Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for determining risk of IPv6 address

An ipv6 address and ipv4 address technology, applied in the field of Internet security, can solve the problems of inability to know the risk or reliability of IPv6 addresses, lack of a better solution, and obstacles to the promotion and application of IPv6 communication in network security operation management

Active Publication Date: 2020-06-26
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, Internet operators cannot know the risk or credibility of IPv6 addresses, which hinders the safe operation and management of networks and the promotion and application of IPv6 communications.
[0005] For the above problems, there is currently no better solution in the industry

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for determining risk of IPv6 address
  • Method and device for determining risk of IPv6 address
  • Method and device for determining risk of IPv6 address

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The subject matter described herein will be discussed below with reference to example implementations. It should be understood that the discussion of these implementations is only to enable those skilled in the art to better understand and realize the subject matter described herein, and is not intended to limit the protection scope, applicability or examples set forth in the claims. Changes may be made in the function and arrangement of the elements discussed without departing from the scope of the embodiments of the present description. Various examples may omit, substitute, or add various procedures or components as needed. Additionally, features described with respect to some examples may also be combined in other examples.

[0034] As used herein, the term "comprising" and its variants represent open terms meaning "including but not limited to". The term "based on" means "based at least in part on". The terms "one embodiment" and "an embodiment" mean "at least one...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method and device for determining the risk of an IPv6 address. In this method, the method comprises the following steps: acquiring an IPv4 message set and anIPv6 message set which are generated based on double-protocol stack communication between a client and a server, wherein the IP message comprises client equipment information, an IP address and a message timestamp; screening an IPv4 address and an IPv6 address which are associated with corresponding similar message timestamps from each group of IPv4 messages and IPv6 messages with the same clientequipment information; according to the method, whether each IPv4 address in the IPv4 message set has the black production risk behavior or not is judged, so that when the IPv4 address has the blackproduction risk behavior, it is determined that the IPv6 address associated with the IPv4 address also has the black production risk behavior, and the credibility of the IPv6 address can be effectively identified.

Description

technical field [0001] The embodiments of this specification relate to the field of Internet security, and in particular, relate to a method and device for determining risks of IPv6 addresses. Background technique [0002] With the update and iteration of mobile Internet technology, more and more terminal devices need to access the network, resulting in the gradual exhaustion of IPv4 addresses, making the use of IPv6 to provide network access has become the trend of the next generation of Internet communications. [0003] Although the IPv6 protocol has been released for many years, it has not been deployed on a large scale, especially with the rapid development of IOT (Internet of Things, Internet of Things) and the domestic requirements for large-scale deployment of IPv6, major companies and applications have begun to deploy IPv6 Work. [0004] At present, the security risk control strategy of IPv6 is not yet perfect, and some criminals will carry out illegal activities th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/12H04L29/06H04L29/08
CPCH04L63/20H04L63/1458H04L67/1044H04L2101/686H04L67/133
Inventor 刘向阳
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD