Disclosure of Invention
The invention provides a method, a device and a storage medium for determining a home source address, which are used for solving the problem that the source address verification of the prior IPv6 home for malicious attack is not provided with an effective scheme.
The invention provides the following technical scheme:
A method of determining a home source address, comprising:
Determining an IPv6 address for initiating a malicious attack;
after the IPv6 address is converted, a converted address value is obtained;
and determining a home source address of the IPv6 address according to the converted address value in an address home base, wherein the address home base comprises a corresponding relation between the address value and the home source address.
In practice, the address home library is constructed according to one or a combination of the following parameters, start_InitiaP, end_ InitIP, country, province or State, city, district, longitude and Latitude.
In practice, the home source address of the IPv6 address is determined according to the translated address value, which is MaliciousIP, by start_initip (i) < MaliciousIP < end_initip (i).
In the implementation, determining the home source address of the IPv6 address according to the converted address value in the address home library comprises the following steps:
And obtaining a record to which the address value belongs according to the converted address value, and extracting geographic position information in the record as a home source address.
In practice, the reverse conversion of the IPv6 address is performed on the first 64 bits in the IPv6 address.
In implementation, the reverse conversion is performed on the IPv6 address, and the binary IPv6 address is converted into a decimal value and then used as the converted address value.
In an implementation, performing reverse translation on the IPv6 address includes:
Converting S 1S2S3S4 into a decimal value T 1,S5S6S7S8, converting S 1S2S3S4 into a decimal value T 2,S9S10S11S12, converting S 3,S13S14S15S16 into a decimal value T 4, wherein the first 64 bits of the IPv6 address are S1S2S3S4:S5S6S7S8:S9S10S11S12:S13S14S15S16,, each S i is a hexadecimal value converted by 4 bits in a binary manner, and i is a value from 1 to 16;
T 1*248+T2*232+T3*216+T4 is calculated and this value is taken as the translated address value.
In an implementation, performing reverse translation on the IPv6 address includes:
dividing the first 64 bits in the IPv6 address into m subsections according to the subsection of the address attribution library, wherein the bit number of each subsection is C 1、C2、C3、……、Cm, and C 1+C2+C3+……+Cm = 64;
Converting binary values of C 1、C2、C3、……、Cm bits corresponding to the m subsections into decimal values T 1、T2、T3、……、Tm respectively;
Calculation of And each value is used as the address value after conversion.
An apparatus for determining a home source address, comprising:
A processor for reading the program in the memory, performing the following process:
Determining an IPv6 address for initiating a malicious attack;
after the IPv6 address is converted, a converted address value is obtained;
determining a home source address of the IPv6 address according to the converted address value in an address home base, wherein the address home base comprises a corresponding relation between the address value and the home source address;
And a transceiver for receiving and transmitting data under the control of the processor.
In practice, the address home library is constructed according to one or a combination of the following parameters, start_InitiaP, end_ InitIP, country, province or State, city, district, longitude and Latitude.
In practice, the home source address of the IPv6 address is determined according to the translated address value, which is MaliciousIP, by start_initip (i) < MaliciousIP < end_initip (i).
In the implementation, determining the home source address of the IPv6 address according to the converted address value in the address home library comprises the following steps:
And obtaining a record to which the address value belongs according to the converted address value, and extracting geographic position information in the record as a home source address.
In practice, the reverse conversion of the IPv6 address is performed on the first 64 bits in the IPv6 address.
In implementation, the reverse conversion is performed on the IPv6 address, and the binary IPv6 address is converted into a decimal value and then used as the converted address value.
In an implementation, performing reverse translation on the IPv6 address includes:
Converting S 1S2S3S4 into a decimal value T 1,S5S6S7S8, converting S 1S2S3S4 into a decimal value T 2,S9S10S11S12, converting S 3,S13S14S15S16 into a decimal value T 4, wherein the first 64 bits of the IPv6 address are S1S2S3S4:S5S6S7S8:S9S10S11S12:S13S14S15S16,, each S i is a hexadecimal value converted by 4 bits in a binary manner, and i is a value from 1 to 16;
T 1*248+T2*232+T3*216+T4 is calculated and this value is taken as the translated address value.
In an implementation, performing reverse translation on the IPv6 address includes:
dividing the first 64 bits in the IPv6 address into m subsections according to the subsection of the address attribution library, wherein the bit number of each subsection is C 1、C2、C3、……、Cm, and C 1+C2+C3+……+Cm = 64;
Converting binary values of C 1、C2、C3、……、Cm bits corresponding to the m subsections into decimal values T 1、T2、T3、……、Tm respectively;
Calculation of And each value is used as the address value after conversion.
An apparatus for determining a home source address, comprising:
An address module for determining an IPv6 address for initiating a malicious attack;
the conversion module is used for obtaining a converted address value after converting the IPv6 address;
the determining module is used for determining the home source address of the IPv6 address according to the converted address value in the address home base, wherein the address home base contains the corresponding relation between the address value and the home source address.
In practice, the address home library is constructed according to one or a combination of the following parameters, start_InitiaP, end_ InitIP, country, province or State, city, district, longitude and Latitude.
In implementations, the determining module is further configured to determine the home source address by start_initip (i) < MaliciousIP < end_initip (i), the translated address value being MaliciousIP.
In implementation, the determining module is further configured to determine, in an address home library, a home source address of the IPv6 address according to the converted address value, where the determining module includes:
And obtaining a record to which the address value belongs according to the converted address value, and extracting geographic position information in the record as a home source address.
In practice, the translation module is further configured to reverse translate the first 64 bits in the IPv6 address.
In implementation, the conversion module is further configured to convert the binary IPv6 address into a decimal value when the IPv6 address is reversely converted, and then use the decimal value as the converted address value.
In an implementation, the translation module is further configured to, when performing reverse translation on the IPv6 address, include:
Converting S 1S2S3S4 into a decimal value T 1,S5S6S7S8, converting S 1S2S3S4 into a decimal value T 2,S9S10S11S12, converting S 3,S13S14S15S16 into a decimal value T 4, wherein the first 64 bits of the IPv6 address are S1S2S3S4:S5S6S7S8:S9S10S11S12:S13S14S15S16,, each S i is a hexadecimal value converted by 4 bits in a binary manner, and i is a value from 1 to 16;
T 1*248+T2*232+T3*216+T4 is calculated and this value is taken as the translated address value.
In an implementation, the translation module is further configured to, when performing reverse translation on the IPv6 address, include:
dividing the first 64 bits in the IPv6 address into m subsections according to the subsection of the address attribution library, wherein the bit number of each subsection is C 1、C2、C3、……、Cm, and C 1+C2+C3+……+Cm = 64;
Converting binary values of C 1、C2、C3、……、Cm bits corresponding to the m subsections into decimal values T 1、T2、T3、……、Tm respectively;
Calculation of And each value is used as the address value after conversion.
A computer readable storage medium storing a computer program for performing the above method of determining a home source address.
The invention has the following beneficial effects:
in the technical scheme provided by the embodiment of the invention, after the IPv6 address for initiating the malicious attack is determined, the home source address of the IPv6 address can be determined according to the preset address home base, so that the home source address of the IPv6 address can be determined according to the IPv6 address for the malicious attack, and further, the verification of the IPv6 home source address for preventing the malicious attack can be realized.
Furthermore, the address attribution library is generated in various modes, and the generation is performed according to the network size, so that the modes are flexible and various, and the verification and the application are facilitated. The popularization application range is large or small, and the method can be used for an organization, an industry or a country or a plurality of countries. The IPv6 home address verification system for preventing malicious attacks is simple to realize and has a good application scene, and can be widely popularized and expanded after product realization.
Detailed Description
The inventors noted during the course of the invention that:
The scheme discloses a potential risk IPv6 address positioning method and a positioning server. The method mainly comprises the steps of obtaining IPv6 monitoring data in real time, generating a record containing an address with a unified IPv6 address format, a network segment identifier and a region identifier by each piece of IPv6 monitoring data, obtaining daily increment data of the IPv6 monitoring data corresponding to each preset region, comparing the daily increment data of the monitoring data of each preset region with the set maximum daily increment of the corresponding region, updating the set maximum daily increment of the region A to the daily increment data of the IPv6 monitoring data of the current region A if the daily increment data of the IPv6 monitoring data of the region A is larger than the set maximum daily increment, positioning the IPv6 address causing the daily increment in the IPv6 monitoring data of the region A to be a target IPv6 address, namely a potential risk IPv6 address, and inquiring and returning the attribution information of the target IPv6 address, so that the monitoring efficiency is improved. But this solution is a solution to find potential IPv6 addresses and does not address the problem of IPv6 home source address verification that is involved in preventing malicious attacks.
Therefore, the prior source address verification of the IPv6 attribution for malicious attack has no effective method, and even if a part of malicious IPv6 address library exists, the target IPv6 address system has the defects of complex inquiry, inconvenient operation, incapability of effectively positioning attribution information and the like.
Based on this, the embodiment of the invention provides a source address determining scheme of an IPv6 attribution for malicious attack, and a specific embodiment of the invention is described below with reference to the accompanying drawings.
FIG. 1 is a schematic flow chart of an implementation of a method for determining a home source address, and as shown in the figure, may include:
step 101, determining an IPv6 address for initiating malicious attack;
102, converting the IPv6 address to obtain a converted address value;
and 103, determining a home source address of the IPv6 address according to the converted address value in an address home base, wherein the address home base comprises a corresponding relation between the address value and the home source address.
In the implementation, determining the home source address of the IPv6 address according to the converted address value in the address home library comprises the following steps:
And obtaining a record to which the address value belongs according to the converted address value, and extracting geographic position information in the record as a home source address.
The method comprises the steps of carrying out reverse conversion on an IPv6 address of a malicious attack on the basis of an IPv6 home base to obtain a converted address value, carrying out size comparison in the home base by utilizing the converted address value to obtain a record to which the address value belongs, and extracting geographic position information in the record to realize home source address verification.
In practice, the address home library is constructed according to one or a combination of the following parameters, start_InitiaP, end_ InitIP, country, province or State, city, district, longitude and Latitude.
In specific implementation, the home source address of the IPv6 address is determined according to the converted address value, which is MaliciousIP, by the start_initip (i) < MaliciousIP < end_initip (i).
Specifically, an IPv6 address of a malicious attack can be input, then a conversion function is called to reversely convert the IPv6 address of the malicious attack, a converted address mapping value is recorded as MaliciousIP, the converted address mapping value MaliciousIP is compared with the sizes of the start_Initial IP (i) and the end_Initial IP (i) in a home base, if the start_Initial IP (i) < MaliciousIP < end_Initial (i), a record to which the address mapping value of the malicious attack belongs is obtained, and geographic position information in the record is extracted to obtain a home source address.
The following examples illustrate the invention.
First, the implementation of the IPv6 address home base will be described. The IPv6 address home base may include 7 components, namely, start_ InitIP (Start point), end_ InitIP (End point), country (Country), province or State (province or state), city (City), district (region), longitude and Latitude (latitude and longitude). Therefore, seven tuples of the IPv6 address home base are formed, namely [ Start_ InitIP |end_ InitIP |country| Province or State |City| District | Longitude and Latitude ], so that the generation and construction of the IPv6 address home base can be realized.
One possible generation implementation of the IPv6 address home library is described below.
For IPv6 address entry, the entry is any of the original 128-bit IPv6 addresses that need to be entered into the home pool.
For address generation of an IPv6 address home base, the input 128-bit IPv6 address is used for address conversion and generation, and the original 128-bit address is generated into an address in the home base which can be rapidly compared and inquired according to an address generation mode. Thereby, a value corresponding to start_initip and end_ InitIP in the home library element, or a corresponding value generated by any other IPv6 address translation between start_ InitIP and end_ InitIP is generated. The specific address generation method may at least include 2 methods, which will be described below.
And generating the geographic position of the IPv6 address home library, and mapping and generating by using the geographic position information corresponding to the input 128-bit IPv6 address. Thus, values corresponding to Country, province or State, city, district, and Longitude and Latitude in the home library element are generated. The specific generation mode can be that the mapping extraction of the geographic position is carried out according to a rule method, and at least two types of the geographic position can be divided into the following two types:
The first type is constructed aiming at a home base corresponding to the IPv6 address of the unit, the 128-bit address is segmented according to the coding rule, then the segmented original value is compared with the IPv6 coding rule of the unit to obtain specific country, province, city, district information, and then longitude and latitude information is reversely found according to urban area information.
Second, constructing a home base corresponding to the IPv6 address of the non-self unit, segmenting the 128-bit original address according to a large coding rule specified in the standard, obtaining rough count, province or state and city, district information by the large segmentation on the front side, and then reversely finding longitude and latitude information according to state, city and region information.
Fig. 2 is a schematic flow diagram of an implementation of an IPv6 home source address verification method for preventing malicious attacks, where as shown in the drawing, the IPv6 home source address verification for preventing malicious attacks may include:
step 201, inputting an IPv6 address of a malicious attack.
Step 202, calling a conversion function to reversely convert the IPv6 address of the malicious attack.
That is, the output of step 201 is received and reverse conversion is performed. The conversion modes here may include a first mode, i.e., IPv6 address conversion mode 1, and a second mode, i.e., IPv6 address conversion mode 2. Specific embodiments will be further described below.
And 203, obtaining a converted address mapping value, which is recorded as MaliciousIP.
Step 204, comparing the converted address mapping value MaliciousIP with each of the sizes of Start_InitiaP (i) and end_InitiaP (i) in the home base.
That is, the output of step 203 is received, and the size is compared. The elements of the home library here are composed of the following 7 elements, namely, start_initip, end_ InitIP, country, province or State, city, district, longitude and Latitude, respectively. The comparison of the sizes may be performed by comparing the number of different rounds/segments according to the transformation method in step 202. For example, one round/segment is performed in the case of the first mode IPv6 address translation mode 1, and m rounds/segments are performed in the case of the second mode IPv6 address translation mode 2.
Step 205, if start_initip (i) < MaliciousIP < end_initip (i), obtaining the record to which the address mapping value of the malicious attack belongs.
That is, the output of step 204 is received, and the matching location of the associated record is performed. The record matching method performs different rounds/segments according to the conversion method in step 202, and performs one round/segment if the first method is IPv6 address conversion method 1, and performs m rounds/segments if the second method is IPv6 address conversion method 2. Or directly from the number of rounds/segments performed in step 204.
And 206, extracting the geographical position information in the record to obtain the home source address.
That is, the output of step 205 is received, the geographical location information in the record is extracted, and the home source address is obtained, thereby implementing the source address verification.
In practice, the reverse conversion of the IPv6 address is performed on the first 64 bits in the IPv6 address.
In specific implementation, the reverse conversion is performed on the IPv6 address, and the converted address value is obtained by converting the binary IPv6 address into a decimal value.
The following describes the way to translate the IPv6 address, which can be as follows:
The first mode is IPv6 address translation mode 1.
In an implementation, performing reverse translation on the IPv6 address includes:
Converting S 1S2S3S4 into a decimal value T 1,S5S6S7S8, converting S 1S2S3S4 into a decimal value T 2,S9S10S11S12, converting S 3,S13S14S15S16 into a decimal value T 4, wherein the first 64 bits of the IPv6 address are S1S2S3S4:S5S6S7S8:S9S10S11S12:S13S14S15S16,, each S i is a hexadecimal value converted by 4 bits in a binary manner, and i is a value from 1 to 16;
T 1*248+T2*232+T3*216+T4 is calculated and this value is taken as the translated address value.
Specifically, in the 128-bit IPv6 address, the latter 64 bits are mainly used for identifying the host, and have little influence on information such as attribution. Thus, a 128-bit IPv6 address can be segmented, in a first step, by 64 bits. For the last 64 bits, the address is directly truncated without subsequent consideration, and for the first 64 bits, the address is converted and generated. Therefore, the address comparison speed can be greatly increased, the comparison efficiency is enhanced, and the space complexity is reduced.
And the second step is mainly to convert the address of the first 64 bits according to an absolute value method. That is, assuming that the first 64 bits of the original IPv6 address are S1S2S3S4:S5S6S7S8:S9S10S11S12:S13S14S15S16,, each S i is a hexadecimal value converted by 4 bits binary, the decimal values S 1S2S3S4 are T 1,S5S6S7S8 and T 2,S9S10S11S12 and T 3,S13S14S15S16 are T 4, respectively, and then T 1*248+T2*232+T3*216+T4 is calculated, and the value is used as an address mapping value after IPv6 address conversion of malicious attack. Taking 2009:8001:fff1:ffff as an example, the address mapping value information after address conversion can be calculated.
In the second mode, IPv6 address translation mode 2.
In an implementation, performing reverse translation on the IPv6 address includes:
dividing the first 64 bits in the IPv6 address into m subsections according to the subsection of the address attribution library, wherein the bit number of each subsection is C 1、C2、C3、……、Cm, and C 1+C2+C3+……+Cm = 64;
Converting binary values of C 1、C2、C3、……、Cm bits corresponding to the m subsections into decimal values T 1、T2、T3、……、Tm respectively;
Calculation of And each value is used as the address value after conversion.
Specifically, in the 128-bit IPv6 address, the latter 64 bits are mainly used for identifying the host, and have little influence on information such as attribution. Thus, a 128-bit IPv6 address can be segmented, in a first step, by 64 bits. For the last 64 bits, the address is directly truncated without subsequent consideration, and for the first 64 bits, the address is converted and generated. Therefore, the address comparison speed can be greatly increased, the comparison efficiency is enhanced, and the space complexity is reduced.
And secondly, the first 64 bits are mainly used for converting addresses according to a segmentation method, and then different segments are stored with different numerical values so as to facilitate the subsequent comparison of the sizes. The method comprises two links of segmentation and evaluation.
1 Segmentation, namely, assuming that the first 64 bits of the original IPv6 address are S1S2S3S4:S5S6S7S8:S9S10S11S12:S13S14S15S16,, wherein each S i is a hexadecimal value converted by 4 bits binary system, the segmentation can be determined according to the number of segments adopted by the original home base. Let m segments be divided, and the number of bits in each segment is C 1、C2、C3、……、Cm.C1+C2+C3+……+Cm =64. For example, the segments are divided into 6 segments in order of 20 bits, 4 bits, 8 bits, 4 bits, and 20 bits.
And 2, evaluating, namely respectively converting the addresses according to different segments to obtain the address converted values of the corresponding segments. The scheme is that binary values of C 1、C2、C3、……、Cm bits corresponding to m subsections are respectively converted into decimal values T 1、T2、T3、……、Tm, and then calculated And taking the values as address mapping values corresponding to different segments after IPv6 address conversion.
Based on the same inventive concept, the embodiment of the invention also provides a device for determining the home source address and a computer readable storage medium, and because the principle of solving the problems of the devices is similar to that of the method for determining the home source address, the implementation of the devices can refer to the implementation of the method, and the repetition is omitted.
In implementing the technical scheme provided by the embodiment of the invention, the method can be implemented as follows.
Fig. 3 is a schematic structural diagram of a device for determining a home source address, and as shown in the drawing, the device includes:
the processor 300 is configured to read the program in the memory 320, and execute the following procedures:
Determining an IPv6 address for initiating a malicious attack;
after the IPv6 address is converted, a converted address value is obtained;
determining a home source address of the IPv6 address according to the converted address value in an address home base, wherein the address home base comprises a corresponding relation between the address value and the home source address;
a transceiver 310 for receiving and transmitting data under the control of the processor 300.
In practice, the address home library is constructed according to one or a combination of the following parameters, start_InitiaP, end_ InitIP, country, province or State, city, district, longitude and Latitude.
In practice, the home source address of the IPv6 address is determined according to the translated address value, which is MaliciousIP, by start_initip (i) < MaliciousIP < end_initip (i).
In the implementation, determining the home source address of the IPv6 address according to the converted address value in the address home library comprises the following steps:
And obtaining a record to which the address value belongs according to the converted address value, and extracting geographic position information in the record as a home source address.
In practice, the reverse conversion of the IPv6 address is performed on the first 64 bits in the IPv6 address.
In implementation, the reverse conversion is performed on the IPv6 address, and the binary IPv6 address is converted into a decimal value and then used as the converted address value.
In an implementation, performing reverse translation on the IPv6 address includes:
Converting S 1S2S3S4 into a decimal value T 1,S5S6S7S8, converting S 1S2S3S4 into a decimal value T 2,S9S10S11S12, converting S 3,S13S14S15S16 into a decimal value T 4, wherein the first 64 bits of the IPv6 address are S1S2S3S4:S5S6S7S8:S9S10S11S12:S13S14S15S16,, each S i is a hexadecimal value converted by 4 bits in a binary manner, and i is a value from 1 to 16;
T 1*248+T2*232+T3*216+T4 is calculated and this value is taken as the translated address value.
In an implementation, performing reverse translation on the IPv6 address includes:
dividing the first 64 bits in the IPv6 address into m subsections according to the subsection of the address attribution library, wherein the bit number of each subsection is C 1、C2、C3、……、Cm, and C 1+C2+C3+……+Cm = 64;
Converting binary values of C 1、C2、C3、……、Cm bits corresponding to the m subsections into decimal values T 1、T2、T3、……、Tm respectively;
Calculation of And each value is used as the address value after conversion.
Wherein in fig. 3, a bus architecture may comprise any number of interconnected buses and bridges, and in particular, one or more processors represented by processor 300 and various circuits of memory represented by memory 320, linked together. The bus architecture may also link together various other circuits such as peripheral devices, voltage regulators, power management circuits, etc., which are well known in the art and, therefore, will not be described further herein. The bus interface provides an interface. Transceiver 310 may be a number of elements, including a transmitter and a receiver, providing a means for communicating with various other apparatus over a transmission medium. The processor 300 is responsible for managing the bus architecture and general processing, and the memory 320 may store data used by the processor 300 in performing operations.
The embodiment of the invention also provides a device for determining the source address of the home location, which comprises the following steps:
An address module for determining an IPv6 address for initiating a malicious attack;
the conversion module is used for obtaining a converted address value after converting the IPv6 address;
the determining module is used for determining the home source address of the IPv6 address according to the converted address value in the address home base, wherein the address home base contains the corresponding relation between the address value and the home source address.
In practice, the address home library is constructed according to one or a combination of the following parameters, start_InitiaP, end_ InitIP, country, province or State, city, district, longitude and Latitude.
In implementations, the determining module is further configured to determine the home source address by start_initip (i) < MaliciousIP < end_initip (i), the translated address value being MaliciousIP.
In implementation, the determining module is further configured to determine, in an address home library, a home source address of the IPv6 address according to the converted address value, where the determining module includes:
And obtaining a record to which the address value belongs according to the converted address value, and extracting geographic position information in the record as a home source address.
In practice, the translation module is further configured to reverse translate the first 64 bits in the IPv6 address.
In implementation, the conversion module is further configured to convert the binary IPv6 address into a decimal value when the IPv6 address is reversely converted, and then use the decimal value as the converted address value.
In an implementation, the translation module is further configured to, when performing reverse translation on the IPv6 address, include:
Converting S 1S2S3S4 into a decimal value T 1,S5S6S7S8, converting S 1S2S3S4 into a decimal value T 2,S9S10S11S12, converting S 3,S13S14S15S16 into a decimal value T 4, wherein the first 64 bits of the IPv6 address are S1S2S3S4:S5S6S7S8:S9S10S11S12:S13S14S15S16,, each S i is a hexadecimal value converted by 4 bits in a binary manner, and i is a value from 1 to 16;
T 1*248+T2*232+T3*216+T4 is calculated and this value is taken as the translated address value.
In an implementation, the translation module is further configured to, when performing reverse translation on the IPv6 address, include:
dividing the first 64 bits in the IPv6 address into m subsections according to the subsection of the address attribution library, wherein the bit number of each subsection is C 1、C2、C3、……、Cm, and C 1+C2+C3+……+Cm = 64;
Converting binary values of C 1、C2、C3、……、Cm bits corresponding to the m subsections into decimal values T 1、T2、T3、……、Tm respectively;
Calculation of And each value is used as the address value after conversion.
For convenience of description, the parts of the above apparatus are described as being functionally divided into various modules or units, respectively. Of course, the functions of each module or unit may be implemented in the same piece or pieces of software or hardware when implementing the present invention.
The embodiment of the invention also provides a computer readable storage medium, which is characterized in that the computer readable storage medium stores a computer program for executing the method for determining the home source address.
For implementation, reference may be made to the above-described embodiments of the method for determining a home source address.
In practice, other possible implementation configurations of the means for determining the home source address are not excluded, such as the following system.
Fig. 4 is a schematic structural diagram of an IPv6 home source address verification system for preventing malicious attacks, as shown in the figure, it may be as follows:
The IPv6 home source address verification system for preventing malicious attack can be composed of an IPv6 address input module, an IPv6 address reverse conversion module, an IPv6 address mapping value matching module and an IPv6 home source address extraction module. Therefore, the IPv6 home source address verification of malicious attack is realized, the address comparison speed can be greatly increased, the comparison efficiency is enhanced, the space complexity is reduced, and the follow-up tracing and evidence obtaining are facilitated.
The IPv6 home source address verification system for preventing malicious attack comprises 4 functional modules, namely an IPv6 address input module 401, an IPv6 address reverse conversion module 402, an IPv6 address mapping value matching module 403 and an IPv6 home source address extraction module 404. The method can be concretely as follows:
the IPv6 address input module 401 is an input item of the entire system, that is, a 128-bit IPv6 address for malicious attack.
The IPv6 address reverse conversion module 402 is configured to reverse-convert the input 128-bit IPv6 address, and convert the original 128-bit address into an address mapping value that can be quickly compared and queried according to a conversion manner.
And the IPv6 address mapping value matching module 403 is configured to compare and match the size of the converted address mapping value in the home base.
And the IPv6 home source address extraction module 404 is used for extracting the geographic position information in the record in the matching to obtain the home source address and realize source address verification.
In summary, in the technical scheme provided by the embodiment of the invention, the verification of the IPv6 home source address for preventing malicious attack can be realized. The mode is flexible and various, and is beneficial to verification and application.
The popularization application range is large or small, and the method can be used for an organization, an industry or a country or a plurality of countries.
The IPv6 home address verification system for preventing malicious attacks is simple to realize and has a good application scene, and can be widely popularized and expanded after product realization.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, magnetic disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.