Method for preventing IP address from forged based on rewritten address

An IP address and address technology, which is applied in the field of computer communication, can solve problems such as inability to prevent, and achieve the effects of preventing forgery, small impact on network performance, and simple rewriting operation

Inactive Publication Date: 2005-01-12
XI AN JIAOTONG UNIV
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method can deter IP address forgery in two-way communication to a certain extent, but it cannot be prevented, because the client can modify the MAC address and IP address at the same time.
Existing methods cannot prevent source IP address forgery of one-way (the client sends out IP packets)

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing IP address from forged based on rewritten address
  • Method for preventing IP address from forged based on rewritten address

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] Accompanying drawing is the specific embodiment of the present invention;

[0021] Below in conjunction with accompanying drawing, content of the present invention is described in further detail;

[0022] Referring to Fig. 1, 1 is a network management organization for address allocation. The network access device 2 can be an Ethernet switch, a dial-up server, a DSL concentrator, etc., and the port numbers for connecting computers are 1-N. A single computer 3 is directly connected to the network access device 2 . The IP data packet 4 is an IP packet sent by a single computer 3 . The IP data packet 5 is an IP packet after the address of the access device 2 is rewritten.

[0023] The realization process of the present invention is composed of address allocation and source IP address field rewriting in IP packets.

[0024] 1) If the port i (1≤i≤n) of the network access device 2 is not connected to a single computer 3, then the IP address field of item i in the "Port-IP ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is widely applicable to network access devices such as Ethernet exchange, router, dial server, DSL concentrator, especially, single computer connected to network access devices based on rewritten IP address. Network access device maintains a 'port-IP address corresponding table' for single computer no matter using dynamic IP address or static IP address. The invention prevents forged IP address.

Description

technical field [0001] The present invention relates to the field of computer communication, and is widely used in various network access devices, such as Ethernet switches, routers, dial-up servers, DSL concentrators, etc. Write anti-IP address forgery method. Background technique [0002] IP address forgery is a common problem in network applications. When a networked computer communicates based on the TCP / IP protocol, it will send out IP data packets. Among them, in the source address field, the IP address allocated by the network organization should be filled in, but this address can be easily modified by the sender. Many network attackers will take advantage of this feature to carry out anonymous attacks, such as DoS (Denial of Service). [0003] Currently, there are two main methods to prevent IP address forgery: [0004] One is to utilize IPsec. The AH protocol in IPsec can generate authentication data for the IP packet header, which is called ICV. The content of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/24H04L12/28
Inventor 李卫
Owner XI AN JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products