Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Message safety protection method based on boundary gateway protocol message

A border gateway protocol and security protection technology, applied in data exchange details, user identity/authority verification, data collection prevention, etc., can solve problems such as routing black holes, damage, and hidden dangers of data bureau message transmission mechanism, and achieve The effect of protecting safety

Inactive Publication Date: 2005-10-12
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For example, obtain routing information based on BGP packets, and destroy based on the routing information; when obtaining BGP information, change the routing information and put it back into the TCP data transmission stream. If a wrong route is replayed, it will cause routing black holes and increase The traffic of a certain router will attack the router until it restarts or crashes
Therefore, there are potential security risks in the existing transmission mechanism of data bureau packets based on the BGP protocol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message safety protection method based on boundary gateway protocol message
  • Message safety protection method based on boundary gateway protocol message
  • Message safety protection method based on boundary gateway protocol message

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The realization of the present invention is that when establishing a BGP connection, both sides of the sending end and the receiving end of the BGP message exchange verification words through the OPEN message, so that after the ability negotiation to the message verification, the first 16 bits of the message header based on the BGP protocol are changed. Byte mark field, that is, use the BGP message header mark field to dynamically verify the message, so as to realize the protection of the entire BGP message, and thus protect the BGP connection. Although the illegal person can intercept the BGP message from the TCP message flow, but because the header of the BGP is not known, the message has no way to synchronize, so the specific content of the BGP message cannot be obtained.

[0019] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0020] figure 1 It is an embodiment flowchart of the method of the present ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses a message safety protection method based on boundary gateway protocol message control. The method includes the following steps: implementing consulation process of verification mechanism and verification word of message receiving end and between message receiving ends, creating GPS connection, defining mark domain with front 16 bytes in message header, sending BGP message, receiving message and making verification. It can effectively protect contents of BGP message and safety of network.

Description

technical field [0001] The invention relates to a security protection method for messages in a network system. Background technique [0002] Data security in the Internet (Internet) is an important research topic. For the core protocol of the Internet - Border Gateway Protocol (BGP, Border Gateway Protocol), since a large number of routes are transmitted between domains, the security of routes is guaranteed. Security and security of the BGP connection becomes an important issue. Specifically, it is to prevent tampering after the BGP message is intercepted, so as to realize the protection of the BGP connection. According to the BGP protocol, the existing BGP message is composed of 16-byte all-ones plus BGP specific message content, so if the transmission control protocol (TCP protocol) connection is intercepted, according to the 16-byte all-1 message header , as long as the field of all 1s is analyzed, the content of the BGP message can be easily obtained. In this way, not ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L12/22
Inventor 胡春哲倪辉邓秋林
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products