CN102394786A - Hand-held network protocol and threat analyzer - Google Patents

Hand-held network protocol and threat analyzer Download PDF

Info

Publication number
CN102394786A
CN102394786A CN2011104162054A CN201110416205A CN102394786A CN 102394786 A CN102394786 A CN 102394786A CN 2011104162054 A CN2011104162054 A CN 2011104162054A CN 201110416205 A CN201110416205 A CN 201110416205A CN 102394786 A CN102394786 A CN 102394786A
Authority
CN
China
Prior art keywords
packet
network
module
hand
analyzer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2011104162054A
Other languages
Chinese (zh)
Inventor
张永隽
桂习伟
陈艳文
高振鹰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Iron and Steel Group Corp
Original Assignee
Wuhan Iron and Steel Group Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Iron and Steel Group Corp filed Critical Wuhan Iron and Steel Group Corp
Priority to CN2011104162054A priority Critical patent/CN102394786A/en
Publication of CN102394786A publication Critical patent/CN102394786A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses a hand-held network protocol and threat analyzer. The analyzer is characterized in that: the analyzer comprises: a box body, a display screen, a small keyboard, a port, a power supply and a mainboard; the display screen, the small keyboard, the port, the power supply and the mainboard are installed relied on the box body; the port is used to connect with an Ethernet to be checked; the display screen is used to display input data and detected result information; the small keyboard is used for manually inputting various kinds of the data; the mainboard comprises: a system module, a data packet capture module and an information analysis module. The invention provides a hand-held network analyzer for a network administrator. The analyzer can analyze rapidly the data packet of the network, the used protocol and flow used by each machine and can monitor APR attack information. By using the analyzer, network maintenance time expenditure can be saved. Costs are low and lots of the analyzer can be developed.

Description

A kind of hand-hold type procotol and threat analysis appearance
Technical field
The present invention relates in Ethernet, detect the packet information in the network, the location technology of the analysis of agreement and ARP attack source.
Background technology
Current information technology is widely used, and various demands of applications are to the dependence of information network simultaneously, and real-time requires increasingly high.So to the robustness of network, real-time, fail safe is also increasingly high.Employed network application is numerous in each local area network (LAN) at present, and Cyberthreat also day by day increases.The network equipment of present various LANs is made up of the different classes of router of various models, switch and hub basically.And this kind equipment only can provide the simple network information at present.To the analysis of agreement, the monitoring of network traffics is also simple inadequately and directly perceived, and does not provide the information (attacking like the ARP in the network) of some necessary Cyberthreats.And present network manager lacks the procotol in a kind of ability extensive analysis Ethernet, network traffics, the instrument of Cyberthreat.Particularly in case of emergency, if adopt traditional mode of inquiry log from switch or router to come phase-split network information then need the labor time, and the result who obtains is not directly perceived.And because the various network keeper to the difference of the understanding and recoganization of the network information, may obtain wrong answer.This product is exactly for the network manager variety of protocol in a kind of timely phase-split network, the instrument of network traffics and Cyberthreat to be provided.
Summary of the invention
Technical problem to be solved by this invention is for the network manager provides a kind of procotol and threat analysis instrument, so as employed procotol in network manager's understanding in time and the analysis local area network (LAN), the situation of flow and Cyberthreat.
For solving the problems of the technologies described above, the present invention provides a kind of procotol and threat analysis appearance of hand-hold type, it is characterized in that, comprises box body, display screen, miniature keyboard, network interface, power supply, mainboard;
Said display screen, miniature keyboard, network interface, power supply and mainboard rely on said box body to install,
Said network interface is used for being connected with the Ethernet that will check; Said display screen is used to show the input data and shows the object information that detects; Said miniature keyboard is used for the various data of artificial input, and said mainboard comprises system module, packet packet capturing module and information analysis module;
Said system module is used for installing operating system, for packet packet capturing module and information analysis module provide basic-level support;
Said packet packet capturing module is used for collection network bag from the network;
Said information analysis module is used for said collection network bag is unpacked analysis, and the analysis result of customization is shown on the said display screen.
Said information analysis module unpacks the analysis content to said collection network bag and comprises: the source MAC of each packet, target MAC (Media Access Control) address, source IP address, purpose IP address, institute's use agreement and packet size.
The analysis result of said customization comprises:
Arrangement according to source IP address counts the IP address list of data packet number greater than certain threshold value;
Arrangement according to source MAC counts the MAC Address tabulation of data packet number greater than certain threshold value;
Press variety of protocol classifiction statistics bag, and from how to arrange to few;
Add up all IP and the corresponding relation of MAC Address.
The analysis result of said customization also comprises: statistics has the IP and the MAC Address of multiple corresponding relation, and wherein classifies the quantity of sending the ARP protocol package as illegal ARP information greater than the IP or the MAC Address of certain threshold value.
The operating system of said system module is linux operating system.
Said packet packet capturing module is a tcpdump packet packet capturing module.
Beneficial effect:
The present invention can provide the network manager a kind of hand-hold type network analyzer, and the enough rapid analyses of this analyzer go out output packet, institute's use agreement and every flow that machine uses, and monitoring APR attacks information.The present invention saves the spending of network operation time, and is with low cost, convenient deployment in a large number.
Description of drawings
Below in conjunction with accompanying drawing and embodiment technical scheme of the present invention is further specified.
Fig. 1 is a surface structure sketch map of the present invention.
Fig. 2 is the work sketch map of mainboard of the present invention.
Fig. 3 is workflow states figure of the present invention.
Embodiment
As shown in Figure 1, the procotol of hand-hold type of the present invention and threat analysis appearance, the visible box body 1 of outward appearance, display screen 3, miniature keyboard 4, RJ45 network interface 2, power supply, mainboard are installed in the box body; RJ45 network interface 2 is connected with the Ethernet that will check, and display screen 2 shows input data and the object information that shows detection, and miniature keyboard 3 is used for the various data of artificial input, and power supply adopts rechargeable cell.
As shown in Figure 2, mainboard 11 comprises system module 5, packet packet capturing module 6 and information analysis module 7.Linux operating system is installed, for packet packet capturing module 6 and information analysis module 7 provide basic-level support on the system module 5; Packet packet capturing module 6 connects switches 8 through netting twine 10, collection network bag from the network, and switch 8 connects routers 9 through netting twine 10.7 pairs of collection network bags of information analysis module unpack analysis.
The mode of operation of packet packet capturing module 6 is divided into main frame type analysis pattern and two kinds of patterns of network-type analytical model.
1. main frame type analysis pattern
Main frame type analysis pattern is selected in hand-hold type analyzer start back, and imports IP available address in this local area network (LAN), couples together through the RJ45 mouth of twisted-pair feeder handheld formula analyzer and switch in the network that will check then.At this moment the packet in the network that is obtained is collected and analyzed to the hand-hold type analyzer through being modeled to a main frame.
2. network-type analytical model
The network-type analytical model is selected in hand-hold type analyzer start back, and imports IP available address in this local area network (LAN), couples together through the RJ45 mouth of twisted-pair feeder handheld formula analyzer and switch in the network that will check then.The port of needs inspections, be generally the exchanger core outlet, data image to the switch ports themselves that handheld device inserted.At this moment the hand-hold type analyzer data of coming through mirror image are come the phase-split network situation.
As shown in Figure 3,, the hand-hold type analyzer can analyze after receiving enough packets through inner analysis software, reduce all IP packets.Add up the source MAC in each packet then, target MAC (Media Access Control) address, source IP address, purpose IP address, packet institute use agreement, packet size.
Arrangement according to source IP address counts the IP address list of data packet number greater than certain threshold value;
Arrangement according to source MAC counts the MAC Address tabulation of data packet number greater than certain threshold value;
Press variety of protocol classifiction statistics bag, and from how to arrange to few;
Add up all IP and the corresponding relation of MAC Address.
Statistics has the IP and the MAC Address of multiple corresponding relation, and wherein classifies the quantity of sending the ARP protocol package as illegal ARP information greater than the IP or the MAC Address of certain threshold value.
Be presented at required result displayed report on the display screen at last.
The method for using of the procotol of brief description hand-hold type of the present invention and threat analysis appearance and step.
1. open the hand-hold type analyzer, select mode of operation (host mode or network schemer);
2. according to analyzer menu prompt input IP address information.
3. connect in the Ethernet like the needs inspection with netting twine handheld formula analyzer according to selected mode of operation.
3. analyze needed report according to packet information collected from Ethernet.
4. report is presented in the display screen of hand-hold type analyzer.
It should be noted last that; Above embodiment is only unrestricted in order to technical scheme of the present invention to be described; Although with reference to preferred embodiment the present invention is specified, those of ordinary skill in the art should be appreciated that and can make amendment or be equal to replacement technical scheme of the present invention; And not breaking away from the spirit and the scope of technical scheme of the present invention, it all should be encompassed in the middle of the claim scope of the present invention.

Claims (7)

1. the procotol of a hand-hold type and threat analysis appearance is characterized in that, comprise box body, display screen, miniature keyboard, network interface, power supply, mainboard;
Said display screen, miniature keyboard, network interface, power supply and mainboard rely on said box body to install,
Said network interface is used for being connected with the Ethernet that will check; Said display screen is used to show the input data and shows the object information that detects; Said miniature keyboard is used for the various data of artificial input, and said mainboard comprises system module, packet packet capturing module and information analysis module;
Said system module is used for installing operating system, for packet packet capturing module and information analysis module provide basic-level support;
Said packet packet capturing module is used for collection network bag from the network;
Said information analysis module is used for said collection network bag is unpacked analysis, and the analysis result of customization is shown on the said display screen.
2. the procotol of hand-hold type according to claim 1 and threat analysis appearance; It is characterized in that; Said information analysis module unpacks the analysis content to said collection network bag and comprises: the source MAC of each packet, target MAC (Media Access Control) address, source IP address; Purpose IP address, institute's use agreement and packet size.
3. the procotol of hand-hold type according to claim 2 and threat analysis appearance is characterized in that, the analysis result of said customization comprises:
Arrangement according to source IP address counts the IP address list of data packet number greater than certain threshold value;
Arrangement according to source MAC counts the MAC Address tabulation of data packet number greater than certain threshold value;
Press variety of protocol classifiction statistics bag, and from how to arrange to few;
Add up all IP and the corresponding relation of MAC Address.
4. the procotol of hand-hold type according to claim 3 and threat analysis appearance; It is characterized in that; The analysis result of said customization also comprises: statistics has the IP and the MAC Address of multiple corresponding relation, and wherein classifies the quantity of sending the ARP protocol package as illegal ARP information greater than the IP or the MAC Address of certain threshold value.
5. according to the procotol and the threat analysis appearance of one of claim 1-4 described hand-hold type, it is characterized in that the operating system of said system module is linux operating system.
6. according to the procotol and the threat analysis appearance of one of claim 1-4 described hand-hold type, it is characterized in that said packet packet capturing module is a tcpdump packet packet capturing module.
7. the procotol of hand-hold type according to claim 5 and threat analysis appearance is characterized in that, said packet packet capturing module is a tcpdump packet packet capturing module.
CN2011104162054A 2011-12-14 2011-12-14 Hand-held network protocol and threat analyzer Pending CN102394786A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2011104162054A CN102394786A (en) 2011-12-14 2011-12-14 Hand-held network protocol and threat analyzer

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2011104162054A CN102394786A (en) 2011-12-14 2011-12-14 Hand-held network protocol and threat analyzer

Publications (1)

Publication Number Publication Date
CN102394786A true CN102394786A (en) 2012-03-28

Family

ID=45861996

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2011104162054A Pending CN102394786A (en) 2011-12-14 2011-12-14 Hand-held network protocol and threat analyzer

Country Status (1)

Country Link
CN (1) CN102394786A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106027549A (en) * 2016-06-30 2016-10-12 大连楼兰科技股份有限公司 Early warning method and device for address resolution protocol (ARP) flooding attacks in local area network
CN109561097A (en) * 2018-12-17 2019-04-02 泰康保险集团股份有限公司 Structured query language injects security flaw detection method, device, equipment and storage medium
CN111756775A (en) * 2020-07-27 2020-10-09 四川神琥科技有限公司 Handheld gigabit network analyzer and application method thereof

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101072147A (en) * 2007-06-20 2007-11-14 重庆邮电大学 Industrial Ethernet protocol analysisand field tester
CN101556609A (en) * 2009-05-19 2009-10-14 杭州信杨通信技术有限公司 Customer behavior analysis and service system based on web contents
CN101621430A (en) * 2009-07-31 2010-01-06 南京拓为电力科技发展有限公司 Portable electric power communication protocol detector and detection method thereof
CN101741847A (en) * 2009-12-22 2010-06-16 北京锐安科技有限公司 Detecting method of DDOS (distributed denial of service) attacks
CN102045366A (en) * 2011-01-05 2011-05-04 上海北塔软件股份有限公司 Method for actively discovering network attacked by viruses

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101072147A (en) * 2007-06-20 2007-11-14 重庆邮电大学 Industrial Ethernet protocol analysisand field tester
CN101556609A (en) * 2009-05-19 2009-10-14 杭州信杨通信技术有限公司 Customer behavior analysis and service system based on web contents
CN101621430A (en) * 2009-07-31 2010-01-06 南京拓为电力科技发展有限公司 Portable electric power communication protocol detector and detection method thereof
CN101741847A (en) * 2009-12-22 2010-06-16 北京锐安科技有限公司 Detecting method of DDOS (distributed denial of service) attacks
CN102045366A (en) * 2011-01-05 2011-05-04 上海北塔软件股份有限公司 Method for actively discovering network attacked by viruses

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
屈猛: ""IPv4与IPv6双栈模式下网络数据监测与协议分析"", 《中国优秀硕士学位论文全文数据库信息科技辑》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106027549A (en) * 2016-06-30 2016-10-12 大连楼兰科技股份有限公司 Early warning method and device for address resolution protocol (ARP) flooding attacks in local area network
CN109561097A (en) * 2018-12-17 2019-04-02 泰康保险集团股份有限公司 Structured query language injects security flaw detection method, device, equipment and storage medium
CN109561097B (en) * 2018-12-17 2021-05-25 泰康保险集团股份有限公司 Method, device, equipment and storage medium for detecting security vulnerability injection of structured query language
CN111756775A (en) * 2020-07-27 2020-10-09 四川神琥科技有限公司 Handheld gigabit network analyzer and application method thereof

Similar Documents

Publication Publication Date Title
CN106209870B (en) A kind of Network Intrusion Detection System for distributed industrial control system
CN102082690B (en) Passive finding equipment and method of network topology
CN111371640B (en) SDN controller-based traffic collection analysis method and system
CN108429637B (en) System and method for dynamically detecting process layer network topology of intelligent substation
CN106603507A (en) Method and system for automatically completing network security self checking
CN110401624A (en) The detection method and system of source net G system mutual message exception
CN107154940A (en) A kind of Internet of Things vulnerability scanning system and scan method
CN101399710B (en) Detection method and system for protocol format exception
US20170006082A1 (en) Software Defined Networking (SDN) Orchestration by Abstraction
CN102594814A (en) Terminal-based network access control system
CN107222462A (en) A kind of LAN internals attack being automatically positioned of source, partition method
CN1725709A (en) Method of linking network equipment and invading detection system
CN101567884A (en) Method for detecting network theft Trojan
CN104778042A (en) Stream data processing method based on event stream processing and plug-in type development framework
CN103152341A (en) Virtuality and reality combined network security situation awareness simulation method and system
CN100493065C (en) Method for using immediate information software by data detection network address switching equipment
CN110266519A (en) A kind of method, system, storage medium and equipment perceiving substation network topology
CN102394786A (en) Hand-held network protocol and threat analyzer
CN104618246A (en) Network topology discovery method for XEN virtualization environment
CN106572103A (en) Hidden port detection method based on SDN network architecture
CN103944775A (en) Network traffic collection analysis and display output method
CN103414640B (en) A kind of method of the capacity of extended wireless controller equiment mac address forwarding table
CN105162639A (en) Virtual network fault positioning device based on Kernel-based virtual machine (KVM)
CN107608752A (en) The threat information response examined oneself based on virtual machine and method of disposal and system
CN104135403B (en) A kind of distributed environment Monitoring Data transfer check method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20120328