CN108111429A - It is a kind of to detect and solve the method and system of local network attack - Google Patents

It is a kind of to detect and solve the method and system of local network attack Download PDF

Info

Publication number
CN108111429A
CN108111429A CN201711392584.1A CN201711392584A CN108111429A CN 108111429 A CN108111429 A CN 108111429A CN 201711392584 A CN201711392584 A CN 201711392584A CN 108111429 A CN108111429 A CN 108111429A
Authority
CN
China
Prior art keywords
message
interchanger
mac
client
mac address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201711392584.1A
Other languages
Chinese (zh)
Inventor
郭敏
王斌
王建国
曹建
廖北平
蒋汉柏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Hengmao Tech Ltd By Share Ltd
Original Assignee
Hunan Hengmao Tech Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Hengmao Tech Ltd By Share Ltd filed Critical Hunan Hengmao Tech Ltd By Share Ltd
Priority to CN201711392584.1A priority Critical patent/CN108111429A/en
Publication of CN108111429A publication Critical patent/CN108111429A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/12Avoiding congestion; Recovering from congestion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/06Management of faults, events, alarms or notifications
    • H04L41/0677Localisation of faults
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0876Network utilisation, e.g. volume of load or congestion level
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • H04L47/13Flow control; Congestion control in a LAN segment, e.g. ring or bus

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of detection and the method and system of local network attack are solved, the method comprising the steps of:Server interception manufactures the MAC Address of the client of a large amount of messages, writes notice message and sends;After the notified message of client, alert box is popped up if MAC successful match, client user is prompted to stop sending rubbish message, and assembles back message and returns to server;After interchanger receives the notice message of server transmission, composition backtracking message after the information of this interchanger is added, and postbacked in receiving port;Notice message is forwarded, and a timer is generated in forwarding port, in the timer expiry, if not receiving the backtracking message that the interchanger being connected with forwarding port returns, closes this forwarding port.The system includes server module, client modules and switch module.The present invention can remove rubbish network congestion caused by message.

Description

It is a kind of to detect and solve the method and system of local network attack
Technical field
The present invention relates to network congestion process field more particularly to a kind of detect and solve the method for local network attack and be System.
Background technology
With the fast development of China's network communication, Ethernet exchanging machine equipment is also in the application of each medium-sized and small enterprises More and more extensive, interchanger becomes entire company's hub device, carries all computers or other Ethernets in LAN and sets Standby network communication task.The use of Ethernet switch is essential for medium-sized and small enterprises.Although it is present with The function of too network switch is more and more also stronger and stronger, but high cost also allows many medium-sized and small enterprises to be hoped and timid Step, then the Ethernet exchanging of some low and middle-ends is used, cost-effective and maintenance time is come with this.Cost-effective and maintenance time Sometimes it is often not directly proportional.Entire LAN is impacted when certain computer in company is sending substantial amounts of message, and User does not but know what has occurred in itself, the Internet resources of company is caused largely to be occupied, network blockage causes Other computers cannot get Internet resources and suspension.Network administrator can not also go to determine bottom at this time by effective means Failure has occurred in that computer, can only both have been lost time or waste of manpower by investigation one by one.
The sFlow network monitor technologies used at present, are by data flow stochastical sampling, can analyze two layers to four layers Network traffic information, allow user analyze in real time the performance of network transmission stream, trend and there are the problem of.But sFlow networks Although detection technique can cannot navigate to specific client in LAN, to network by sampling analysis network traffics Control is also without advantage.
The content of the invention
Present invention aims at providing a kind of detection and solving the method and system of local network attack, to solve existing network Monitoring technology cannot navigate to the technical issues of specific client in LAN.
To achieve the above object, the present invention provides a kind of method for detecting and solving local network attack, including following step Suddenly:
Server is truncated to the MAC Address for the client for manufacturing a large amount of messages by packet catcher, by the MAC of client The MAC Address of book server MAC and is write notice message as source MAC and is sent to LAN by location as a purpose;Client End is parsed after receiving the notice message of server transmission, if the purpose MAC in message with the machine MAC successful match, Alert box is popped up, client user is prompted to stop sending rubbish message, and assembles back message and returns to server;Interchanger After the notice message for receiving server transmission, composition backtracking message after the information of this interchanger is added, and returned in receiving port Hair;Notice message by mac address table is forwarded, and a timer is generated in forwarding port, in timer expiry, If not receiving the backtracking message that the interchanger being connected with forwarding port returns, this forwarding port is closed.
Further improvements in methods as the present invention:
It is further comprising the steps of:After interchanger receives the back message of client, if do not found in back message Exchanger information recombinates back message after then the information of this interchanger is added, further according to mac address table forwarding after restructuring Back message.
Interchanger forwards notice message by mac address table, comprises the following steps:Interchanger identifies notice message Source MAC and purpose MAC, and searched according to mac address table and record the corresponding receiving ports of source MAC and purpose of notice message Corresponding forwarding ports of MAC, and after subtracting 1 by the ttl value of notice message, according to mac address table by notice message from forwarding port It forwards.
Method is further comprising the steps of:If interchanger before timer expiry, is received to be connected with forwarding port and exchanged The backtracking message that machine returns then closes the timer of forwarding port.
Notice message, back message and backtracking message, including following information:Represent the purpose of the MAC Address of client MAC, the source MAC of MAC Address for representing server, protocol type, length, data, TTL and FCS, TTL time for survival, FCS is verification, and data include notice message, the back message of client and the backtracking message of interchanger for Differentiated Services device Mark.
The data of notice message further include:Server info and MAC address of server, recalling the data of message includes corresponding to Notice message data, and increase the port information that exchanger information and interchanger receive notice message.
The data of back message further include:Client-side information and client mac address;The number of back message after restructuring According to further including:Exchanger information and interchanger receive back message port information.
The technical concept total as one, the present invention also provides a kind of system for detecting and solving local network attack, bags It includes:
Server module, for passing through the MAC Address that packet catcher is truncated to the client for manufacturing a large amount of messages, by client The MAC Address of book server MAC and is write notice message as source MAC and is sent to office by the MAC Address at end as a purpose Domain net;
Client modules, for being parsed after the notice message of server transmission is received, if the purpose in message MAC then pops up alert box, client user is prompted to stop sending rubbish message, and assembles response with the machine MAC successful match Message returns to server;
Switch module, for after the notice message of server transmission is received, group after the information of this interchanger is added Into backtracking message, and postbacked in receiving port;It is additionally operable to forward notice message by mac address table, and at forwarding end Mouth generates a timer, in timer expiry, if not receiving the backtracking that the interchanger being connected with forwarding port returns Message then closes this forwarding port.
As being further improved for system of the invention:
Switch module is additionally operable to, after the back message of client is received, if without finding to hand in back message Change planes information, then will this interchanger information add after recombinate back message, further according to mac address table forwarding returning after restructuring Answer message.
Switch module is additionally operable to, and after notice message is received, identifies the source MAC of notice message and purpose MAC, and root It is searched according to mac address table and records the corresponding receiving ports of source MAC of notice message and the corresponding forwarding ports of purpose MAC, and After subtracting 1 by the ttl value of notice message, notice message is forwarded from forwarding port according to mac address table;Switch module is also For when interchanger receives the backtracking message for the interchanger return that is connected with forwarding port before timer expiry, closing and turning The timer of originator mouth.
The invention has the advantages that:
1st, detection of the invention and the method for solving local network attack, are controlled based on ethernet network, can quickly be determined Generate the hosts of a large amount of rubbish messages in the network of position, when network congestion is found, by server transmission notice message to Client, and the forwarding port is closed to control network using Ethernet exchanging, network congestion caused by the message that removes rubbish.Make Can quickly position rubbish message producer with the present invention, and be eliminated from network, the quick network that recovers is unobstructed, avoid because Network congestion causes loss of data or other economic losses.The procotol of customization reduces the occupancy of Internet resources, simultaneously Unnecessary communication cost in LAN is decreased, simplifies attended operation, flexibility ratio is high.
2nd, detection of the invention and the system for solving local network attack carry out net using interchanger and computer software Network detects and controls, and reduces R&D costs, need not individually research and develop the management program of other monitoring devices or complexity.
In addition to objects, features and advantages described above, the present invention also has other objects, features and advantages. Below with reference to accompanying drawings, the present invention is described in further detail.
Description of the drawings
The attached drawing for forming the part of the application is used for providing a further understanding of the present invention, schematic reality of the invention Example and its explanation are applied for explaining the present invention, is not constituted improper limitations of the present invention.In the accompanying drawings:
Fig. 1 be the preferred embodiment of the present invention agreement in three kinds of message transmitting path schematic diagrames;
Fig. 2 is the form schematic diagram of the two layer message of the preferred embodiment of the present invention;
Fig. 3 is the notice message encapsulation format schematic diagram that the server of the preferred embodiment of the present invention is sent;
Fig. 4 is the server module work flow diagram of the preferred embodiment of the present invention;
Fig. 5 is the back message encapsulation format schematic diagram that the client of the preferred embodiment of the present invention is sent;
Fig. 6 is the client modules work flow diagram of the preferred embodiment of the present invention;
Fig. 7 is the flow chart of the switch processes notice message of the preferred embodiment of the present invention;
Fig. 8 is the back message encapsulation format schematic diagram after interchanger recombinates of the preferred embodiment of the present invention;
Fig. 9 is the flow chart of the switch processes back message of the preferred embodiment of the present invention;
Figure 10 is the backtracking message encapsulation format schematic diagram through interchanger of the preferred embodiment of the present invention;
Figure 11 is the flow chart of the switch processes backtracking message of the preferred embodiment of the present invention.
Specific embodiment
The embodiment of the present invention is described in detail below in conjunction with attached drawing, but the present invention can be defined by the claims Implement with the multitude of different ways of covering.
Referring to Fig. 1, there are three types of message formats in the entire network for the protocol massages of the preferred embodiment of the present invention:Notice report Text, back message and backtracking message.Wherein, notice message is responsible for that client is notified to stop sending message.Back message is to receive The message of server is returned to after to notice message, is responsible for details of the notice server on client, back message exists By that can add the details of interchanger during first interchanger in itself by interchanger, remaining interchanger is detecting There are can directly be forwarded after the information of interchanger.It is that higher level's interchanger is returned to after notified message to recall message Whether message determines interchanger direct connection client with this.
The detection of the present invention and the method for solving local network attack, based on Ethernet switch retransmission technique, basic step It is as follows:
Server is truncated to a large amount of messages of manufacture by packet catcher and (can set a threshold value according to actual conditions, surpass It is a large amount of to cross the threshold value, and threshold value is suitably adjusted according to the number of users and network capacity of network) client MAC Address, By the MAC Address of client as a purpose MAC and using the MAC Address of book server as source MAC write-in notice message it is concurrent It send to LAN.
Client is parsed after receiving the notice message of server transmission, if the purpose MAC in message is with the machine MAC Successful match then pops up alert box, and client user is prompted to stop sending rubbish message, and assembles back message and returns to clothes Business device;After interchanger receives the back message of client, if this handed over without finding exchanger information in back message Back message is recombinated after the information addition changed planes, the back message after restructuring is forwarded further according to mac address table.
After interchanger receives the notice message of server transmission, composition backtracking message after the information of this interchanger is added, And it is postbacked in receiving port;Interchanger identifies the source MAC of notice message and purpose MAC, and searches and record according to mac address table The corresponding forwarding port of the corresponding receiving ports of source MAC and purpose MAC of notice message, and the ttl value of notice message is subtracted 1 Afterwards, notice message from forwarding port is forwarded according to mac address table, and a timer is generated in forwarding port, fixed When device time-out when, if not receiving the backtracking message returned with the interchanger that is connected of forwarding port, close this forwarding port. If interchanger before timer expiry, receives the backtracking message for the interchanger return that is connected with forwarding port, then forwarding is closed The timer of port.
The detection of the present embodiment and the system for solving local network attack, including server module, client modules and exchange Machine module.Wherein:
Server module is used to be truncated to the MAC Address for the client for manufacturing a large amount of messages by packet catcher, by client The MAC Address of book server MAC and is write notice message as source MAC and is sent to office by the MAC Address at end as a purpose Domain net.
Client modules are used to after the notice message of server transmission is received be parsed, if the purpose in message MAC then pops up alert box, client user is prompted to stop sending rubbish message, and assembles response with the machine MAC successful match Message returns to server;
Switch module, for after the notice message of server transmission is received, group after the information of this interchanger is added Into backtracking message, and postbacked in receiving port;It is additionally operable to forward notice message by mac address table, and at forwarding end Mouth generates a timer, in timer expiry, if not receiving the backtracking that the interchanger being connected with forwarding port returns Message then closes this forwarding port.Switch module is additionally operable to after the back message of client is received, if in back message In without find exchanger information, then will this interchanger information add after recombinate back message, further according to mac address table forward Back message after restructuring.Switch module is additionally operable to, after notice message is received, identify notice message source MAC and Purpose MAC, and searched according to mac address table and record notice message the corresponding receiving ports of source MAC and purpose MAC it is corresponding Port is forwarded, and after subtracting 1 by the ttl value of notice message, the notice message encapsulation format calculated after ttl value is unchanged, according to MAC Address table forwards notice message from forwarding port;Switch module is additionally operable to, when interchanger is before timer expiry When receiving the backtracking message for the interchanger return that is connected with forwarding port, the timer of forwarding port is closed.
Below by way of the detection for illustrating the present invention and the system function of local network attack is solved, synthesis illustrates to service respectively Device, client and interchanger are specifically in the mode and the form of each message for performing above-mentioned steps:
1st, server module
The software of server module on a certain computer is in a local network installed, realizes the reception of specific two layer message And transmission.The form of two layer message is as shown in Fig. 2, shown in notice message encapsulation format Fig. 3 that server is sent.Wherein:
Purpose MAC:6 bytes, the MAC Address of client;
Source MAC:6 bytes, the MAC Address of server;
Protocol type:2 bytes, are defaulted as 0xAAEE;
Mark:2 bytes, marker bit can represent three kinds of message formats, as follows:
1:Server notice message;
2:Client back message;
3:Interchanger recalls message;
TLV data (data of TLV protocol formats, type-length-value):
Mark 1:2 bytes, server info;
Length:2 bytes;
Server info:According to length computation;
Mark 2:2 bytes, MAC address of server;
Length:2 bytes;
MAC address of server:According to length computation;
TTL:4 bytes, life span (time to live), default value 20 can configure, often by an exchange data Subtract 1, if the TTL that interchanger receives is 0, abandon the message;
FCS:4 bytes, CRC-32 verifications;
Server module workflow is as shown in figure 4, step is as follows:
(1) MAC Address for the client for manufacturing a large amount of messages is truncated to by packet catcher;
(2) MAC Address of client is filled in, and notice message is sent to Ethernet;
(3) the backtracking message of interchanger return, display exchanger information, switch port information are received;
(4) back message of client return, display client-side information, switch port information are received;
(5) Network Management and Maintenance interchanger.
2nd, client modules
The software of client modules on each computer or other embedded devices is in a local network installed, is realized Specific two layer message sends and receivees.The form of two layer message is as shown in Figure 2.The back message encapsulation format that client is sent As shown in figure 5, wherein:
Purpose MAC:6 bytes, the MAC Address of server;
Source MAC:6 bytes, the MAC Address of client;
Protocol type:2 bytes, are defaulted as 0xAAEE;
Mark:2 bytes, marker bit can represent three kinds of message formats, as follows:
1:Server notice message;
2:Client back message;
3:Interchanger recalls message;
TLV data:
Mark 1:2 bytes, client-side information;
Length:2 bytes;
Client-side information:According to length computation;
Mark 2:2 bytes, client mac address;
Length:2 bytes;
Client mac address:According to length computation;
TTL:4 bytes, the value of notice message TTL are filled into back message and return to server;
FCS:4 bytes, CRC-32 verifications.
Client modules workflow is as shown in fig. 6, step is as follows:
(1) notified message, judge whether be the machine MAC Address, be not to abandon;
(2) client is prompted to stop rubbish message to send;
(3) back message is sent, notifies server.
3rd, switch module
Realize that notice message and back message all upload to CPU, utilize on each switch device in a local network CPU handles message, includes the realization of message forwarding, Packet reassembling and related algorithm.
The flow of switch processes notice message is as shown in fig. 7, step is as follows:
(1) notice message is received;
(2) backtracking message is sent to the receiving port for receiving notice message;
(3) the forwarding port of notice message is searched according to mac address table;
(4) ttl value of notice message is calculated;
(5) notice message is forwarded;
(6) forwarding port timer is started.
For the back message of client, if response can be recombinated without finding exchanger information in back message Message, as shown in Figure 2, the back message encapsulation format after restructuring is as shown in figure 8, wherein for the form of two layer message:
Purpose MAC:6 bytes, the MAC Address of server;
Source MAC:6 bytes, the MAC Address of client;
Protocol type:2 bytes, are defaulted as 0xAAEE;
Mark:2 bytes, marker bit can represent three kinds of message formats, as follows:
1:Server notice message;
2:Client back message;
3:Interchanger recalls message;
TLV data:
Mark 1:2 bytes, client-side information;
Length:2 bytes;
Client-side information:According to length computation;
Mark 2:2 bytes, client mac address;
Length:2 bytes;
Client mac address:According to length computation;
Mark 3:2 bytes, exchanger information;
Length:2 bytes;
Exchanger information:According to length computation;
Mark 4:2 bytes, interchanger receive the port information of back message;
Length:2 bytes;
Interchanger receives back message port information:According to length computation;
TTL:4 bytes, the TTL of back message, interchanger are not made an amendment;
FCS:4 bytes, CRC-32 verifications;
Switch processes back message flow is as shown in figure 9, step is as follows:
(1) back message is received;
(2) other exchanger informations, no then reconstructed file addition exchanger information are determined whether;
(3) back message is forwarded according to mac address table.
The purpose of the backtracking message of interchanger be determine whether next stage interchanger exist, if illustrate without if turn Sending out public notice under the port of message, connect is client, the forwarding port is closed at this time, to avoid more rubbish are received Message after the silent a period of time of port opens this forwarding port, recovers normal network communication again.The form of backtracking message is shown in Shown in Fig. 2, backtracking message encapsulation format is as shown in Figure 10, wherein:
Purpose MAC:6 bytes, server-side MAC Address;
Source MAC:6 bytes, the MAC Address of interchanger;
Protocol type:2 bytes, are defaulted as 0xAAEE;
Mark:2 bytes, marker bit can represent three kinds of message formats, as follows:
1:Server notice message;
2:Client back message;
3:Interchanger recalls message;
TLV data:
Mark 1:2 bytes, MAC address of server;
Length:2 bytes;
MAC address of server:According to length computation;
Mark 2:2 bytes, switch mac address;
Length:2 bytes;
Switch mac address:According to length computation;
Mark 3:2 bytes, exchanger information;
Length:2 bytes;
Exchanger information:According to length computation;
Mark 4:2 bytes, interchanger receive notice message port information;
Length:2 bytes;
Switch port:According to length computation;
TTL:4 bytes, the ttl value of notice message are filled into backtracking message after subtracting 1;
FCS:4 bytes, CRC-32 verifications.
The backtracking message that interchanger is sent after notified message is mentioned in the flow of processing notification message, under Introduce processing of the interchanger to other interchangers backtracking message in face.Switch processes backtracking message flow is as shown in figure 11, step It is as follows:
(1) timer is judged whether;
(2) there are timer, backtracking message, forwarding backtracking message are received;
(3) there is no timer, judge whether timer is overtime;
(4) the backtracking message of forwarding port is received before timer expiry, then cancels timer;
(5) the backtracking message of forwarding port is not received before timer expiry, then close port;
(6) silent port;
(7) open port and recover network communication.
The present invention is based on the realization of Ethernet switch retransmission technique, the notice report for being sent out server by Ethernet Text forwards, and by software analytic message after the notified message of client, alert box is popped up if successful match, prompts client User is held to stop sending rubbish message, and assembles back message and returns to server.
After Ethernet switch receives the notice message of server transmission, backtracking message is sent in receiving port.And it is sending out Sending end mouth generates a timer, in timer expiry, if not receiving returning for the interchanger return that is connected with forwarding port Trace back message, then closes this forwarding port.
In summary, detection of the invention and the method for solving local network attack, are controlled, energy based on ethernet network The host of a large amount of rubbish messages is generated in quick positioning network, when network congestion is found, is sent and notified by server Message closes the forwarding port to control network to client, and using Ethernet exchanging, network caused by the message that removes rubbish Obstruction.Rubbish message producer can be quickly positioned using the present invention, and is eliminated from network, the quick network that recovers leads to Freely, loss of data or other economic losses caused by network congestion are avoided.The procotol of customization reduces Internet resources It occupies, while decreases unnecessary communication cost in LAN, simplify attended operation, flexibility ratio is high.The inspection of the present invention The system surveyed and solve local network attack carries out network with computer software using interchanger and detects and controls, and reduction is ground Cost is sent out, need not individually research and develop the management program of other monitoring devices or complexity.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the invention, for the skill of this field For art personnel, the invention may be variously modified and varied.Within the spirit and principles of the invention, that is made any repaiies Change, equivalent substitution, improvement etc., should all be included in the protection scope of the present invention.

Claims (10)

  1. A kind of 1. method for detecting and solving local network attack, which is characterized in that comprise the following steps:
    Server is truncated to the MAC Address for the client for manufacturing a large amount of messages by packet catcher, and the MAC Address of client is made For purpose MAC and the MAC Address of book server is write into notice message as source MAC and is sent to LAN;
    Client is parsed after receiving the notice message of server transmission, if the purpose MAC in message is matched with the machine MAC Alert box is then popped up in success, and client user is prompted to stop sending rubbish message, and assembles back message and returns to service Device;
    After interchanger receives the notice message of server transmission, composition backtracking message after the information of this interchanger is added, and Receiving port postbacks;Notice message by mac address table is forwarded, and a timer is generated in forwarding port, in institute When stating timer expiry, if not receiving the backtracking message that the interchanger being connected with forwarding port returns, this forwarding is closed Port.
  2. 2. the method according to claim 1 for detecting and solving local network attack, which is characterized in that the method further includes Following steps:After interchanger receives the back message of client, if without finding exchanger information in back message, it will Back message is recombinated after the information addition of this interchanger, the back message after restructuring is forwarded further according to mac address table.
  3. 3. the method according to claim 1 for detecting and solving local network attack, which is characterized in that interchanger will notify to report Text is forwarded by mac address table, is comprised the following steps:Interchanger identifies the source MAC of notice message and purpose MAC, and root It is searched according to mac address table and records the corresponding receiving ports of source MAC of notice message and the corresponding forwarding ports of purpose MAC, and After subtracting 1 by the ttl value of notice message, notice message is forwarded from forwarding port according to mac address table.
  4. 4. the method according to claim 3 for detecting and solving local network attack, which is characterized in that the method further includes Following steps:If the interchanger before the timer expiry, receives returning for the interchanger return that is connected with forwarding port Trace back message, then closes the timer of forwarding port.
  5. 5. the method according to any one of claim 1 to 4 for detecting and solving local network attack, which is characterized in that institute Notice message, back message and backtracking message are stated, including following information:Represent purpose MAC, the table of the MAC Address of client Show source MAC, protocol type, length, data, TTL and the FCS of the MAC Address of server, it is TTL times for survival, described FCS is verification, and the data include the backtracking of notice message, the back message and interchanger of client for Differentiated Services device The mark of message.
  6. 6. the method according to claim 5 for detecting and solving local network attack, which is characterized in that the notice message Data further include:Server info and MAC address of server, the data of the backtracking message include the number of corresponding notice message According to, and increase exchanger information and the port information of interchanger reception notice message.
  7. 7. the method according to claim 5 for detecting and solving local network attack, which is characterized in that the back message Data further include:Client-side information and client mac address;The data of the back message after restructuring further include:It exchanges Machine information and interchanger receive back message port information.
  8. 8. a kind of system for detecting and solving local network attack, which is characterized in that including:
    Server module, for passing through the MAC Address that packet catcher is truncated to the client for manufacturing a large amount of messages, by client The MAC Address of book server MAC and is write notice message as source MAC and is sent to local by MAC Address as a purpose Net;
    Client modules, for receive server transmission notice message after parsed, if the purpose MAC in message with The machine MAC successful match then pops up alert box, and client user is prompted to stop sending rubbish message, and assembles back message Return to server;
    Switch module, for after the notice message of server transmission is received, being formed back after the information of this interchanger is added Trace back message, and is postbacked in receiving port;It is additionally operable to forward notice message by mac address table, and in the production of forwarding port A raw timer, in the timer expiry, if not receiving the backtracking that the interchanger being connected with forwarding port returns Message then closes this forwarding port.
  9. 9. the system according to claim 8 for detecting and solving local network attack, which is characterized in that the switch module It is additionally operable to, after the back message of client is received, if exchanged this without finding exchanger information in back message Back message is recombinated after the information addition of machine, the back message after restructuring is forwarded further according to mac address table.
  10. 10. detection according to claim 8 or claim 9 and the system for solving local network attack, which is characterized in that the interchanger Module is additionally operable to, and after notice message is received, is identified the source MAC of notice message and purpose MAC, and is looked into according to mac address table It looks for and records the corresponding receiving ports of source MAC of notice message and the corresponding forwarding ports of purpose MAC, and by notice message After ttl value subtracts 1, notice message is forwarded from forwarding port according to mac address table;The switch module is additionally operable to, when When the interchanger receives the backtracking message for the interchanger return that is connected with forwarding port before the timer expiry, close and turn The timer of originator mouth.
CN201711392584.1A 2017-12-21 2017-12-21 It is a kind of to detect and solve the method and system of local network attack Pending CN108111429A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711392584.1A CN108111429A (en) 2017-12-21 2017-12-21 It is a kind of to detect and solve the method and system of local network attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711392584.1A CN108111429A (en) 2017-12-21 2017-12-21 It is a kind of to detect and solve the method and system of local network attack

Publications (1)

Publication Number Publication Date
CN108111429A true CN108111429A (en) 2018-06-01

Family

ID=62210724

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711392584.1A Pending CN108111429A (en) 2017-12-21 2017-12-21 It is a kind of to detect and solve the method and system of local network attack

Country Status (1)

Country Link
CN (1) CN108111429A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745419A (en) * 2022-05-07 2022-07-12 深信服科技股份有限公司 Method, device, equipment and storage medium for acquiring MAC address of terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101123510A (en) * 2007-07-11 2008-02-13 中兴通讯股份有限公司 Method, switch and switching chip for port separation of switch
CN101202664A (en) * 2007-11-30 2008-06-18 华为技术有限公司 Method for reporting equipment information, system and method for obtaining equipment information
CN103428032A (en) * 2013-08-19 2013-12-04 杭州华三通信技术有限公司 Attack positioning and assistant positioning device and method
US8707432B1 (en) * 2004-02-06 2014-04-22 Extreme Networks, Inc. Method and system for detecting and preventing access intrusion in a network
CN107222462A (en) * 2017-05-08 2017-09-29 汕头大学 A kind of LAN internals attack being automatically positioned of source, partition method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8707432B1 (en) * 2004-02-06 2014-04-22 Extreme Networks, Inc. Method and system for detecting and preventing access intrusion in a network
CN101123510A (en) * 2007-07-11 2008-02-13 中兴通讯股份有限公司 Method, switch and switching chip for port separation of switch
CN101202664A (en) * 2007-11-30 2008-06-18 华为技术有限公司 Method for reporting equipment information, system and method for obtaining equipment information
CN103428032A (en) * 2013-08-19 2013-12-04 杭州华三通信技术有限公司 Attack positioning and assistant positioning device and method
CN107222462A (en) * 2017-05-08 2017-09-29 汕头大学 A kind of LAN internals attack being automatically positioned of source, partition method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114745419A (en) * 2022-05-07 2022-07-12 深信服科技股份有限公司 Method, device, equipment and storage medium for acquiring MAC address of terminal
CN114745419B (en) * 2022-05-07 2024-02-23 深信服科技股份有限公司 Method, device, equipment and storage medium for acquiring terminal MAC address

Similar Documents

Publication Publication Date Title
CN100382517C (en) Network QoS test method and system
US7940676B2 (en) Methods and systems for providing end-to-end testing of an IP-enabled network
EP1039694B1 (en) System wide flow aggregate process
US6405251B1 (en) Enhancement of network accounting records
CN100463418C (en) Network performance test method, system and network device
US7711751B2 (en) Real-time network performance monitoring system and related methods
US6625657B1 (en) System for requesting missing network accounting records if there is a break in sequence numbers while the records are transmitting from a source device
US7167860B1 (en) Fault tolerance for network accounting architecture
US7243143B1 (en) Flow probe connectivity determination
US6446200B1 (en) Service management
CN102204164B (en) Method and apparatus for reporting network packet-losing message
EP1039686A2 (en) Capturing quality of service
CN104486153B (en) A kind of transformer station process layer network transmission performance monitoring method based on FPGA
Shi et al. NDNLP: A link protocol for NDN
CN103840976B (en) Communication means, light device and the network equipment
CN107645398A (en) A kind of method and apparatus of diagnostic network performance and failure
CN102821009A (en) Method for monitoring ring network on basis of link layer discovery protocol and device
CN107666486A (en) A kind of network data flow restoration methods and system based on message protocol feature
US20090196301A1 (en) Methods, systems and apparatus for monitoring and/or generating communications in a communications network
CN106533832A (en) Distributed-deployment-based network flow detection system
CN107342809A (en) A kind of service feature monitoring and Fault Locating Method and device
US20100161769A1 (en) Method and System for Virtual LAN Media Access Control Trouble Diagnostics
AU2008258126B2 (en) Method, systems and apparatus for monitoring and/or generating communications in a communications network
CN101141323A (en) Method, system and equipment for controlling connectivity detection
CN108111429A (en) It is a kind of to detect and solve the method and system of local network attack

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180601

RJ01 Rejection of invention patent application after publication