首页 | 官方网站   微博 | 高级检索  
     

抗灰洞攻击的IPv6网络部署改造方法
引用本文:陈守明,梁运德,钱扬,李雪武,卢妍倩.抗灰洞攻击的IPv6网络部署改造方法[J].计算机与现代化,2021,0(2):122-126.
作者姓名:陈守明  梁运德  钱扬  李雪武  卢妍倩
作者单位:广东电力信息科技有限公司,广东广州510080
摘    要:针对原有IPv6网络部署改造方法对于灰洞攻击检测能力较差,导致IPv6网络攻击预警能力较差的问题,设计一种抗灰洞攻击的IPv6网络部署改造方法。采用层次化的设计理念,将网络构架从逻辑角度分为核心层、汇聚层、接入层以及广域网与服务器的接入部分,以网络构架为基础,优化网络中使用的服务器群以及网络间接方式。设定网络检测匹配规则,将接入方式作为网络中路由器的间接方法,针对多模式网络攻击,应用多模式检测方法实现IPv6网络攻击检测。实验结果表明,本文方法的灰洞攻击预警能力较强,操作系统的兼容性较高。

关 键 词:IPv6    过渡技术    IP协议    灰洞攻击    网络部署  
收稿时间:2021-03-01

IPv6 Network Deployment and Transformation Method Against Grey Hole Attack
CHEN Shou-ming,LIANG Yun-de,QIAN Yang,LI Xue-wu,LU Yan-qian.IPv6 Network Deployment and Transformation Method Against Grey Hole Attack[J].Computer and Modernization,2021,0(2):122-126.
Authors:CHEN Shou-ming  LIANG Yun-de  QIAN Yang  LI Xue-wu  LU Yan-qian
Abstract:In view of the poor detection ability of the original IPv6 network deployment and transformation method for gray hole attack, which results in the poor early warning ability of IPv6 network attack, this paper designs an IPv6 network deployment and transformation method against gray hole attack. The network architecture is divided into core layer, convergence layer, access layer, and access part of Wan and server from a logical point of view by adopting hierarchical design concept. Based on the network architecture, the server cluster used in the network and network indirect mode are optimized. The paper sets network detection and matching rules, uses access mode as an indirect method of routers in the network, against multi-mode network attack, uses multi-mode detection method to achieve IPv6 network attack detection. The experimental results show that the designed method has strong early warning ability of gray hole attack and high compatibility of operating system.
Keywords:
本文献已被 万方数据 等数据库收录!
点击此处可从《计算机与现代化》浏览原始摘要信息
点击此处可从《计算机与现代化》下载全文
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号