Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

91 results about "ARP spoofing" patented technology

In computer networking, ARP spoofing, ARP cache poisoning, or ARP poison routing, is a technique by which an attacker sends (spoofed) Address Resolution Protocol (ARP) messages onto a local area network. Generally, the aim is to associate the attacker's MAC address with the IP address of another host, such as the default gateway, causing any traffic meant for that IP address to be sent to the attacker instead.

Processing method, access device and communication system for address resolution protocol

The invention discloses a method for handling an address resolution protocol (ARP) packet, and access equipment and a communication system thereof. The method comprises the following steps: access equipment receives an ARP packet through a lower interface, which carries an active Internet protocol (IP) address, a source media access control (MAC) address, a destination IP address and a destination MAC address; the access equipment judges whether the source IP address is the same as the IP address of gateway equipment configured on the lower interface, and the upper interface of the access equipment is connected with the gateway equipment; if the source IP address is the same as the IP address of gateway equipment, the access equipment discards the ARP packet; and if the source IP address is different from the IP address of gateway equipment, the access equipment forwards the ARP packet according to the destination IP address in the ARP packet. The embodiment of the invention can prevent the ARP packet which is deceived by an illegal host and passes through the gateway equipment of not performing ARP spoofing with respect to the gateway equipment, without imposing heavier load upon the gateway equipment.
Owner:BEIJING XINWANG RUIJIE NETWORK TECH CO LTD

High-coverage intranet honeypot system

InactiveCN109768993AIncrease the chance of being attackedAvoid occupyingTransmissionIp addressARP spoofing
The invention discloses a high-coverage intranet honeypot system. The honeypot system comprises an agent node comprising an attack drainage module; a first network card, a second network card and a proxy forwarding module, the attack drainage module is used for passing ARP spoofing; guiding a local area network access request of which a destination address is an idle IP address in a network segment where the local area network is located to the agent node, the IP address of the first network card and the IP address of the honeypot are in the same network segment; the first network card is usedfor communicating with a honeypot node; the IP address of the second network card and the IP address of the protected device in the local area network are in the same network segment. The second network card is used for communicating with equipment in the local area network, and the agent forwarding module is used for sending the local area network access request guided to the agent node to the honeypot node and sending attack response information returned by the honeypot node to an initiator IP address of the local area network access request. Through the technical scheme provided by the invention, the IP address coverage rate of the honeypot in the honeypot system is improved while the IP address occupation of the honeypot is reduced.
Owner:中国人民解放军32082部队

A synchronous detection and failure separation method for dual control high-availability system

The invention provides a method of synchronous detection and failure isolation for a double control highly available system. The system is provided with two controllers which use special channels integrated on a PCI mainboard, serial ports or network card cables to monitor the HADaemon process of the counterpart. When a failure appears, a primary controller and a secondary controller conduct the following control steps of: 1), the primary controller releases virtual IPs of a server and the secondary controller takes over the IPs through ARP deception; 2), the resources of the main controller are hung and send state information to the primary controller, and a related service is started to realize seamless switching; 3), during the taking over of IP and the switching of servers, an alarm is given in an email log; 4), the primary controller after restoration choose takeover service or no takeover as a backup of synchronous detection; 5), in order to improve the availability of heartbeat transmission, network cards and serial ports are used together to avoid single point failure of a link; 6), a failure occuring in a network for external services of the primary controller can also be detected by the HADaemon which then triggers the primary controller to take over the virtual IP and switch the resources.
Owner:LANGCHAO ELECTRONIC INFORMATION IND CO LTD

Method and system for preventing address resolution protocol (ARP) gateway spoofing

InactiveCN102546658ASolve the problem of ARP spoofingRelieve CPU pressureData switching networksAddress Resolution ProtocolAddress resolution
The invention discloses a method and a system for preventing address resolution protocol (ARP) gateway spoofing. The method comprises the following steps that: a convergence-layer switch stores a mapping relationship between the Internet protocol (IP) address and media access control (MAC) address of each layer-three interface, and transmits the mapping relationship to an access-layer switch; the access-layer switch stores the mapping relationship in a mapping table, and enables an ARP monitoring function; and the access-layer switch receives an ARP message, discards the ARP message when the IP address of an ARP message transmission or receiving party is an IP address in the mapping table and the MAC address of the ARP message transmission or receiving party is inconsistent with a corresponding MAC address in the mapping table, and forwards the ARP message when the IP address of the ARP message transmission or receiving party is not the IP address in the mapping table. By the method and the system, the problem of ARP IP gateway spoofing in a network is solved; and the ARP monitoring function is devolved to the access-layer switch, so that the pressure of a central processing unit (CPU) of the convergence-layer switch is greatly alleviated.
Owner:北京神州数码云科信息技术有限公司

Automatic locating and isolating method of internal attack source of local area network

The embodiment of the invention discloses an automatic locating and isolating method of an internal attack source of a local area network. The method comprises the following steps: automatically collecting data of a network device, and storing the data in a database, inquiring an MAC address of the network device according to an IP address of the attack source, detecting ARP fraud counterfeiting the host and matching the timestamps of different IP-MAC items to automatically process the situation that one IP address corresponds to a plurality of MAC addresses, locating a switch port according to the MAC address, and filtering a cascade port of the switch and matching the timestamps of different MAC-switch port items to automatically process the situation that one MAC address corresponds to a plurality of switch ports, and operating the switch to isolate the attack source. The automatic locating and isolating method can be applicable to all kinds of network environments without any manual operation, the larger the network scale is, the more obvious the effect of the automatic locating and isolating method is, by adoption of the automatic locating and isolating method, the processing time of a network security event can be shortened, the working efficiency of a network administrator is improved, and the network security of the local area network is ensured.
Owner:SHANTOU UNIV

ARP (Address Resolution Protocol) auxiliary model based on SDN (Software Defined Network)

InactiveCN106506200AReduce or even eliminate broadcastingFlexible controlData switching networksAddress Resolution ProtocolTraffic capacity
The invention discloses an ARP (Address Resolution Protocol) auxiliary model based on an SDN (Software Defined Network). The ARP auxiliary model comprises an ARP datagram filtering module, an ARP request datagram processing module, an ARP response message sending module, an ARP traffic statistics and analysis module and an IP-MAC (Internet Protocol-Media Access Control) mapping table management and configuration module, wherein the ARP datagram filtering module is used for performing format correctness detection on an ARP message reported by a switch; the ARP request datagram processing module is used for answering an ARP request message; the ARP response message sending module is used for constructing and sending an ARP response datagram of a non-empty query result; the ARP traffic statistics and analysis module is used for receiving various ARP message event records and switch port information transmitted by the ARP datagram filtering module and the ARP request processing module; and the IP-MAC mapping table management and configuration module is used for providing management and configuration interfaces of an IP-MAC mapping table. When the ARP auxiliary model is applied to the SDN, ARP broadcast can be effectively isolated; ARP spoofing is prevented; an executor of the ARP spoofing is traced; and global IP-MAC information is managed and maintained.
Owner:COMP APPL RES INST CHINA ACAD OF ENG PHYSICS

Distributed detection method and system for ARP (Address Resolution Protocol) cheating

ActiveCN104901953ANo signaling burden addedDetection Efficient DynamicsTransmissionAddress Resolution ProtocolNetwork packet
The invention discloses a distributed detection method and system for ARP (Address Resolution Protocol) cheating. The method comprises: monitoring the quantity of first data packets requested and answered for communication between a first terminal and a second terminal and including IP addresses of the first terminal and the second terminal, and the quantity of second data packets for communication between a first MAC (Multimedia Access Control) address corresponding to the first terminal and a second MAC address corresponding to the second terminal in a preset time period; judging whether the first data packets for communication between the first terminal and the second terminal have abnormal communication data packets to be verified according to the quantity of the first data packets and the quantity of the second data packets; and when the first data packets have the abnormal communication data packets to be verified, sending the abnormal communication data packets to be verified to the first terminal corresponding to the first MAC address, so that the first terminal verifies the abnormal communication data packets to be verified. The method and the system can be used for detecting ARP cheating behaviors in real time, and have high detection accuracy and high detection efficiency.
Owner:INST OF INFORMATION ENG CAS

Method of automatically detecting host-passing-off ARP spoofing

The embodiment of the invention discloses a method of automatically detecting host-passing-off ARP (Address Resolution Protocol) spoofing. The method of automatically detecting host-passing-off ARP spoofing includes a data acquisition method and an ARP spoofing detection method, wherein a data acquisition program uses an SNMP (Simple Network Management Protocol) to automatically obtain an ARP table of three-layer equipment on time and saving the ARP table in a database; the ARP spoofing detection method includes an initial screening stage and an analysis determination stage and includes the following steps: initially screening and obtaining the record that the number of different IP (Internet Protocol) addresses corresponding to one MAC (Media Access Control) address in the database is greater than one threshold; performing analysis and determination on each MAC address of the initial screening result; and through a white list, analysis of the value of ipNetToMediatype, analysis of the distribution range and the tense change rule of IP addresses, and other technical means, eliminating the special situations that the address is the own MAC address of a router and other network devices and a plurality of virtual machines are running on one computer, determining that the address is the ARP spoofing.
Owner:SHANTOU UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products