CN107370743B - For the detection of the malice wooden horse of altered data packet and defence method on many-core chip - Google Patents

For the detection of the malice wooden horse of altered data packet and defence method on many-core chip Download PDF

Info

Publication number
CN107370743B
CN107370743B CN201710647004.2A CN201710647004A CN107370743B CN 107370743 B CN107370743 B CN 107370743B CN 201710647004 A CN201710647004 A CN 201710647004A CN 107370743 B CN107370743 B CN 107370743B
Authority
CN
China
Prior art keywords
node
data packet
detection
many
wooden horse
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710647004.2A
Other languages
Chinese (zh)
Other versions
CN107370743A (en
Inventor
赵一鸣
王小航
龙子俊
张力
潘文明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Jian Fei Communication Co Ltd
South China University of Technology SCUT
Original Assignee
Guangzhou Jian Fei Communication Co Ltd
South China University of Technology SCUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Jian Fei Communication Co Ltd, South China University of Technology SCUT filed Critical Guangzhou Jian Fei Communication Co Ltd
Priority to CN201710647004.2A priority Critical patent/CN107370743B/en
Publication of CN107370743A publication Critical patent/CN107370743A/en
Application granted granted Critical
Publication of CN107370743B publication Critical patent/CN107370743B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of for the detection of the malice wooden horse of altered data packet and defence method on many-core chip, wherein should include: to be detected to path using detection request packet to the detection method of hardware Trojan horse in many-core chip;Hardware Trojan horse is positioned using detection request packet;The defence method that hardware Trojan horse is coped in many-core chip includes: using Adaptive Minimal Wormhole Routing around hardware Trojan horse;Use steering model deadlock prevention.The present invention can reduce packet loss problem caused by hardware Trojan horse in many-core chip.

Description

For the detection of the malice wooden horse of altered data packet and defence method on many-core chip
Technical field
The present invention relates to technical field of integrated circuits, and in particular to a kind of malice for altered data packet on many-core chip The detection of wooden horse and defence method.
Background technique
In the system of data center, mobile computing etc, a challenge very outstanding is information security.In order to meet The performance requirement of high computing capability, these systems use building module of the multi core chip as them.Multi core chip is dependent on crowd Means of communication of the core piece (Network-on-Chip, NoC) as its bottom.
In present multi core chip, safety becomes a very crucial challenge.Hardware Trojan horse (hardware Trojan, HT) serious threat is constituted to multi core chip, the information of chip failure or leakage sensitivity can be caused.Hardware wood Marko by being embedded in a malice circuit in chip design process to be injected among chip.In order to shorten Time To Market and Design overhead is reduced, present multi core chip is integrated with many different third parties (third party intellectual Prop-erty, 3PIP) component, and in these components may include hardware Trojan horse.
Dell/black hole Denial of Service attack is one of the catastrophic attack for many-core chip, and this attack passes through evil Meaning node attempts to make the many-core resources of chip of prospective users to be disabled.In black hole attack, hardware Trojan horse is injected into road By in device, making data packet be not forwarded original destination, on the contrary, they are dropped or are forwarded to other malicious nodes. In dell attack, malicious node attracts neighbouring node by pretending to possess many freebufs under adaptive routing Data packet.
Summary of the invention
The purpose of the present invention is propose a kind of for many-core core for the hardware Trojan horse for being implanted to router altered data packet The detection of the malice wooden horse of on piece altered data packet and defence method.
The purpose of the present invention can be reached by adopting the following technical scheme that:
It is a kind of to include for the detection of the malice wooden horse of altered data packet and defence method, the method on many-core chip Detecting step and defence step, wherein the detecting step includes path detection sub-step and node locating sub-step, described Path detection sub-step it is specific as follows:
Global administration person notifies the source node for sending data packet to send detection request packet to destination node, wherein detection request Each tail addition check code of the packet by general data packet using cyclic redundancy check in data packet is formed;
After data packet reaches destination node, destination node judges the data packet in routing procedure by checking check code In whether be tampered, if being not tampered with destination node reply source node, if being tampered, destination node will be into many-core system All suspect nodes issue a repeating transmission request;
Vertex ticks on reverse-path is no wooden horse node by global administration person;
The node locating sub-step is specific as follows:
It is the data packet that the node of repeating transmission request is issued to it that each suspect node, which can send a destination, while again The data packet format of hair is identical as the data packet format being tampered is detected;
The node for receiving retransmission data packet will successively detect whether each data packet is tampered, and be determined according to routing algorithm It is implanted into the node location of malice wooden horse;
Wherein, the defence step is specific as follows:
The router of each many-core chip safeguards an adjacent malicious node list, which records the north of the router, Whether the downstream router in west, south, eastern four direction is implantation wooden horse, when router calculates the output port of a data packet When, which can check whether calculated output port includes malicious node, if the router will comprising malicious node Output port is reselected for data packet.
Further, the selection of the suspect node is determined dependent on routing algorithm used in many-core chip, is chosen To be tampered the node that data packet is passed through in routing procedure.
Further, the node location of malice wooden horse implantation is detected each time, which can all be broadcast to each Node, each corresponding router of node update the adjacent malicious node list of this node by received broadcast.
Further, detection protocol is executed using detection request packet in the detecting step.
The present invention has the following advantages and effects with respect to the prior art:
The present invention can effectively detect the wooden horse position for the purpose of altered data packet, the case where guaranteeing detection accuracy Under possess lesser power consumption, it is lower to occupying for all kinds of resources of chip.Experiment on corresponding simulator simultaneously is shown can To there is very high accuracy to detect, wooden horse position can correctly avoid the malicious node containing wooden horse with stylish data packet.
Detailed description of the invention
Fig. 1 is the path detection scene figure in detection method;
Fig. 2 is the wooden horse positioning scene figure in detection method;
Fig. 3 is the scene figure that the node containing wooden horse is bypassed in defence method;
Fig. 4 is for the process step figure of the detection of the malice wooden horse of altered data packet and defence method on many-core chip.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
Embodiment one
The present embodiment is directed to the hardware Trojan horse for being implanted to router altered data packet, proposes a kind of online detection and defence Method.Wherein,
Detecting step: the source node for sending data packet can use cyclic redundancy check in data packet before issuing data packet Each tail add check code.After data packet reaches destination node, destination node judges this by checking check code Whether data packet is tampered in routing procedure.Once the destination node will be all " suspicious into many-core system it was found that distort Node " issues a repeating transmission request.The selection of " suspect node " is dependent on specific routing algorithm used in many-core chip, generally To be tampered the node that data packet is passed through in routing procedure.It is to send out to it that each " suspect node ", which can send a destination, The data packet of the node of request is retransmitted out, while the data packet format retransmitted is identical as the data packet format being tampered is detected. The node for receiving the data packet of these repeating transmission will successively detect whether each data packet is tampered, and according to specifically used routing Algorithm determination implants the node location of wooden horse.
Defence step: the router of each many-core chip can safeguard an adjacent malicious node list, this table record The north of this router, west, south, whether the downstream router of eastern four direction be to implant wooden horse.Evil is detected each time The node location that wooden horse of anticipating is implanted into, the position can all be broadcast to each node, and each corresponding router of node passes through this A little broadcast update the adjacent malicious node list of oneself.When router calculates the output port of a data packet, it can be checked Whether calculated output port has corresponded to a malicious node, if it is, router will select again for data packet Select output port.By this mechanism, new data packet can then prevent data packet to avoid by the node for being implanted wooden horse It is tampered.
Embodiment two
The present embodiment is that global administration person increases detection request packet function and is that network increases detection in 2D-mesh network Agreement.It is non-minimum routing algorithm that the present embodiment, which modifies algorithm network routing,.Here it is illustrated by taking 3x3 2D-mesh network as an example The detection of malice wooden horse and defence method disclosed in the present invention.The path detection process of the present embodiment is as shown in Figure 1, global pipe Reason person G selects node 3 and node 4 as suspect node, then sends detection request packet to them;Node 3 receives request packet simultaneously Reply global administration person G;Global administration person receives reply, flag node 3 and node 6 as no wooden horse node.
Global administration person does not receive the reply of suspect node 4, is accurately positioned to hardware Trojan horse, process as shown in Fig. 2, Global administration person G has found that packet loss is requested in the detection to suspect node 4, then the transmission detection of suspect node 8 first on path is asked Ask packet (1. path tag is).If node 8 is not replied, flag node 8 is malicious node.Otherwise, under G is on path One suspect node 7 sends detection request packet, checks whether node 7 replys (2. path tag is).
The non-minimum routing defence process of the present embodiment by the data packet that node 1 is sent to node 9 as shown in figure 3, made With normally route in the case of by node containing wooden horse 3, using non-minimum routing algorithm, in node 2, router is to tentatively tying Fruit node 3 is verified, and reading wooden horse register discovery node 3 is node containing wooden horse, is given up PRELIMINARY RESULTS and is recalculated newly to go out Mouth node 5, finally, data packet arrives at the destination node 9 by the path of 1-2-5-6-9.The algorithm turns to mould using north is last Type, the case where forbidding in the example north-east to turn to, path is such as forbidden to be 4-1-2.
The above embodiment is a preferred embodiment of the present invention, but embodiments of the present invention are not by above-described embodiment Limitation, other any changes, modifications, substitutions, combinations, simplifications made without departing from the spirit and principles of the present invention, It should be equivalent substitute mode, be included within the scope of the present invention.

Claims (4)

1. a kind of for the detection of the malice wooden horse of altered data packet and defence method on many-core chip, which is characterized in that described Method include detecting step and defence step, wherein the detecting step includes path detection sub-step and node locating Sub-step, the path detection sub-step are specific as follows:
Global administration person notify send data packet source node to destination node send detection request packet, wherein detection request packet by Each tail addition check code of the general data packet using cyclic redundancy check in data packet is formed;
After data packet reaches destination node, destination node is in routing procedure to judge the data packet by checking check code No to be tampered, destination node replys source node if being not tampered with, if being tampered, destination node will own into many-core system Suspect node issue repeatings transmission and request;
Vertex ticks on reverse-path is no wooden horse node by global administration person;
The node locating sub-step is specific as follows:
It is the data packet for retransmitting the node of request to be issued to it, while retransmitting that each suspect node, which can send a destination, Data packet format is identical as the data packet format being tampered is detected;
The node for receiving retransmission data packet will successively detect whether each data packet is tampered, and be determined and be implanted into according to routing algorithm The node location of malice wooden horse;
Wherein, the defence step is specific as follows:
The router of each many-core chip safeguards an adjacent malicious node list, which records the north of the router, west, Whether the downstream router in south, eastern four direction is that implantation wooden horse should when router calculates the output port of a data packet Router can check whether calculated output port includes malicious node, if the router will be number comprising malicious node Output port is reselected according to packet.
2. according to claim 1 be directed to the detection of the malice wooden horse of altered data packet and defence method on many-core chip, It is characterized in that, the selection of the suspect node is determined dependent on routing algorithm used in many-core chip, it is chosen for being usurped Change the node that data packet is passed through in routing procedure.
3. according to claim 1 be directed to the detection of the malice wooden horse of altered data packet and defence method on many-core chip, It is characterized in that, detecting the node location of malice wooden horse implantation each time, which can all be broadcast to each node, often A corresponding router of node updates the adjacent malicious node list of this node by received broadcast.
4. according to claim 1 be directed to the detection of the malice wooden horse of altered data packet and defence method on many-core chip, It is characterized in that, executing detection protocol using detection request packet in the detecting step.
CN201710647004.2A 2017-08-01 2017-08-01 For the detection of the malice wooden horse of altered data packet and defence method on many-core chip Active CN107370743B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710647004.2A CN107370743B (en) 2017-08-01 2017-08-01 For the detection of the malice wooden horse of altered data packet and defence method on many-core chip

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710647004.2A CN107370743B (en) 2017-08-01 2017-08-01 For the detection of the malice wooden horse of altered data packet and defence method on many-core chip

Publications (2)

Publication Number Publication Date
CN107370743A CN107370743A (en) 2017-11-21
CN107370743B true CN107370743B (en) 2019-08-20

Family

ID=60309258

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710647004.2A Active CN107370743B (en) 2017-08-01 2017-08-01 For the detection of the malice wooden horse of altered data packet and defence method on many-core chip

Country Status (1)

Country Link
CN (1) CN107370743B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111143847B (en) * 2019-12-30 2023-04-21 华南理工大学 Probability-based light-weight data packet tamper Trojan detection method
CN111414618B (en) * 2020-03-16 2022-09-02 福州大学 Micro-fluidic biochip field-level hardware Trojan horse detection method based on Hamming distance

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1319302C (en) * 2003-01-31 2007-05-30 菲尼克斯电气公司 Method and device for monitoring data packet safety transmission
CN101383712A (en) * 2008-10-16 2009-03-11 电子科技大学 Routing node microstructure for on-chip network
CN103488941A (en) * 2013-09-18 2014-01-01 工业和信息化部电子第五研究所 Hardware Trojan horse detection method and hardware Trojan horse detection system
CN104092674A (en) * 2014-06-30 2014-10-08 广东九联科技股份有限公司 Router network security detection method and system based on set top box
CN104950248A (en) * 2015-06-24 2015-09-30 中国电子科技集团公司第五十八研究所 Circuit safety DFT (design for testability) method for accelerating hardware Trojan trigger and hardware Trojan detection method
CN106357760A (en) * 2016-09-14 2017-01-25 芜湖扬展新材料科技服务有限公司 ZigBee-based vehicular wireless safety communication system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1319302C (en) * 2003-01-31 2007-05-30 菲尼克斯电气公司 Method and device for monitoring data packet safety transmission
CN101383712A (en) * 2008-10-16 2009-03-11 电子科技大学 Routing node microstructure for on-chip network
CN103488941A (en) * 2013-09-18 2014-01-01 工业和信息化部电子第五研究所 Hardware Trojan horse detection method and hardware Trojan horse detection system
CN104092674A (en) * 2014-06-30 2014-10-08 广东九联科技股份有限公司 Router network security detection method and system based on set top box
CN104950248A (en) * 2015-06-24 2015-09-30 中国电子科技集团公司第五十八研究所 Circuit safety DFT (design for testability) method for accelerating hardware Trojan trigger and hardware Trojan detection method
CN106357760A (en) * 2016-09-14 2017-01-25 芜湖扬展新材料科技服务有限公司 ZigBee-based vehicular wireless safety communication system

Also Published As

Publication number Publication date
CN107370743A (en) 2017-11-21

Similar Documents

Publication Publication Date Title
CN100448224C (en) Method and apparatus for discovering path maximum transmission unit (PMTU)
CN103460648B (en) Methods and systems for screening Diameter messages within a Diameter signaling router (DSR)
TWI677222B (en) Connection establishment method and device applied to server load balancing
CN1938982B (en) Method and apparatus for preventing network attacks by authenticating internet control message protocol packets
US11005760B2 (en) Ensuring data locality for secure transmission of data
US8351605B2 (en) Stealth message transmission in a network
CN107370743B (en) For the detection of the malice wooden horse of altered data packet and defence method on many-core chip
CN104363243A (en) Method and device for preventing gateway deceit
CN107332886A (en) Method of data synchronization, device, system, electronic equipment and readable storage medium storing program for executing
CN106470187A (en) Prevent dos attack methods, devices and systems
US7248582B2 (en) Method and system for labeling data in a communications system
CN103581168A (en) Hidden information communication method based on IP fragmentation camouflage technology
CN107545194B (en) Detection and the defence method of hardware Trojan horse are coped in network-on-chip
Clayton Anonymity and traceability in cyberspace
US11961074B2 (en) Method and system for a network device to obtain a trusted state representation of the state of the distributed ledger technology network
US8490172B2 (en) Methods, systems, and computer readable media for adaptive assignment of an active security association instance in a redundant gateway configuration
CN104901829B (en) Routing data forwarding behavior congruence verification method and device based on action coding
CN107104919A (en) The processing method of firewall box, SCTP SCTP packet
CN1906884B (en) Preventing network data injection attacks
CN110247924A (en) Transmitted in both directions and control system and data transmission method based on physical transfer
US7453812B1 (en) Method for detecting and correcting publish-subscribe looping in a messaging network
CN105471839A (en) Method for judging whether router data is tampered
CN112448921B (en) Method and device for detecting rear door
Kamtam et al. Artificial intelligence approaches in cyber security
Hospital et al. Retransmission steganography in real-world scenarios: a practical study

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant