Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety and protection equipment detection method for realizing TCP protocol stack information leakage based on ALG protocol

A technology of security equipment and information leakage, applied in the field of information security and information technology, can solve the problems of inaccurate positioning, non-response, and inability to perceive the existence of the protection system in the detection of network security equipment, so as to achieve simple versatility, avoid false alarms, and improve The effect of accuracy

Active Publication Date: 2020-02-21
WEBRAY TECH BEIJING CO LTD
View PDF16 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0013] 2) Do not respond to messages that request invalid Banner information
[0016] As network security devices such as protective walls, intrusion detection systems, and next-generation firewalls are transparently deployed, the returned banner information is the device behind the protective device. From the perspective of detection, it is impossible to perceive the existence of the protective system.
There are large errors in this detection method, and the detection of network security equipment cannot be accurately located

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety and protection equipment detection method for realizing TCP protocol stack information leakage based on ALG protocol
  • Safety and protection equipment detection method for realizing TCP protocol stack information leakage based on ALG protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in detail below in conjunction with the accompanying drawings, so that those of ordinary skill in the art can implement it after referring to this specification.

[0036] Such as figure 1 with figure 2 As shown, a security device detection method based on the ALG protocol to realize information leakage of the TCP protocol stack includes the following steps: S1. The client sends a detection message containing the ALG protocol stack to the server.

[0037] S2. The server responds to the detection message, wherein a response packet of the server to the detection message includes basic information of the detected software and protocol stack information of the security device.

[0038] S3. The client receives the response packet.

[0039] In the above solution, by setting the ALG protocol stack in the detection message, the existence of the protection device in the network can be obtained during detection, thereby realizing the dete...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a safety and protection equipment detection method for realizing TCP protocol stack information leakage based on an ALG protocol. The method comprises the following steps thatS1, a client sends a detection message accommodating the ALG protocol stack to a server; S2, the server responds to the detection message, and a response packet of the server responding to the detection message comprises basic information of the detected software and protocol stack information of the safety and protection equipment; and S3, the client receives the response packet. By constructingthe detection message accommodating the protocol stack of the protection equipment, the protection equipment returns corresponding protocol stack information, so that the protection equipment which istransparently deployed is identified, and the purpose of truly identifying the network equipment is achieved.

Description

technical field [0001] The invention relates to the fields of information technology and information security technology, in particular to a security device detection method for realizing information leakage of TCP protocol stack based on ALG protocol. Background technique [0002] As the "fifth frontier" after land, sea, air, and space, cyberspace has become the strategic focus of competition among countries around the world. Our country has become a big country in the network world, and technological waves such as smart cities, digital China, and Internet + are transforming traditional production and living patterns. Network security and informatization are major strategic issues related to national security and national development, as well as to the work and life of the broad masses of the people. The description and identification of cyberspace devices has become one of the basic conditions for governing cyberspace. [0003] Network fingerprint is an important identif...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/168H04L63/20H04L69/329H04L63/1416H04L63/0227
Inventor 韩卫东权晓文
Owner WEBRAY TECH BEIJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products