Check patentability & draft patents in minutes with Patsnap Eureka AI!

Inter-domain source address verification method and device, electronic equipment and storage medium

A verification method and source address technology, applied in the Internet field, can solve problems such as large bandwidth impact, router discarding data packets, failure of inter-domain routing asymmetry scheme, etc., and achieve the effect of avoiding attacks and forgery problems

Active Publication Date: 2021-03-26
TSINGHUA UNIV
View PDF6 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem with this type of scheme is that additional tags need to be added to the data packets, which has a greater impact on autonomous domains with limited bandwidth
And the label is often placed in the extension header, and the router often discards the data packet that does not know the extension header
Routing-based schemes use routing information to build filtering rules, and then perform source address verification. Typical schemes include: RBF, IDPF, uRPF, SAVE, etc. The problem with this type of scheme is that the asymmetry of inter-domain routing will cause the scheme to fail

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Inter-domain source address verification method and device, electronic equipment and storage medium
  • Inter-domain source address verification method and device, electronic equipment and storage medium
  • Inter-domain source address verification method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the purpose, technical solutions and advantages of the application clearer, the application will be further described in detail below in conjunction with the accompanying drawings. All other embodiments obtained under the premise of creative labor belong to the scope of protection of this application.

[0059] In the following description, references to "some embodiments" describe a subset of all possible embodiments, but it is understood that "some embodiments" may be the same subset or a different subset of all possible embodiments, and Can be combined with each other without conflict.

[0060] If there is a similar description of "first\second\third" in the application documents, add the following explanation. In the following description, the term "first\second\third" is only to distinguish similar Objects do not represent a specific order for objects. It is understandable that "first\second\third" can be exchanged for a specific order or sequence ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an inter-domain source address verification method and device, a live broadcast server and a storage medium, and the inter-domain source address verification method comprises the steps: determining a first address prefix of a destination address of a first data packet under the condition that the first data packet transmitted by a host in a source AS is obtained, wherein thesource address of the first data packet comprises an interface identifier, and a first source AS identifier of the source AS is embedded into the interface identifier; determining a shared key between the source AS and a destination AS corresponding to the destination address based on the first address prefix; encrypting the interface identifier based on the shared key to obtain a second data packet; and sending the second data packet to the destination address, so that a boundary router of the destination AS verifies the source address based on the second data packet.

Description

technical field [0001] The present application relates to the technical field of the Internet, and in particular to a verification method, device, electronic device and storage medium of an inter-domain source address. Background technique [0002] IP address forgery is usually used for anonymous and reflective attacks, such as: Distributed Denial of Service (DDoS, Distributed Denial of Service), which is extremely destructive to the Internet and causes serious economic losses. The root cause is that the current Internet does not verify the source address of the data packet. Today, the accelerated deployment of IPv6 networks may aggravate the damage of DDoS attacks, and the number of IPv6-based DDoS attacks has gradually increased in recent years. Therefore, it is very important to design a method to prevent DDoS attacks for the IPv6 Internet. [0003] In order to prevent source address forgery, a Source Address Validation Architecture (SAVA, Source Address Validation Arch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/08
CPCH04L9/085H04L63/126H04L63/1458
Inventor 何林刘莹任罡杨家海
Owner TSINGHUA UNIV
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More