Attack data packet traceability method and system based on dynamic probabilistic dual-domain packet marking

A data packet and marking technology, applied in the transmission system, complex mathematical operations, electrical components, etc., can solve the problems of difficult to accurately reconstruct the attack path, too large log information, difficult to store, etc., to achieve calculation pressure balance and reduce errors , the effect of roughly balancing the number of marks

Active Publication Date: 2021-11-30
XIDIAN UNIV
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The marking scheme requires a certain amount of statistics on the attack packets, and it is difficult to accurately reconstruct the attack path when there are few attack packets
The "logging type" scheme has additional requirements for the storage of the router. When the amount of data is large, the log information recorded by the router will be too large and redundant to be stored

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack data packet traceability method and system based on dynamic probabilistic dual-domain packet marking
  • Attack data packet traceability method and system based on dynamic probabilistic dual-domain packet marking
  • Attack data packet traceability method and system based on dynamic probabilistic dual-domain packet marking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0032] The attack data packet tracing method based on dynamic probabilistic dual-domain packet marking in the present invention combines the advantages of the dynamic probabilistic packet marking algorithm in the probabilistic packet marking algorithm, and sets two marking fields in the packet header of the IP message, and the router calculates the marking probability revision Parameters and record its own information to the two marking domains through two marking strategies. The overall flow chart is as figure 1 shown. When a network attack is detected, the victim host can count the attack data packets and effectively trace the attack path of the data packets.

[0033] 1. Mark space settings;

[0034]For the setting of the mark space, use the idle data packet in the head of the IP message as the record space of the mark. The current network is constantly...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An attack packet source tracing method and system based on dynamic probabilistic dual-domain packet marking, the source tracing method includes the following steps: setting the marking space of the dual-domain marking domain; marking the two marking domains with opposite marking strategies; After the attack, the victim host counts all attack packets, and reconstructs the attack path in two steps: (1) all the tag information that appears in the tag field is the router that constitutes the attack path; (2) count the number of occurrences of the tag information; m 1 、m 2 Denote the two label domains in the above label space respectively; m 1 The router with more appearance times is closer to the victim host, and the number of times decreases along the attack path to the attack host; m 2 The router with more occurrences in , the closer to the attacking host, and the number of times decreases along the attack path to the victim host. The invention also provides a system for realizing the above method, which satisfies the requirement of high security in the autonomous local area network.

Description

technical field [0001] The invention belongs to the field of network attack traceability, and in particular relates to a method and system for traceability of attack data packets based on dynamic probability double-domain packet marking. Background technique [0002] In recent years, with the rapid development of the Internet, people store a lot of high-value data in the network. However, the increasingly frequent network attacks make these high-value data or network facilities unable to be effectively secured, which puts forward various requirements for the construction of new networks, including high requirements for security. Institutions such as banks, securities, education, medical care, and government are frequently attacked by cyber attacks, causing huge economic losses. Although these institutions often have a mature internal network system, due to the development of network attack technology, relatively closed internal networks are still difficult to resist high-te...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06F17/18
CPCG06F17/18H04L63/1416
Inventor 李腾肖泽宇张翔宇温子祺廖艾彭宇飞张胜凯魏大卫马卓沈玉龙马建峰
Owner XIDIAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products