WO2010110530A1 - Ipv6 네트워크 내 호스트 차단 및 탐색방법 - Google Patents
Ipv6 네트워크 내 호스트 차단 및 탐색방법 Download PDFInfo
- Publication number
- WO2010110530A1 WO2010110530A1 PCT/KR2010/000263 KR2010000263W WO2010110530A1 WO 2010110530 A1 WO2010110530 A1 WO 2010110530A1 KR 2010000263 W KR2010000263 W KR 2010000263W WO 2010110530 A1 WO2010110530 A1 WO 2010110530A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- host
- packet
- blocking
- information
- network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L45/00—Routing or path finding of packets in data switching networks
- H04L45/02—Topology update or discovery
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/02—Details
- H04L12/22—Arrangements for preventing the taking of data from a data transmission channel without authorisation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/40—Network security protocols
Definitions
- the present invention relates to a host blocking and discovery method in an IPv6 network, and more particularly, to a host blocking and discovery method in an IPv6 network using a neighbor discovery protocol (NDP) in an IPv6 network environment.
- NDP neighbor discovery protocol
- IPv4 a 32-bit address system
- Citing information from the Korea Internet & Security Agency IPv6 portal http://IPv6.vsix.net) predicts that IPv4 addresses will be exhausted after about 791 days as of January 20, 2009.
- IPv6.vsix.net the transition from IPv4 network to IPv6 network is already in progress, and the demand for using IPv6 is increasing.
- IPv6 supports automatic configuration of IP address. When it is automatically assigned, it is necessary to check the IP of all devices and maintain the information in terms of managing network resources.
- An object of the present invention is to find a host discovery method for efficient management of main network resources in an IPv6 environment, and to block and discover hosts in an IPv6 network that can establish a higher level of security by blocking unauthorized network access. To provide a method.
- the present invention transmits a Neighbor Solicitation (NS) packet in which an IP to be searched is set at an ICMPv6 target address to the network, requesting host information for the discovery IP, and then transmits the host. Waiting for a predetermined time in consideration of the processing speed and transmission rate according to the network environment and state, determining whether a NA (Neighbor Advertisement) packet of the IP to be searched after the predetermined time is received, and the NA for the request packet If a packet is received, obtaining host information from the packet.
- NA Neighbor Advertisement
- a step of requesting router information by transmitting a RS (Router Solicitation) packet to a network, waiting for a predetermined time in consideration of the processing speed of the router and the transmission speed according to the network environment and state after the packet transmission Determining whether a Router Advertisement (RA) packet is received after waiting for a predetermined time, and if the RA packet for the request packet is received, obtaining router information from the packet.
- RS Raster Solicitation
- the method comprises: capturing an NDP packet, determining whether the captured packet is one of RS, NS, NA, and if the determination result is one of RS, NS, NA, the host in the captured packet. Acquiring the information, or obtaining the router information from the captured packet if the RA is the determination result.
- the host information may optionally further include field information of a NA (Neighbor Advertisement) packet.
- NA Neighbor Advertisement
- the router information includes link-layer address information and IP address information.
- the router information may further include field information of a Router Advertisement (RA) packet.
- RA Router Advertisement
- an IP address and a link-layer address of host information or router information are managed as a list.
- a policy for network blocking of a host if a policy for network blocking of a host is set, capturing a neighbor discovery protocol (NDP) packet in a network, and determining whether to include a blocking policy according to the type of the captured packet. And, if the determination result is included in the blocking policy, blocking the host by generating a modulated NA packet for the host IP and transmitting the multicast packet to a multicast or unicast IP.
- NDP neighbor discovery protocol
- NA packets modulated with respect to the blocking host IP are received. And generating and transmitting the multicast or unicast IP to block the host.
- a modulated NA packet is set by setting a link-layer address of a neighbor advertisement packet (NA) to a virtual link layer address or a specific link layer address that does not exist in a corresponding network.
- the host may be blocked by multicasting or unicasting.
- a policy for blocking a network of a host is managed as a list.
- the policy for network blocking of the host includes an IP address or a link-layer address.
- the policy further includes a policy start time and expiration time in the policy for network blocking of the host.
- the step of blocking the host is characterized in that the blocking of the host by transmitting a modulated NA packet to the blocking host to fail the IP assignment to the network interface of the blocking host.
- the step of blocking the host may transmit a modulated NA packet of the blocking host to the hosts in the network to which the blocking host belongs to the neighbor cache as the modified NA packet information for the blocking host. It is characterized in that the host is blocked by using a method of preventing communication with the blocking host by updating a cache).
- a neighbor discovery protocol (NDP) packet captured in a network is a router solicitation (RS) or router advertisement packet (RA), it is determined whether or not to block the host using source information. do.
- NDP neighbor discovery protocol
- the NDP Neighbor Discovery Protocol
- NS neighbor solicitation
- determining whether the host is blocked using the source information, and when the determination result source information is the blocking host Determining whether a DAD (Duplicate Address Detection) confirmation packet is included, and determining a blocking host using destination information when the source information is not a blocking host.
- DAD Downlicate Address Detection
- the neighbor discovery protocol (NDP) packet captured in the network is a neighbor advertisement (NA)
- determining whether the source information is a blocking host and if the determination result source information is not a blocking host, Determining whether the information is a blocking host.
- the source information includes any one or more of a source link-layer address, a source IP address, and a target address of an ICMPv6 header.
- the destination information includes any one or more of a destination link-layer address, a destination IP address, and a target address of the ICMPv6 header.
- FIG. 1 is a flowchart illustrating a host discovery method using an NS packet and an NA packet according to the present invention.
- FIG. 2 is a flowchart illustrating a host discovery method using an RS packet and an RA packet according to the present invention.
- FIG. 3 is a flowchart illustrating a host and router discovery method through NDP packet analysis captured in a network according to the present invention.
- FIG. 4 is a flowchart illustrating a blocking method of a host according to the present invention.
- a neighbor discovery protocol (NDP) is used for discovery and blocking of a host in IPv6.
- the discovery of a host is divided into three types, the first of which requests host information of a discovery IP using a NS (Neighbor Solicitation) packet, and the host responds with a NA (Neighbor Advertisement) packet.
- the host information is obtained from the received packet.
- the router requests a router information by using a router solicitation (RS) packet, and obtains router information from the received packet when the router receiving the RS packet responds with a router advertisement packet (RA). .
- RS router solicitation
- RA router advertisement packet
- host and router information may be obtained according to types.
- the present invention relates to host blocking and discovery in an IPv6 network environment, and may be confused with IPv4 when specified as IP. Therefore, for items not specifically designated as IPv4, IPv6 and IPv6 networks are meant.
- IPv6 the base technology in IPv6 will be described.
- ICMP stands for Internet Control Message Protocol, which allows you to send and receive messages about network status, and operates at the same Layer 3 network layer as IP.
- ICMP is basically a protocol operating in IPv4 and its main functions are shown in Table 1.
- Table 1 division function Explanation Error Messages Destination Unreachable Message sent to the sender when a packet fails to reach its destination, containing various detailed error messages depending on network conditions Time Exceeded Messages that occur because the time-to-live value is set to 0 Redirect Message used when sending data through a router other than the default router on a network with multiple routers Source Quench Message sent to the sender when too much data is received by the destination for processing.
- IPF is the ICMP used in Six.
- the basic functions are the same as ICMP, and some protocols (ARP, RARP, IGMP) used in IPv4 are additionally included as shown in Table 2.
- Router Solicitation Message that the host raises to find the router Router Advertisement Message used when the router sends to the hosts the information needed to communicate (prefix, MTU ).
- Neighbor Solicitation Message issued by host to verify link layer address of neighboring host Neighbor advertisement A message sent by the host to the other host to announce its link layer address when an NS request is made. Redirect Same as IPv4
- NDP is a protocol that IPF uses to communicate with neighboring hosts in Sixth environment. It is included in ICMPv6 and replaces the function of Address Resolution Protocol (ARP) in IPv4 environment. The main functions of NDP are shown in Table 3.
- the host discovers a router existing in the network by using router solicitation and router advertisement messages and receives prefix information of the network.
- Address resolution IPF replaces IPv4's Address Resolution Protocol (ARP) in Six NDP.
- the host verifies the link layer address of the neighbor node using a neighbor solicitation and a neighbor advertisement message. Redirect Same functionality as the redirect message in IPv4, which is used to send data through a router other than the default router in a network with multiple routers.
- Router Advertisement A packet that informs a host of its own information.
- the router provides the host with its link layer address, IP, prefix, and MTU information.
- RA packets are periodically provided by multicast IP, and are often provided at the request of an RS packet.
- Neighbor Solicitation A packet in which a host requests link layer address information to communicate with a peripheral host. After configuring an IP, it is also used to determine if the IP is already in use on the network (DAD).
- IP is configured to check whether the IP is already in use through the DAD process.
- DAD is a method of checking whether an IP to be used is currently in use on a network, and expects no response by sending an NS packet containing the IP to be used on the network.
- Hosts in the network that receive the NS packet for DAD verification send a NA packet to the host that sent the NS packet if it is identical compared to its IP, and update the neighbor cache if it is not the same.
- the host performing the DAD receives the NA packet, it determines that the IP to be used is already in use.
- the host A to be used first transmits NS packets at a RetransTimer time interval by the set DupAddrDetectTransmits value, and then waits for a RetransTimer time. If there is no NA packet response over the RetransTimer time, the newly allocated IP is assigned to the interface and communication starts. On the other hand, when another host B is using the IP, if host A tries to use the same IP, host B sends an NA packet to host A to inform that it is already in use. In this way, the host A fails to assign the IP by checking the NA packet for the corresponding IP.
- a host connected to a network may be searched by using an NDP (Neighbor Solicitation) packet, an Neighbor Advertisement (NA) packet, a Router Solicitation (RS) packet, and a Router Advertisement (RA) packet.
- NDP Neighbor Solicitation
- NA Neighbor Advertisement
- RS Router Solicitation
- RA Router Advertisement
- the host information referred to herein basically means link-layer address information and IP address information, and may optionally further include field information of the NA packet according to a situation.
- the router information basically means link-layer address information and IP address information, and may optionally further include field information of the RA packet according to a situation.
- FIG. 1 is a flowchart illustrating a host discovery method using an NS packet and an NA packet according to the present invention.
- an NS packet in which an IP to be searched is set at an ICMPv6 target address is transmitted to the network to request host information for the search IP (step S11).
- the processor waits for a predetermined time in consideration of the processing speed of the host and the transmission speed according to the network environment and state (step S12).
- step S13 it is determined whether an NA packet of an IP to be searched is received. If an NA packet for a request packet is received, host information is obtained from the corresponding packet (step S14). On the other hand, if there is no NA packet received in step S13, the process ends.
- FIG. 2 is a flowchart illustrating a host discovery method using an RS packet and an RA packet according to the present invention.
- router information is requested by transmitting an RS packet to a network (step S21).
- the router waits for a predetermined time in consideration of the processing speed of the router and the transmission speed according to the network environment and state (step S22).
- step S23 it is determined whether the RA packet is received (step S23), and if the RA packet is received, router information is obtained from the packet (step S24). On the other hand, if there is no RA packet received in step S23, the processing ends.
- FIG. 3 is a flowchart illustrating a host and router discovery method through NDP analysis captured in a network according to the present invention.
- step S31 if an NDP packet is captured (step S31), it is determined whether the packet is one of RS, NS, NA (step S33).
- step S32 If the result of the determination is one of RS, NS, NA, host information is obtained from the captured packet (step S32). If the packet is not one of RS, NS, NA, it is determined whether it is an RA packet (step S34).
- router information is obtained from the captured packet (step S35).
- step S34 If the RA packet is not in step S34, the processing ends.
- the host blocking of the present invention uses a duplicate address detection (DAD) operation, and a modulated neighbor advertisement packet (NA) packet of a blocking host, which is described below, refers to a link-layer address of a blocking host to a corresponding network. It means a NA packet in which a virtual link layer address or a specific link layer address that does not exist is set.
- DAD duplicate address detection
- NA modulated neighbor advertisement packet
- a DAD acknowledgment packet is captured for a host to use an IP in the network
- the host responds with a modulated NA packet of the blocking host.
- the blocking host that receives the NA packet determines that the corresponding IP is already in use by the DAD operation, and IP allocation to the network interface fails.
- the modulated NA packet of the blocking host is transmitted as an all-node multicast IP. do.
- Hosts in the network receive the modulated NA packet of the blocking host and update the neighbor cache to fail communication with the blocking host.
- a blocking IP address or a blocking link layer address is set as setting information when setting a policy for blocking a host, and both items may be set. It may also optionally include a start time and end time of the policy.
- capturing an NDP packet confirms the type of packet (RS, RA, NS, NA) and determines whether it is included in the blocking policy according to the type of packet. If it is included in the blocking policy, check whether it is a DAD acknowledgment packet, if it is a DAD acknowledgment packet, respond with NA packet modulated by the blocking host, and if not, block it with all-node multicast IP. Blocking is performed by transmitting the modulated NA packet of the host. On the other hand, if the policy is not included, the packet is ignored and allowed to communicate.
- blocking is performed using a method of transmitting a modulated NA packet of the blocking host to all-node multi IP in addition to the method of responding with a modulated NA packet to the blocking host. You may.
- FIG. 4 is a flowchart illustrating a blocking method of a host according to the present invention.
- the source information is a source link-layer address or a source IP address
- the destination information is a destination link-layer address or a destination IP address.
- the method of distinguishing the blocking hosts is based on the IP address and the link layer address information.
- the target address of the ICMP6 header is replaced with source IP or destination IP address information for processing.
- step S41 when an NDP packet is captured (step S41), it is determined whether the captured packet is a router solicitation (RS) or a router advertisement (RA) (step S42).
- RS router solicitation
- RA router advertisement
- step S43 it is determined whether the source information is a blocking host (step S43). If the determination result indicates that the source information is the blocking host, the modulated NA packet of the blocking host is transmitted to the all-node multicast IP (step S51).
- step S44 If it is not an RS packet or an RA packet in step S42, it is determined whether it is a neighbor solicitation (NS) packet (step S44). If the determination result is NS packet, it is determined whether the source information is a blocking host (step S45). If the determination result indicates that the source information is a blocking host (step S47), and if the DAD confirmation packet transmits the NA packet modulated to the blocking host (step S52), the processing ends. If it is determined in step S47 that the packet is not a DAD confirmation packet, the process ends after step S51.
- NS neighbor solicitation
- step S45 If the source information is not the blocking host in step S45, it is determined whether the destination information is the blocking host (step S46).
- step S51 If the destination information is determined to be a blocking host, the process ends after step S51. If it is determined in step S46 that it is not a blocking host, the process ends.
- step S48 determines whether it is a NA (Neighbor Advertisement) packet. If the result of the determination is an NA packet, it is determined whether the source information is a blocking host (step S49). If it is determined that the source information is a blocking host, the process ends after performing step S51. On the other hand, if it is determined that the host is not the blocked host, it is determined whether the destination information is the blocked host (step S50). If the destination information is determined to be a blocking host, the process ends after performing step S51 similarly, and if the destination information is not determined to be a blocking host, the process ends. On the other hand, if the result of the determination in step S48 is not a NA packet, the process ends.
- NA Neighbor Advertisement
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
| 구분 | 기능 | 설명 |
| Error Messages | Destination Unreachable | 패킷이 목적지에 도달하지 못할 경우 송신지에 보내는 메시지로, 네트워크 상황에 따라 다양한 세부 에러 메시지가 포함됨 |
| Time Exceeded | TTL(Time-to-Live)값이 0으로 설정됨으로 인해 발생하는 메시지 | |
| Redirect | 여러 개의 라우터가 존재하는 네트워크에서 기본 라우터 외에 다른 라우터를 통해 데이터를 전송할 때 사용되는 메시지 | |
| Source Quench | 목적지에서 처리하기에 너무 많은 양의 데이터를 수신할 때 송신지에 보내는 메시지 | |
| Parameter Problem | IP 데이터그램 자체에 문제가 있을 경우 발생하는 메시지 | |
| Informational Messages | Echo Request /Echo Reply | 원격시스템 동작상태 확인 메시지 |
| Timestamp Request /Timestamp Reply | 송신 시스템에서 특정 네트워크의 대기시간을 파악하는데 사용되는 메시지 | |
| Address Mask Request /Address Mask Reply | 호스트가 로컬 네트워크의 서브넷 마스크를 파악하는데 사용되는 메시지 | |
| Router Solicitation /Router Advertisement | 호스트가 사용자의 설정 없이 동적으로 라우터 정보를 갱신할 때 사용되는 메시지 |
| 구분 | 기능 | 설명 |
| Error Messages | Destination Unreachable | IPv4와 동일 |
| Packet Too Big | 송신지와 수신지 사이 경로에 MTU를 초과하는 경우 발생하는 메시지아이피브이 식스는 송신지와 수신지만이 패킷을 분할/결합을 할 수 있다. | |
| Time Exceeded | IPv4와 동일 | |
| Parameter Problems | IPv4와 동일 | |
| Informational Messages | Echo Request / Echo Reply | IPv4와 동일 |
| Group Membership | Multicast group에 포함/제외/질의 등이 필요할 때 사용되는 메시지 | |
| Router Solicitation | 호스트가 라우터를 찾기 위해 발생시키는 메시지 | |
| Router Advertisement | 라우터가 호스트들에게 통신을 위해 필요한 정보(prefix, MTU...)를 전송할 때 사용되는 메시지 | |
| Neighbor Solicitation | 호스트가 인접 호스트의 링크층 어드레스를 확인하기 위해 발생시키는 메시지 | |
| Neighbor Advertisement | NS 요청이 있을 때 해당 호스트가 자신의 링크층 어드레스를 알리기 위해 상대편 호스트에게 보내는 메시지 | |
| Redirect | IPv4와 동일 |
| 기능 | 설명 |
| Router and Prefix Discovery | 호스트는 라우터 요청(Router Solicitation)과 라우터 광고(Router Advertisement) 메시지를 이용하여 네트워크에 존재하는 라우터를 발견하고 해당 네트워크의 prefix 정보를 수신받는다. |
| Address Resolution | 아이피브이 식스의 NDP에서 IPv4의 ARP(Address Resolution Protocol)의 기능을 대신한다. 호스트는 이웃 요청(Neighbor Solicitation)과 이웃 광고(Neighbor Advertisement) 메시지를 이용해서 인접 노드의 링크층 어드레스를 확인한다. |
| Redirect | IPv4의 redirect메시지와 기능이 동일하다.여러 개의 라우터가 존재하는 네트워크에서 기본 라우터 외에 다른 라우터를 통해 데이터를 전송할 때 사용되는 메시지 |
| 구분 | 설명 |
| RS(Router Solicitation) | 호스트가 빠른 네트워크 정보 획득을 위해 RA 정보를 요청하는 패킷 |
| RA(Router Advertisement) | 라우터가 자신의 정보를 호스트에게 알려주는 패킷으로, 자신의 링크층 어드레스, IP를 비롯하여 prefix, MTU정보를 호스트에게 제공한다. RA패킷은 주기적으로 multicast IP로 제공되며, RS패킷의 요청에 의해서 수시로 제공된다. |
| NS(Neighbor Solicitation) | 호스트가 주변 호스트와 통신하기 위해 링크층 어드레스 정보를 요청하는 패킷. IP를 구성한 후 해당 IP가 네트워크에 이미 사용 중인지 아닌지 확인하기 위해(DAD) 사용되기도 함 |
| NA(Neighbor Advertisement) | NS의 요청에 의해서 보내지거나, 호스트가 자신의 정보(링크층 어드레스, 라우터 동작 유무)를 빠르게 전파하기 위해 multicast IP로 제공되는 패킷 |
| Redirect | 네트워크에 하나 이상의 라우터가 존재할 경우 더 나은 경로로 보내기 위해 호스트에게 패킷의 경로를 바꾸게 하는 패킷 |
Claims (20)
- 탐색하고자 하는 IP를 ICMPv6 목표 어드레스(target address)에 설정한 NS(Neighbor Solicitation) 패킷을 네트워크에 전송하여 탐색 IP에 대한 링크층 어드레스(link-layer address) 정보와 IP 어드레스 정보를 포함하는 호스트 정보를 요청하는 단계;패킷 전송 후 호스트의 처리속도와 네트워크 환경 및 상태에 따른 전송속도를 고려하여 일정시간 대기하는 단계;상기 일정시간 대기 후 상기 탐색하고자 하는 IP의 NA(Neighbor Advertisement) 패킷이 수신되었는지를 판정하는 단계; 및요청패킷에 대한 NA 패킷이 수신되었으면 해당 패킷에서 호스트 정보를 획득하는 단계를 포함하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 탐색방법.
- RS(Router Solicitation) 패킷을 네트워크에 전송하여 링크층 어드레스(link-layer address) 정보와 IP 어드레스 정보를 포함하는 라우터 정보를 요청하는 단계;패킷 전송 후 라우터의 처리속도와 네트워크 환경 및 상태에 따른 전송속도를 고려하여 일정시간 대기하는 단계;상기 일정시간 대기 후 RA(Router Advertisement) 패킷이 수신되었는지를 판정하는 단계; 및요청패킷에 대한 RA 패킷이 수신되었으면 해당 패킷에서 라우터 정보를 획득하는 단계를 포함하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 탐색방법.
- NDP 패킷을 캡처하는 단계와;캡처한 패킷이 RS, NS, NA중 하나인지를 판정하는 단계; 및판정결과 RS, NS, NA 중 하나라면 캡처된 패킷에서 링크층 어드레스(link-layer address) 정보와 IP 어드레스 정보를 포함하는 호스트 정보를 획득하거나, 판정결과 RA라면 캡처된 패킷에서 라우터 정보를 획득하는 단계를 포함하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 탐색방법.
- 제 1항 또는 제 3항에 있어서,상기 호스트 정보는 NA(Neighbor Advertisement) 패킷의 필드정보를 선택적으로 더 포함하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 탐색방법.
- 제 3항에 있어서,상기 라우터 정보는 링크층 어드레스(link-layer address) 정보와 IP 어드레스 정보를 포함하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 탐색방법.
- 제 2항 또는 제 3항에 있어서,상기 라우터 정보는 RA(Router Advertisement) 패킷의 필드정보를 선택적으로 더 포함하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 탐색방법.
- 제 1항 내지 제 3항중 어느 한 항에 있어서,상기 호스트 정보 또는 상기 라우터 정보 중 적어도 하나는 IP 어드레스와 링크층 어드레스(link-layer address)를 리스트로 관리하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 탐색방법.
- 호스트의 네트워크 차단을 위한 정책이 설정되면, 네트워크 내에서 NDP(Neighbor Discovery Protocol) 패킷을 캡처하는 단계;캡처한 패킷의 종류에 따라 차단정책 포함 여부를 판정하는 단계; 및판정 결과 차단정책에 포함될 경우, 상기 호스트 IP에 대해서 변조된 NA 패킷을 생성하여 멀티캐스트(multicast) 또는 유니캐스트(unicast) IP로 전송함으로써 호스트의 차단을 실시하는 단계를 포함하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 차단방법.
- 호스트의 네트워크 차단을 위한 정책이 설정되면, 네트워크 내에서 차단호스트의 NDP(Neighbor Discovery Protocol) 패킷이 캡쳐되지 않은 상황에서, 차단호스트 IP에 대해서 변조된 NA 패킷을 생성하여 멀티캐스트(multicast) 또는 유니캐스트(unicast) IP로 전송함으로써 호스트의 차단을 실시하는 단계를 포함하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 차단방법.
- 제 8항 또는 제 9항에 있어서,상기 NA(Neighbor Advertisement) 패킷의 링크층 어드레스(link-layer address)를 해당 네트워크에 존재하지 않는 가상의 링크층 어드레스 또는 특정 링크층 어드레스로 설정한 변조된 NA 패킷을 멀티캐스트(multicast) 하거나 유니캐스트(unicast) 함으로써 호스트의 차단을 수행하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 차단방법.
- 제 8항 또는 제 9항에 있어서,상기 호스트의 네트워크 차단을 위한 정책이 리스트로 관리되는 것을 특징으로 하는 IPv6 네트워크 내 호스트 차단방법.
- 제 8항 또는 제 9항에 있어서,상기 호스트의 네트워크 차단을 위한 정책은 IP 어드레스 또는 링크층 어드레스(link-layer address)를 포함하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 차단방법.
- 제 8항 또는 제 9항에 있어서,상기 호스트의 네트워크 차단을 위한 정책에서 정책 시작시간과 만료시간을 더 포함하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 차단방법.
- 제 8항 또는 제 9항에 있어서,상기 호스트의 차단을 실시하는 단계는,상기 차단 호스트에 변조된 NA 패킷을 전송하여 상기 차단 호스트의 네트워크 인터페이스에 IP할당을 실패하게 함으로써 호스트의 차단을 수행하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 차단방법.
- 제 8항 또는 제 9항에 있어서,상기 호스트의 차단을 실시하는 단계는,상기 차단 호스트가 속한 네트워크 내 호스트들에게 상기 차단 호스트의 변조된 NA 패킷을 전송하여 상기 차단 호스트에 대한 변조된 NA 패킷 정보로 이웃 캐시(neighbor cache)를 갱신하게 함으로써 상기 차단 호스트와 통신이 되지 않게 하는 방법을 이용하여 호스트의 차단을 수행하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 차단방법.
- 제 9항에 있어서,상기 네트워크 내에서 캡처된 NDP(Neighbor Discovery Protocol) 패킷이 RS(Router Solicitation) 또는 RA(Router Advertisement) 패킷이라면, 근원지 정보를 이용하여 차단호스트 여부를 판정하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 차단방법.
- 제 9항에 있어서,상기 네트워크 내에서 캡처된 NDP(Neighbor Discovery Protocol) 패킷이 NS(Neighbor Solicitation)라면, 근원지 정보를 이용하여 차단호스트인지 판정하는 단계;판정결과 근원지 정보가 차단호스트일 경우 DAD(Duplicate Address Detection) 확인 패킷인지 판정하는 단계; 및근원지 정보가 차단호스트가 아닐 경우 목적지 정보를 이용하여 차단호스트를 판정하는 단계를 포함하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 차단방법.
- 제 9항에 있어서,상기 네트워크 내에서 캡처된 NDP(Neighbor Discovery Protocol) 패킷이 NA(Neighbor Advertisement)라면, 근원지 정보가 차단호스트인지 판정하는 단계; 및판정결과 근원지 정보가 차단호스트가 아니라면 목적지 정보가 차단호스트인지 판정하는 단계를 포함하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 차단방법.
- 제 16항 내지 제 18항중 어느 한 항에 있어서,상기 근원지 정보는 소스 링크층 어드레스(source link-layer address), 소스 IP 어드레스(source IP address), ICMPv6 헤더의 목표 어드레스(target address)중 어느 하나 이상을 포함하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 차단방법.
- 제 17항 또는 제 18항에 있어서,상기 목적지 정보는 목적지 링크층 어드레스(destination link-layer address), 목적지 IP 어드레스(destination IP address), ICMPv6 헤더의 목표 어드레스(target address)중 어느 하나 이상을 포함하는 것을 특징으로 하는 IPv6 네트워크 내 호스트 차단방법.
Priority Applications (3)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201080002700.4A CN102165741B (zh) | 2009-03-20 | 2010-01-15 | 在ipv6网络中用于封锁和搜索主机的方法 |
| JP2011525998A JP4975190B2 (ja) | 2009-03-20 | 2010-01-15 | IPv6ネットワーク内のホストの探索方法 |
| US13/121,681 US8189580B2 (en) | 2009-03-20 | 2010-01-15 | Method for blocking host in IPv6 network |
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| KR10-2009-0024074 | 2009-03-20 | ||
| KR20090024074A KR100908320B1 (ko) | 2009-03-20 | 2009-03-20 | IPv6 네트워크 내 호스트 차단 및 탐색방법 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2010110530A1 true WO2010110530A1 (ko) | 2010-09-30 |
Family
ID=41337744
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/KR2010/000263 Ceased WO2010110530A1 (ko) | 2009-03-20 | 2010-01-15 | Ipv6 네트워크 내 호스트 차단 및 탐색방법 |
Country Status (5)
| Country | Link |
|---|---|
| US (2) | US8189580B2 (ko) |
| JP (3) | JP4975190B2 (ko) |
| KR (1) | KR100908320B1 (ko) |
| CN (1) | CN102165741B (ko) |
| WO (1) | WO2010110530A1 (ko) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9198664B2 (en) | 2009-04-01 | 2015-12-01 | Sentreheart, Inc. | Tissue ligation devices and controls therefor |
| US9992159B2 (en) | 2012-06-11 | 2018-06-05 | Nec Corporation | Communication information detecting device and communication information detecting method |
Families Citing this family (15)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9270638B2 (en) * | 2012-01-20 | 2016-02-23 | Cisco Technology, Inc. | Managing address validation states in switches snooping IPv6 |
| KR101352352B1 (ko) * | 2012-03-02 | 2014-01-16 | 건국대학교 산학협력단 | IPv6 네트워크에서 호스트 장치 차단 방법, 그리고 이를 구현한 네트워크 관리장치 |
| KR101296376B1 (ko) * | 2012-03-02 | 2013-08-14 | 건국대학교 산학협력단 | IPv6 네트워크에서 호스트 장치 차단 방법, 그리고 이를 구현한 네트워크 관리장치 |
| KR101235157B1 (ko) * | 2012-03-09 | 2013-02-25 | (주)넷맨 | IPv6를 지원하는 네트워크 내 호스트 동작 상태 확인 및 탐색 방법 |
| KR101359369B1 (ko) | 2012-09-17 | 2014-02-07 | (주)넷맨 | ICMPv6 NIQ를 이용한 네트워크 내 호스트 동작 상태 확인 및 탐색 방법 |
| US9088608B2 (en) * | 2013-03-12 | 2015-07-21 | Cisco Technology, Inc. | Throttling and limiting the scope of neighbor solicitation (NS) traffic |
| KR101359372B1 (ko) | 2013-12-12 | 2014-02-07 | (주)넷맨 | DHCPv6 패킷을 이용한 네트워크 내 호스트 동작 상태 확인 및 탐색 방법 |
| KR101359373B1 (ko) | 2013-12-12 | 2014-02-07 | (주)넷맨 | 네트워크 내 호스트 동작 상태 확인 및 탐색 방법 |
| KR101359371B1 (ko) | 2013-12-12 | 2014-02-07 | (주)넷맨 | 네트워크에서 발생되는 패킷을 이용한 네트워크 내 호스트 동작 상태 확인 및 탐색 방법 |
| US10305800B2 (en) * | 2015-04-15 | 2019-05-28 | Hughes Network Systems, Llc | Preferential selection of IP protocol version with domain name matching on proxy servers |
| JP6476530B2 (ja) * | 2015-04-21 | 2019-03-06 | 株式会社Pfu | 情報処理装置、方法およびプログラム |
| US11159379B2 (en) * | 2016-04-15 | 2021-10-26 | Convida Wireless, Llc | Enhanced 6LoWPAN neighbor discovery for supporting mobility and multiple border routers |
| JP6676460B2 (ja) * | 2016-04-28 | 2020-04-08 | キヤノン株式会社 | 通信装置、制御方法、および、プログラム。 |
| JP7232121B2 (ja) * | 2019-05-10 | 2023-03-02 | アズビル株式会社 | 監視装置および監視方法 |
| CN114124898B (zh) * | 2021-10-22 | 2023-07-21 | 深圳中科德能科技有限公司 | 一种智能设备的自动搜索方法及装置 |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20030092322A (ko) * | 2002-05-29 | 2003-12-06 | 삼성전자주식회사 | IPv4/IPv6 통신 방법 및 그 장치 |
| KR100714131B1 (ko) * | 2005-12-07 | 2007-05-02 | 한국전자통신연구원 | IPv6 로컬 네트워크에서의 이웃 발견 서비스 거부 공격방지 장치 및 방법 |
| KR100770354B1 (ko) * | 2006-08-03 | 2007-10-26 | 경희대학교 산학협력단 | IPv6 네트워크에서 공격자 호스트의 IP를 역추적하는방법 |
| US20080310323A1 (en) * | 2007-06-15 | 2008-12-18 | Qualcomm Incorporated | Method and Apparatus for DNS Update Triggered IPv6 Neighbor Advertisement |
Family Cites Families (20)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP3402406B2 (ja) * | 1994-09-22 | 2003-05-06 | シンクレイヤ株式会社 | ブロードバンド伝送路を用いた電話システム |
| JP3915230B2 (ja) * | 1998-02-27 | 2007-05-16 | 株式会社日立製作所 | パケット生成方法およびその機能を有する情報処理装置並びにパケット生成プログラムを記録した記録媒体 |
| US20010034831A1 (en) * | 2000-04-19 | 2001-10-25 | Brustoloni Jose C. | Method and apparatus for providing internet access to client computers over a lan |
| US20030026230A1 (en) * | 2001-08-02 | 2003-02-06 | Juan-Antonio Ibanez | Proxy duplicate address detection for dynamic address allocation |
| US20040240669A1 (en) * | 2002-02-19 | 2004-12-02 | James Kempf | Securing neighbor discovery using address based keys |
| KR100484145B1 (ko) * | 2002-07-05 | 2005-04-18 | 삼성전자주식회사 | 중복 주소 노드에 가상 주소를 자동으로 할당하는 장치 및방법 |
| JP2004242142A (ja) * | 2003-02-07 | 2004-08-26 | Nippon Telegr & Teleph Corp <Ntt> | ユーザ管理方法、該方法に使用する加入者収容ルータ装置及び加入者認証サーバ装置、及び該方法を実行させるためのコンピュータプログラム |
| JP2004334684A (ja) * | 2003-05-09 | 2004-11-25 | Nec Corp | 障害連絡システム及び障害連絡装置 |
| KR100503470B1 (ko) * | 2003-08-13 | 2005-07-27 | 삼성전자주식회사 | 디스트리뷰션시스템에서 빠른 dad 수행을 위해 정보를관리하는 빠른 dad 관리자 및 이를 이용한 빠른 dad수행방법 |
| CN1898918A (zh) * | 2003-12-22 | 2007-01-17 | 皇家飞利浦电子股份有限公司 | 自动转移路由器功能的方法 |
| JP2005260615A (ja) * | 2004-03-12 | 2005-09-22 | Hitachi Ltd | ネットワーク監視装置,ネットワーク監視方法,ネットワーク監視用プログラム及びネットワーク監視用プログラムが格納された記録媒体 |
| JP4179300B2 (ja) * | 2005-03-31 | 2008-11-12 | 日本電気株式会社 | ネットワーク管理方法および装置並びに管理プログラム |
| US20080232405A1 (en) * | 2005-08-25 | 2008-09-25 | Nxp B.V. | Method and Circuit for Calculating a Timeout Parameter in a Communication Session |
| JP2007104396A (ja) * | 2005-10-05 | 2007-04-19 | Nippon Telegraph & Telephone East Corp | 不正接続防止システムおよび方法、プログラム |
| JP2007124216A (ja) * | 2005-10-27 | 2007-05-17 | Ntt Docomo Inc | 通信ノード、アクセスルータ、通信システム及び通信方法 |
| JP2007180686A (ja) * | 2005-12-27 | 2007-07-12 | Matsushita Electric Ind Co Ltd | 中継通信装置、記憶媒体、集積回路および通信システム |
| JP5164450B2 (ja) * | 2007-06-28 | 2013-03-21 | キヤノン株式会社 | 通信装置及びその制御方法とプログラム |
| JP4931234B2 (ja) * | 2007-07-05 | 2012-05-16 | キヤノン株式会社 | 情報処理装置及びその制御方法、並びにプログラム |
| US8312541B2 (en) | 2007-07-17 | 2012-11-13 | Cisco Technology, Inc. | Detecting neighbor discovery denial of service attacks against a router |
| US7953097B2 (en) * | 2009-01-09 | 2011-05-31 | Alcatel Lucent | Neighbour discovery protocol mediation |
-
2009
- 2009-03-20 KR KR20090024074A patent/KR100908320B1/ko active Active
-
2010
- 2010-01-15 CN CN201080002700.4A patent/CN102165741B/zh active Active
- 2010-01-15 WO PCT/KR2010/000263 patent/WO2010110530A1/ko not_active Ceased
- 2010-01-15 US US13/121,681 patent/US8189580B2/en active Active
- 2010-01-15 JP JP2011525998A patent/JP4975190B2/ja active Active
-
2011
- 2011-12-13 JP JP2011272336A patent/JP2012085335A/ja active Pending
-
2012
- 2012-04-26 US US13/457,402 patent/US20120207167A1/en not_active Abandoned
-
2013
- 2013-07-30 JP JP2013157551A patent/JP5798598B2/ja active Active
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| KR20030092322A (ko) * | 2002-05-29 | 2003-12-06 | 삼성전자주식회사 | IPv4/IPv6 통신 방법 및 그 장치 |
| KR100714131B1 (ko) * | 2005-12-07 | 2007-05-02 | 한국전자통신연구원 | IPv6 로컬 네트워크에서의 이웃 발견 서비스 거부 공격방지 장치 및 방법 |
| KR100770354B1 (ko) * | 2006-08-03 | 2007-10-26 | 경희대학교 산학협력단 | IPv6 네트워크에서 공격자 호스트의 IP를 역추적하는방법 |
| US20080310323A1 (en) * | 2007-06-15 | 2008-12-18 | Qualcomm Incorporated | Method and Apparatus for DNS Update Triggered IPv6 Neighbor Advertisement |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US9198664B2 (en) | 2009-04-01 | 2015-12-01 | Sentreheart, Inc. | Tissue ligation devices and controls therefor |
| US9992159B2 (en) | 2012-06-11 | 2018-06-05 | Nec Corporation | Communication information detecting device and communication information detecting method |
Also Published As
| Publication number | Publication date |
|---|---|
| US20110182293A1 (en) | 2011-07-28 |
| US20120207167A1 (en) | 2012-08-16 |
| CN102165741A (zh) | 2011-08-24 |
| JP4975190B2 (ja) | 2012-07-11 |
| US8189580B2 (en) | 2012-05-29 |
| KR100908320B1 (ko) | 2009-07-17 |
| JP2012502544A (ja) | 2012-01-26 |
| JP5798598B2 (ja) | 2015-10-21 |
| JP2013258739A (ja) | 2013-12-26 |
| JP2012085335A (ja) | 2012-04-26 |
| CN102165741B (zh) | 2014-10-15 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| WO2010110530A1 (ko) | Ipv6 네트워크 내 호스트 차단 및 탐색방법 | |
| US7046666B1 (en) | Method and apparatus for communicating between divergent networks using media access control communications | |
| US6888834B1 (en) | System and method for providing wireless internet services | |
| KR20040024917A (ko) | 아이피 어드레스 할당 장치 및 방법 | |
| WO2010072096A1 (zh) | IPv6环境下提高邻居发现安全性的方法及宽带接入设备 | |
| JP2001257720A (ja) | Dnsサーバ、dhcpサーバ、端末および通信システム | |
| WO2007009367A1 (en) | A method for duplicate address detection in the two-layer access network supporting ipv6 and a system thereof | |
| WO2010095324A1 (ja) | ネットワーク間接続装置 | |
| CN102025799A (zh) | 一种发现及自动配置设备的ip地址的方法 | |
| US20130089092A1 (en) | Method for preventing address conflict, and access node | |
| US8396010B2 (en) | Self-configuration of a forwarding table in an access node | |
| KR100827143B1 (ko) | 패킷 스위치 장비 및 그 방법 | |
| JP2012524491A (ja) | 加入者装置をIPv6対応のアグリゲーションネットワークに接続するための方法および装置 | |
| JP4832816B2 (ja) | 無線式パケット・ベースのネットワークの電力節減 | |
| JP2005045472A (ja) | 端末及びアドレス生成方法 | |
| JP2010239591A (ja) | ネットワークシステム、中継装置、およびネットワーク制御方法 | |
| WO2012163000A1 (zh) | 一种报文转发的方法、设备及系统 | |
| CN111541797A (zh) | 一种基于ecos的IPV6实现方法 | |
| KR20040011936A (ko) | 복수의 가상랜으로 구성된 이더넷 상에서의 스위칭 장치와이를 이용한 통신 방법 | |
| CN114221892B (zh) | Bier网络中设备自动分配方法、装置及电子设备 | |
| WO2019212268A1 (ko) | Sdn 컨트롤러의 모바일 노드 관리 방법 및 장치 | |
| WO2024219755A1 (en) | System and methods for routing downlink data packets in a thread network | |
| US20220141177A1 (en) | Remote controller source address verification and retention for access devices | |
| KR20170127852A (ko) | 하나의 서브넷에서 망분리를 구현하는 방법과 그에 따라 망분리된 네트워크 세그먼트간 arp 프로토콜을 지원하는 방법 | |
| KR100702783B1 (ko) | 동일 mac 주소를 갖는 가입자 단말 처리 시스템 및 처리방법 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| WWE | Wipo information: entry into national phase |
Ref document number: 201080002700.4 Country of ref document: CN |
|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 10756285 Country of ref document: EP Kind code of ref document: A1 |
|
| ENP | Entry into the national phase |
Ref document number: 2011525998 Country of ref document: JP Kind code of ref document: A |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 13121681 Country of ref document: US |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 10756285 Country of ref document: EP Kind code of ref document: A1 |