Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

System and method for realizing PPPoE three attacks by using FPGA

A sub-system and sub-unit technology, applied in the field of network security, can solve problems such as difficult to prevent, stifle, and undetectable counterfeit server attacks, and achieve the effects of fast attack speed, simple functions, and data transparency

Inactive Publication Date: 2020-02-11
XIDIAN UNIV
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(3) Sending and receiving address, PPPoE still retains the Ethernet MAC address as the receiving and sending address, while PPP does not
However, the Trojan horse attack is easily recognized by the firewall, and it has been killed before realizing specific functions, and it is difficult to prevent the three attacks by using the PPPoE protocol. System and method to solve the problems existing in the prior art
[0010] To sum up, the existing problems in the prior art are: in the prior art, in the methods of attacking the computer, stealing the account password of the other party, making the other party offline, and carrying out DDoS attacks, etc., the Trojan horse attack is easily recognized by the firewall Out, it has been killed before the specific function is realized
No matter how good firewall and antivirus software users use, they will not be able to detect the existence of fake server attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for realizing PPPoE three attacks by using FPGA
  • System and method for realizing PPPoE three attacks by using FPGA
  • System and method for realizing PPPoE three attacks by using FPGA

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0068] In order to make the object, technical solution and advantages of the present invention more clear, the present invention will be further described in detail below in conjunction with the examples. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0069] Aiming at the problems existing in the prior art, the present invention provides a system and method for realizing three kinds of PPPoE attacks by using FPGA. The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0070] Such as figure 1 with image 3 As shown, the system for realizing three kinds of PPPoE attacks by using FPGA provided by the embodiment of the present invention includes two subsystems: PPPoE attack subsystem 1 and MAC core subsystem 2 .

[0071] The PPPoE attack subsystem 1 includes u_pppoeattack_v1 module 1-1 and u_pppoeat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of network security, and discloses a system and method for realizing PPPoE three attacks by using an FPGA, and the system comprises a PPPoE attack subsystem and an MAC core subsystem. The invention is not disclosed at home and abroad in any form before. The method for realizing PPPoE three attacks by using the FPGA comprises the following steps: a Mac physical address of a computer are analyzed and obtained; the receiving data frame control module acquires PPPOED and PPP frames transmitted by the internet access 0, analyzes the PPPOED and PPP frames, records information of a computer client side for PPPoE login authentication, and determines the type of a reply frame according to the type of the received frame; the data frame sending control module sends a corresponding frame to the 0 port according to the recorded information and the reply frame type; and the U _ MAC _ upper module and the U _ MAC _ lower module obtain the data frames fromthe corresponding network ports, correspondingly process the data frames and send the processed data frames to the upper layer. The system and method have the advantages of being high in attack speed,wide in attack range and difficult to prevent.

Description

technical field [0001] The invention belongs to the technical field of network security, and in particular relates to a system and a method for realizing three kinds of attacks of PPPoE by using FPGA. Background technique [0002] At present, the closest existing technology: In today's society, the Internet is becoming more and more important in people's lives, and as it is gradually integrated into people's daily habits, it has become an inseparable part. Compared with the traditional narrowband access technology, the broadband access technology has the functions of high speed, authentication, and billing, so it has been greatly developed and applied in real life, and the current popular broadband access method ADSL is Using the PPPoE protocol, you can use the Ethernet card to connect those computers that use ADSL to access the Internet with the Internet. Higher cost performance is a very large advantage and benefit of PPPoE technology compared with traditional access techn...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/20H04L69/168H04L2101/622
Inventor 潘伟涛张赫炎杨一凡王亚雯孙义雯
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products