Moving target defense method based on Internet of Things DDoS attack

A mobile target defense and Internet of Things technology, applied in the field of Internet of Things device DDoS attack defense, can solve the problem that the protection level of Internet of Things devices cannot be compared with traditional devices and software, the security of Internet of Things devices is not sufficient, and the security of Internet of Things devices is difficult to defend, etc. problems, to reduce the impact of network bandwidth, reduce capital expenditures, and expand accessibility

Active Publication Date: 2021-08-03
NANJING UNIV OF POSTS & TELECOMM
View PDF2 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The reason is that the security aspects of IoT devices are not fully considered when designing, and traditional security scanning solutions are difficult to defend against the security of IoT devices. We have long used them to discover traditional computers, assess and manage related vulnerabilities and risks , solutions to detect and respond to potential attacks do not take into account these less secure IoT devices
Hackers are well aware that enterprise IoT devices cannot be protected at the same level as traditional devices and software

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Moving target defense method based on Internet of Things DDoS attack
  • Moving target defense method based on Internet of Things DDoS attack
  • Moving target defense method based on Internet of Things DDoS attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] Further detailed description of the technical solutions of the present invention will be described below with reference to the drawings:

[0045] like figure 1 A mobile target defense method based on an Internet DDOS attack, including the following steps.

[0046] Step 1) Build two lesible proxy nodes before the application server, the first layer agent node has M, which is N, which is n, which is a relay forwarding node. In addition, a IPv6 address pool is built. Proxy node switching address;

[0047] The IPv6 address pool allocation is detailed:

[0048] There are N IPv6 addresses in the IPv6 address pool. Select N allocated to n hidden relay forwarding nodes from n IPv6 addresses, and the remaining (NN) IPv6 addresses constitute an address pool, randomly select M individuals every time. Assigned to M identity authentication nodes;

[0049] The certification process is specific:

[0050] Step 1-1) The user issues a request to the identity authentication node, requiring au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a mobile target defense method based on an internet of things DDoS attack, and the method comprises the following steps: 1), deploying agent nodes which comprise an identity authentication node and a relay forwarding node; 2) deploying and operating a DDoS detection function at the proxy node; 3) under the condition of no DDoS attack, when a user client sends an access request, verifying the legality of the user, if the verification is passed, executing a jump protocol, jumping network connection to a relay forwarding node, and completing the access of the user to the server; 4) if the DDoS attack is detected, encrypting and switching the IPv6 addresses of all proxy nodes, and writing the encrypted IPv6 address of the identity authentication node into a domain name resolution system; 5) the identity authentication node executes a specific identity authentication method to exclude Internet of Things equipment, and 6) the real identity of an attacker is determined through the intersection of multiple times of login information. The Internet of Things DDoS attack can be resisted, and the real identity of the attacker can be determined.

Description

Technical field [0001] The present invention relates to an identical network defense method, specifically a mobile target defense method based on an Internet of Th. DDoS attack, belonging to the field of DDOS attack defense in the Internet of Things equipment. Background technique [0002] With the arrival of the 5G era, the type and number of uses of the Internet of Things equipment is also increasing, such as smart cameras, smart home appliances, etc. However, it is not sufficient for security in terms of design when the IoT device is designed, so it is often controlled by hacker to form a zombie network. While convenient people live, these Internet of Things devices also brings a threat to the security of the network environment. Among them, a simple and inexpensive attack method is often hacked by means of the Internet of Things equipment - DDOS attacks. Such as: In 2016, a hacker took a hacker with a large number of Internet of Things to make up the zombie network to the DYN...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/12H04W12/126
CPCH04L63/1458H04L61/5061H04L2101/659
Inventor 何高峰司勇瑞魏千峰肖咸财
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products