Font Size: a A A

The Design And Implementation Of An Anti 802.1x Protocol Packet Attack Packet Processing System

Posted on:2016-06-10Degree:MasterType:Thesis
Country:ChinaCandidate:Y T LiFull Text:PDF
GTID:2348330479954309Subject:Software engineering
Abstract/Summary:PDF Full Text Request
Protocol packet attack means that a large number of invalid packets whose satisfied the format of authentication packet to launch the network authentication on the network device side. For using 802.1x port-based authentication control protocols to launch the system just only verify the format of packets, authentication packets will be sent to the CPU processing packet by network device for which format is correct. And a large number of invalid authentication packets will take up a lot of CPU resources, Packet congestion will appeared once the rate of sending packets over the threshold of equipment processing, the CPU of network device will not be able to handle a normal user authentication packets, that will cause the user can not go online even the network paralysis occurred. By anti-802.1x protocol packet attack packet processing system to solve the problem of users can not get on-line.Anti 802.1x protocol packet attack packet processing system is characterized by the use of the user's priority information packets difference limit packets. User priority information is maintained on the network device side, user information divided into manually configured and dynamic learning. The priority of manually configure user information is high, dynamic user priority information is middle, the priority changed to meet certain conditions for the high. Packet processing system in accordance with the priority information in order to process user authentication packets, there is no record of certified priority packets are discarded.Authentication packet processing system of anti 802.1x protocol packet attack mainly from 802.1x authentication packet processing. 802.1x authentication packet processing due to just check the format of authentication packet, that the Packet which in the correct format will be send to the CPU to process.Now the protocol packet attack occurs the system will adopt another authentication packet processing mechanism. The networkdevice side detect the packet rate of authentication packet, once the packet rate authentication packets exceeds the threshold processing of network device, drive module issued Acl to limit distinguish on sending packets to ensure the normal user's authentication to get on-line which based user information is maintained on the device side.Anti 802.1x authentication protocol packet attack packet processing system of this study will start in the protocol packet attacks affect the normal user authentication. When the protocol packet attacks stop, delete Acl restore the previous authentication packet processing mechanism. Normal authentication packet processing mechanism relative to this certification packet processing system more efficient, and therefore authentication packet processing mechanism of this paper is an effective solution 802.1x protocol packet attack plan.
Keywords/Search Tags:Protocol packet attack, Authentication, Priority, Access Control List
PDF Full Text Request
Related items