Security switching chip, implementation method and network switching equipment based on mimicry idea

A technology for secure exchange and thought, applied in the field of network exchange, can solve problems such as shortening the research and development cycle, limited protection, tampering or destruction, and achieve the effects of increasing difficulty, enhancing security, and enhancing reliability

Active Publication Date: 2021-04-02
PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There is no targeted protection against potential security risks, unknown vulnerabilities, Trojan horses and backdoors that may exist in the hardware. Therefore, the traditional defense design has limited protection against unknown vulnerabilities, Trojan horses and backdoors that may exist in the switching chip.
The defense technology characteristics of the current switch chip, due to the increasingly complex switching system and the development of programmable forwarding technology, the forwarding engine system is becoming more and more complex, and the forwarding engine is very likely to have unknown loopholes or unreliable design ideas. How to realize potential loopholes in the forwarding engine It is particularly important to improve the reliability of the forwarding engine design; with the development of IC technology, after the configuration information is sent to the switch chip, it is very likely to be tampered with or damaged at the hardware level, thus changing the data flow. Therefore, how to Realizing the protection of important configuration information in the switching chip has become one of the important issues that need to be solved urgently; when designing a complex switching system, it has become a trend to use third-party general IP, especially the data cache module, which can reduce R&D However, how to avoid the coordinated software and hardware attacks triggered by the backdoor reserved by the third party IP is also a problem that needs to be paid attention to at present.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security switching chip, implementation method and network switching equipment based on mimicry idea
  • Security switching chip, implementation method and network switching equipment based on mimicry idea
  • Security switching chip, implementation method and network switching equipment based on mimicry idea

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purpose, technical solution and advantages of the present invention more clear and understandable, the present invention will be further described in detail below in conjunction with the accompanying drawings and technical solutions.

[0049] Network exchange refers to a form of exchange that converts different signals or signal forms into signal types recognizable by the other party through switches and other equipment to achieve communication purposes. The common ones are: data exchange, line exchange, message exchange, and packet exchange. . In a computer network, according to different switching levels, network switching can be divided into physical layer switching (such as telephone network), link layer switching (two-layer switching, changing the MAC address), network layer switching (three-layer switching, Change the IP address), transport layer switching (four-layer switching, port changes, relatively rare) and application layer switching (i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network switching, and in particular relates to a security switching chip, an implementation method and a network switching device based on a mimetic idea. Packet headers and cache packet data; parse through heterogeneous parsing algorithms, and make mimic judgments on the parsing results; generate packet descriptors based on the judgment results, which contain at least packets related to packet forwarding policy behaviors Feature information; look up the entry cache based on mimetic entry verification to obtain forwarding policy behavior data and update the packet descriptor; extract the corresponding packet data from the cached packet data, and send the extracted packet data in the form of data packets to the corresponding port. The present invention enhances the security and reliability of the switching chip by introducing technologies such as de-cooperative cache, mimic forwarding engine, and mimic table entry verification, and has important guiding significance for the development of network switching technology.

Description

technical field [0001] The invention belongs to the technical field of network switching, and in particular relates to a security switching chip based on the idea of ​​mimicry, a realization method and network switching equipment. Background technique [0002] Today, with the rapid development of the Internet, network switching technology is an important hub of network communication, so the security and reliability of switching devices, especially switching chips, are extremely important. In the field of network switching, security incidents continue to emerge. In early 2018, Cisco disclosed that 318 switches had vulnerabilities and might have been infiltrated. The safety and reliability of switching equipment has become the top priority in the design of current network switching equipment. At the same time, with the increasing complexity of the network and the soaring data traffic, the design complexity of the switch chip is also increasing. Therefore, the design of the sw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/741H04L12/861H04L12/933H04L12/935H04L29/06H04L45/74H04L49/111
CPCH04L49/109H04L49/3009H04L49/90H04L45/745H04L63/1466H04L63/1433
Inventor 张文建邬江兴刘勤让宋克沈剑良刘冬培陈艇李沛杰汤先拓张帆
Owner PLA STRATEGIC SUPPORT FORCE INFORMATION ENG UNIV PLA SSF IEU
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products