately trace the source, and reduce computing overhead.

Active Publication Date: 2021-08-17
哈尔滨英赛克信息技术有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the inevitable collision of the hashing method, it leads to the problem of high logging time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack source tracing method based on frit
  • Attack source tracing method based on frit
  • Attack source tracing method based on frit

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0030] figure 1 Topology is a schematic view of the invention, based on figure 1 Brief description of the workflow of the present invention:

[0031] (1) labeling process

[0032] Table 1 shows the values ​​of the data packet stored on the router and changes the attack path during forwarding tag value. Suppose the attacker to attack a packet sent from the router R1 is connected in a local area network, the attack packets from entering R1 is 0, 2 roll-out, i.e. UP 1 = 0, mark = UP 1 , DW 1 = 2, i = UP 1 , J = DW 1 , R1 because this is the border router routing process is provided RT [I] [j] = 255, i.e., RT [0] [2] = 255, then transmitted to the router R2 of the core router the packet interface 2; R2 is received by a packet from the router 3 and coming from the interface 4 forwards the packet out of the interface, this packet flag value 0, then, into the relevant variables obtained. At this time, the interface number of the received packet marknew 3, i.e. marknew = 3, and forward t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a FRIT-based attack source tracing method. The method combines two methods of data packet marking and route recording to trace the source. First, the router interface number is 0-n; secondly, the marking value of the data packet is set to The data packet is transferred to the number of the interface passed by the router, and the old tag value of the data packet is stored in the router, so as to mark the attack path; finally, the attack path is reconstructed through the tag value and router logs to trace the source Purpose. The attack source tracing scheme FRIT proposed by the present invention can complete the source tracing task with only one data packet, which greatly reduces the complexity of the source tracing process, and reduces the storage burden of routers while ensuring the accuracy of source tracing.

Description

Technical field [0001] The present invention relates to a method for the trace attack, particularly to a router-based FRIT (Fast RouteInterface Traceback) attack source tracing method. Background technique [0002] Attack source tracing methods can be roughly divided into four categories, which link testing, by backtracking and ICMP packet logging program due back time and limit the types of resources, there has been very little research to improve these three types of methods, recent more popular packet marking scheme because of its influence from attack time and become the mainstream method for the trace. Different protocol layers to be used according to the traceability scheme, which can be back through the data link layer and network layer in two ways, wherein the data link layer of a data link by exploratory testing, and to determine the article from the detection result whether the link is a link to attack, to reconstruct the full attack path. However, these methods have th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/26H04L12/721
CPCH04L43/10H04L45/26H04L63/1416H04L2463/146
Inventor 杨武
Owner 哈尔滨英赛克信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products