Bandwidth limitation detection method and device and storage medium
A bandwidth limitation and detection method technology, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as network bandwidth limitations, difficulty in responding to normal service requests, and inability to update maintenance table items
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0038] Such as figure 1 As shown, the detection method of bandwidth limitation includes:
[0039] Every 10s, send PING packets to all IPs in the network, record the IP and Ethernet source MAC in the received ICMP packets, and generate an IP-MAC list;
[0040] Send ARP requests to all IPs in the network, and count the number of ARP response packets received within 5 seconds after the policy takes effect and the ARP request is sent;
[0041] Every 10s, the number of received ARP packets is reset, and before each reset, if the number of ARP reply packets is greater than a preset threshold, it is determined that the bandwidth is limited.
[0042] The IP-MAC list is also obtained by periodically reporting IP and MAC information from hosts in the network.
[0043] The preset threshold may be a predicted value based on historical records of the number of ARP reply packets under normal conditions. For example, count the number of response packets received within 5 seconds after eac...
Embodiment 2
[0046]A method for identifying the source of an attack in the embodiment may have the following misjudgment: when the controlled host accesses the LAN, in order to obtain the MAC addresses of other hosts, it may frequently use and send ARP request messages, and there is a detected The ARP message received during bandwidth limitation is not the possibility of attack message. At this time, it is not accurate enough to find the attack source according to the Ethernet source MAC in the received message. Based on the method, another method to identify the attack source is proposed:
[0047] For each ARP response message received, according to the source IP of the message, it is searched whether there is a statistical record of the corresponding relationship between the source IP and the source MAC in the message number information list.
[0048] If there is a record, then add up the number of packets of the IP; if there is no record, then add the source IP and source MAC of this pa...
Embodiment 3
[0052] The present invention also provides a bandwidth limit detection device, including:
[0053] The message sending module is used to send PING packets and ARP requests to IP in the network;
[0054] The message receiving module receives and parses the returned ICMP packets and ARP response packets;
[0055] The IP-MAC information processing module records the IP-MAC information to generate an IP-MAC list, and counts the number of ARP response messages;
[0056] The bandwidth limit judging module periodically resets the number of ARP response packets, and before each reset, if the number of ARP response packets is greater than a preset threshold, it is determined that the bandwidth limit is imposed.
[0057] As a preferred embodiment, the above-mentioned bandwidth limit detection device also includes an attack source identification module, when it is judged that the bandwidth limit is imposed, according to the Ethernet source MAC in the newly received message, the IP-MAC l...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


