Mimicry thought-based security exchange chip, implementation method and network exchange equipment

A technology of secure exchange and thought, applied in the field of network exchange, can solve the problems of shortening the research and development cycle, changing the data flow, tampering or destroying, etc., to achieve the effect of increasing difficulty, enhancing reliability, and enhancing security

Active Publication Date: 2019-08-27
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF9 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is no targeted protection against potential security risks, unknown vulnerabilities, Trojan horses and backdoors that may exist in the hardware. Therefore, the traditional defense design has limited protection against unknown vulnerabilities, Trojan horses and backdoors that may exist in the switching chip.
The defense technology characteristics of the current switch chip, due to the increasingly complex switching system and the development of programmable forwarding technology, the forwarding engine system is becoming more and more complex, and the forwarding engine is very likely to have unknown loopholes or unreliable design ideas. How to realize potential loopholes in the forwarding engine It is particularly important to improve the reliability of the forwarding engine design; with the development of IC technology, after the configuration information is sent to the switch chip, it is very likely to be tampered with or damaged at the hardware level, thus changing the data flow. Therefore, how to Realizing the protection of important configuration information in the switching chip has become one of the important issues that need to be solved urgently; when designing a complex switching system, it has become a trend to use third-party general IP, especially the data cache module, which can reduce R&D However, how to avoid the coordinated software and hardware attacks triggered by the backdoor reserved by the third party IP is also a problem that needs to be paid attention to at present.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mimicry thought-based security exchange chip, implementation method and network exchange equipment
  • Mimicry thought-based security exchange chip, implementation method and network exchange equipment
  • Mimicry thought-based security exchange chip, implementation method and network exchange equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the purpose, technical solution and advantages of the present invention more clear and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions.

[0051] Network exchange refers to a form of exchange that converts different signals or signal forms into signal types recognizable by the other party through switches and other equipment to achieve communication purposes. The common ones are: data exchange, line exchange, message exchange, and packet exchange. . In a computer network, according to different switching levels, network switching can be divided into physical layer switching (such as telephone network), link layer switching (two-layer switching, changing the MAC address), network layer switching (three-layer switching, Change the IP address), transport layer switching (four-layer switching, port changes, relatively rare) and application layer switching (i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network switching, and particularly relates to a mimicry thought-based security switching chip, an implementation method of the security switching chipand network switching equipment, and the method comprises the following steps: carrying out scheduling processing on message data of each port according to input scheduling; aiming at each piece of message data, extracting a message header and caching the message data; parsing through a heterogeneous parsing algorithm, and carrying out mimicry judgment on a parsing result; generating a message descriptor according to the judgment result, wherein the message descriptor at least comprises message feature information related to the message forwarding strategy behavior; searching for a mimicry table item verification-based table item cache to obtain forwarding strategy behavior data and updating a message descriptor; and extracting corresponding message data from the cached message data, and sending the extracted message data to a corresponding port in the form of a data packet. The security and reliability of the switch chip are enhanced by introducing such technologies as de-collaborative caching, mimic forwarding engines and mimic table item checking, and the method has important guiding significance for the development of the network switching technology.

Description

technical field [0001] The invention belongs to the technical field of network switching, and in particular relates to a security switching chip based on the idea of ​​mimicry, a realization method and network switching equipment. Background technique [0002] Today, with the rapid development of the Internet, network switching technology is an important hub of network communication, so the security and reliability of switching devices, especially switching chips, are extremely important. In the field of network switching, security incidents continue to emerge. In early 2018, Cisco disclosed that 318 switches had vulnerabilities and might have been infiltrated. The safety and reliability of switching equipment has become the top priority in the design of current network switching equipment. At the same time, with the increasing complexity of the network and the soaring data traffic, the design complexity of the switch chip is also increasing. Therefore, the design of the sw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/741H04L12/861H04L12/933H04L12/935H04L29/06H04L45/74H04L49/111
CPCH04L49/109H04L49/3009H04L49/90H04L45/745H04L63/1466H04L63/1433
Inventor 张文建邬江兴刘勤让宋克沈剑良刘冬培陈艇李沛杰汤先拓张帆
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products