Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and network appliance for preventing IPv6 packet attack

A network equipment and packet technology, applied in data exchange networks, digital transmission systems, electrical components, etc., can solve the problems of low accuracy, inability to distinguish attack packets and non-attack packets in detail, and achieve the goal of improving accuracy. Effect

Inactive Publication Date: 2008-02-06
NEW H3C TECH CO LTD
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that it is impossible to distinguish attack packets and non-attack packets in detail, and the accuracy of preventing illegal IPv6 packet attacks is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and network appliance for preventing IPv6 packet attack
  • Method and network appliance for preventing IPv6 packet attack
  • Method and network appliance for preventing IPv6 packet attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0045] Fig. 4 is the flow chart that prevents IPv6 report attack that the embodiment of the present invention provides, as shown in Fig. 4, its specific steps are as follows:

[0046] Step 401: the source node constructs a type 0 routing header in the IPv6 message, which includes the address of the specific node that the message needs to pass through to reach the final destination node, sets the remaining segment number as the total number of the specific node, and sets the IPv6 message's The address of the first hop is set to the destination address of the basic header.

[0047] Step 402: the source node sends out the IPv6 message.

[0048] Step 403: When the IPv6 packet arrives at a node, the node judges whether the destination address of the basic header is its own address, and if so, executes step 405; otherwise, executes step 40...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a network device for preventing IPv6 notice attack. The method comprises that: receiving IPv6 notices with 0 type route header, judging whether the notices meet the repeating conditions of preset route header or not according to the addresses in the 0 type route header of the notices; if the answer is yes, the notices are specified as IPv6 attacking notices, the last IPv6 address in the 0 type route header addresses of the attacking notices replaces the target address of the attacking notices, and the residua sections inside the attacking notices are set as 0 so as to subtransmit the attacking notices to the last target node corresponding to the last IPv6 address in the 0 type route header. The invention avoids the IPv6 notices are repeatedly transmitted at the same route, also enables the non attacking aimed IPv6 notices transmitted from source node to be normally subtransmitted so as to improve the accuracy on preventing IPv6 notice attacks.

Description

technical field [0001] The invention relates to the technical field of Internet protocols, in particular to a method and network equipment for preventing IPv6 message attacks. Background technique [0002] Strict source routing and free source routing are defined in IPv4, and similar functions are available in IPv6. IPv6 defines two types of routing headers, type 0 and type 2, in the routing extension header of the packet. The source node lists the addresses of specific nodes that the packet must pass through to reach the destination node in the type 0 routing header of the IPv6 packet. These specific nodes can be all nodes on the path through which the IPv6 packet passes, or some nodes on the path. [0003] Figure 1 shows a schematic diagram of the format of an IPv6 message with a type 0 routing header. As shown in Figure 1, the IPv6 message mainly consists of two parts: an IPv6 basic header and an IPv6 payload. [0004] The IPv6 basic header includes: version number, next...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/56H04L45/74
Inventor 刘经伦
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products