CN104869120A - Active hiding method of router identity characteristic information - Google Patents

Active hiding method of router identity characteristic information Download PDF

Info

Publication number
CN104869120A
CN104869120A CN201510264761.2A CN201510264761A CN104869120A CN 104869120 A CN104869120 A CN 104869120A CN 201510264761 A CN201510264761 A CN 201510264761A CN 104869120 A CN104869120 A CN 104869120A
Authority
CN
China
Prior art keywords
information
pseudo
identity
probe messages
router
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510264761.2A
Other languages
Chinese (zh)
Other versions
CN104869120B (en
Inventor
胡宇翔
王鹏
李玉峰
刘宗海
杜飞
张风雨
李晨晖
张霞
陈祥
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
PLA Information Engineering University
Original Assignee
PLA Information Engineering University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by PLA Information Engineering University filed Critical PLA Information Engineering University
Priority to CN201510264761.2A priority Critical patent/CN104869120B/en
Publication of CN104869120A publication Critical patent/CN104869120A/en
Application granted granted Critical
Publication of CN104869120B publication Critical patent/CN104869120B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden

Abstract

The invention relates to an active hiding method of router identity characteristic information. Through a message parsing mechanism, arrived detection messages are parsed and legal detection messages and illegal detection messages are distinguished. Through a randomization pseudonym information scheduling mechanism, corresponding pseudonym information is scheduled according to an illegal message detection demand so that a hiding purpose is reached. Through dynamic perception learning, a fake identity information pool is generated so that an attacker identity which is responded and given by the router is highly similar with a node identity in a surrounding network environment and attacker identification difficulty is increased. When an identity characteristic needs to be hidden, the router adopts a Hash mapping mode to randomly select the identity characteristic to respond from the fake identity information pool according to an identity characteristic of an attacker. A consistent strategy is used so as to ensure that response contents which are given to the same attacker are consistent so that the attacker is deceived.

Description

Router identification characteristic information is hidden method initiatively
Technical field
The present invention relates to computer network security field, particularly a kind of router identification characteristic information initiatively hidden method.
Background technology
Current, network is one of infrastructure becoming information-intensive society, plays more and more important effect in daily life.Under this background, the safety of network security particularly core network just seems particular importance.Network attack person is the chief threat that current network security faces, the related protocol leak that network attack person often utilizes router to exist illegally detects the characteristic information of router, and then utilize router characteristic information routers to carry out attacking and controlling, reach the object attacking and destroy whole network.
The existence of router characteristic information is that conveniently keeper's routers is configured, administers and maintains, network attack person adopts the method for illegal detection to obtain router characteristic information, although and then routers is carried out attacking and is stamped patch to related protocol leak, but this fundamentally can not solve the safety problem of router, and network attack person implements to control toward contact by cracking administrator password routers.These are the serious threat normal operation of network and the information security of user all.
Summary of the invention
For deficiency of the prior art, the invention provides a kind of router identification characteristic information initiatively hidden method, from the angle promoting network security ability and network protection ability, for router administration plane Problems existing, by the problem causing the various identity of router to be revealed due to related protocol leak that randomization pseudo-identity response generating algorithm solves that current router exists, when invalid information probe messages enters router administration plane, by mimicry from using identity concealing technology, namely by the pseudo-identity response generating algorithm of randomization, produce pseudo-identity response message and send to opposite end, reach and the identity of assailant is hidden.
According to design provided by the present invention, a kind of router identification characteristic information is hidden method initiatively, comprises following steps:
Step 1. is resolved the probe messages arrived, and judges that whether probe messages is legal, if legal probe messages, the characteristic information that then router normal response is correct, otherwise, judge that this probe messages is as illegal probe messages, extract illegal probe messages information, enter step 2;
Step 2., for the illegal probe messages information extracted in step 1, is taked the pseudo-identity response generating algorithm of randomization to generate corresponding pseudo-identity information, is selected corresponding pseudo-identity information object group in pseudo-mib information pond;
Step 3., according to the pseudo-identity information generated in step 2, dynamically produce random uncertain pseudo-identity response information, and the pseudo-identity response information of same assailant is consistent to take consistent strategy to guarantee by the pseudo-identity response generating algorithm of randomization;
Step 4. pseudo-mib information pond stores pseudo-identity information, administers and maintains, different pseudo-identity information is stored in different pseudo-identity information object group according to the difference of identity information, stores the pseudo-identity information of same identity information in same pseudo-identity information object group.
Described pseudo-mib information pond is that the MIB tree structure according to standard in router administration plane produces at random, and according to the corresponding illegal probe messages of pseudo-identity information response.
Extract illegal probe messages packets of information in described step 1 containing the characteristic information extracting illegal probe messages, described characteristic information comprises IP address and detection content characteristic.
The pseudo-identity response generating algorithm of described randomization adopts the Hash mapping algorithm in the pseudo-identity information scheduling mechanism of randomization.
Beneficial effect of the present invention:
1. the active hidden method that the present invention proposes is learnt by dynamic sensing, generate false identities information pool, router is responded and to the node identities in the identity of assailant and ambient network environment, there is higher similitude, thus increase assailant identifies difficulty; Needs carry out identity characteristic hide time; router is according to assailant's identity characteristic (IP address, detection feature content etc.); Hash mapping mode Stochastic choice identity characteristic from false identities information pool is taked to respond; and take consistent strategy to guarantee to reply to the response contents of same assailant unanimously, lure that assailant is deceived into.
2. the present invention is by packet parsing mechanism, resolves, distinguish legal probe messages and illegal probe messages to the probe messages arrived; By the pseudo-identity information scheduling mechanism of randomization, realizing according to the detection demand dispatch of invalid packet is that identity information is to reach hiding object accordingly; Wherein, pseudo-mib information pond, builds by the MIB tree structure of standard, realizes the generation of pseudo-identity information, store and management; The pseudo-identity response generating algorithm of randomization, for generating the pseudo-identity information consistent with the demand that illegally detects, reaching initiatively hide object by carrying out pseudo-identity response to illegal detection.
accompanying drawing illustrates:
Fig. 1 is schematic flow sheet of the present invention;
Fig. 2 is probe messages process of analysis schematic diagram of the present invention;
Fig. 3 is randomization of the present invention pseudo-identity information scheduling mechanism schematic flow sheet.
embodiment:
Below in conjunction with accompanying drawing and technical scheme, the present invention is further detailed explanation, and describe embodiments of the present invention in detail by preferred embodiment, but embodiments of the present invention are not limited to this.
Embodiment one, shown in Fig. 1 ~ 2, a kind of router identification characteristic information is hidden method initiatively, comprises following steps:
Step 1. is resolved the probe messages arrived, and judges that whether probe messages is legal, if legal probe messages, the characteristic information that then router normal response is correct, otherwise, judge that this probe messages is as illegal probe messages, extract illegal probe messages information, enter step 2;
Step 2., for the illegal probe messages information extracted in step 1, is taked the pseudo-identity response generating algorithm of randomization to generate corresponding pseudo-identity information, is selected corresponding pseudo-identity information object group in pseudo-mib information pond;
Step 3., according to the pseudo-identity information generated in step 2, dynamically produce random uncertain pseudo-identity response information, and the pseudo-identity response information of same assailant is consistent to take consistent strategy to guarantee by the pseudo-identity response generating algorithm of randomization;
Step 4. pseudo-mib information pond stores pseudo-identity information, administers and maintains, different pseudo-identity information is stored in different pseudo-identity information object group according to the difference of identity information, stores the pseudo-identity information of same identity information in same pseudo-identity information object group.
Embodiment two, substantially identical with embodiment one, difference is: described pseudo-mib information pond is that the MIB tree structure according to standard in router administration plane produces at random, and according to the corresponding illegal probe messages of pseudo-identity information response.
Embodiment three, substantially identical with embodiment one, difference is: extract illegal probe messages packets of information in described step 1 containing the characteristic information extracting illegal probe messages, and described characteristic information comprises IP address and detection content characteristic.
Embodiment four, shown in Figure 3, substantially identical with embodiment one, difference is: the pseudo-identity response generating algorithm of described randomization adopts the Hash mapping algorithm in the pseudo-identity information scheduling mechanism of randomization.
The present invention is learnt by dynamic sensing, generates false identities information pool, router is responded and has higher similitude to the node identities in the identity of assailant and ambient network environment, thus increase assailant identifies difficulty; Needs carry out identity characteristic hide time; router is according to assailant's identity characteristic (IP address, detection feature content etc.); Hash mapping mode Stochastic choice identity characteristic from false identities information pool is taked to respond; and take consistent strategy to guarantee to reply to the response contents of same assailant unanimously, lure that assailant is deceived into.
The present invention is not limited to above-mentioned embodiment, and those skilled in the art also can make multiple change accordingly, but to be anyly equal to the present invention or similar change all should be encompassed in the scope of the claims in the present invention.

Claims (4)

1. a router identification characteristic information initiatively hidden method, is characterized in that: comprise following steps:
Step 1. is resolved the probe messages arrived, and judges that whether probe messages is legal, if legal probe messages, the characteristic information that then router normal response is correct, otherwise, judge that this probe messages is as illegal probe messages, extract illegal probe messages information, enter step 2;
Step 2., for the illegal probe messages information extracted in step 1, is taked the pseudo-identity response generating algorithm of randomization to generate corresponding pseudo-identity information, is selected corresponding pseudo-identity information object group in pseudo-mib information pond;
Step 3., according to the pseudo-identity information generated in step 2, dynamically produce random uncertain pseudo-identity response information, and the pseudo-identity response information of same assailant is consistent to take consistent strategy to guarantee by the pseudo-identity response generating algorithm of randomization;
Step 4. pseudo-mib information pond stores pseudo-identity information, administers and maintains, different pseudo-identity information is stored in different pseudo-identity information object group according to the difference of identity information, stores the pseudo-identity information of same identity information in same pseudo-identity information object group.
2. router identification characteristic information according to claim 1 initiatively hidden method, it is characterized in that: described pseudo-mib information pond is that the MIB tree structure according to standard in router administration plane produces at random, and according to the corresponding illegal probe messages of pseudo-identity information response.
3. router identification characteristic information according to claim 1 initiatively hidden method, it is characterized in that: extract illegal probe messages packets of information in described step 1 containing the characteristic information extracting illegal probe messages, described characteristic information comprises IP address and detection content characteristic.
4. router identification characteristic information according to claim 1 initiatively hidden method, is characterized in that: the pseudo-identity response generating algorithm of described randomization adopts the Hash mapping algorithm in the pseudo-identity information scheduling mechanism of randomization.
CN201510264761.2A 2015-05-22 2015-05-22 Router identification characteristic information active hidden method Active CN104869120B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510264761.2A CN104869120B (en) 2015-05-22 2015-05-22 Router identification characteristic information active hidden method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510264761.2A CN104869120B (en) 2015-05-22 2015-05-22 Router identification characteristic information active hidden method

Publications (2)

Publication Number Publication Date
CN104869120A true CN104869120A (en) 2015-08-26
CN104869120B CN104869120B (en) 2018-06-22

Family

ID=53914643

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510264761.2A Active CN104869120B (en) 2015-05-22 2015-05-22 Router identification characteristic information active hidden method

Country Status (1)

Country Link
CN (1) CN104869120B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105721442A (en) * 2016-01-22 2016-06-29 耿童童 Spurious response system and method based on dynamic variation and network security system and method
CN108512852A (en) * 2018-04-04 2018-09-07 中山大学 Terminal identity information protects system and method under a kind of wireless network environment
CN108924131A (en) * 2018-07-02 2018-11-30 杭州安恒信息技术股份有限公司 A kind of camera Internet of Things mimicry means of defence and device
CN109257445A (en) * 2018-11-12 2019-01-22 郑州昂视信息科技有限公司 A kind of Web service dynamic dispatching method and dynamic scheduling system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6415321B1 (en) * 1998-12-29 2002-07-02 Cisco Technology, Inc. Domain mapping method and system
CN101340322A (en) * 2008-08-29 2009-01-07 陈玲玲 Error prompt method for WEB access
CN102752303A (en) * 2012-07-05 2012-10-24 北京锐安科技有限公司 Bypass-based data acquisition method and system
CN104348789A (en) * 2013-07-30 2015-02-11 中国银联股份有限公司 Web server and method for preventing cross-site scripting attack

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6415321B1 (en) * 1998-12-29 2002-07-02 Cisco Technology, Inc. Domain mapping method and system
CN101340322A (en) * 2008-08-29 2009-01-07 陈玲玲 Error prompt method for WEB access
CN102752303A (en) * 2012-07-05 2012-10-24 北京锐安科技有限公司 Bypass-based data acquisition method and system
CN104348789A (en) * 2013-07-30 2015-02-11 中国银联股份有限公司 Web server and method for preventing cross-site scripting attack

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105721442A (en) * 2016-01-22 2016-06-29 耿童童 Spurious response system and method based on dynamic variation and network security system and method
CN105721442B (en) * 2016-01-22 2019-03-22 北京卫达信息技术有限公司 Based on dynamic mapping false response system, method and network safety system and method
CN108512852A (en) * 2018-04-04 2018-09-07 中山大学 Terminal identity information protects system and method under a kind of wireless network environment
CN108924131A (en) * 2018-07-02 2018-11-30 杭州安恒信息技术股份有限公司 A kind of camera Internet of Things mimicry means of defence and device
CN109257445A (en) * 2018-11-12 2019-01-22 郑州昂视信息科技有限公司 A kind of Web service dynamic dispatching method and dynamic scheduling system

Also Published As

Publication number Publication date
CN104869120B (en) 2018-06-22

Similar Documents

Publication Publication Date Title
CN109246108B (en) Simulated honeypot fingerprint obfuscation system and SDN network architecture thereof
CN104869120A (en) Active hiding method of router identity characteristic information
CN105721457B (en) Network security protection system and network security defence method based on dynamic mapping
JP6690644B2 (en) Security system, security method, and recording medium storing program
JP6693516B2 (en) Security system, security method, and recording medium storing program
CN104219338B (en) The generation method and device of the safe list item of authorized address analysis protocol
Tripathi et al. Analysis of various ARP poisoning mitigation techniques: A comparison
CN109495583B (en) Data security interaction method based on host characteristic confusion
JP6460112B2 (en) Security system, security method and program
引用本篇文獻時 et al. Improvement on a smart card based password authentication scheme
CN105516073B (en) Network intrusion prevention method
WO2022028513A1 (en) Data sending method and apparatus and data receiving method and apparatus for resisting network communication monitoring
US20150295950A1 (en) Method, apparatus and system for defending against network attack
CN103685181A (en) Key negotiation method based on SRTP
CN106130903B (en) SDN switch flow table encryption method based on FPGA
CN101399814B (en) Method, system and device for verifying relation between data link layer address and sending side
CN105790932B (en) A kind of encryption method by using based on machine code
CN104410642A (en) Equipment access sensing method based on ARP protocol
Salim et al. Preventing ARP spoofing attacks through gratuitous decision packet
Peng et al. Security technology analysis of IoT
Wang et al. A DoS-resilient enhanced two-factor user authentication scheme in wireless sensor networks
CN105471839B (en) A kind of method for judging router data and whether being tampered
KR101188308B1 (en) Pseudo packet monitoring system for address resolution protocol spoofing monitoring of malicious code and pseudo packet monitoring method therefor
Yang et al. Design of DHCP protocol based on access control and SAKA encryption algorithm
Hjelm et al. Situation-aware adaptive cryptography

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant