An active network defense system for embedded and its defense method
An active network and defense system technology, applied in transmission systems, electrical components, etc., can solve problems such as ARP spoofing, replay attacks, and inability to accurately judge network messages, and achieve convenient and flexible use, high accuracy, and security Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0046] Embodiment one: if image 3 As shown, for ARP spoofing, the defense method of the active network defense system of the present invention, the specific steps are as follows:
[0047] 1. The system will maintain an ARP information table. When receiving an ARP response message, it will first check whether there are related entries in the current table. protocol stack.
[0048] 2. If there is an entry, it will judge whether the content of the currently received message is consistent with the description of the entry. If they are consistent, go to step 3 to determine whether the current entry is in an abnormal state. If not, the flag bit of the current table entry will be set to indicate that an exception has occurred and the same goes to step 3.
[0049] 3. When detecting the abnormal state of the table item, if the flag bit shows that it is not an abnormal state, the message will be passed directly to the protocol stack. Otherwise, it will judge whether the embedded de...
Embodiment 2
[0065] Embodiment two: if Figure 4 Shown, for network storm, SYN flood attack, the defense method of active network defense system of the present invention, concrete steps are as follows:
[0066] 1. First receive the network packet and judge whether it is a broadcast packet. If it is a broadcast packet, go to the next step. If it is not a broadcast packet, further judge whether there is an IP packet header. If there is an IP packet header, go to the next step. If not The IP packet header judges that the current packet is allowed to pass;
[0067] 2. Set the detection flag according to the message type, and judge whether there is this device information in the device information table, if not, create a new device entry information and enter the next step, if there is, directly enter the next step;
[0068] 3. Make a corresponding cumulative count judgment according to the flag bit, and judge whether the number of received messages within one second is greater than the set th...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com