Unlock instant, AI-driven research and patent intelligence for your innovation.

Message transmission method and related device

A message transmission and message technology, applied in transmission systems, digital transmission systems, secure communication devices, etc., can solve the problem that legitimate user host messages cannot complete the session establishment process, the flow of attack messages is large, and attack message crowding, etc. question

Pending Publication Date: 2022-04-19
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, when a large number of attack packets without session establishment sent by illegal user hosts appear in the host-CAR area of ​​the packets without session establishment, the access gateway device hashes the packets without session establishment according to a fixed hash algorithm, The legitimate user hosts that hash the attack packets of the illegal user hosts in the same CAR channel are fixed. The traffic of the attack packets of the illegal user hosts is very large, and the packets of the legitimate user hosts with small traffic will be blocked by the CAR channel. Rate-limited discarding, which will cause all unestablished packets sent by legitimate user hosts in the same CAR channel as the attack packets of illegal user hosts to be crowded by attack packets, and all unestablished packets sent by legitimate user hosts Session packets cannot complete the session establishment process

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message transmission method and related device
  • Message transmission method and related device
  • Message transmission method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0047] The embodiment of the present application provides a message transmission method, which can make the message sent by the legitimate user host without establishing a session be hashed in different CAR channels, and when there are no or few attack messages sent by the illegal user host In the CAR channel, packets sent by legitimate user hosts that have not established a session can be sent to the CPU to complete the process of establishing a session.

[0048] The host committed access rate (host-CAR) rate limiting technology is an anti-attack technology. By limiting the flow of CPU packets sent by the user host, the impact of the attack on the user host is limited to a small range. The packets sent to the CPU include packets with established sessions and packets without sessions established. The host-CAR rate limiting technology divides packets with established sessions and packets without sessions into different host-CAR areas. The message transmission method provided by...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a message transmission method and access gateway equipment. The embodiment of the invention can be applied to a system architecture in which a control plane and a forwarding plane are separated, and specifically can be realized on access gateway equipment, and the method comprises the following steps: the access gateway equipment determines a CAR channel corresponding to a message according to user host feature information and a changed salt value or a feature sequence obtained by randomly sorting bits of the user host feature information, in this way, messages sent by the same user host in different time periods can enter different CAR channels to be transmitted, and therefore legal user hosts can avoid attacks of illegal user hosts to complete the session establishment process.

Description

technical field [0001] The embodiments of the present application relate to the technical field of network interconnection protocols, and in particular, to a message transmission method and related devices. Background technique [0002] The access gateway (AG) generally adopts a system architecture in which the control plane and the forwarding plane are separated. Among them, the central processing unit (CPU) of the control plane is weak in processing packets. Once a network attack occurs, It will cause the CPU to be busy and cause the entire network to be unstable. Generally, when packets are sent from the forwarding plane to the control plane, a committed access rate (CAR) rate-limiting strategy is adopted to ensure that the flow of packets sent to the CPU is within the processing capability of the CPU. [0003] The host committed access rate (host-CAR) rate limiting technology is an anti-attack technology. By limiting the flow of CPU packets sent by the user host, the im...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L67/141H04L9/40
CPCH04L67/141H04L63/1441
Inventor 李娟何智峰
Owner HUAWEI TECH CO LTD