Font Size: a A A

PPPoE's Security Leaks And Resolving Scheme

Posted on:2005-03-27Degree:MasterType:Thesis
Country:ChinaCandidate:X G LiuFull Text:PDF
GTID:2168360152969241Subject:Computer application technology
Abstract/Summary:PDF Full Text Request
Since network activities, such as Email,network communication and electronic business and so on, becoming a part of people's lives, it will be a basic requirement for embedded terminal devices to access broadband network. Embedded terminal devices improve people's living style, enhance work efficiency and enlarge communication methods. The colorful information telephone terminal( iFone ), which was designed and implemented to meet the demand of home and office, provides to accesss ADSL broadband through PPPoE protocol because ADSL has so many advantages. In the course of accomplishing the task, we found some security leaks in the application of PPPoE and its self, which includes it easily suffers D.o.S attack to and Disguised Access Concentrator attack to Client (user).Comprehensive research on the causes and resolving measures of network security leaks through the present network environment, comparing with PPPoE's application, I found the causes of the above two attacking methods. With deeply analysing the format and working principle of PPPoE and make a difference between their style and goal,I provided corresponding measures and at last put forward a complete set of resolving sheme for PPPoE.The resolving scheme is mainly based on the better extension of PPPoE, by using the given tag and adding some appropriate TLV(TagType – Length – Value) combination and using advanced security encrypt algorithm, which finally get rid of the D.o.S attack and Disguised AC attack. Additionally, through doing some experiments, it is proved that the resolving scheme works well and can be easily applied. The security of product is improved and profit of user is enhanced by getting rid of these security leaks which not only presents convience of people's lives and provides guarantee of people's privacy.
Keywords/Search Tags:Access Concentrator, PPPoE protocol, PPP protocol, AES
PDF Full Text Request
Related items