WO2005109797A1 - ネットワーク攻撃対策方法、ネットワーク攻撃対策装置及びネットワーク攻撃対策プログラム - Google Patents
ネットワーク攻撃対策方法、ネットワーク攻撃対策装置及びネットワーク攻撃対策プログラム Download PDFInfo
- Publication number
- WO2005109797A1 WO2005109797A1 PCT/JP2005/008679 JP2005008679W WO2005109797A1 WO 2005109797 A1 WO2005109797 A1 WO 2005109797A1 JP 2005008679 W JP2005008679 W JP 2005008679W WO 2005109797 A1 WO2005109797 A1 WO 2005109797A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- attack
- information
- network
- countermeasure
- prepare
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
Definitions
- Network attack countermeasure method Network attack countermeasure device and network attack countermeasure program
- the present invention is used for realizing a network attack countermeasure method for preventing an attack on a device existing on a network or an unnecessary packet performed on the network using an unnecessary packet, the device, and the network attack countermeasure method. Regarding network attack countermeasures.
- the present invention provides a method for transmitting one or more unnecessary packets to another one or more terminals or servers by connecting one or more terminals connected to a network. If multiple devices are taking countermeasures against network attacks that interfere with services that the destination terminal connects to the network and perform, etc., each of these devices stops the attack countermeasures autonomously. And technology for converging the scope of measures.
- Arbor networks' PeakFlow detects network attacks by observing traffic at multiple points and takes countermeasures with routers and countermeasures that exist in the network. .
- each device in the network autonomously determines the stop of the attack and stops the countermeasures. At this time, the information on the attack is maintained and prepared for when the attack is restarted. If it is finally determined that the attack has stopped on all devices, each device is initialized and the attack information is deleted by a management device that can know the information of each device.
- each device is initialized without depending on the system administrator. Note that the system administrator can also issue commands to initialize each device!
- Non-Patent Document 1 PEAKFLOW SP @ Internet URL:
- Nippon Telegraph and Telephone Corporation's MovingFirewall constructs a very effective countermeasure system against DDoS attacks, but requires a management device.
- Some network attack countermeasure devices are those in which the system determines that an attack has stopped and automatically returns to a normal state.
- the present invention has been made in view of vigorous circumstances, and in a plurality of network attack countermeasures devices to which the present invention is applied, when each device autonomously determines and stops attack countermeasures,
- the objective is to provide a new network attack countermeasure technology that enables to stop the attack countermeasure while solving these problems.
- the invention according to claim 1 uses an attack on a device existing on a network or an unnecessary packet using a plurality of network attacks on a network.
- a network attack countermeasure method executed by a network attack countermeasure device that defends in cooperation with a countermeasure device, and when the countermeasure for the attack is stopped in response to the stop of the attack, the attacker side than the own device.
- the determination step needs to prepare for the restart of an attack in accordance with whether there is a network attack countermeasure device located closer to the attacker than the own device. It is characterized by determining whether there is a certain force or not.
- the invention according to claim 3 is the invention according to the above invention, as a countermeasure against the attack.
- the determination step is performed when all of the other network attack countermeasure devices to which information about the attack is notified have returned to the normal state.
- it is characterized in that it is determined that there is no need to prepare for the resumption of the attack.
- the method further includes a return notification step of notifying the apparatus of the return to the normal state, and the determination step includes a notification that all of the other network attack countermeasure apparatuses to which the information on the attack is notified have returned to the normal state. Is received, it is determined that it is not necessary to prepare for the resumption of the attack.
- the invention according to claim 6 is a network attack countermeasure that defends an attack using an unnecessary packet performed on a device existing on the network or the network in cooperation with a plurality of network attack countermeasure devices. If the countermeasure for the attack is stopped in response to the stoppage of the attack, the network attack countermeasure device located closer to the attacker than the own device has the force and the countermeasures of the attack that are actually taking measures against the attack.
- Determining means for determining whether or not it is necessary to prepare for the resumption of the attack, according to the force prepared for resumption or whether the countermeasures against the attack have been stopped and returned to the normal state, If it is determined that there is no need to prepare for the resumption of the attack, the return means that deletes the information on the attack and returns to the normal state, and the determination means prepares for the restart of the attack. If it is required it is the determine the constant that, characterized in that and a resumption comprises means obtain prepare for the resumption of the attack without deleting information about the attack.
- the determination means determines whether the network attack countermeasure device is located closer to the attacker than the own device. It is characterized in that it is determined whether or not it is necessary to prepare for restart.
- the invention according to claim 8 is the invention according to the above invention, in which information on the attack is notified to another network attack countermeasure device located closer to the attacker than the own device as a countermeasure against the attack.
- the determination means must be prepared for resuming the attack according to whether another network attack countermeasure device to which information about the attack is notified has returned to a normal state. Determining whether there is a certain force or not
- the determination means is configured such that all of the other network attack countermeasure devices to which the information on the attack is notified have returned to the normal state.
- it is characterized in that it is determined that there is no need to prepare for the resumption of the attack.
- the apparatus when the information on the attack is deleted and the state returns to the normal state, another network attack countermeasure that is a notification source of the information on the attack is provided.
- the apparatus further comprises return notification means for notifying the apparatus of the return to the normal state, wherein the determination means determines that all of the other network attack countermeasure apparatuses to which the information on the attack is notified have returned to the normal state. Is received, it is determined that it is not necessary to prepare for the resumption of the attack.
- the invention according to claim 11 is a network attack countermeasure that cooperates with a plurality of network attack countermeasure devices to prevent an attack using an unnecessary packet performed on a device existing on the network or the network.
- a network attack countermeasure program executed by a device, wherein when the countermeasure for the attack is stopped in response to the stop of the attack, the network attack countermeasure device located closer to the attacker than the own device is actually a countermeasure for the attack. To determine whether it is necessary to prepare for the resumption of the attack, depending on whether the attacker has taken action, the strength to prepare for the resumption of the attack, or the fact that the countermeasures for the attack have been stopped and returned to normal.
- the information about the attack is deleted and return to the normal state is performed.
- Konbyu a forward when it is determined that it is necessary to prepare for the resumption of an attack by the determination Priority determination procedure, and the procedure includes resuming comprises the resumption of the attack without deleting the information of have the attack Nitsu, the Data is executed.
- the determining step includes restarting the attack according to whether there is a network attack countermeasure device located closer to the attacker than the own device. It is characterized in that it is determined whether or not the force needs to be provided.
- the invention according to claim 13 is the invention according to the above invention, wherein the information on the attack is sent to another network attack countermeasure device located closer to the attacker than the own device as a countermeasure against the attack.
- the computer further executes an attack notification procedure for notifying the user that the network attack countermeasure device, to which the information is to be notified, has returned to the normal state. It is determined whether it is necessary to prepare for the resumption of the attack.
- the determination step is performed when all of the other network attack countermeasure devices to which information on the attack is notified have returned to the normal state.
- it is characterized in that it is determined that there is no need to prepare for the resumption of the attack.
- the network attack countermeasure device located on the attacker side with respect to the own device actually performs the countermeasure against the attack.
- the attacker is preparing for the resumption of the attack, or whether the attack countermeasures have been stopped and returned to the normal state, it is determined whether or not it is necessary to prepare for the resumption of the attack, and the attack is restarted. If it is determined that there is no need to prepare for the attack, the information on the attack is deleted and the system returns to the normal state.
- each device stops the attack autonomously without using a management device Even if a decision is made to stop measures, the range of measures can be effectively converged while preparing for the resumption of the attack.
- the second, seventh or twelfth aspect of the present invention it is necessary to prepare for the restart of an attack depending on whether there is a network attack countermeasure device located closer to the attacker than the own device. Therefore, even when there is no network attack countermeasure device located closer to the attacker than the own device, the range of the countermeasure can be efficiently converged while preparing for the restart of the attack. And, it has an effect.
- the information about the attack is notified to another network attack countermeasure device located closer to the attacker than the own device as a countermeasure against the attack.
- another network attack countermeasure device, to which the information is to be notified has returned to the normal state, it is determined whether or not it is necessary to prepare for the restart of the attack.
- FIG. 1 is a diagram showing an example of defense of an attack target by cooperation of a DDoS protection device.
- FIG. 2 is a diagram showing an example of a device configuration of a DDoS protection device provided with the present invention.
- FIG. 3 is a diagram showing an example of a data structure of an attack packet information DB.
- FIG. 4 is a diagram showing an example of a data structure of a device cooperation information DB.
- FIG. 5 is a diagram showing an example of a processing flow executed by a packet distribution unit.
- FIG. 6 is a diagram showing an example of a processing flow executed by an attack detection unit.
- FIG. 7 is a diagram showing an example of a processing flow executed by an attack packet handling unit.
- FIG. 8 is a diagram showing an example of a processing flow executed by a stop / restart determination unit.
- FIG. 9 is a diagram showing an example of a processing flow executed by the device cooperation unit.
- FIG. 10 is a diagram showing an example of a processing flow executed by the device cooperation unit.
- the countermeasure state of the network attack countermeasure device is a state in which the countermeasure for the attack is stopped and returned to the normal state.
- a case will be described in which it is determined whether or not there is a force necessary to prepare for the resumption of an attack according to whether or not there is a force.
- the present invention is not limited to this, and whether such countermeasure status is “measures in progress” for executing attack countermeasures, or information about the attack is retained although the attack countermeasures are stopped. Thus, it may be determined whether or not it is necessary to prepare for the resumption of the attack according to whether or not the player is in the “restart preparation state”.
- the network attack countermeasure device of the present invention protects a network attack while cooperating with another device (network attack countermeasure device). Is stored. If the attack is detected by the own device, the fact that the detected device is the own device is stored. Then, when notifying the attack information to another device, the device to which the device was notified is stored.
- the attack countermeasure device of the present invention if it is determined that the attack traffic in the monitored network has stopped during the attack countermeasure, the attack countermeasure is stopped.
- the attack information determined to be contained has not been notified to the other device, the attack information is deleted and the state returns to the normal state.
- the attack information to be deleted is information to which the power of another device has also been notified, a notification that the attack has stopped and the attack information has been deleted is sent to that device (return to the normal state). If the attack of the attack information to be deleted is detected by the own device, there is no need to notify that the attack information has been deleted. Return.
- the network attack countermeasure device of the present invention receives notification of deletion of attack information from another device, it stores the device that sent the notification. At this time, the attack countermeasures are stopped on the own device! /, Ruka! /, And the attack information deletion notification comes from all the devices to which the own device notified the attack information. Find out that.
- the own device stops the attack countermeasures, and if the notification of the deletion of the attack information is received from all the devices notified by the own device of the attack information, the own device also detects the attack information. Delete the information and return to the normal state.
- the attack information to be deleted is information to which the power of another device has also been notified, it is notified to the device that the attack has ended and the attack information has been deleted. If the attack of the attack information to be detected is detected by the own device, there is no need to notify that the attack information has been deleted, so that the state returns to the normal state.
- each device of the network attack countermeasure device of the present invention performs an attack countermeasure stop process, thereby protecting even when each device autonomously judges and stops the attack countermeasure. It is possible to converge the range of devices that are taking countermeasures against attacks that do not create a hole in the network and devices that are preparing for the restart of attacks. When the attack resumes, it is possible to immediately cope with the device that is in the process of convergence, and the range of defense can be expanded by re-notifying the device of the attack information.
- an attack countermeasure can be taken in response to an attack to flexibly change the range in which the device exists and the range in which the device exists in preparation for restarting the attack.
- each device is less likely to be overwhelmed by the saturation of attack information than before. Then, since each device can autonomously make a judgment to stop the attack countermeasure or return to a normal state, there is no need to prepare a management device for implementing these processes.
- FIG. 1 illustrates a connection example showing, as an embodiment of the present invention, protection of an attack target by cooperation of a plurality of DDoS defense devices when a DDoS attack occurs.
- DDoS attack terminals 31 to 35 transmit attack packets to attack target 11 and attack target 12, and between each DDoS attack terminal 31 to 35 and attack targets 11 and 12.
- a plurality of DDoS protection devices 21 to 27 are connected, and these DDoS protection devices 21 to 27 are connected. ⁇ 27 cooperate to protect DDoS attack targets 11 and 12.
- the defense line is extended to the side of DDoS attack terminals 31 to 35, and when the DDoS attack ends, defense against attacks from DDoS defense devices 25 to 27 far from attack targets 11, 12 is stopped Go to
- DDoS protection device 25-26 DDoS protection device 24 ⁇ DDoS protection device 23
- FIG. 2 illustrates an example of a device configuration of the DDoS protection devices 21 to 27 equipped with the present invention.
- the DDoS protection devices 21 to 27 of this embodiment include a network interface unit 101, a packet distribution unit 102, an attack detection unit 103, and an attack packet information DB 104. , An attack packet handling unit 105, a stop / restart determining unit 106, a device cooperation unit 107, and a device cooperation information DB 108.
- the DDoS protection devices 21 to 27 forward the packet to the network interface unit 101 via the packet distribution unit 102 when the packet is received by the network interface unit 101 when no DDoS attack has occurred. .
- FIG. 3 shows an example of the data structure of the attack packet information DB 104
- FIG. 4 shows an example of the data structure of the device cooperation information DB 108.
- the attack packet information DB 104 manages the attack packet information, and as shown in FIG. 3, associates the attack packet with the identification information of the attack packet, It manages the conditions for suspending the execution of the system, the conditions for restarting the coping method, and the status information indicating whether the coping method is being started or stopped (stop is the same as terminating).
- the device cooperation information DB 108 manages the cooperation information of the devices that cooperate to perform countermeasures against an attack, and as shown in Fig. 4, is associated with the attack packet information.
- the information of the device that transmitted the attack packet information (information of the transmission source device), the information of the device that transmitted the attack packet information (information of the transmission destination device), and the state of the transmission destination device Manage information and.
- the own device is included in the destination device, and the status information of the own device is managed by the status information of the destination device.
- the device cooperation information DB 108 shown in FIG. 4 is an example of the device cooperation information DB 108 included in the device “3”, and the IP address of the device ⁇ 1 ⁇ is ⁇ 1.1. 1.1 "The protocol is 'UDP', the port number is” 1434 “and the coping method is” Shutdown “and the stop condition is” 10Mbps. "
- Attack packet information is sent to the device, stating that the response method should be stopped if the traffic lasts for 3 seconds, and restarting if the restart condition is "20 Mbps traffic lasts 1 second.” It manages that the attack packet information has been sent to the DDoS protection device (current status is “Starting”) of device ⁇ 4 ⁇ , and furthermore, confirms that it is in the status of “self-powered termination (stop)”. Manage it.
- FIG. 5 illustrates an example of a processing flow executed by the packet distribution unit 102
- FIG. 6 illustrates an example of a processing flow executed by the attack detection unit 103
- FIG. FIG. 8 illustrates an example of a processing flow performed by the unit 105
- FIG. 8 illustrates an example of a processing flow performed by the stop / restart determination unit 106
- FIGS. 9 and 10 illustrate processing performed by the device cooperation unit 107.
- An example of a flow is illustrated.
- the processing executed by the DDoS protection devices 21 to 27 configured as described above will be described in detail according to these processing flows.
- the packet distribution unit 102 when the packet distribution unit 102 receives a packet from the network interface unit 101 in Step 10, the packet distribution unit 102 proceeds to Step 11, copies the received packet, and copies the copied packet. To the attack detection unit 103.
- step 12 it is determined whether the information of the received packet is registered in the attack packet information DB 104.
- step 13 the received packet is copied, and the copied packet is stopped. Transfer to section 106.
- step 14 it is determined whether or not the status information recorded in the entry information (entry information that matches the received packet) registered in the attack packet information DB 104 is running.
- step 15 the received packet is processed by the attack packet handling unit 105. And then return to step 10.
- step 12 when it is determined in step 12 that the information of the received packet is not registered in the attack packet information DB 104, the process proceeds to step 16, where the received packet is transferred to the network interface unit 101, and then And return to step 10.
- step 14 If it is determined in step 14 that the status information recorded in the entry information conforming to the received packet is not running, that is, if it is determined that the status information is stopped, the process proceeds to step 16. Then, the received packet is transferred to the network interface unit 101, and the process returns to step 10.
- the packet distribution unit 102 transfers a copy of the received packet to the attack detection unit 103, and the received packet is transmitted to the attack packet information DB 104 Is the attack packet registered in Stops copying of the received packet based on whether or not! /, Coping with attacks and attacks! /, And whether or not it is in progress!
- the processing is performed so that the packet is forwarded to the attack packet handling unit 105, or the received packet is forwarded to the network interface unit 101.
- the attack detection unit 103 when the attack detection unit 103 receives a packet from the packet distribution unit 102 in step 20, the attack detection unit 103 proceeds to step 21 and registers the received packet in the attack packet information DB 104. Judge whether it is done.
- step 22 determines whether or not the registered information can be transmitted to another device ( If it has not been sent yet, it will be judged that it will not be sent.) If it has been sent, it will be judged that it will not be sent.
- step 23 a cooperation message including the registration information is notified to the device cooperation unit 107, and then the process returns to step 20.
- step 22 if it is determined in step 22 that the registered information is not to be sent to another device,
- step 21 If it is determined in step 21 that the received packet is not registered in the attack packet information DB 104, the process proceeds to step 24 to determine whether the received packet is an attack.
- step 25 attack packet information is generated, and the generated attack packet information is registered in the attack packet information DB 104. Then, in step 26, a registration message including the attack packet information is notified to the device linking unit 107, and the process returns to step 20.
- step 24 if it is determined in step 24 that the received packet is not an attack packet, the process immediately returns to step 20 without performing the processes in steps 25 and 26.
- the attack detection unit 103 detects that the received packet is registered in the attack packet information DB 104, If the packet information needs to be sent to another device, a link message is sent to the device linking unit 107. If the received packet is not registered in the attack packet information DB 104, the received packet If the packet is a packet, the attack packet information is generated and registered in the attack packet information DB 104, and then the registration message is notified to the device cooperation unit 107.
- step 30 when the attack packet handling unit 105 receives a packet from the packet distribution unit 102 in step 30, the process proceeds to step 31 and is stored in the attack packet information DB 104. Identify entry information that matches the received packet.
- step 32 after taking a countermeasure recorded in the specified entry information on the received packet, in step 33, it is determined whether or not the packet needs to be transferred. If it is determined that the packet needs to be transferred, the process proceeds to step 34, and the received packet on which the processing method has been performed is transferred to the network interface unit 101.
- the attack packet handling unit 105 upon receiving a packet from the packet distribution unit 102, applies an attack countermeasure to the received packet, and then forwards the packet to the network interface unit 101.
- the process is as follows.
- the stop / restart determination unit 106 determines in step 40 that the packet is transmitted from the bucket distribution unit 102 (this packet is an attack packet registered in the attack packet information DB 104). Proceeds to step 41, the entry information matching the received packet stored in the attack packet information DB 104 is specified, and in step 42, the state information recorded in the specified entry information is activated. Judge whether there is any power.
- step 43 the stop condition recorded in the entry information is determined. It is determined whether or not the condition is satisfied, and if the stop condition is satisfied, the process proceeds to step 44 and a stop message is notified to the device cooperation unit 107.
- step 45 the status information recorded in the specified entry information is changed to "active" or “active” to update the attack packet information DB 104, and the process ends.
- step 43 if it is determined in step 43 that the stop condition recorded in the entry information conforming to the received packet is not satisfied, the processing ends immediately without performing the processing in steps 44 and 45. .
- step 42 when it is determined that the status information recorded in the entry information conforming to the received packet is not running, that is, when it is determined that it is stopped, the process proceeds to step 46. Then, it is determined whether or not the restart condition recorded in the entry information is satisfied. If the restart condition is satisfied, the process proceeds to step 47, and a restart message is notified to the device cooperation unit 107. I do.
- step 48 the attack packet information DB 104 is updated by changing the state information recorded in the specified entry information to the stop state and the start state, and the process ends.
- step 46 if it is determined in step 46 that the restart condition recorded in the entry information conforming to the received packet is not satisfied, the processing is immediately terminated without performing the processing in steps 47 and 48 I do.
- the stop / restart determination unit 106 receives the attack packet registered in the attack packet information DB 104 from the packet distribution unit 102, the coping method is being started (under execution). Then, it is determined whether or not the stop condition is satisfied. If the stop condition is satisfied, a stop message is notified to the device linking unit 107. On the other hand, if the coping method is being stopped, It is determined whether or not the restart condition is satisfied, and if the restart condition is satisfied, processing is performed so as to notify the device cooperation unit 107 of a restart message.
- the device coordination unit 107 determines in step 50 that an end message has been received from another device (the device coordination unit 107 included in the other device performs processing in step 54 described later). Is determined to be sent) In step 51, by searching the device cooperation information DB 108 using the attack packet information included in the received end message as a search key, the corresponding entry information stored in the device cooperation information DB 108 is specified. Then, the state of the transmission destination (the device that transmitted the end message) recorded in the specified entry information is changed to the active state end (equivalent to stop).
- step 52 it is determined whether or not all the states of the transmission destination (including the state of the own apparatus) recorded in the specified entry information have been completed. If it is determined that no longer exists, the process proceeds to step 53, where the transmission source information is registered in the specified entry information, and it is determined whether or not the information is valid.
- step 52 According to the determination processing in steps 52 and 53, all the states of the transmission destination (including the state of the own apparatus) recorded in the specified entry information are completed, and the transmission source information is included in the entry information. If registered, the process proceeds to step 54, where a new end message including the attack packet information recorded in the entry information is newly generated, and the generated end message is registered in the sender information. To the device that is.
- the entry information is deleted from the device cooperation information DB 108 in a succeeding step 55.
- the device coordinating unit 107 executes the processes of Step 50 to Step 55, so that all the devices that have transmitted the attack packet information If the device's (device located on the forefront side of the defense line with respect to its own device) force end message has been sent and its own device has completed its countermeasures, the attack packet information is A termination message is transmitted to the device that has transmitted to the device (the transmission source device), and the entry information on the attack packet information is deleted from the device cooperation information DB 108.
- the device cooperation unit 107 determines in step 57 that the received stop message is received.
- the attack packet information DB 104 By searching the attack packet information DB 104 using the attack packet information included in the page as a search key, the corresponding entry information is specified, and the specified entry information is deleted from the attack packet information DB 104. This deletion process stops (ends) the countermeasures.
- the device cooperation information DB 108 is searched using the attack packet information included in the received stop message as a search key, and the corresponding device information is stored in the device cooperation information DB 108. Identify the entry information and change the status of the corresponding destination (if it passes through this route, it is its own device) recorded in the identified entry information from active to terminated.
- step 52 it is determined whether or not all the destination states (including the state of the own device) recorded in the specified entry information have been completed. If it is determined that the entry information has been transmitted, the process proceeds to step 53, where the transmission source information is registered in the specified entry information, and it is determined whether or not the entry information is valid.
- step 52 all the states of the transmission destination (including the state of the own apparatus) recorded in the specified entry information are completed, and the transmission source information is included in the entry information. If registered, the process proceeds to step 54, where a new end message including the attack packet information recorded in the entry information is newly generated, and the generated end message is registered in the sender information. To the device that is.
- the entry information is deleted from the device cooperation information DB 108 in a succeeding step 55.
- Step 56 to Step 58Z Step 52 to Step 55 an end message is sent from all the devices to which the own device has transmitted the attack packet information (devices located on the forefront side of the defense line rather than the own device), and the own device also ends the countermeasures. If so, an end message is sent to the device (source device) that sent the attack packet information to its own device, and the entry information for the attack packet information is deleted from the device cooperation information DB 108. That's how it works.
- step 59 the device cooperation unit 107 receives a cooperation message from the other device (sent by the device cooperation unit 107 provided in the other device performing the processing in step 65 described below). If it is determined in step 60, the attack packet information included in the received cooperative message and the source of the The information set as information is registered in the device cooperation information DB 108.
- step 61 the attack packet information is registered in the attack packet information DB 104.
- the device cooperation unit 107 executes the processing of step 59 to step 61, and based on the cooperation message to which other device power is also transmitted, the device cooperation information DB 108 adds a new device cooperation. In addition to registering the information, processing is performed to register new attack packet information in the attack packet information DB 104.
- the device cooperation unit 107 determines in step 63 that the attack The packet information is registered in the device cooperation information DB 108.
- the device cooperation unit 107 executes the processing of Steps 62 to 63, and based on the registration message sent from the attack detection unit 103, adds a new information to the device cooperation information DB 108. It processes to register the attack packet information.
- the device cooperation unit 107 transmits the received cooperation message to another device in step 65. .
- step 66 the corresponding entry information is specified by searching the device cooperation information DB 108 using the attack packet information included in the received cooperation message as a search key, and the specified
- the device cooperation information DB 108 is updated by adding the information of the other device that transmitted the cooperation message to the transmission destination information recorded in the entry information.
- the device cooperation unit 107 transmits the cooperation message sent from the attack detection unit 103 to another device by executing the processing of step 64 to step 66, and based on that, In other words, the processing is performed so that the device cooperation information stored in the device cooperation information DB 108 is updated.
- step 67 if the device linking unit 107 determines that the restart message is sent from the stop 'restart determining unit 106', in step 68, the received restart message is received.
- the corresponding entry information is specified by searching the device cooperation information DB 108 using the attack packet information included in the The status of the own device in the destination information to be recorded is changed from “end” to “starting”.
- step 69 the attack packet information included in the received restart message is registered in the attack packet information DB 104.
- the device cooperation unit 107 performs the processing of Steps 67 to 69 so as to execute the countermeasures against the attack again.
- each network attack countermeasure device performs the attack countermeasure stop processing, so that even when each device autonomously determines and stops the attack countermeasure, it is possible to prevent the attack countermeasure. It is possible to converge and expand the range of devices that are taking countermeasures against attacks that do not create holes in the existing network and that exist in preparation for the resumption of attacks. Then, even if the attack resumes, it can be dealt with immediately by the device that is converging.
- the range of defense can be expanded by re-notifying the attack information.
- the network attack countermeasure method of the present invention realized by the operation of each processing means described above can also be realized by a computer program, and this computer program is provided by being recorded on an appropriate recording medium.
- the present invention is provided by being provided via a network, installed when implementing the present invention, and operating on control means such as a CPU.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
- Telephonic Communication Services (AREA)
Abstract
Description
Claims
Priority Applications (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP05739040A EP1746791A1 (en) | 2004-05-12 | 2005-05-12 | Network attack combating method, network attack combating device and network attack combating program |
JP2006516899A JPWO2005109797A1 (ja) | 2004-05-12 | 2005-05-12 | ネットワーク攻撃対策方法、ネットワーク攻撃対策装置及びネットワーク攻撃対策プログラム |
US10/559,189 US20070118896A1 (en) | 2004-05-12 | 2005-05-12 | Network attack combating method, network attack combating device and network attack combating program |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2004-142052 | 2004-05-12 | ||
JP2004142052 | 2004-05-12 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2005109797A1 true WO2005109797A1 (ja) | 2005-11-17 |
Family
ID=35320574
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2005/008679 WO2005109797A1 (ja) | 2004-05-12 | 2005-05-12 | ネットワーク攻撃対策方法、ネットワーク攻撃対策装置及びネットワーク攻撃対策プログラム |
Country Status (6)
Country | Link |
---|---|
US (1) | US20070118896A1 (ja) |
EP (1) | EP1746791A1 (ja) |
JP (1) | JPWO2005109797A1 (ja) |
KR (1) | KR100679170B1 (ja) |
CN (1) | CN1788475A (ja) |
WO (1) | WO2005109797A1 (ja) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100738567B1 (ko) | 2006-02-01 | 2007-07-11 | 삼성전자주식회사 | 동적 네트워크 보안 시스템 및 그 제어방법 |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7735139B1 (en) * | 2006-05-17 | 2010-06-08 | Trend Micro Incorporated | In-line scanning of network data in an asymmetric routing environment |
KR100862187B1 (ko) * | 2006-10-27 | 2008-10-09 | 한국전자통신연구원 | 취약점 분석 및 공격방식 모델링을 이용한 네트워크기반의인터넷 웜 탐지 장치 및 그 방법 |
US8467527B2 (en) | 2008-12-03 | 2013-06-18 | Intel Corporation | Efficient key derivation for end-to-end network security with traffic visibility |
US20080307526A1 (en) * | 2007-06-07 | 2008-12-11 | Mi5 Networks | Method to perform botnet detection |
US8966622B2 (en) * | 2010-12-29 | 2015-02-24 | Amazon Technologies, Inc. | Techniques for protecting against denial of service attacks near the source |
US9015895B2 (en) | 2012-07-02 | 2015-04-28 | Sigma Enterprises, Llc | Textured device for cleaning cosmetic brushes |
US9176838B2 (en) * | 2012-10-19 | 2015-11-03 | Intel Corporation | Encrypted data inspection in a network environment |
CN102946458A (zh) * | 2012-11-17 | 2013-02-27 | 刘成功 | 一种急救电话机 |
US8997224B1 (en) * | 2013-03-14 | 2015-03-31 | Hrl Laboratories, Llc | Explosive network attack and mitigation strategies |
CN107104926B (zh) * | 2016-02-22 | 2019-10-18 | 华为技术有限公司 | 攻击防护系统、方法、装置和网络设备 |
US10516694B1 (en) * | 2016-03-29 | 2019-12-24 | Amazon Technologies, Inc. | Hierarchical mitigation of denial of service attacks on communication networks |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002164938A (ja) * | 2000-09-12 | 2002-06-07 | Nippon Telegr & Teleph Corp <Ntt> | 分散型サービス不能攻撃の防止方法および装置ならびにそのコンピュータプログラム |
JP2003333092A (ja) * | 2002-05-14 | 2003-11-21 | Mitsubishi Electric Corp | ネットワークシステム、攻撃パケット追跡方法および攻撃パケット防御方法 |
-
2005
- 2005-05-12 US US10/559,189 patent/US20070118896A1/en not_active Abandoned
- 2005-05-12 EP EP05739040A patent/EP1746791A1/en not_active Withdrawn
- 2005-05-12 CN CNA2005800003511A patent/CN1788475A/zh active Pending
- 2005-05-12 KR KR1020057023289A patent/KR100679170B1/ko not_active IP Right Cessation
- 2005-05-12 JP JP2006516899A patent/JPWO2005109797A1/ja active Pending
- 2005-05-12 WO PCT/JP2005/008679 patent/WO2005109797A1/ja not_active Application Discontinuation
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002164938A (ja) * | 2000-09-12 | 2002-06-07 | Nippon Telegr & Teleph Corp <Ntt> | 分散型サービス不能攻撃の防止方法および装置ならびにそのコンピュータプログラム |
JP2003333092A (ja) * | 2002-05-14 | 2003-11-21 | Mitsubishi Electric Corp | ネットワークシステム、攻撃パケット追跡方法および攻撃パケット防御方法 |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR100738567B1 (ko) | 2006-02-01 | 2007-07-11 | 삼성전자주식회사 | 동적 네트워크 보안 시스템 및 그 제어방법 |
US8037531B2 (en) | 2006-02-01 | 2011-10-11 | Samsung Electronics Co., Ltd. | Dynamic network security system and control method thereof |
Also Published As
Publication number | Publication date |
---|---|
KR20060030037A (ko) | 2006-04-07 |
CN1788475A (zh) | 2006-06-14 |
US20070118896A1 (en) | 2007-05-24 |
KR100679170B1 (ko) | 2007-02-05 |
EP1746791A1 (en) | 2007-01-24 |
JPWO2005109797A1 (ja) | 2008-03-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7499395B2 (en) | BFD rate-limiting and automatic session activation | |
US10931711B2 (en) | System of defending against HTTP DDoS attack based on SDN and method thereof | |
US8732832B2 (en) | Routing apparatus and method for detecting server attack and network using the same | |
JP2012209633A (ja) | スイッチングハブ及び検疫ネットワークシステム | |
WO2005109797A1 (ja) | ネットワーク攻撃対策方法、ネットワーク攻撃対策装置及びネットワーク攻撃対策プログラム | |
CN101227287B (zh) | 一种数据报文处理方法及数据报文处理装置 | |
WO2014075485A1 (zh) | 网络地址转换技术的处理方法、nat设备及bng设备 | |
JP5178573B2 (ja) | 通信システムおよび通信方法 | |
US7565694B2 (en) | Method and apparatus for preventing network reset attacks | |
JP2008306610A (ja) | 不正侵入・不正ソフトウェア調査システム、および通信振分装置 | |
WO2017028391A1 (zh) | 虚拟网络通信的方法及装置 | |
JP2019152912A (ja) | 不正通信対処システム及び方法 | |
JP2008178100A (ja) | コンピュータネットワークをパケットフラッド(flood)から保護するための方法及びシステム | |
CN114244610B (zh) | 一种文件传输方法、装置,网络安全设备及存储介质 | |
JP3549861B2 (ja) | 分散型サービス不能攻撃の防止方法および装置ならびにそのコンピュータプログラム | |
JP2004318742A (ja) | 分散型サービス不能攻撃を防ぐネットワークシステム | |
US8811179B2 (en) | Method and apparatus for controlling packet flow in a packet-switched network | |
CN113660199A (zh) | 流量攻击的防护方法、装置、设备及可读存储介质 | |
JP2007208575A (ja) | 不正トラフィック管理装置およびシステム | |
JP4167866B2 (ja) | データ伝送方法、データ伝送システム及びデータ伝送装置 | |
JP4710889B2 (ja) | 攻撃パケット対策システム、攻撃パケット対策方法、攻撃パケット対策装置、及び攻撃パケット対策プログラム | |
JP2004104739A (ja) | ウィルス及びハッカー侵入防止機構のためのシステム、侵入防止方法および情報処理装置 | |
JP6101525B2 (ja) | 通信制御装置、通信制御方法、通信制御プログラム | |
JP2008028720A (ja) | 送信元ipアドレス詐称ipパケットを制御可能なipネットワーク装置および送信元ipアドレス詐称ipパケット制御方法 | |
Takai et al. | Quick Blocking Operation of IDS/SDN Cooperative Firewall Systems by Reducing Communication Overhead |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 2006516899 Country of ref document: JP |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KM KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NG NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SM SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IS IT LT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2005739040 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2007118896 Country of ref document: US Ref document number: 10559189 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 20058003511 Country of ref document: CN Ref document number: 1020057023289 Country of ref document: KR |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWP | Wipo information: published in national office |
Ref document number: 1020057023289 Country of ref document: KR |
|
WWG | Wipo information: grant in national office |
Ref document number: 1020057023289 Country of ref document: KR |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWW | Wipo information: withdrawn in national office |
Country of ref document: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2005739040 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 10559189 Country of ref document: US |
|
WWW | Wipo information: withdrawn in national office |
Ref document number: 2005739040 Country of ref document: EP |