CN106878326A - The guard method of IPv6 neighbor caches and its device based on inverse detection - Google Patents

The guard method of IPv6 neighbor caches and its device based on inverse detection Download PDF

Info

Publication number
CN106878326A
CN106878326A CN201710172618.XA CN201710172618A CN106878326A CN 106878326 A CN106878326 A CN 106878326A CN 201710172618 A CN201710172618 A CN 201710172618A CN 106878326 A CN106878326 A CN 106878326A
Authority
CN
China
Prior art keywords
ird
storage queue
record
list item
fields
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710172618.XA
Other languages
Chinese (zh)
Inventor
张连成
孔亚洲
王振兴
郭毅
王禹
辜苛峻
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PLA Information Engineering University
Original Assignee
PLA Information Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PLA Information Engineering University filed Critical PLA Information Engineering University
Priority to CN201710172618.XA priority Critical patent/CN106878326A/en
Publication of CN106878326A publication Critical patent/CN106878326A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present invention relates to a kind of IPv6 neighbor caches guard method based on inverse detection and its device, the method is included:Destination node receives ND messages, and the list item record of storage ND message informations is created in storage queue;After stand-by period t, a record is chosen from storage queue head, IRD neighbor request messages are sent to source node;Corresponding data filling is carried out to the IRD options of IRD neighbor request messages by the Sequence fields and Timestamp fields in the record of selection, and the Status field set that list item is recorded;Source node sends IRD notification packets, timestamp when identical Sequence fields are filled in IRD options and notification packet is sent;Destination node is directed to the IRD notification packets for receiving, and is checked by Sequence fields, Status fields and time-out time threshold value, and the respective record in neighbor cache and storage queue is processed according to inspection result.The present invention is effective against neighbor cache spoofing attack and Denial of Service attack, and resource consumption is few, protocol compatibility is strong, can preferably adapt to applied environment.

Description

The guard method of IPv6 neighbor caches and its device based on inverse detection
Technical field
The present invention relates to IPv6 secure communication of network technical fields, more particularly to a kind of IPv6 neighbours based on inverse detection Buffer protection method and its device.
Background technology
Neighbor Discovery Protocol (Neighbor Discovery Protocol, NDP) is a key protocol of IPv6, it The agreement such as ARP, ICMP router discovery being combined with IPv4 and ICMP redirections, and they are improved, solve same Information exchange problem on one link between different nodes.Because it does not provide any for the security threat in link Security mechanism, the security breaches that attacker exists using NDP can be attacked to IPv6 subnets implementation Denial of Service attack and redirection Hit.Ietf standard specifies to ensure the reliability and integrality of packet in NDP by IPSec AH, but does not provide user Case.Secure Neighbor Discovery Protocol (SEcure Neighbor Discovery, SEND) is by introducing ciphered generation address (Cryptographically Generated Address, CGA) and signature mechanism ensure the safety of NDP, but it is produced Computing cost is excessive, is not used widely.
Neighbor cache is one group of information about single neighbours, and the information that it includes has:Neighbours' IP address and neighbours' link Layer address mapping, Neighbor Reachability state etc..The renewal of neighbor cache is realized by the interaction of ND messages, and ND agreements exist Message is not protected effectively during design, therefore neighbor cache is subject to spoofing attack and DoS attack etc..Inverse detection side Method, although it reduces neighbor cache possibility under fire to a certain extent, because reverse probe messages do not have any protection machine System, attacker still can send substantial amounts of false response message, and then bypass inverse detection mechanism easily, accordingly, it would be desirable to one New IPv6 neighbor cache guard methods are planted, to improve IPv6 intranet security.
The content of the invention
The present invention provides a kind of guard method of IPv6 neighbor caches and its device based on inverse detection, it is ensured that neighbor cache Correct renewal, be effective against neighbor cache spoofing attack and Denial of Service attack etc., and resource consumption is few, compatibility is strong.
According to design provided by the present invention, a kind of IPv6 neighbor cache guard methods based on inverse detection, bag Containing following content:
Destination node receives ND messages, and the list item record of storage ND message informations is created in storage queue, wherein, often Individual node is set up a storage queue for the storage of ND message informations, the IP address comprising source node, source in list item record The MAC Address of node, the Timestamp fields of IRD request message times are sent to source node, and sending IRD to source node asks The Sequence fields of test serial number, and identify whether to send the Status fields of IRD request message states to source node;
After stand-by period t, a record is chosen from storage queue head, IRD neighbor request messages are sent to source node, its In, the IRD options of 0 < t < τ, IRD neighbor request messages are included:Type words for representing the option type value of IRD messages Section, the Length fields of whole option, for the Sequence fields of the IRD test serial numbers of explicit message matching, retain Reserved fields, and for limiting the Timestamp fields of the timestamp of message response duration;In record by selection Sequence fields and Timestamp fields carry out corresponding data filling to the IRD options of IRD neighbor request messages, and will The Status field set of list item record;
Source node sends IRD notification packets, and identical Sequence fields are filled in IRD options and notification packet is sent When timestamp;
Destination node is directed to the IRD notification packets for receiving, by Sequence fields, Status fields and time-out time threshold Value is checked, the respective record in neighbor cache and storage queue is processed according to inspection result.
Above-mentioned, checked by Sequence fields, Status fields and time-out time threshold value, and tied according to checking Fruit is processed the respective record in neighbor cache and storage queue, as follows comprising content:It is in inquiry storage queue first No have the record of identical Sequence fields, if it does not exist, then not updating neighbor cache, deletes this and records and terminate;If In the presence of, then check storage queue in Status fields whether set, if non-set, does not update neighbor cache, delete the record And terminate, if set, whether inspection IRD notification packets reach in time-out time threshold value, if so, then updating neighbor cache simultaneously Terminate, otherwise, do not update neighbor cache, delete this and record and terminate.
Above-mentioned, also include:Node storage queue is managed by the RED methods based on timestamp, deletes storage List item record in queue.
Preferably, node storage queue is managed by the RED methods based on timestamp, it is as follows comprising content:It is right The list item of each Timestamp field non-zero starts timer in storage queue, and the table in storage queue is deleted according to timer Item record;And according to storage queue average length calculate node drop probabilities, and abandon storage queue according to node drop probabilities In list item record.
Above-mentioned, the list item to each Timestamp field non-zero in storage queue starts timer, is deleted according to timer Except the list item record in storage queue, content is as follows:Storage queue minimum length, maximum length are read, current time stores team List items set of records ends, storage queue head logging timestamp, time-out time threshold value;According in storage queue list item set of records ends Whether each list item is recorded, and judges its Timestamp field more than zero, if so, being then correspondence list item by time-out time threshold value Record sets timer;If timer expiry does not receive corresponding IRD notification packets also, corresponding list item record is deleted.
Preferably, according to storage queue average length calculate node drop probabilities, content is as follows:If storage queue is averagely long Degree is less than storage queue minimum length, then set packet loss as zero;If storage queue average length is minimum more than storage queue long Spend and less than storage queue maximum length, then according to formula:
, calculate packet loss;Otherwise, packet loss as 1 is set.
Preferably, time-out time threshold value is corrected according to network delay situation.
A kind of IPv6 neighbor cache protection devices based on inverse detection, comprising:Message information logging modle, record are chosen Module and list item Inventory Detection Module;Wherein,
Message information logging modle, according to the message information for receiving, being created in node storage queue should for destination node The list item record of message information;
Record chooses module, chooses the record of node storage queue head, and send IRD neighbor request reports to source node Text, wherein, the record of IRD neighbor requests message and selection filling identical timestamp field and test serial number field, and by table Identify whether that the Status fields for having sent IRD request message states to source node carry out set operation in item record;
List item Inventory Detection Module, destination node according to the IRD notification packets for receiving, by timestamp field, message sequence Number field warp and time-out time threshold value are updated treatment to the record in neighbor cache and storage queue.
Above-mentioned device, also comprising queue management module, by the RED methods based on timestamp in node storage queue List item record carry out deletion action.
Above-mentioned device, also includes:For the time being adjusted to time-out time threshold value according to network delay situation Threshold value correcting module.
Beneficial effects of the present invention:
The problems such as present invention is directed to spoofing attack and the Denial of Service attack that IPv6 neighbor caches are subject to, from neighbor cache Renewal process is started with, and introduces the protection mechanisms such as timestamp, test serial number and queue management, it is ensured that the correct renewal of neighbor cache; And the numerical result by instantiation shows, the method can be effective against neighbor cache spoofing attack and Denial of Service attack Hit, with resource consumption it is few, protocol compatibility is strong the features such as;Applied environment can be preferably adapted to, effectively protection IPv6 neighbours Caching, with practical value very high.
Brief description of the drawings:
Fig. 1 is flow chart of the method for the present invention;
Fig. 2 is principle schematic of the invention;
Fig. 3 is storage queue schematic diagram of the invention;
Fig. 4 is IRD options schematic diagram of the invention.
Fig. 5 is workflow diagram of the invention;
Fig. 6 is device block diagram of the invention;
Fig. 7 is the network topology schematic diagram of example.
Specific embodiment:
In order that the object, technical solutions and advantages of the present invention are clearer, below in conjunction with the accompanying drawings with specific embodiment pair The present invention is described in detail.
Shown in Figure 1, method provided by the present invention can mainly include:Destination node receives ND messages, is depositing The list item record of storage ND message informations is created in storage queue, wherein, each node is set up has one to be deposited for ND message informations The storage queue of storage, the IP address comprising source node in list item record, the MAC Address of source node sends IRD and asks to source node The Timestamp fields of message time, the Sequence fields of IRD request message sequence numbers are sent to source node, and are identified whether The Status fields of IRD request message states have been sent to source node;After stand-by period t, one is chosen from storage queue head Record, IRD neighbor request messages are sent to source node, wherein, the IRD options of 0 < t < τ, IRD neighbor request messages are included:With In the type field of the option type value for representing IRD messages, the Length fields of whole option, for explicit message matching IRD test serial numbers Sequence fields, retain Reserved fields, and for limiting the timestamp of message response duration Timestamp fields;By the Sequence fields and Timestamp fields in the record of selection to IRD neighbor request messages IRD options carry out corresponding data filling, and the Status field set that list item is recorded;Source node sends IRD notice reports Text, timestamp when identical Sequence fields are filled in IRD options and notification packet is sent;Destination node is directed to and receives IRD notification packets, checked by Sequence fields, Status fields and time-out time threshold value, according to inspection result Respective record in neighbor cache and storage queue is processed.
The above method that the present invention is provided is described in detail below, Fig. 2 shows for principle provided in an embodiment of the present invention It is intended to, the method may comprise steps of:
Step 21:When destination node receives the messages such as NS/NA, first, a list item is created in node storage queue Record, record receives ND message informations, such as IP-MAC mapping relations.
In the present embodiment, in order to ensure node can correctly update neighbor cache, each node sets up a ND message The storage queue of information, as shown in figure 3, each field is meant that:
IP:The IP address of source node;
MAC:The MAC Address of source node;
Timestamp:Time during IRD NS messages is sent to source node, 0 is initialized as;
Sequence:Sequence number during IRD NS messages is sent to source node;
Status:Whether IRD NS messages are sent to source node.
Wherein, the function of Status fields is:When node attempt transmission falseness IRD response messages are attacked, even if message In Timestamp fields and Sequence fields it is legal, meet standard agreement requirement, but in the queue of recipient not Have the Status field set of respective record, then recipient does not still update neighbor cache and deletes this queue entry.
Step 22:Wait random time t, 0<t<τ, a record is chosen from storage queue head, and IRD is sent to source node NS messages, the message includes IRD Option options, and the Timestamp fields and Sequence fields of respective record are carried out Data are filled, and Status field set.
In the present embodiment, in order to have more preferable compatibility, there is provided a kind of IPD Option options, it is specific as shown in figure 4, Each field meanings are as follows:
Type:Option type value, for identifying IRD messages;
Length:The length (including Type and Length fields) of whole option;
Sequence:IRD test serial numbers, for the matching of response message;
Reserved:Reserved field;
Timestamp:IRD message times are stabbed, for limiting message response duration.
Wherein, Sequence fields and Timestamp fields are used in combination with better against spoofing attack.
Step 23:When source node send IRD NA messages when, it is necessary in option fill identical Sequence fields and Send timestamp during response message.
Step 24:Whether destination node checks the IRD NA messages for receiving have in inquiry storage queue Sequence fields identical is recorded, if it has, going to step 25, otherwise, does not update neighbor cache, is deleted the list item and is tied Beam.
Step 25:Check storage queue in Status fields whether set, if it is, going to step 26, otherwise, do not update Neighbor cache, deletes the list item and terminates.
Step 26:Check whether the IRD NA messages reach in time-out time threshold value, if it is, should in storage queue Each field information is legal and correct in record, by the information updating neighbor cache table of the record and terminates, and otherwise, does not update neighbour Caching is occupied, the list item is deleted and is terminated.
Referring to shown in Fig. 5 and 7, host node B and C attack node A and attempt to implement go-between to it to attack just in proper communication Hit.By taking host node B as an example, when B receives the IRD NA messages from A, B creates a list item storage in its queue should The information such as Timestamp, Sequence, IP-MAC mapping relations in IRD NA messages;Wait random time t (0<t<τ), B Send IRD NS messages to A, the message includes IRD Option options, and by the Timestamp fields of respective record and Sequence fields carry out data filling, and Status field set;When A sends IRD NA messages to B, it is necessary in option Timestamp when the Sequence fields and transmission response message of filling;Node A is checked the IRD NA messages for receiving, looked into Whether there is Sequence fields identical to record in inquiry queue, if it has, going to step 5, otherwise, do not update neighbor cache, delete Except the list item and terminate;Step 5, node A check in queue Status fields whether set, if it is, go to step 6, otherwise, Neighbor cache is not updated, the list item is deleted and is terminated;Whether step 6, node A check the IRD NA messages in the time threshold for defining Reached in value T, if it is, updating neighbor cache and terminating, otherwise, do not update neighbor cache, deleted the list item and terminate.From neighbour Occupy buffer update process to start with, by introducing the protection mechanisms such as timestamp, test serial number, it is ensured that the correct renewal of neighbor cache; The method can be effective against neighbor cache spoofing attack and Denial of Service attack, and with resource consumption is few, protocol-compliant Property is strong.
Further, whether the storage queue of destination node is safe, directly affects the security update of neighbor cache, example Such as, attacker constantly sends a large amount of falseness NS/NA messages, destination node is filled in being constantly in full queue state and storage queue Full deceptive information, destination node cannot update its neighbor cache, and attacker still can reach carries out DoS attack to destination node Purpose, therefore, queue management is one of the key of security update for ensureing neighbor cache.By the RED side based on timestamp Method is managed to node storage queue, stabs the influence managed storage queue by introducing message time so that original RED side Method disclosure satisfy that the requirement of IRD neighbor cache guard methods, and the implementation process of storage queue management is as follows:
List item to each Timestamp field non-zero in storage queue starts timer, is deleted according to timer and stored List item record in queue;And according to storage queue average length calculate node drop probabilities, and lost according to node drop probabilities The list item record abandoned in storage queue so that node storage queue can in time abandon partial data bag, it is ensured that destination node is deposited Store up the robustness of queue.
The management of storage queue is completed through the above way, can be specially:Read storage queue minimum length, most greatly enhance Degree, current time, storage queue list item set of records ends, storage queue head logging timestamp, time-out time threshold value;According to storage Whether each list item record in queue entry set of records ends, judge its Timestamp field more than zero, if so, then by time-out Time threshold is that correspondence list item record sets timer;If timer expiry does not receive corresponding IRD notification packets also, delete Corresponding list item record.If storage queue average length is less than storage queue minimum length, packet loss as zero is set;If storage Queue average length is more than storage queue minimum length and less than storage queue maximum length, then according to formula:
, calculate packet loss;Otherwise, packet loss as 1 is set.
The management process of above-mentioned storage queue can be realized by following program:
Above-mentioned storage queue management method receives Qavg、Tcurrent、TtimestampWith the influence of the factor such as T, meanwhile, network prolongs When also can on destination node receive message produce influence, if network delay is larger, over-time threshold value T ignores node processing IRD request messages and send the IRD response message times in the case of, then destination node will delete queue entry, cannot Correct renewal neighbor cache, therefore, to be further ensured that neighbor cache is updated, it is necessary to according to network delay situation to time threshold T is adjusted accordingly amendment, to ensure the correctness that neighbor cache updates.
Above is the description carried out to the method that the present invention is provided, is situated between in detail to device provided by the present invention below Continue, as shown in fig. 6, the protection device, comprising:Message information logging modle 301, record choose module 302 and list item record inspection Survey module 303;Wherein,
Message information logging modle 301, destination node is created according to the message information for receiving in node storage queue The list item record of the message information.
Each node is set up a storage queue for the storage of ND message informations, and source node is included in list item record IP address, the MAC Address of source node sends the Timestamp fields of IRD request message times to source node, is sent out to source node The Sequence fields of IRD request message sequence numbers are sent, and identifies whether to send IRD request message states to source node Status fields.
Record chooses module 302, chooses the record of node storage queue head, and send IRD neighbor requests to source node Message, wherein, record filling identical timestamp field and the test serial number field of IRD neighbor requests message and selection, and will Identify whether that the Status fields for having sent IRD request message states to source node carry out set operation in list item record.
After waiting random time t, a record is chosen from storage queue head, IRD neighbor request reports are sent to source node Text, the Status field set of list item record, wherein, the IRD options of 0 < t < τ, IRD neighbor request messages are included:For table Show the type field of the option type value of IRD messages, the Length fields of whole option, for explicit message matching The Sequence fields of IRD test serial numbers, retain Reserved fields, and for limiting the timestamp of message response duration Identical Sequence fields and Timestamp fields are filled in Timestamp fields, and the record chosen.
List item Inventory Detection Module 303, destination node according to the IRD notification packets for receiving, by timestamp field, message Sequence number field is passed through and time-out time threshold value is updated treatment to the record in neighbor cache and storage queue.
First, whether Sequence fields identical records in inquiry storage queue;Secondly, in inspection storage queue Status fields whether set;Again, check whether the IRD NA messages reach in the time-out time threshold value T of definition.If Each field information is legal and correct in the record of storage queue, then by the information updating neighbor cache table of the record and tie Beam;Otherwise, do not update neighbor cache table deletes queue simultaneously in and respective record and terminate.
Preferably, also comprising queue management module, by the RED methods based on timestamp to the table in node storage queue Item record carries out deletion action.List item to each Timestamp field non-zero in storage queue starts timer, according to timing Device deletes the list item record in storage queue;And according to storage queue average length calculate node drop probabilities, and according to node Drop probabilities abandon the list item record in storage queue so that node storage queue can in time abandon partial data bag, it is ensured that The robustness of destination node storage queue.
In addition, because network delay receives the influence of message generation to destination node, it is necessary to be adjusted to time-out time threshold value It is whole;By setting time threshold value correcting module, adjustment is modified to time-out time threshold value according to network delay situation, further Ensure the correct renewal of neighbor cache.
In sum, by the above embodiment of the present invention, there is provided a kind of IPv6 neighbor caches based on inverse detection Guard method, protection device, the problem of spoofing attack and Denial of Service attack etc. is subject to for IPv6 neighbor caches, from neighbours Buffer update process is started with, by introducing the protection mechanisms such as timestamp, test serial number and queue management, it is ensured that neighbor cache is just Really update, be effective against neighbor cache spoofing attack and Denial of Service attack, with resource consumption it is few, it is compatible strong the features such as, Applied environment can be preferably adapted to, effectively protection IPv6 communication securities.
Each embodiment is described by the way of progressive in this specification, and what each embodiment was stressed is and other The difference of embodiment, between each embodiment same or similar part mutually referring to.To the disclosed embodiments Described above, enables professional and technical personnel in the field to realize or uses the present invention.To various modifications of these embodiments to this Be will be apparent for the professional and technical personnel in field, generic principles defined herein can not depart from the present invention Spirit or scope in the case of, realize in other embodiments.Therefore, the present invention be not intended to be limited to it is shown in this article this A little embodiments, and it is to fit to the most wide scope consistent with principles disclosed herein and features of novelty.

Claims (10)

1. a kind of IPv6 neighbor cache guard methods based on inverse detection, it is characterised in that comprising following content:
Destination node receives ND messages, and the list item record of storage ND message informations is created in storage queue, wherein, each section Point is set up a storage queue for the storage of ND message informations, the IP address comprising source node, source node in list item record MAC Address, to source node send the IRD request message times Timestamp fields, to source node send IRD request messages The Sequence fields of sequence number, and identify whether to send the Status fields of IRD request message states to source node;
After stand-by period t, a record is chosen from storage queue head, IRD neighbor request messages are sent to source node, wherein, 0 The IRD options of < t < τ, IRD neighbor request messages are included:The type field for representing the option type value of IRD messages, it is whole The Length fields of individual option, for the Sequence fields of the IRD test serial numbers of explicit message matching, retain Reserved fields, and for limiting the Timestamp fields of the timestamp of message response duration;In the record of selection Sequence fields and Timestamp fields carry out corresponding data filling to the IRD options of IRD neighbor request messages, and will The Status field set of list item record;
Source node sends IRD notification packets, when identical Sequence fields are filled in IRD options and notification packet is sent Timestamp;
Destination node is directed to the IRD notification packets for receiving, and is entered by Sequence fields, Status fields and time-out time threshold value Row checks, the respective record in neighbor cache and storage queue is processed according to inspection result.
2. the IPv6 neighbor cache guard methods based on inverse detection according to claim 1, it is characterised in that pass through Sequence fields, Status fields and time-out time threshold value checked, and according to inspection result to neighbor cache and storage Respective record in queue is processed, as follows comprising content:Whether there is identical Sequence in inquiry storage queue first The record of field, if it does not exist, then not updating neighbor cache, deletes this and records and terminate;If in the presence of checking storage queue Middle Status fields whether set, if non-set, does not update neighbor cache, delete this and record and terminate, if set, check Whether IRD notification packets reach in time-out time threshold value, if so, then update neighbor cache and terminate, otherwise, not more new neighbor Caching, deletes this and records and terminate.
3. the IPv6 neighbor cache guard methods based on inverse detection according to claim 1, it is characterised in that also wrap Contain:Node storage queue is managed by the RED methods based on timestamp, deletes the list item record in storage queue.
4. the IPv6 neighbor cache guard methods based on inverse detection according to claim 3, it is characterised in that by base Node storage queue is managed in the RED methods of timestamp, it is as follows comprising content:To in storage queue each The list item of Timestamp field non-zeros starts timer, and the list item record in storage queue is deleted according to timer;And according to depositing Storage queue average length calculate node drop probabilities, and the list item record in storage queue is abandoned according to node drop probabilities.
5. the IPv6 neighbor cache guard methods based on inverse detection according to claim 4, it is characterised in that to storage The list item of each Timestamp field non-zero starts timer in queue, and the list item note in storage queue is deleted according to timer Record, content is as follows:Read storage queue minimum length, maximum length, current time, storage queue list item set of records ends, storage Queue head logging timestamp, time-out time threshold value;Recorded according to each list item in storage queue list item set of records ends, judge it Whether Timestamp fields are more than zero, if so, being then that correspondence list item record sets timer by time-out time threshold value;If fixed When device time-out do not receive corresponding IRD notification packets also, then delete corresponding list item record.
6. the IPv6 neighbor cache guard methods based on inverse detection according to claim 5, it is characterised in that according to depositing Storage queue average length calculate node drop probabilities, content is as follows:If storage queue average length is minimum less than storage queue long Degree, then set packet loss as zero;If storage queue average length is more than storage queue minimum length and maximum less than storage queue Length, then according to formula:
Calculate packet loss;Otherwise, packet loss as 1 is set.
7. the IPv6 neighbor cache guard methods based on inverse detection according to any one of claim 4~6, its feature exists In time-out time threshold value is corrected according to network delay situation.
8. a kind of IPv6 neighbor cache protection devices based on inverse detection, it is characterised in that include:Message information records mould Block, record choose module and list item Inventory Detection Module;Wherein,
Message information logging modle, destination node creates the message according to the message information for receiving in node storage queue The list item record of information;
Record chooses module, chooses the record of node storage queue head, and sends IRD neighbor request messages to source node, its In, record filling identical timestamp field and the test serial number field of IRD neighbor requests message and selection, and list item is recorded In identify whether to source node send IRD request message states Status fields carry out set operation;
List item Inventory Detection Module, destination node according to the IRD notification packets for receiving, by timestamp field, test serial number word Section warp and time-out time threshold value are updated treatment to the record in neighbor cache and storage queue.
9. IPv6 neighbor cache protection devices based on inverse detection according to claim 8, it is characterised in that also include Queue management module, the list item in node storage queue is recorded by the RED methods based on timestamp carry out deletion action.
10. the IPv6 neighbor cache protection devices based on inverse detection according to any one of claim 8 or 9, its feature It is also to include:For the time threshold correcting module being adjusted to time-out time threshold value according to network delay situation.
CN201710172618.XA 2017-03-21 2017-03-21 The guard method of IPv6 neighbor caches and its device based on inverse detection Pending CN106878326A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710172618.XA CN106878326A (en) 2017-03-21 2017-03-21 The guard method of IPv6 neighbor caches and its device based on inverse detection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710172618.XA CN106878326A (en) 2017-03-21 2017-03-21 The guard method of IPv6 neighbor caches and its device based on inverse detection

Publications (1)

Publication Number Publication Date
CN106878326A true CN106878326A (en) 2017-06-20

Family

ID=59172526

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710172618.XA Pending CN106878326A (en) 2017-03-21 2017-03-21 The guard method of IPv6 neighbor caches and its device based on inverse detection

Country Status (1)

Country Link
CN (1) CN106878326A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108900272A (en) * 2017-08-25 2018-11-27 杭州德泽机器人科技有限公司 Sensor data acquisition method, system and packet loss judgment method
CN111147382A (en) * 2019-12-31 2020-05-12 杭州迪普科技股份有限公司 Message forwarding method and device
CN111464517A (en) * 2020-03-23 2020-07-28 武汉思普崚技术有限公司 Method and system for preventing address spoofing attack by NS reverse query
CN112714133A (en) * 2021-01-04 2021-04-27 烽火通信科技股份有限公司 ND attack prevention method and device suitable for DHCPv6 server
CN114968893A (en) * 2022-07-27 2022-08-30 井芯微电子技术(天津)有限公司 PCIe message queue scheduling method, system and device based on timestamp
CN116094998A (en) * 2022-12-29 2023-05-09 天翼云科技有限公司 Method and device for forwarding VXLAN message of neighbor table entry based on OVS

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104518966A (en) * 2013-09-27 2015-04-15 中国电信股份有限公司 IPv6 direct connection link invalid address processing method and device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104518966A (en) * 2013-09-27 2015-04-15 中国电信股份有限公司 IPv6 direct connection link invalid address processing method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
孔亚洲 等: ""基于改进反向探测的IPv6 邻居缓存保护方法"", 《计算机应用》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108900272A (en) * 2017-08-25 2018-11-27 杭州德泽机器人科技有限公司 Sensor data acquisition method, system and packet loss judgment method
CN108900272B (en) * 2017-08-25 2021-02-19 杭州德泽机器人科技有限公司 Sensor data acquisition method and system and packet loss judgment method
CN111147382A (en) * 2019-12-31 2020-05-12 杭州迪普科技股份有限公司 Message forwarding method and device
CN111147382B (en) * 2019-12-31 2021-09-21 杭州迪普科技股份有限公司 Message forwarding method and device
CN111464517A (en) * 2020-03-23 2020-07-28 武汉思普崚技术有限公司 Method and system for preventing address spoofing attack by NS reverse query
CN111464517B (en) * 2020-03-23 2021-02-26 武汉思普崚技术有限公司 Method and system for preventing address spoofing attack by NS reverse query
CN112714133A (en) * 2021-01-04 2021-04-27 烽火通信科技股份有限公司 ND attack prevention method and device suitable for DHCPv6 server
CN114968893A (en) * 2022-07-27 2022-08-30 井芯微电子技术(天津)有限公司 PCIe message queue scheduling method, system and device based on timestamp
CN114968893B (en) * 2022-07-27 2022-09-30 井芯微电子技术(天津)有限公司 PCIe message queue scheduling method, system and device based on timestamp
CN116094998A (en) * 2022-12-29 2023-05-09 天翼云科技有限公司 Method and device for forwarding VXLAN message of neighbor table entry based on OVS

Similar Documents

Publication Publication Date Title
CN106878326A (en) The guard method of IPv6 neighbor caches and its device based on inverse detection
Gong et al. A more practical approach for single-packet IP traceback using packet logging and marking
Compagno et al. Poseidon: Mitigating interest flooding DDoS attacks in named data networking
Cambiaso et al. Taxonomy of slow DoS attacks to web applications
Shi et al. On broadcast-based self-learning in named data networking
CN100566294C (en) Single broadcast reverse path repeating method
US6816910B1 (en) Method and apparatus for limiting network connection resources
Zhou et al. Exploiting the Vulnerability of Flow Table Overflow in Software‐Defined Network: Attack Model, Evaluation, and Defense
CN103701700B (en) Node discovery method in a kind of communication network and system
JP5713445B2 (en) Communication monitoring system and method, communication monitoring device, virtual host device, and communication monitoring program
Ullrich et al. {IPv6} security: Attacks and countermeasures in a nutshell
Knockel et al. Counting packets sent between arbitrary internet hosts
CN108965263A (en) Network attack defence method and device
Lu et al. A novel path‐based approach for single‐packet IP traceback
WO2021032016A1 (en) Data processing method and device
CN113347155A (en) Method, system and device for defending ARP spoofing
Boppana et al. Analyzing the vulnerabilities introduced by ddos mitigation techniques for software-defined networks
US8234503B2 (en) Method and systems for computer security
Alston et al. Neutralizing interest flooding attacks in named data networks using cryptographic route tokens
CN103095858B (en) Method, the network equipment and the system of ARP message processing
JP6418232B2 (en) Network management device, network system, network management method and program
Ribeiro et al. Content pollution mitigation for content-centric networking
Song et al. Using FDAD to prevent DAD attack in secure neighbor discovery protocol
Li et al. Prospect for the future internet: A study based on TCP/IP vulnerabilities
CN114024731A (en) Message processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170620