Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

45 results about "Martian packet" patented technology

A Martian packet is an IP packet seen on the public Internet that contains a source or destination address that is reserved for special-use by Internet Assigned Numbers Authority (IANA). On the public Internet, such a packet either has a spoofed source address, and it cannot actually originate as claimed, or the packet cannot be delivered. The requirement to do this is found in RFC 1812, Section 5.2.3 (Local Delivery Decision).

Saturation attack defending method, device and system of buffer queue in outlet gateway

The invention discloses a saturation attack defending method, device and system of a buffer queue in an outlet gateway, and belongs to the field of network safety. The method comprises the steps of receiving a data packet transmitted by a terminal; when flow table items in a data packet static flow table and a dynamic flow table are unmatched, transmitting the data packet to a central controller; and forwarding the data packet based on a flow table item fed back by the central controller. According to the saturation attack defending method, device and system of the buffer queue in the outlet gateway, the problem that buffer queue overflow is resulted easily to enable the whole SDN (Software Defined Network) to be supersaturated when a malicious user transmits a large number of data packets having different destinations and carrying with relatively great loads is solved, and the effect of avoiding buffer queue overflow due to that the outlet gateway suddenly receives a large number of data packets having different destinations when a mobile network suffers from network attack of an illegal terminal is realized as frequently-used data packets are directly matched in the outlet gateway rather than being added into the buffer queue to be transmitted to the central controller.
Owner:BEIJING JIAOTONG UNIV

Node privacy protection method based on directional random routing in wireless sensor network

The invention relates to a node privacy protection method based on directional random routing in a wireless sensor network. The method comprises the following six steps: establishment of grids, establishment of rings, determination of the grid, where a node locates, in the network, determination of the ring, where the node locates, in the network, routing of a real data packet and routing of confusion data packets. The confusion data packets are introduced to each direction of the network to prevent direction attack of an attacker, and network traffic is equalized; ring-based routing is introduced at the start position of a data packet to prolong the safety period of the network; through a time-domain confusion mechanism, the attacker cannot continue tracing after tracing back to the last node; and the directional routing policy of the real data packet increases diversity of the routing, and improves attack difficulty of the attacker. The node privacy protection method based on the directional random routing in the wireless sensor network can protect a source node and a base station node simultaneously through the design of grid and ring based routing, is suitable for the case of mobile source nodes and multisource nodes, and has good expansibility.
Owner:HOHAI UNIV CHANGZHOU

Wireless sensor network security data discovery and dissemination method based on Hash tree

The invention discloses a wireless sensor network security data discovery and dissemination method based on a Hash tree. The method comprises the following steps that: (1) in the initialization phase of a system, a base station constructs an elliptic curve cryptosystem and generates a public key, a private key as well as public parameters; (2) the base station constructs data packets aiming at small data needing distribution, carries out digital signature on the data packets, and then sends the data packets to all sensor nodes of a network; and (3) after the data packets are received by all the sensor nodes, the sensor nodes judge whether the received data packets are legal data packets or not, receive the data packets and update if the received data packets are legal, and directly give up the data packets if the received data packets are illegal. According to the method, the condition that sensor node resources are limited is taken into account, and the security is guaranteed on the basis that the efficiency of a data discovery and dissemination process is guaranteed. The method has the advantages that the node compromise is resisted, the robustness for packet loss and packet transmission disorder is high, no time synchronization between the base station and the sensor nodes exists, and the like.
Owner:SOUTH CHINA UNIV OF TECH

Communication method avoiding p2p traffic identification

The invention discloses a communication method avoiding p2p traffic identification. The method comprises the following steps: S20: serializing information to be sent; S40: splitting the serialized information into a plurality of data packets with random lengths; S60: adding random data with preset lengths at the heads and/or tails of the data packets; and S80: sending the plurality of data packets in a random sequence through a dynamic network port. According to the communication method disclosed by the invention, the means of serializing the information to binary, splitting the data, randomly setting the lengths of the data packets, filling random data in important identification areas, sending the data packets in the random sequence and sending the data packets through the dynamic port and the like are integrated to effectively avoid the identification of the existing p2p traffic identification means and realize speed limitation or interception, and no single module needs to be set to establish an additional communication channel; such means as encrypting the data packets and adding random disturbing data packets and the like are further integrated to reduce the identification rate; and the instruction and the data are divided into double-channel communication to further reduce the identification rate.
Owner:北京广密华安科技有限公司

Network session traffic alignment method based on address translation

InactiveCN110365807AAvoid alignment problemsThe method is efficient and fastTransmissionTraffic capacityServer allocation
The invention provides a network session traffic alignment method based on address translation. The network session traffic alignment method comprises the specific steps: distributing a correspondingavailable address pool for each flow processing server, wherein the address pool comprises a group of available IP addresses; when the traffic server acquires an uplink data packet, selecting an IP address from a corresponding address pool to replace a source IP address in the data packet, then extracting a quintuple of the uplink data packet, and storing the quintuple into a session mapping table; when the target receives the uplink data packet, generating a downlink data packet, and when the downlink data packet passes through another traffic server, sending the downlink data packet to a traffic processing server corresponding to the uplink; and obtaining the quintuple of the data packet after the traffic server receives the downlink data packet, completing alignment when determining that the data packet is the same session data packet after comparing the quintuple with the stored session mapping table, and otherwise, re-injecting the data packet into the network. According to the invention, the function that a specific point only uses a specific IP address is realized, and the scene that bidirectional flow needs to be processed in related applications such as network auditing and network security is satisfied, and the network session traffic alignment method is fast and efficient.
Owner:BEIJING UNIV OF POSTS & TELECOMM

A method for securely transmitting data packets sent by sensors to base stations in the Internet of Things

The invention discloses a transmission method for safely transmitting a data packet sent out by a sensor to a base station in an internet of things. The transmission method comprises the steps of: calculating out an optimal alterable included angle theta via a remaining time delay TZ of the current sending data packet in the internet of things; in a [-theta / 2, theta / 2] sector area with a connecting line between a current sender node and the base station as a reference, broadcasting a request sending packet to all neighboring nodes along a base station direction, waiting for a backoff time after the neighboring nodes receive the request sending packet and then replying a response packet; checking whether a distance between the current sender node and the base station is within a communication radius r2 of the current sender node, and if yes, directly sending the sending data packet to the base station, thereby finishing a data transmission task; if no, randomly selecting one neighboring node which replies the response packet in the [-theta / 2, theta / 2] sector area of the current sender node as a relay node, and sending the data packet to the relay node; replying a confirmation packet correspondingly after the relay node receives the data packet and then taking the relay node as the current sender node to repeat above process till the data packet is transmitted to the base station.
Owner:UNIV OF SHANGHAI FOR SCI & TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products