CN1564538A - Method for preventing IP address from forged based on rewritten address - Google Patents

Method for preventing IP address from forged based on rewritten address Download PDF

Info

Publication number
CN1564538A
CN1564538A CN 200410026055 CN200410026055A CN1564538A CN 1564538 A CN1564538 A CN 1564538A CN 200410026055 CN200410026055 CN 200410026055 CN 200410026055 A CN200410026055 A CN 200410026055A CN 1564538 A CN1564538 A CN 1564538A
Authority
CN
China
Prior art keywords
address
port
network access
access equipment
single computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200410026055
Other languages
Chinese (zh)
Other versions
CN100463429C (en
Inventor
李卫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xian Jiaotong University
Original Assignee
Xian Jiaotong University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xian Jiaotong University filed Critical Xian Jiaotong University
Priority to CNB2004100260556A priority Critical patent/CN100463429C/en
Publication of CN1564538A publication Critical patent/CN1564538A/en
Application granted granted Critical
Publication of CN100463429C publication Critical patent/CN100463429C/en
Anticipated expiration legal-status Critical
Expired - Fee Related legal-status Critical Current

Links

Images

Landscapes

  • Small-Scale Networks (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention is widely applicable to network access devices such as Ethernet exchange, router, dial server, DSL concentrator, especially, single computer connected to network access devices based on rewritten IP address. Network access device maintains a 'port-IP address corresponding table' for single computer no matter using dynamic IP address or static IP address. The invention prevents forged IP address.

Description

Based on the pseudo-making method in the anti-IP address of address rewrite
Technical field
The present invention relates to computer communication field, be widely used in the diverse network access device, as Ethernet switch, router, dialup server, DSL concentrator etc., particularly single computer directly is connected the pseudo-making method in the anti-IP address based on address rewrite of occasion with network access equipment.
Background technology
Forge the IP address is problem common in the network application, when Net-connected computer carries out based on the communication of ICP/IP protocol, can send the IP packet.Wherein, in the source address field, should fill in the IP address of distributing to oneself by network mechanism, revise but this address is easy to the person of being sent out.Many network attack persons can utilize this characteristic, carry out anonymous attack, as DoS (denial of service).
At present, prevent that the main method that forge the IP address from having two kinds:
A kind of is to utilize IPsec.AH agreement among the IPsec can produce verify data to IP packet header, is called ICV.The content that ICV calculates comprises the immovable field of transmission course intermediate value in the IP packet header (for the field that value changes, supposing during calculating that its value is 0), AH packet header (the authentication data field initial value is 0), upper-layer protocol data (supposing can not change in the transmission course) etc.
The algorithm that calculates the ICV use can be based on the message authentication code (MAC) of one-way Hash function and symmetric key algorithm, as HMAC-MD5-96, HMAC-SHA-1-96 etc., also can be based on the digital signature of one-way Hash function and public key algorithm.
Subject matter based on the IPsec method is to realize relatively difficulty, needs the support of extensive cipher key authority.This method prevents mainly that IP from wrapping in the transmission course and distorted, forges, but can't prevent that the IP address of user side from forging.
The another kind of method that adopts MAC Address, IP address binding.This method can be forged the IP address in the two-way communication certain containment effect, but can't prevent, because user side can be revised MAC Address, IP address simultaneously.Existing method also can't prevent the source IP address forgery of unidirectional (user side sends the IP packet).
Summary of the invention
The object of the present invention is to provide a kind of pseudo-making method of forging succinct, as can to prevent user side IP address in the anti-IP address based on address rewrite of operating.
Technical scheme of the present invention is to solve like this:
Network access equipment is when directly connecting single computer, no matter single computer adopts dynamic IP addressing or static ip address, network access equipment all can be safeguarded one " port-IP address correspondence table " simultaneously, and (IP address allocated is identical with the IP address field value of i item in " port-IP address correspondence table " on the single computer of 1≤i≤n) connected for port i.
Concrete treatment step is as follows:
1) if the port i of network access equipment (1≤i≤n) do not connect single computer, then the IP address field of i item is set to 0 in " port-IP address correspondence table ";
If (1≤i≤n) has connected single computer the port i of network access equipment, and the static ip address Xi that uses network management mechanism to distribute, then network management mechanism carries out manual configuration by control desk, network management protocol, Telnet mode to access device, static ip address Xi is set to simultaneously the IP address field of i item in " port-IP address correspondence table ";
If (1≤i≤n) has connected single computer the port i of network access equipment, and use dynamic IP addressing, network access equipment has obtained single computer behind the dynamic authentication of network management mechanism, address allocation information, the dynamic IP addressing that obtains is set to simultaneously the IP address field of i item in " port-IP address correspondence table ";
2) (after 1≤i≤n) received the IP packet, the IP address field value in the network access equipment inspection " port-IP address correspondence table " in the i item if value is 0, then abandoned the IP packet to network access equipment port i; If the IP address field value is not 0, then the IP address field value is write the source IP address field of IP packet, obtain by the IP packet of address rewrite, network access equipment is transmitted this IP packet.
Said " port-IP address correspondence table " is meant:
Port numbers The IP address
????1 ????X1
????2 ????X2
????… ????…
????n ????Xn
Adopt method of the present invention and step, because the access device address rewrite is enforceable, no matter whether source address is forged in the IP that computer the is sent out bag, access device all will write the IP address again, thereby forge the IP address that has effectively prevented user side.Because it is rewrite operation is very simple, therefore, also very little to the network performance influence.
Description of drawings
Fig. 1 is a flow chart of the present invention;
Fig. 2 is that access device is safeguarded " port-IP address correspondence table " among the present invention.
Embodiment
Accompanying drawing is specific embodiments of the invention;
Below in conjunction with accompanying drawing content of the present invention is described in further detail;
With reference to shown in Figure 1, the 1st, carry out the network management mechanism of address assignment.Network access equipment 2 can be Ethernet switch, dialup server, DSL concentrator etc., and the port numbers that is used to connect computer is 1~N.Single computer 3 directly is connected with network access equipment 2.IP packet 4 is IP bags that single computer 3 is sent.IP packet 5 is through the bag of the IP after access device 2 address rewrites.
Implementation procedure of the present invention is rewritten by source IP address field in address assignment, the IP bag to be formed.
1) if the port i of network access equipment 2 (1≤i≤n) do not connect single computer 3, then the IP address field of i item is set to 0 in " port-IP address correspondence table ";
If (1≤i≤n) has connected single computer 3 the port i of network access equipment 2, and the static ip address Xi that uses network management mechanism 1 to distribute, then network management mechanism 1 carries out manual configuration by control desk, network management protocol, Telnet mode to network access equipment 2, static ip address Xi is set to simultaneously the IP address field of i item in " port-IP address correspondence table ";
If (1≤i≤n) has connected single computer 3 the port i of network access equipment 2, and use dynamic IP addressing, network access equipment 2 has obtained single computer 3 behind the dynamic authentication of network management mechanism 1, address allocation information, the dynamic IP addressing that obtains is set to simultaneously the IP address field of i item in " port-IP address correspondence table ";
2) network access equipment 2 port i (after 1≤i≤n) receives IP packet 4, check the IP address field value of i item in " port-IP address correspondence table ", if value is 0, then abandon IP packet 4; If be not 0, then the IP address field value is write the source IP address field of IP packet 4.Obtain IP packet 5, network access equipment 2 is transmitted IP packet 5.
With reference to shown in Figure 2, safeguard one " port-IP address correspondence table " on the network access equipment 2, main field is the IP address in the table.

Claims (3)

1, the pseudo-making method in a kind of anti-IP address based on address rewrite, it is characterized in that, implementation procedure is rewritten and is formed by address assignment, IP bag source IP address, if network access equipment (2) port i, i.e. 1≤i≤n, when connecting single computer (3), single computer (3) is no matter adopt dynamic IP addressing or static ip address, network access equipment (2) all can be safeguarded one " port-IP address correspondence table " simultaneously, and it is identical with the IP address field value of " port-IP address correspondence table " i item to guarantee that single computer (3) goes up IP address allocated.
2, the pseudo-making method in the anti-IP address based on address rewrite according to claim 1 is characterized in that concrete treatment step is as follows:
1) address assignment:
If the port i of network access equipment (2), promptly 1≤i≤n does not connect single computer (3), and then the IP address field of i item is set to 0 in " port-IP address correspondence table ";
If the port i of network access equipment (2), i.e. 1≤i≤n, connected single computer (3), and the static ip address Xi that uses network management mechanism (1) to distribute, then network management mechanism (1) carries out manual configuration by control desk, network management protocol, Telnet mode to access device (2), static ip address Xi is set to simultaneously the IP address field of i item in " port-IP address correspondence table ";
If the port i of network access equipment (2), i.e. 1≤i≤n, connected single computer (3), and use dynamic IP addressing, network access equipment (2) has obtained single computer (3) behind the dynamic authentication of network management mechanism (1), address allocation information, the dynamic IP addressing that obtains is set to simultaneously the IP address field of i item in " port-IP address correspondence table ";
2) IP bag source IP address rewrites
Network access equipment (2) port i, i.e. 1≤i≤n, receive IP packet (4) after, network access equipment (2) is checked the IP address field value of i item in " port-IP address correspondence table ", if value is 0, then abandons IP packet (4); If the IP address field value is not 0, then the IP address field value is write the source IP address field of IP packet (4), obtain IP packet (5), network access equipment (2) is transmitted IP packet (5).
3, the pseudo-making method in the anti-IP address based on address rewrite according to claim 1 is characterized in that said " port-IP address correspondence table " is meant:
Port numbers The IP address ??1 ??X1 ??2 ??X2 ??… ??… ??n ??Xn
CNB2004100260556A 2004-04-19 2004-04-19 Method for preventing IP address from forged based on rewritten address Expired - Fee Related CN100463429C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2004100260556A CN100463429C (en) 2004-04-19 2004-04-19 Method for preventing IP address from forged based on rewritten address

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2004100260556A CN100463429C (en) 2004-04-19 2004-04-19 Method for preventing IP address from forged based on rewritten address

Publications (2)

Publication Number Publication Date
CN1564538A true CN1564538A (en) 2005-01-12
CN100463429C CN100463429C (en) 2009-02-18

Family

ID=34480560

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2004100260556A Expired - Fee Related CN100463429C (en) 2004-04-19 2004-04-19 Method for preventing IP address from forged based on rewritten address

Country Status (1)

Country Link
CN (1) CN100463429C (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102301653A (en) * 2009-01-28 2011-12-28 三菱电机株式会社 IP address delivery device and IP address delivery method
CN103179221A (en) * 2011-12-21 2013-06-26 英业达股份有限公司 Servo system and method for setting address of distribution unit
US10341332B2 (en) 2016-07-26 2019-07-02 International Business Machines Corporation System and method for providing persistent user identification

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5757924A (en) * 1995-09-18 1998-05-26 Digital Secured Networks Techolognies, Inc. Network security device which performs MAC address translation without affecting the IP address
KR100277061B1 (en) * 1998-11-04 2001-01-15 윤종용 Short message compression device of mobile communication terminal and corresponding short message transmission method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102301653A (en) * 2009-01-28 2011-12-28 三菱电机株式会社 IP address delivery device and IP address delivery method
US8755307B2 (en) 2009-01-28 2014-06-17 Mitsubishi Electric Corporation IP-address distribution device and IP-address distribution method
CN102301653B (en) * 2009-01-28 2015-10-21 三菱电机株式会社 IP address distribution device and IP address distribution method
CN103179221A (en) * 2011-12-21 2013-06-26 英业达股份有限公司 Servo system and method for setting address of distribution unit
US10341332B2 (en) 2016-07-26 2019-07-02 International Business Machines Corporation System and method for providing persistent user identification
US11032268B2 (en) 2016-07-26 2021-06-08 International Business Machines Corporation System and method for providing persistent user identification

Also Published As

Publication number Publication date
CN100463429C (en) 2009-02-18

Similar Documents

Publication Publication Date Title
Rigney et al. Remote authentication dial in user service (RADIUS)
EP1943802B1 (en) Method for protecting against denial of service attacks
US20030126252A1 (en) Method and apparatus for dynamic client-side load balancing system
US8800032B2 (en) System and method for secure distributed execution
CN1177439C (en) Method of acting address analytic protocol Ethernet Switch in application
CN1414746A (en) Method of providing internal service apparatus in network for saving IP address
US20070199062A1 (en) Apparatus and method for performing dynamic security in internet protocol (IP) system
CN102984031B (en) Method and device for allowing encoding equipment to be safely accessed to monitoring and control network
US20040059944A1 (en) System and method for repelling attack data streams on network nodes in a communications network
CN1968087A (en) Subscriber authentication realizing method in broadband access network
CN1152517C (en) Method of guarding network attack
CN1496642A (en) Firewall with index to access rule
CN100403742C (en) A method of safety authentication between media gateway and media gateway controller
CN1564538A (en) Method for preventing IP address from forged based on rewritten address
CN1225864C (en) Safety management method of network comprehensive switch on equipment
WO2003038621A1 (en) Reverse firewall packet transmission control system
CN1640094A (en) System and method for management of passive network devices usingconvert connections
CN101364877B (en) Security policy configuring method and apparatus thereof
CN105357332B (en) A kind of method for network address translation and device
CN1859384A (en) Method for controlling user's message passing through network isolation device
CN106454823A (en) Authentication method for network security access and authentication system for implementing method
CN1505345A (en) A method for accessing user forced access identification server
CN101827079A (en) Blocking and attacking-resistant terminal connection building method and terminal access authenticating system
CN103491096A (en) Anti-attack IPv6 fragmentation message reassembling method and device
CN1630256A (en) A realizing method for preventing IP address embezzlement during connection to Internet

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20090218

Termination date: 20120419