WO2006043327A1 - 中継装置及びネットワークシステム - Google Patents
中継装置及びネットワークシステム Download PDFInfo
- Publication number
- WO2006043327A1 WO2006043327A1 PCT/JP2004/015689 JP2004015689W WO2006043327A1 WO 2006043327 A1 WO2006043327 A1 WO 2006043327A1 JP 2004015689 W JP2004015689 W JP 2004015689W WO 2006043327 A1 WO2006043327 A1 WO 2006043327A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- packet
- management
- authentication
- unit
- network
- Prior art date
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/46—Interconnection of networks
- H04L12/4641—Virtual LANs, VLANs, e.g. virtual private networks [VPN]
Definitions
- the present invention relates to a network system and a relay apparatus that relay packets between networks.
- Patent Document 1 based on information from a router that detects an attack caused by an illegal packet, the router can block the attack by receiving an external network power attack through communication between routers. .
- securing communications necessary for information exchange between routers is an assumption. For this reason, in a LAN environment where the location of the attack can be widely distributed within the network, communication between routers cannot be secured at the moment the attack occurs. More When trying to apply this method to an existing LAN environment, it is necessary to deploy a large number of routers in order to identify the source of the attack, and it can be easily applied to an existing LAN environment that has a large impact on the LAN environment. Is required.
- Patent Document 2 there is described a method for detecting unauthorized intrusion or the like by continuously monitoring suspicion or communication according to the character or situation of the monitoring target.
- measures such as securing communications for monitoring and controlling the traffic.
- Patent Document 1 Japanese Patent Laid-Open No. 2003-333092
- Patent Document 2 JP 2002-342276 A
- a large number of monitoring points can be easily added to an existing LAN, and the range of the network to be isolated is narrowed. Even if an attack by an unexpected illegal packet is occurring, The purpose is to secure management communication for control and communication between normal sub-networks.
- the network system of the present invention includes:
- Each of the plurality of relay devices is a
- It is characterized in that when it receives the configuration network power that connects itself to packets communicated in the collective network, it is classified into at least one of a decrypted packet for decrypting the contents and a transparent packet that is transmitted through its own device.
- the network system further includes:
- designation information for designating at least one of the plurality of relay apparatuses and control information for instructing predetermined control to the designated relay apparatus designated by the designation information.
- Including a management device that transmits control packets including the same to a relay device adjacent to the control packet Among the plurality of relay devices, each relay device from the relay device that receives the control packet from the management device to the relay device adjacent to the designated relay device receives the control packet when the control packet is received. Is classified as a decryption packet, and based on the decryption result of the control packet classified as the decryption packet, the control packet is distributed to the designated relay device.
- the management device comprises:
- a plurality of relay devices are designated as designated information as designated relay devices, an information request for requesting predetermined information from the plurality of designated relay devices as control information is included in a control packet, and each of the plurality of designated relay devices is
- the received control packet is classified as a decryption packet, and a response including correspondence information corresponding to the information request is based on the decryption result of the control packet classified as the decryption packet.
- the packet is transmitted to another relay device, and the other relay device
- the other relay device includes:
- an integrated packet including route information indicating a route from the designated relay device to itself is generated.
- the other relay device includes:
- route information indicating a route from the designated relay device to itself is stored.
- the predetermined management information is provided to the installed relay device.
- a packet classification unit that receives a first network force packet and classifies the received packet into at least one of a management packet used for communication management and a transparent packet that transmits inside the device;
- a transmission unit that transmits the transparent packet classified by the packet classification unit to a second network; a management control unit that inputs the management packet classified by the packet classification unit and decodes the management packet;
- the packet classification unit includes:
- the first network also receives a packet of a predetermined format as a received packet
- the packet classification unit classifies the received packet as a transparent packet
- the transparent packet is transmitted to the second network without changing the format of the transparent packet from the format of the received packet.
- the received predetermined packet is classified into the monitor packet to be monitored,
- the relay device further includes:
- Monitor packet counter for measuring the number of monitor packets classified by the packet classification unit
- the management control unit includes:
- the monitor packet classified by the packet classification unit is analyzed.
- the relay device further includes:
- a transparent packet counter for measuring the number of transparent packets classified by the packet classification unit
- the classification is changed to the discard target packet that is the target of discard.
- the packet classification unit includes:
- the packet classification unit Based on the discard instruction included in the discard instruction packet classified as a management packet, the packet classification unit classifies the packet received by the packet classification unit from a transparent packet to a discard target packet to be discarded. It is characterized by being changed.
- the packet classification unit includes:
- the received authentication information addition packet is classified into a management packet
- the relay device further includes:
- a packet authentication unit that authenticates the authentication information addition packet classified into the management packet by the packet classification unit and outputs the authentication information addition packet that has been authenticated to the management control unit when the authentication is established; It is characterized by.
- the management control unit includes:
- a management communication transmission packet including predetermined management information is generated based on the management packet decoding result, and the generated management communication transmission packet is output.
- the transmitter is a signal
- the management communication transmission packet output by the management control unit is input, and the input management communication transmission packet is transmitted to the second network with higher priority than the transparent packet.
- the relay device further includes:
- the management communication transmission packet output by the management control unit is input, and a header including index information indicating that the packet is a management communication transmission packet is added to the input management communication transmission packet as a header addition packet. It has a header addition part to output,
- the transmitter is a signal
- the header addition packet output by the header addition unit is input, and the input header addition packet is input.
- the packet is transmitted to the second network with higher priority than the transparent packet.
- the relay device further includes:
- An authentication information adding unit that inputs the management communication transmission packet output by the management control unit, adds the authentication information to the input management communication transmission packet, and outputs the authentication information additional packet;
- the header adding unit is
- the authentication information addition packet output by the authentication information addition unit is input, and a header including index information indicating that the packet is a management communication transmission packet is added to the input authentication information addition packet as a header addition packet. It is characterized by outputting.
- the management control unit includes:
- the received packet is classified into management packets based on the management packet classification condition notified from the management control unit.
- the management control unit includes:
- a predetermined management packet classification condition is notified again to the packet classification unit, and the packet classification unit includes:
- the received packet is classified into a management packet.
- the relay device further includes:
- a management packet counter for measuring the number of management packets classified by the packet classification unit
- the packet classification unit includes:
- the received authentication information addition packet is classified into a management packet
- the relay device further includes:
- a packet authentication unit for authenticating the authentication information addition packet classified by the packet classification unit into a management packet
- a predetermined management bucket classification condition is notified again to the packet classification unit based on the authentication result of the management packet by the packet authentication unit.
- a transmitting unit for transmitting the target packet to which the authentication information adding unit has added the authentication information to the second network
- the relay device of the present invention includes:
- a packet authentication unit that inputs and authenticates an authentication packet classified by the packet classification unit, and outputs an authentication packet that has been authenticated when authentication is established;
- An authentication packet output from the packet authentication unit is input and output to the second network.
- the relay device further includes:
- a management for storing a plurality of authentication packet classification conditions for classifying authentication information added packets received by the packet classification unit into authentication packets, and notifying the packet classification unit of any of the plurality of stored authentication packet classification conditions With a control unit,
- the received authentication information addition packet is classified into an authentication packet based on the authentication packet classification condition notified to the management control unit.
- the management control unit includes:
- a predetermined authentication packet classification condition is notified again to the packet classification unit, and the packet classification unit includes:
- the management control unit classifies the received packet into an authentication packet based on the authentication packet classification condition notified again.
- the management control unit includes:
- a predetermined authentication bucket classification condition is notified again to the packet classification unit based on the authentication result of the authentication packet by the packet authentication unit.
- the relay device further includes:
- An authentication packet counter for measuring the number of authentication packets classified by the packet classification unit
- a predetermined authentication packet classification condition is notified again to the packet classification unit.
- management communication for network monitoring and control and normal communication between sub-networks can be ensured even when attacked by a virus or an unexpected illegal packet.
- the range of isolated networks can be narrowed even when attacked by viruses or unexpected malicious packets.
- Embodiment 1 will be described with reference to FIGS.
- FIG. 1 shows a network configuration of network system 1000 according to the first embodiment.
- the entire network consists of a local area network (LAN) that communicates using IP packets.
- the network system 1000 includes LAN networks 15-18 and subnetworks 19-26. These LAN networks 15-18 and sub-networks 19 1-26 are constituent networks constituting the network system of FIG. These constituent networks form a hierarchical structure.
- a hierarchical structure is formed in which the LAN network 15 is the first layer, the LAN networks 16-18 are the second layer, and the sub-networks 19-26 are the third layer.
- the network system 1000 includes a LAN monitoring and control device 1-13 (an example of a relay device) and a management device 14.
- LAN monitoring 'Control device 1-13 13 relays packets between networks and monitors the network to which it is connected.
- LAN monitoring / control devices 1 1 13 are arranged in a hierarchical structure along the LAN configuration.
- the management device 14 monitors and controls the LAN monitoring / control device 1-13.
- the network to which the LAN monitoring / control device 1 etc. inputs the packet is the first network, and the network that outputs the packet is the second network.
- FIG. 2 is a block diagram showing an example of the LAN monitoring / controlling device 1.
- LAN monitoring / control device 2 LAN monitoring / control device 13 has the same configuration. Details of the configuration of the LAN monitoring / controlling device 1 will be described in detail in Embodiment 3. Therefore, in Embodiment 1, an outline of the configuration will be described.
- the LAN monitoring control device 1 includes a downstream packet processing unit 63, a management control unit 45, and an upstream packet processing unit 64.
- the downstream packet processing unit 63 receives the downstream packet input 52 and outputs the downstream packet output 53. Further, the upstream packet processing unit 64 inputs the upstream packet input 65 and outputs the upstream packet output 66.
- the downstream packet processing unit 63 and the upstream packet processing unit 64 are paired. In FIG. 2, only the downstream packet processing unit 63 shows the internal configuration.
- the internal configuration of the upstream packet processing unit 64 is the same as that of the downstream packet processing unit 63.
- the internal structure of the upstream packet processing unit 64 is downstream packet processing. In the section 63, the downstream packet input 52 is replaced with the upstream packet input 65, and the downstream packet output 53 is replaced with the upstream packet output 66.
- Figure 3 shows the internal configuration of the upstream packet processing unit 64.
- the packet classification unit 39 classifies received packets into transparent packets, discarded packets, authentication packets, management packets, and monitor packets.
- the packet authentication unit 44 authenticates the authentication packet and the management packet and confirms the validity of the packet.
- the output packet sorting unit 46 receives the packet from the packet classification unit 39 and sorts the output destination.
- the transmission packet authentication processing unit 49 adds authentication information to the transmission packet.
- the authentication packet generation unit 50 adds a header that can be classified as an authentication packet or a management packet to the transmission packet.
- the transmission priority control unit 51 (an example of a transmission unit) sends the management packet as the first priority, the authentication packet as the second priority, and the transparent packet as the third priority. I believe.
- the management control unit 45 decodes the management packet, and exchanges and processes management communication and manages and controls the entire lan monitoring / control device 1. Further, the management control unit 45 stores management bucket classification conditions and authentication packet classification conditions. The configuration of the LAN monitoring / control device 1 has been described above. Further details will be described in Embodiment 3.
- the management device 14 receives the monitoring information from the LAN monitoring / control device 11-13 and sends the LAN control information to the LAN monitoring / control device 11-13 to establish the LAN. Monitoring ⁇ Control.
- the LAN network 15-18 includes communication devices such as routers, switches, and hubs.
- Subnetwork 19-26 includes a terminal device such as a PC or a server in a network device such as a switch hub, and 27 is an interface with an external network. It is a position.
- the LAN monitoring-control device 1-13 classifies the received packet into a transparent packet by the packet classification unit 39. Then, it transmits as it is to the opposite network to which the apparatus is connected through the transmission priority control unit 51, thereby operating as a repeater. In other words, the LAN monitoring and control device 1 13 transmits the received packet to the opposite network (second network) without changing the format of the received packet received from the network (first network). This will be described based on the configuration shown in FIG.
- the packet classification unit 39 receives a packet of a predetermined format from the network (first network) force as a received packet. Then, the received packet is classified as a transparent packet. The packet classification unit 39 does not change the format of the received packet when classifying the received packet as a transparent packet. The packet classification unit 39 outputs the transparent packet to the output packet distribution unit 46.
- the output packet sorting unit 46 receives the transparent packet from the packet classification unit 39 and outputs it to the transmission destination priority control unit 51 without changing the format.
- the transmission destination priority control unit 51 When the transmission destination priority control unit 51 receives the transparent packet from the output packet sorting unit 46, the transmission destination priority control unit 51 transmits the transparent packet format to the opposite network (second network) without changing the format of the received packet. . Therefore, from other devices in the LAN (in the network system 1000), the LAN monitoring and control device 1-13 looks transparent o The transmission priority control unit 51 transmits the transparent packet when transmitting the transparent packet. Amplification signal that forms the signal is amplified and output.
- the “management packet” is transmitted from the management device 14 to a predetermined LAN monitoring control device. Alternatively, it is transmitted to any one of the LAN monitoring 'control device managers' and other control devices or management devices 14.
- Figure 1 In network system 1000, LAN monitoring / control device 1 is LAN monitoring / control device
- FIG. 3 is a block diagram showing the connection between the LAN monitoring “control device 1” and the LAN monitoring “control device 3”.
- “a” is added to the constituent elements of the upstream packet processing unit 64 of the LAN monitoring and control device 1.
- “b” is added to the downstream packet processing unit 63b of the LAN monitoring / control apparatus 3
- “c” is added to the upstream packet processing unit 64c of the LAN monitoring / control apparatus 3. Components with the same number are the same.
- FIG. 4 is a flowchart illustrating a process in which the LAN monitoring / control device 1 transmits a “management packet” to the LAN monitoring / control device 3. The explanation is based on Fig. 4.
- the control device 1 adds authentication information to the management communication transmission packet by the transmission packet authentication processing unit 49 and passes it to the authentication packet generation unit 50 (S101).
- the authentication packet generation unit 50 adds a header that can be classified into a management packet by the packet classification unit 39b of the LAN monitoring and control device 3 to the packet received from the transmission packet authentication processing unit 49, and the transmission priority control unit 51 (S102).
- the transmission priority control unit 51 transmits the packet to the LAN network 15 (second network) as the downstream packet output 53 with the highest priority. In this case, even if there is a transparent packet waiting for transmission, the transmission priority control unit 51 overtakes it and transmits the management packet to the LAN network 15 (S103).
- the LAN network 15 sends the management packet to the LAN monitoring / control device 3 based on the destination IP address (S104).
- the LAN monitoring / control device 3 classifies the packet received from the downstream packet input 52b into a management packet by the packet classification unit 39 and passes it to the packet authentication unit 44b (S105).
- the packet classification unit 39 is notified in advance of management packet classification conditions from the management control unit 45.
- the management control unit 45 stores a plurality of management packet classification conditions. Then, the management control unit 45 notifies the packet classification unit 39 of predetermined management packet classification conditions.
- the packet classification unit 39 classifies the received packet into management packets based on the notified management packet classification conditions.
- the management control unit 45 notifies the packet classification unit 39 of the management packet classification condition again in a predetermined case.
- the packet classification unit 39 Classify by packet classification condition.
- the packet authentication unit 44b verifies the validity of the packet based on the authentication information included in the received management packet (S106, S107). If the validity is confirmed as a result of the verification, the LAN monitoring 'control device 3 processes the packet as a management packet from the LAN monitoring' control device 1 (S108). Specifically, the management control unit 45b inputs the packet (an example of a decrypted packet) via the output packet sorting unit 46b and decrypts it. On the other hand, if authentication is not established in S1 07, the process proceeds to step S109 in FIG. Details will be described in the explanation of FIG.
- the “authentication condition” and “management packet classification condition” used in the above communication are shared in advance by the LAN monitoring / control apparatus 1 and the LAN monitoring / control apparatus 3. These conditions are stored in the management control unit 45, the management control unit 45b, and the like.
- the “authentication condition” for example, an authentication key and an authentication algorithm are shared.
- Management packet classification conditions for management packets are defined by a combination of the values of multiple fields such as IP address, protocol number, and port number, which are constituent elements of the packet header.
- LAN monitoring ⁇ Control device 1 and LAN monitoring ⁇ Multiple types are shared by control device 3. However, the destination IP address designates the IP address distributed to the LAN network 17 so that the packet transfer in the LAN network 15 is possible. Conversely, when a management packet is sent from LAN monitor 'control device 3 to LAN monitor' control device 1, the IP address distributed to external network interface 27 is specified as the destination IP address.
- the sharing range of “authentication condition” and “management packet classification condition” is determined for each interface connected to the LAN network 15-18 of the LAN monitoring / control device 11-13.
- a LAN monitoring / control device 1 to 4 is connected to the LAN 15 and directly performs management communication.
- the LAN monitoring and control devices 1 to 4 share a unique “authentication condition” and “management packet classification condition” on a one-to-one basis.
- the LAN monitoring 'control device 2 is also connected to the LAN network 16 and performs management communication with the LAN monitoring' control devices 5-7.
- the LAN monitoring / control device 2 shares a unique “authentication condition” and “management packet classification condition” on a one-to-one basis with the LAN monitoring / control device 5-7. Since the LAN monitoring / control device 5 is also connected to the management device 14, the LAN monitoring / control device 5 and the management device 14 also share specific authentication conditions and management packet classification conditions. The LAN monitoring and control devices 6 and 7 are connected to the LA network 16 Since N does not have the other party to share authentication conditions and management packet classification conditions, subnetworks 19 and 20 are monitored as end devices.
- authentication condition and management packet classification condition are shared by the LAN monitoring / control device 1 13 for each party to which management communication is directly exchanged.
- common authentication conditions and management bucket classification conditions are shared by LAN monitoring and control devices 1 to 4 connected to the LAN 15.
- the LAN monitoring / control devices 2, 5, 6, and 7 connected to the LAN network 16 share different authentication conditions and management packet classification conditions.
- FIG. 5 shows the processing of S109 of FIG.
- the management control unit 45b of the LAN monitoring / control device 3 shares a plurality of An alternative “management packet classification condition” is selected from the “management packet classification conditions”, and the management condition of the alternative management packet classification is notified to the LAN monitoring and control device 1 (S201).
- the management control unit 45 of the LAN monitoring / control device 1 Upon receiving the notification, the management control unit 45 of the LAN monitoring / control device 1 performs control so as to send a management packet corresponding to the alternative classification condition (S202).
- LAN monitoring 'Control device 3 changes the management packet classification condition used before the change to the transparent packet classification condition, and at the same time, in addition to the monitor packet classification condition, Is monitored and changed to a discarded packet if necessary. On the other hand, a packet with an authentication error is discarded as a packet that is relayed to the LAN network 17 as a transparent packet and discarded. Which processing is to be performed is set in the LAN monitoring / control device 3 in advance.
- the management packet classification condition is changed as soon as an authentication error is detected.
- the number of authentication error occurrences may be counted, and the “management packet classification condition” may be changed when the number of authentication errors occurring within a certain time exceeds a predetermined number.
- the illegal packet counter 61 is used. And count the number of management packets with authentication errors.
- the management control unit 45 notifies the management packet classification unit 39 again of the management packet classification conditions and also notifies the partner device. As a result, it is possible to cope with an environment in which an authentication error can occur other than an attack, such as when the network quality is poor.
- the number of management packets received in a given time by the management packet counter 85 is shared in advance between the LAN monitoring 'control device 1 and the LAN monitoring' control device 3 When it is detected that the value exceeds the specified value, it is considered that an unexpected attack has occurred. Then, for example, the management control unit 45 of the LAN monitoring / controlling apparatus 1 notifies the packet monitoring unit 39 itself of the management packet classification conditions and notifies the LAN monitoring / controlling apparatus 3.
- FIG. 6 is a flowchart showing an operation in which the management device 14 collects monitoring information of all LAN monitoring and control devices 1 1 1 3.
- the management device 14 sends a management packet including a monitoring information transmission request (an example of an information request) to the LAN monitoring and control device 5 (an example of a control packet) (S301).
- a monitoring information transmission request an example of an information request
- the LAN monitoring and control device 5 an example of a control packet
- the LAN monitoring 'control device 5 that received this management packet distributes the management packet from the management device 14 to the LAN monitoring' control devices 2, 6, and 7 connected via the LAN network 16 and the LAN It waits for a monitoring information response (an example of a response packet) from the monitoring control devices 2, 6, and 7 (S302).
- LAN monitoring Control device 2 is connected via LAN network 15. LAN monitoring. LAN monitoring 'Distributes management packets received from control device 5 to control devices 1, 3, and 4 and LAN monitoring. 'Wait for a return of monitoring information from the control devices 1, 3, and 4 (S303).
- the LAN monitoring / control device 1 does not transmit the management packet to the external network interface 27, and returns its own monitoring information (an example of correspondence information) to the LAN monitoring / control device 2 (S304).
- Each of the LAN monitoring device 3 and the LAN monitoring / control device 4 transmits a management packet to the LAN monitoring / control device 8-13 immediately below, and waits for a return of monitoring information from these devices (S305).
- LAN monitoring 'control device 6-13 does not have a lower level LAN monitoring / control device. For this reason, the LAN monitoring 'control devices 6 and 7 return the monitoring information of the sub-networks 19 and 20 to the LAN monitoring' control device 5.
- the LAN monitoring / control device 8-10 returns the monitoring information of the sub-networks 21-23 to the LAN monitoring / control device 3.
- the LAN monitoring / control device 11 13 returns the monitoring information of the sub-networks 24-26 to the LAN monitoring / control device 4 (S306).
- LAN monitoring / control device 4 integrates the monitoring information returned by the LAN monitoring / control device 11 1-13 and its own monitoring information to generate an integrated packet, and the integrated packet is LAN monitoring-control device. Reply to 2 (S307).
- the LAN monitoring / control device 3 integrates the monitoring information sent back by the LAN monitoring / control device 8-10 with its own monitoring information, and sends it back to the LAN monitoring / control device 2 (S308).
- the LAN monitoring / control device 2 that has received the monitoring information from the LAN monitoring / control device 1, 3, 4 integrates the received monitoring information and its own monitoring information, and sends it back to the LAN monitoring / control device 5. (S309).
- LAN monitoring / control device 5 integrates its own monitoring information into the monitoring information received from LAN monitoring 'control devices 2, 6, 7 and sends it back to management device 14 (S310).
- each LAN monitoring / control device 1-113 attaches reply path information (route information) to the response to the monitoring information transmission request sent from the management device 14 to the all-LAN monitoring / control device 1-113.
- the management device 14 grasps the number of LAN monitoring / control devices and the connection relationship. Through this procedure, the management device 14 grasps the increase / decrease and abnormality of the LAN monitoring / control devices as needed, and obtains information necessary for specifying the transmission route of the management packet.
- FIG. 7 is a flowchart showing blocking of the sub-network 26.
- the abnormality of the subnetwork 26 is an increase in the amount of communication, and the characteristics of the packet that causes the attack cannot be identified.
- the management device 14 sends a LAN monitoring / control device 13 to the management packet (an example of the control packet) including the instruction to shut down the sub-network 26 (an example of control information). Send to 5.
- the management device 14 includes the management packet in the management packet indicating the transfer path of the management packet. This transfer path is information indicating the next destination of the management packet, and is specified in the order of LAN monitoring * control device 2, LAN monitoring, control device 4, LAN monitoring, control device 13 (an example of specification information) ( S401).
- the LAN monitoring 'control device 5 When receiving the management packet specified in this way, the LAN monitoring 'control device 5 recognizes the LAN monitoring' control device 2 with the route information power in the management packet as the next destination, and performs LAN monitoring 'control. A management packet is transmitted only to the device 2 (S402).
- the LAN monitoring / control device 2 sends a management packet only to the LAN monitoring / control device 4, and the LAN monitoring / control device 4 is also based on the path information in the received management packet.
- the management packet is transmitted only to the LAN monitoring control device 13 (S403).
- the control device 13 recognizes that it is a management packet addressed to itself, and follows all the blocking instructions of the management device 14 to turn all the transparent packets received from the sub-network 26 into discarded packets by the packet classification unit 39. By classifying and discarding, the sub-network 26 is blocked from the LAN network 18 (S404).
- the management device 14 instructs LAN monitoring 'control device 13 for the classification condition of the causative packet. (S503).
- the packet classification unit 39 classifies only the packet as a discarded packet, thereby partially restoring the subnetwork 26 to the LAN network 18. (S504)
- the management device 14 monitors the number of received discarded packets using the LAN monitoring 'control device 13 discarded packet counter 58 (S505, S506). This monitoring completes the countermeasures for abnormalities in the subnetworks 26 and confirms that the occurrence of abnormal packets has been suppressed (S507), and discards the packet classification unit 39 in the LAN monitoring and control unit 13. Remove all conditions.
- the LAN monitoring / control device 13 is managed by the transmission priority control unit 51.
- LAN monitoring by prioritizing packet transmission.
- Control device 13 and LAN monitoring • Ensure management communication with the control unit 4.
- the LAN monitoring / control device 11 is connected from the management device 14 to the LAN monitoring / control device 4. Send the shut-off instruction by 13. Upon receiving this instruction, the LAN monitoring / control device 4 distributes a management packet including an instruction to shut down the sub-networks 24-26 to the LAN monitoring / control device 11-13.
- the management device 14 sends a management packet including a blocking instruction by the LAN monitoring / control device 8-13 to the LAN monitoring / control device 2.
- the LAN monitoring / control device 2 distributes the management packet to the LAN monitoring / control devices 3 and 4.
- the LAN monitoring / control device 3 delivers the management packet to the LAN monitoring / control device 8-10.
- the LAN monitoring / control device 4 delivers the management packet to the LAN monitoring 'control device 11-1113.
- the LAN monitoring control device 8-13 classifies the sub-network 21-26 into the LAN network 17, by classifying the transparent packets from the subnetwork 21-26 into discarded packets by the packet classification unit 39. Shut off from 18.
- the management apparatus 14 uses a method for specifying a transfer route to the destination.
- the same effect can be obtained by the following.
- each LAN monitoring 'control device 1 to 13 sends the reply source (an example of route information) ) Is stored.
- the management control unit 45 of the management apparatus 14 instructs each LAN monitoring / control apparatus 1 13 in advance to monitor the traffic amount of the transparent packet by the transparent bucket counter 60.
- the management control unit 45 of each lan monitoring / control device 1 13 sends a transparent packet to the packet classification unit 39 when the traffic volume of the transparent packet generated within a predetermined time exceeds a specified value. Instruct all to classify as discarded packets. Thereby, for example, when the traffic of packets transmitted from the sub-network 26 to the LAN network 18 exceeds a specified value, the LAN monitoring and control device 13 blocks the sub-network 26 independently.
- FIG. 9 is a diagram illustrating the relay direction of the transparent packet. For example, even if the traffic volume of transparent packets 86, 87, 88 sent from individual subnetworks 24-26 to LAN network 18 does not exceed the specified value, it is sent from LAN network 18 to LAN network 15. The traffic volume of the transparent packet 89 may exceed the specified value. In this case, a disconnection instruction is sent to the LAN monitoring 'control device 4 1S LAN monitoring' control device 11 1 13.
- the LAN monitoring 'control device 4 has a large change in the transmission amount of the transparent packets 87 and 88 to the LAN network 18 based on the monitoring information sent from the LAN monitoring' control device 11 1 13. If it turns out, send a shutdown instruction only to the LAN monitoring 'control devices 12 and 13. It should be noted that if there is no unusual change from the monitoring information obtained from the LAN monitoring and control device 11 1 13, it is expected that an abnormality has occurred in the LAN network 18. For this reason, the LAN monitoring and control device 4 changes the transparent packet 89 received from the LAN network 18 to a discard packet.
- the management packet from the LAN monitoring / control device 11 1 13 is classified as a management packet by the bucket classification unit 39 of the LAN monitoring / control device 4, so that the LAN monitoring / control device 11 1 13 LAN monitoring ⁇ Management communication between the control devices 4 is secured.
- FIG. 10 is a diagram illustrating blocking for transparent packets in the downstream direction.
- the LAN monitoring and control device 4 also monitors the traffic amount of the transparent packet in the downstream direction transmitted from the LAN network 15 to the LAN network 18 by the power of the traffic amount of the transparent packet in the upstream direction.
- the LAN monitoring 'control device 4 sends an instruction to block the transparent packets 90, 91, 92 to the LAN monitoring' control device 1 to 3.
- the monitoring information is obtained from the LAN monitoring 'control device 1-3.
- the management control unit 45 of the LAN monitoring / control device 4 issues an instruction to the packet classification unit 39 to classify the transparent packet 93 received from the LAN network 15 into a discard packet.
- the LAN monitoring / control device 4 determines that the external network interface 27 is abnormal based on the monitoring information from the LAN monitoring / control device 1 will be described.
- the LAN monitoring / control device 4 transmits to the LAN monitoring / control device 1 a blocking instruction (a management packet including a blocking instruction) of the transparent packet 90 received from the external network as a transparent packet.
- the LAN monitoring / control device 1 that has received the blocking instruction changes the transparent packet 90 received from the external network interface 27 to a discarded packet because it is located at the end facing the external network.
- LAN monitoring and control device 4 sent a shutdown instruction (management packet including a shutdown instruction) to LAN monitoring 'control devices 2 and 3
- LAN monitoring / control device 2 and LAN monitoring / control device 3 are connected via LAN networks 16 and 17 to LAN monitoring / control devices 6 and 7 and LAN monitoring / control device 8-10.
- LAN monitoring / control device 2 forwards the blocking instruction to LAN monitoring 'control devices 6 and 7.
- the LAN monitoring / control device 3 forwards the disconnection instruction to the LAN monitoring 'control device 8-10.
- the LAN monitoring / control device 4 obtains monitoring information from the LAN monitoring / control devices 6 and 7 and the LAN monitoring 'control device 8-10. For example, if it is found that the change in the traffic volume of transparent packets between the LAN monitoring / control device 7 and the LAN monitoring / control device 9 is particularly large, the LAN monitoring 'control device 4 controls the LAN monitoring' Sends a blocking instruction for transparent packets 94 and 95 only to devices 7 and 9. Also, if the monitoring information received from the LAN monitoring / control devices 6 and 7 and the LAN monitoring / control device 8-10 is not unique Is expected to have an abnormality in LAN networks 16 and 17.
- the LAN monitoring 'control device 4 causes the LAN monitoring' control device 2 to change the transparent packet 91 received from the LAN network 16 into a discard packet. Also, the LAN monitoring 'control device 4 causes the LAN monitoring' control device 3 to change the transparent packet 92 received from the LAN network 17 into a discard packet.
- the LAN monitoring / control device 4 issues a blocking instruction with a blocking condition without checking the monitoring information of the blocking instruction destination.
- the “blocking condition” is a condition for instructing blocking when a change in traffic is unique.
- the source of the blocking instruction checks its own monitoring information and executes the blocking instruction when it is found that the blocking condition is satisfied.
- the transmission source of the cutoff instruction (LAN monitoring 'control device 4) receives the response of the result from the cutoff instruction issued from the reception source. In this case, if all the receivers that have received a blocking instruction with a blocking condition receive a reply that the blocking condition is not satisfied, the traffic volume of transparent packets at each receiver is expected to be appropriate. Therefore, the sender itself cuts off.
- FIG. 11 is a flowchart showing the procedure for adding the LAN monitoring / control device 1-13. As an example, a case where a LAN monitoring / control device 13 is added between the LAN network 18 and the sub-network 26 will be described.
- the LAN monitoring control device 13 is inserted between the LAN network 18 and the subnet network 26 (S603).
- the inserted LAN monitoring / control device 13 performs management communication indicating that it is connected to the LAN monitoring / control device 4 (S604).
- LAN monitoring / control device 4 recognizes LAN monitoring / control device 13 as a new connection destination. Thereafter, the management packet is transferred as many as 14 management devices (S605).
- the LAN monitoring / control device 4 is connected to the LAN network 18 with respect to the LAN monitoring / control device 13 and communicates with the LAN monitoring / control device 11 and the LAN monitoring / control device 12.
- the “authentication condition and management packet classification condition” (an example of management information) required for notification is sent (S606).
- the LAN monitoring / control device 4 also has the authentication conditions and management packets required for management communication with the LAN monitoring / control device 13 for the LAN monitoring / control device 11 and the LAN monitoring-control device 12. Notify the classification conditions. This enables management communication between the LAN monitoring 'control device 13 and the LAN monitoring' control device 11 and the LAN monitoring 'control device 12 (S607).
- the authentication condition and the management packet classification condition are directly set in advance in the LAN monitoring 'control device 4 and the LAN monitoring' control device 13.
- the management device 14 may notify the LAN monitoring / control device 4 in advance of the authentication conditions and management packet classification conditions necessary for management communication with the LAN monitoring / control device 13.
- the LAN monitoring / controlling device 11-13 since the LAN monitoring / controlling device 11-13 operates as a repeater, the LAN monitoring / controlling device 11-13 can be easily inserted without changing the existing network settings. .
- the management packet exchanged between the LAN monitoring and control devices 1 and 13 is identified by the packet classification unit 39 using a plurality of fields in the packet header, authenticated by the packet authentication unit 44, and when an authentication error occurs, By changing the packet classification unit 39, it is possible to quickly avoid attacks on the management communication by illegal packets. Furthermore, since the transmission priority control unit 51 gives priority to the transmission of management packets, management communication between the LAN monitoring / control devices 1 13 can be ensured even during an attack caused by an unexpected illegal packet.
- the LAN monitoring 'control device 1-13 is arranged hierarchically along the LAN configuration, the management device 14 and the request of the force are propagated between the LAN monitoring / control devices 1-13 13, and the LAN Monitoring / control device 1-11 Since the responses from 13 are integrated and sent back to the management device 14, the management device 14 monitors the LAN and issues a monitoring request without being aware of the location of the control device 1-13. In addition, it is possible to grasp the location of the LAN monitoring and control device 1 and 13 from the return result from the LAN monitoring and control device 1 and 13. Can easily cope with large-scale management. Furthermore, since direct packet exchange between the management device 14 and each LAN monitoring control device 1 13 can be reduced, the communication load and network load of the management device 14 due to management communication can be suppressed.
- the LAN monitoring 'control device 1 13 is arranged hierarchically along the LAN configuration so that each LAN monitoring and control device 1 13 can discard the transparent packet.
- a small unit of 26 levels can isolate the network and ensure communication between other normal networks.
- Each LAN network 15-18 shares authentication conditions and classification conditions between the LAN monitoring and control devices 1 and 13, and the LAN monitoring 'control device 2-4 connects the LAN network 15 and the LAN network 16-18.
- the range of management communication directly executed by each LAN monitoring / control device 1 13 can be narrowed, and a large-scale management range can be achieved.
- information necessary for management communication by management communication with one existing LAN monitoring' control device 4 connected to the LAN network 18 of the connection destination can be easily expanded even when the management scope is large.
- each of a plurality of LAN monitoring and control devices classifies received packets into at least transparent packets and management packets. It can respond quickly.
- each LAN monitoring and control device decodes and transfers a packet including a request issued from the management device, so that the request from the management device is reliably transferred. Can do.
- the replies from the LAN monitoring and control device are integrated and sent back to the management device, so the number of packets can be reduced.
- route information is included when a LAN monitoring / control device sends a reply to the management device. For this reason, the management device can grasp the route to each LAN monitoring / control device.
- the LAN monitoring / control device stores route information sent from other management devices. For this reason, LAN monitoring and control devices can be connected to other LANs. Monitoring ⁇ The route to the control device can be grasped.
- the LAN monitoring / control device power management information that has already been installed is received.
- a LAN monitoring / control device can be easily installed.
- the LAN monitoring 'control device classifies the packet received by the packet classification unit into at least one of the transparent packet and the management packet, it can quickly cope with an unauthorized attack. .
- the kocket classification unit classifies the packets into monitor packets, and therefore can monitor specific packets among the received packets.
- the LAN monitoring / control device of Embodiment 1 classifies packets that have been classified as transparent packets based on the measurement results of the transparent packet counter as discarded packets, it responds quickly to attacks by unauthorized packets. it can.
- the LAN monitoring 'control device classifies and discards the packet received as a transparent packet based on the blocking instruction as a discarded packet, it can respond quickly to an attack by an illegal packet.
- the LAN monitoring and control device of Embodiment 1 classifies and authenticates packets with authentication information added to management packets, so even if an attack with an illegal packet is received, management communication can be performed. Ensuring can be improved.
- the LAN monitoring and control device gives priority to the transmission packet for management communication over the transparent packet, it ensures management communication even when an unauthorized packet is attacked. can do.
- the LAN monitoring 'control device adds a header indicating that it is a management communication transmission packet to the management communication transmission packet, thereby improving the management communication security. .
- the LAN monitoring and control apparatus since the LAN monitoring and control apparatus according to the first embodiment transmits the management communication transmission packet with the authentication information added, the management communication can be ensured.
- the management control unit stores the management packet classification conditions, and the packet classification unit is based on the management packet classification conditions notified from the management control unit.
- the received packets are classified as management packets. For this reason, management packet classification conditions can be set freely.
- the management control unit notifies the packet classification unit of the management packet classification conditions again, and the packet classification unit manages the packets based on the notified management packet classification conditions again. Since it is classified into packets, it is possible to respond quickly to changes in management packets.
- AN monitoring and control devices 1-11 13 are arranged hierarchically and exhaustively to monitor and control the LAN.
- LAN monitoring and control devices communicate packets via a failed network.
- FIG. 12 is a diagram showing a LAN monitoring 'control device and network connection relationship in the second embodiment.
- FIG. 13 is a block diagram of FIG.
- the LAN monitoring “control device 1” and the LAN monitoring “control device 3” shown in FIG. 13 have the same configuration as FIG. As shown in Fig. 12 and Fig. 13, the faulty sub-network 28 where the fault has occurred includes the LAN monitoring / control device 1, the LAN monitoring / control device 3, and the fault terminal 29 that is the source of the fault. Is connected.
- the faulty terminal 29 is infected with a virus or the like and transmits an illegal packet. In the failed subnet network 28, illegal packets flow. The faulty terminal 29 inputs an illegal packet input 30 to the faulty subnetwork 28.
- the LAN monitoring / control device 1 inputs the downstream input 31 that is an input to the LAN monitoring / control device 1 from the higher-level network camera, and is an output to the lower-level network including the failure sub-network 28. Outputs downstream output 33. Further, the LAN monitoring / control device 1 inputs the upstream input 34 from the lower network including the failure sub-network 28 and outputs the upstream output 32 that is an output to the upper network.
- the LAN monitoring and control device 3 inputs the downstream input 35 that is an input from the upper subnetwork including the failed subnetwork, and outputs the downstream output 37 that is an output to the lower network.
- LAN monitoring 'control device 3 The upstream input 38 that is the input to the network is input, and the upstream output 36 that is the output to the upper network including the failure subnetwork 28 is output.
- the LAN monitoring / control device 1 When the LAN monitoring / control device 1 knows that an error has occurred in the faulty subnetwork 28, the LAN monitoring / control device 1 blocks the illegal packet input 30 sent from the faulty terminal 29 via the faulty subnetwork 28.
- the transparent packet received at the stream input 34 is classified into a discard packet by the packet classification unit 39a and discarded.
- the LAN monitoring and control device 3 also blocks transparent packets received from the downstream input 35, which is an input from the failed sub-network 28, in order to block illegal packets transmitted from the failed terminal 29 via the failed sub-network 28. Are classified into discarded packets by the packet classification unit 39b and discarded. As described above, the failure sub-network 28 is disconnected from the LAN monitoring 'upper network of the control device 1 and the lower network of the LAN monitoring'control device 3.
- FIG. 14 is a flowchart showing the exchange of authentication packets.
- the LAN monitoring / control device 1 is connected from the downstream input 31 to the downstream output 37 of the LAN monitoring 'control device 3.
- the packet classification unit 39 classifies the packet as a “transparent packet” (target packet) and passes it to the transmission packet authentication processing unit 49 via the output packet distribution unit 46 (S701).
- the transmission packet authentication processing unit 49 adds authentication packet authentication information directed to the LAN monitoring and control device 3 to the received packet and passes it to the authentication packet generation unit 50 (S702).
- the authentication packet generation unit 50 attaches an authentication packet header for the LAN monitoring / control device 3 to the received packet with authentication information, and passes it to the transmission priority control unit 51 as an authentication packet (S703).
- the transmission priority control unit 51 downloads the received authentication packet with the second highest priority.
- the data is output to the stream output 33 and sent to the LAN monitoring / control device 3 via the failure sub-network 28 (S704).
- the control device 3 classifies the packet into an authentication packet by the packet classification unit 39b and passes it to the packet authentication unit 44b (S705).
- the management control unit 45b of the LAN monitoring / control device 3 notifies the packet classification unit 39b of the authentication packet classification condition to be classified into the authentication packet.
- the packet classification unit 39b performs classification based on the authentication packet classification condition that has been notified. Note that the management control unit 45b re-notifies the authentication packet classification condition to the packet classification unit 39b in a predetermined case.
- the packet authentication unit 44b verifies the authentication information of the received packet and confirms the validity of the packet (S706).
- the packet authentication unit 44b After confirming that the packet is a correct authentication packet, the packet authentication unit 44b passes the packet as a transparent packet to the transmission priority control unit 51b via the output packet distribution unit 46b (S707) . The case where the authentication is not established will be described later.
- the transmission priority control unit 5 lb outputs the received packet as a transparent packet to the downstream output 37 with the third highest priority (S708).
- (2) LAN monitoring / control device 1 and LAN monitoring / control device 3 share a plurality of types of authentication packet classification conditions for authentication packets in advance, and switch when an authentication error occurs.
- the receiving side LAN monitoring 'control device 3 that detected the authentication error selects an alternative authentication packet classification condition from among the multiple types of authentication packet classification conditions that are shared, and sends an alternative authentication packet to the LAN monitoring and control device 1.
- the classification condition is notified (S710).
- the management control unit 45 of the LAN monitoring / control device 1 and the LAN monitoring 'control device 3 The management control unit 45b stores and shares a plurality of authentication packet classification conditions. Then, when an authentication error occurs, the management control unit 45b selects an alternative authentication packet classification condition, notifies the own packet classification unit 39b of the alternative authentication packet classification condition, and performs LAN monitoring / control device 1 Notify the alternative authentication packet classification conditions. LAN monitoring 'The control device 1 thereafter sends an authentication packet corresponding to the alternative authentication packet classification condition. In the LAN monitoring / control device 1, for example, the authentication packet classification condition is replaced by changing the content of the header added by the authentication packet generation unit 50, for example.
- the management control unit 45b of the LAN monitoring / control device 3 instructs the packet classification unit 39b to change the authentication packet classification condition when the authentication error occurs to the discard packet classification condition.
- the management control unit 45b of the LAN monitoring control device 3 may change the authentication packet classification condition based on the number of authentication errors counted by the authenticated packet counter 62b.
- the management control unit 45b notifies the packet classification unit 39b again of the authentication packet classification condition based on the error count number of the authenticated packet counter 62b.
- the packet classification unit 39b classifies the packet based on the notified condition again.
- the LAN monitoring 'control device 1 and the LAN monitoring' control device 3 change the packets that should be relayed between normal networks to authentication packets and block them! Since it is relayed via network 28, normal communication between sub-networks can be secured.
- the management control unit stores the authentication packet classification condition, and the packet classification unit receives the received packet based on the authentication packet classification condition notified from the management control unit. Are classified into authentication packets. For this reason, authentication packet classification conditions can be set freely.
- the management control unit notifies the packet classification unit of the authentication packet classification condition again, and the packet classification unit authenticates the packet based on the notified authentication packet classification condition again. Since it is classified into packets, packet communication between normal networks can be secured.
- Embodiment 3 will be described with reference to FIGS. 2 and 15 to 17.
- the LAN monitoring and control apparatus 1 includes the downstream packet processing unit 63, the management control unit 45, and the upstream packet processing unit 64.
- the downstream packet processing unit 63 includes a packet classification unit 39, a packet authentication unit 44, an output packet distribution unit 46, a transmission packet authentication processing unit 49 (authentication information addition unit), an authentication packet generation unit 50 (an example of a header addition unit), A transmission priority control unit 51 (an example of a transmission unit) is provided.
- the packet classification unit 39 includes a management packet counter 85 that measures the number of packets classified as management packets.
- the downstream packet processing unit 63 includes the following five packet counters.
- Transparent packet counter 60 that counts the number of transparent packets, discard packet counter 58 that counts the number of discarded packets, illegal packet counter 61 that counts the number of illegal packets that have been authenticated as a result of authentication, and packets that have been authenticated
- An authenticated packet counter 62 that counts the number of packets and a motor packet counter 59 that counts the number of monitor packets.
- the upstream packet processing unit 64 has the same configuration as the downstream packet processing unit 63.
- the packet classification unit 39 classifies input packets into transparent packets, discarded packets, management packets, authentication packets, and monitor packets.
- the transparent packet output 40 is an output of the transparent packet of the packet classification unit 39.
- Discarded packet output 41 is an output of the discarded packet of the packet classification unit 39.
- the authentication packet output 42 is an output of a packet classified into a management packet or an authentication packet by the packet classification unit 39.
- the monitor packet output 43 is an output of the monitor packet classified by the packet classification unit 39.
- the packet authentication unit 44 authenticates the management packet or the authentication packet.
- the management control unit 45 decodes the management packet, and exchanges and processes management communication and manages and controls the entire lan monitoring / control device 1. In addition, the management control unit 45 stores management packet classification conditions and authentication packet classification conditions as will be described later.
- the output packet sorting unit 46 includes a packet classification unit 39, a packet authentication unit 44, and a management system.
- the output to control unit 45 is distributed according to the packet attributes.
- the transparent packet output 47 is an output of the transparent packet from the output packet sorting unit 46.
- the authentication packet output 48 is an output of the authentication packet from the output packet sorting unit 46.
- the transmission packet authentication processing unit 49 adds authentication information necessary for outputting the management packet or the authentication packet.
- the authentication packet generator 50 attaches a header as a management packet or an authentication packet to the packet with the authentication information added.
- the transmission priority control unit 51 transmits the management packet with the first priority, the authentication packet with the second priority, and the transparent packet with the third priority.
- Downstream packet input 52 is an input of a packet directed to the lower system from the upper system in the LAN monitoring 'control device 1.
- Downstream packet output 53 is an input of a packet directed to the lower system from the upper system in the LAN monitoring 'control device 1.
- the illegal packet output 54 is an output of a packet that is determined to be illegal by the packet authentication unit 44.
- the authenticated packet output 55 is an output of a packet determined to be valid as a result of authentication by the packet authentication unit 44.
- the downstream input 56 is an input to the management control unit 45 that inputs a management packet or the like from the downstream packet input 52.
- the downstream output 57 is an output of the management control unit 45 that outputs a management packet or the like to the downstream packet output 53.
- the discarded packet counter 58 accumulates the number of discarded packets output to the discarded packet output 41.
- the monitor packet counter 59 accumulates the number of monitor packets output to the monitor packet output 43.
- Transparent packet counter 60 is the number of transparent packets output to transparent packet output 40. Is accumulated.
- the illegal packet counter 61 accumulates the number of illegal packets that are the cause of the authentication error output to the illegal packet output 54.
- the authenticated packet counter 62 accumulates the number of authenticated packets output to the authenticated packet output 55.
- the downstream packet processing unit 63 has an overall configuration for processing the input packet of the downstream packet input power.
- the upstream packet processing unit 64 is paired with the downstream packet processing unit 63 and processes the upstream packet.
- Upstream packet input 65 is an input of a packet from a lower system to a higher system.
- Upstream packet output 66 is the output of the packet from the lower system to the upper system.
- the management control unit upstream input 67 is an input to the management control unit 45 such as a management packet.
- Management control unit upstream output 68 is an output from the management control unit 45 to the upstream packet processing unit.
- Downstream packet processing including packet classification unit 39, packet authentication unit 44, output packet sorting unit 46, transmission packet authentication processing unit 49, authentication packet generation unit 50, and transmission priority control unit 51
- the upstream packet processing unit 64 paired with the unit 63 and the downstream packet processing unit 63 can be realized only by hardware logic.
- the downstream packet processing unit 63 and the upstream packet processing unit 64 perform packet classification, authentication, relaying, discarding, and the like at the LAN transmission speed.
- the management control unit 45 is controlled by a program, and performs more complicated processing such as network monitoring, judgment of blocking, setting and changing authentication conditions and classification conditions, management communication processing, and the like.
- FIG. 15 is a flowchart showing a normal relay operation.
- the packet classification unit 39 of the LAN monitoring 'control device 1 When the packet is received, the received packet is classified as a transparent packet, and is transmitted through its own device. The operation of the LAN monitoring and control device 1 for relaying packets will be described.
- the packet classification unit 39 classifies the packet into a transparent packet, and outputs the packet via the transparent packet output 40.
- the data is sent to the distribution unit 46 (S801).
- the output packet sorting unit 46 sends the transparent packet received from the transparent packet output 40 to the transmission priority control unit 51 via the transparent packet output 47 (S802).
- the transmission priority control unit 51 outputs the transparent packet received from the transparent packet output 47 to the downstream packet output 53 with the third highest priority (S803).
- the LAN monitoring control device 1 transparently relays the packet received from the downstream packet input 52 to the downstream packet output 53.
- the LAN monitoring and control device 1 when the LAN monitoring and control device 1 receives a packet to be relayed from the upstream packet input 65, the upstream packet processing unit so that the configuration shown in FIG. 64 performs the same processing as the above-described processing of the downstream packet processing unit 63, thereby transparently relaying the packet received from the upstream packet input 65 to the upstream packet output 66. With the above operation, the LAN monitoring / control device 1 appears to be transparent as a repeater from the outside.
- Figure 16 shows the operation when the LAN monitoring 'control device 1 receives a management packet.
- LAN monitoring 'control device 1 classifies the input packet into a management packet by packet classification unit 39 and performs authentication processing. Therefore, the packet is sent to the packet authentication unit 44 via the authentication packet output 42 (S901).
- the packet authentication unit 44 verifies the received management packet (S902), and if it is confirmed that it is correct, sends it to the output packet distribution unit 46 via the authenticated packet output 55 (S903).
- the output packet sorting unit 46 knows that the packet is a management packet and manages it.
- the data is sent to the management control unit 45 via the control unit downstream input 56 (S904).
- the management control unit 45 performs monitoring / control processing corresponding to the designated packet (S90).
- the upstream packet processing unit 64 performs the same processing as the processing of the downstream packet processing unit 63.
- the management packet received from the upstream packet input 65 is sent to the management control unit 45 via the management control unit upstream input 67.
- FIG. 17 is a flowchart showing a process in which the LAN monitoring / control apparatus 1 transmits a management packet. Assume the case of Figure 3.
- the output packet sorting unit 46 sends the packet as a management packet to the transmission packet authentication processing unit 49 in order to add authentication information to the received management communication packet (S102).
- the transmission packet authentication processing unit 49 adds authentication information for management communication to the received packet, and sends it to the authentication packet generation unit 50 as a management packet (S1003).
- the authentication packet generation unit 50 adds a header for management communication to the received packet, and sends it as a management packet to the transmission priority control unit 51 (S1004).
- the transmission priority control unit 51 knows that the packet is a management packet, and transmits it to the downstream packet output 53 with the first priority (S1005).
- the management control unit 45 sends the management control unit upstream output 68 to the upstream packet processing unit 64 for management communication. Send the packet as a management packet.
- the upstream packet processing unit 64 performs the same process as the downstream packet processing unit 63 described above, and outputs a management packet to the upstream packet output 66. (1) If the LAN monitoring and control device 1 receives a management bucket from the downstream packet input 52 and the packet authentication unit 44 verifies that it is an invalid packet (S902) NG), the packet authentication unit 44 outputs the packet to the illegal packet output 54 (S906).
- the illegal packet counter 61 counts the illegal packet output to the illegal packet output 54 (S907).
- the management control unit 45 monitors this count result. When the management control unit 45 detects that the value of the illegal packet counter 61 has been counted up, the management control unit 45 notifies the transmission source of the management packet that an authentication error has occurred. The management packet is sent to the upstream packet processing unit 64 (S908).
- the upstream packet processing unit 64 Upon receiving this management packet, the upstream packet processing unit 64 attaches authentication information and a management packet header, and outputs the management packet to the upstream packet output 66 (S909).
- the management control unit 45 changes the transparent packet classification condition of the packet classification unit 39 to the discard packet classification condition. With this change, the packet classification unit 39 thereafter classifies all packets to be transparently relayed received at the downstream packet input 52 as discarded packets and discards them. As described above, the LAN monitoring control device 1 blocks the upstream network packet from the downstream side, and blocks the upstream side network from the downstream side network. On the other hand, when the downstream network is also interrupted by the upstream network, the management control unit 45 discards the transparent packet classification condition to the packet classification unit 39a of the upstream packet processing unit 64. Change to packet classification conditions. As a result, the upstream packet processing unit 64 performs the same processing as the above-described operation of the downstream packet processing unit 63, and inputs the upstream packet. Discard all the packets to be relayed received from 65 and block the upstream network power from the downstream network.
- the control device 1 relays the authentication packet as described in the second embodiment. Since this has been described in Embodiment 2 with reference to FIGS. 13 and 14, detailed description thereof will be omitted.
- the management control unit 45 observes the management packet counter 85, the transparent packet counter 60, the discarded packet power counter 58, the illegal packet counter 61, the authenticated packet counter 62, and the monitor packet counter 59, and monitors the traffic of each packet.
- the management control unit 45 sets the monitor packet classification condition of the packet classification unit 39 to output a copy of the packet to be monitored to the monitor packet output 43, and the monitor packet counter 59 determines the occurrence frequency. Monitor. Further, the management control unit 45 inputs the monitor packet from the output packet distribution unit 46 as the management control unit downstream input 56 as necessary, and analyzes the input monitor packet. For the upstream packet input 65, as with the downstream packet processing unit 63, the management control unit 45 controls the upstream packet processing unit 64, monitors the frequency of occurrence of each packet, and manages the upstream of the management control unit. Capture monitor packet from stream input 67 and analyze.
- the packet classification conditions used by the packet classification unit 39, the authentication conditions of the management packet and authentication packet used by the packet authentication unit 44, and the authentication of the management packet and authentication packet used by the transmission packet authentication processing unit 49 The management packet generated by the condition and authentication packet generation unit 50 and the header generation condition of the authentication packet are set in advance in each processing unit by the management control unit 45 and respond to an attack or the like.
- the management control unit 45 changes at the timing described in 2.
- LAN monitoring and control device 1 Since LAN monitoring and control device 1 is configured as described above, it ensures normal communication between networks while blocking illegal packets even when an attack with an unexpected illegal bucket occurs. it can.
- Embodiment 4 will be described with reference to FIGS.
- a pair of entry / exit Although the configuration of the control device 1 is shown, it shows an embodiment of a device that has a plurality of inputs and outputs and can be used as a switch.
- FIG. 18 is a block diagram showing an example of such a switch-type LAN monitoring and control device 80.
- FIG. 19 shows a configuration example of a network using such a switch-type LAN monitoring and control device 80.
- Embodiment 1 above indicates that a portion having the same number as that in Embodiment 1 has the same function.
- the configuration of the switch type LAN monitoring / control device 80 will be described.
- the switch-type LAN monitoring / control device 80 has a plurality of input packet processing units 72a, 72b, 72 ⁇ , etc. for inputting packets and a plurality of output packet processing units 73a, 73b, 73 ⁇ , for outputting packets. , A packet switch unit 70, and a management control unit 45.
- the configuration of the input packet processing unit 72a, etc. is composed of the downstream packet processing unit 63 of the LAN monitoring and control device 1, the input side (packet classification unit 39 side) and the output side based on the output packet distribution unit 46. It is similar to the configuration on the input side when divided into (transmission priority control unit side).
- the input packet processing unit 72a and the like further include a packet input switch interface unit 69.
- the configuration of the output packet processing unit 73a and the like is similar to the configuration on the output side with the output packet sorting unit 46 as a reference.
- the output packet processing unit 73a and the like further include a packet output switch interface unit 71.
- the packet input switch interface unit 69 distributes the received packet classified by the packet classification unit 39 to the transmission destination.
- the packet switch unit 70 forwards packets inside the switch type LAN monitoring and control device 80 * 5.
- the packet output switch interface unit 71 receives a transmission packet from the packet switch unit 70.
- the input packet processing unit 72a is a first input packet processing unit that classifies and authenticates packets received at the downstream packet input 52 and determines a transmission destination.
- the output packet processing unit 73a adds a header corresponding to the authentication information and the classification condition to the transmission packet, and downstream the packet while controlling the priority according to the packet attribute. It is the first output packet processing unit that transmits to the packet output 53.
- the input packet processing unit 72b is a second input packet processing unit that processes the received packet from the upstream packet input 65.
- the output packet processing unit 73b is a second output packet processing unit that processes transmission packets sent to the upstream packet output 66.
- the input packet processing unit 72 ⁇ is a ⁇ th input packet processing unit that processes other input packets.
- the output packet processing unit 73 ⁇ is a ⁇ -th output packet processing unit that processes other output packets.
- the management control unit integrated input 78 is an input of a packet sent to the management control unit 45 from each of the input packet processing units 72a, 72b,.
- the management control unit integrated output 79 is an output of a transmission packet sent from the management control unit 45 to each output packet processing unit 73a, 73b,.
- FIG. 20 is a diagram showing the connection between the switch-type LAN monitoring and control device 80 and the network.
- Switch-type LAN monitoring 'Control device 80 is connected to the upstream network via downstream packet input 52 and upstream packet output 66, and downstream network via upstream packet input 65 and downstream packet output 53. Connect with. This connection relays packets between the upstream network and the downstream network in the same manner as the LAN monitoring and control device 1.
- a plurality of input packet processing units 72c, 72d, 72 ', etc. other than the input packet processing units 72a, 72b, and a plurality of output packet processing units 73c other than the output packet processing units 73a, 73b 73bd,..., 73 ⁇ , etc. are connected to a plurality of sub-networks, and the packet switch 70 operates as a switch by switching the connection between the processing units and delivering packets.
- the packet is output via the packet switch unit 70. Sent to packet processor 73b, Output to upstream packet output 66. This relays to the upstream network. If the destination IP address is the downstream network, the packet is sent to the output packet processing unit 73a via the packet switch unit 70 and output to the downstream packet output 53. This relays the packet to the downstream network.
- Management packets are received by multiple input packet processing units 72a, 72b, 72 ⁇ , etc., and management packets are based on management packet classification conditions and authentication conditions that are independent for each connected network. And the management packet are authenticated, and all are sent to the management control unit integrated input 78 via the packet switch unit 70.
- the management control unit 45 processes the received management packet and, if necessary, outputs a transmission packet for reply or distribution to the management control unit integrated output 79, via the packet switch unit 70. It is sent to the output packet processing units 73a, 73b, ⁇ 73 ⁇ etc. connected to the destination network.
- the output packet processing unit 73a, 73b, 73 ⁇ , etc. that received the packet adds authentication information and a header corresponding to the transmission destination, and has the highest priority for the downstream packet output 53, the upstream packet output 66, etc. Send.
- FIG. 21 is a diagram showing a connection state of the switch-type LAN monitoring / control device 80 shown in FIG.
- the output of the subnetwork 15 is connected to the input packet processing unit 72a, and the output is connected to the output packet processing unit 73a.
- the output of the management device 14 is connected to the input packet processing unit 72b and the output is connected to the output packet processing unit 73b.
- the output of the subnetwork 19 is connected to the input packet processing unit 72c, and the output is connected to the output packet processing unit 73c.
- the output of the subnetwork 20 is connected to the input packet processing unit 72d and the output is connected to the output packet processing unit 73d.
- the packet switch unit 70 switches the connection when a packet is output from each of the input packet processing units 72a, 72b, 72c, 72b, and outputs the output packet to the output packet processing unit 7
- the switch-type LAN monitoring / control device 80 is configured as described above, so it can be directly connected to multiple sub-networks to achieve fine-grained monitoring / control with a smaller number of devices. wear.
- the LAN monitoring 'control device with the following (a)-(f) is distributed in the LAN and communicates with each other, so that the network power in which the failure has occurred
- a transmission priority control unit that transmits the management packet as the first priority, the authentication packet as the second priority, and the transmission packet as the third priority.
- Each connection destination has individual classification conditions and authentication conditions.
- the LAN monitoring and control devices connected to each other share a plurality of classification conditions for authentication packets and management packets, and the receiving side LAN monitoring and control device detects an authentication error.
- the receiving side LAN monitoring controller explained switching the classification conditions to be used in subsequent communications by notifying the transmitting side LAN monitoring controller of the alternative classification conditions. If the same classification condition is shared by multiple LAN monitoring controllers, the LAN monitoring controller that detected the authentication error can notify all related LAN monitoring / control devices of the alternative classification condition. The case where the classification conditions are switched for the entire group was explained.
- the classification condition of the management packet or the authentication packet is changed on the condition that the number of fraud determinations occurring within a predetermined time exceeds the predetermined number in the authentication fraud determination of the received packet.
- LAN monitoring for sending and receiving management packets and authentication packets' The upper limit of the number of packets to be sent and received within a predetermined time is shared in advance between control devices, and the receiving side LAN monitoring is performed.
- control device changes the classification conditions of the corresponding management packet or authentication packet when the number of received management packets and authentication packets exceeds the upper limit has been explained.
- the LAN monitoring' control device that directly receives the management instruction from the management device is the starting point.
- this management information is distributed to all LAN monitoring and control devices that are located adjacent to each other as a transmission destination.
- the LAN monitoring / control device that has received the management information also distributes the management information to all LAN monitoring / control devices arranged adjacent to each other as a transmission destination. Then, the case where the above distribution processing is repeated until reaching the terminal LAN monitoring 'control device has been explained.
- the management information (management Management information from the LAN monitoring 'control device placed at the end is gathered once and the upstream LAN monitoring / control device is integrated as a single management packet. I explained the case of replying to.
- the LAN monitoring / control device arranged in the middle satisfies the predetermined blocking condition as a result of accumulating the management information returned from the terminal cover and its own management information. If it turns out, the relevant LAN monitoring 'all LAN monitoring located downstream of the control device' is instructed to classify all received packets except for management packets and authentication packets into discarded packets. The case where an alarm is issued was explained.
- a LAN in which management devices are distributed and distributed including the route information of the LAN monitoring and control devices passed to the management information (management packets) returned from each LAN monitoring and control device.
- management information management packets
- the route information to the destination is managed in the management packet based on the route information grasped in the above procedure.
- each LAN monitoring 'control device passes the management packet to the target LAN monitoring' control device and distributes it was explained.
- a specific LAN monitoring-all LAN monitoring connected to the downstream of a specific control device by sending a management packet including route information to the control device and a management information distribution instruction for all devices. The case where management information is distributed to the control device has been described. This is effective when issuing a shutdown instruction to all devices below a specific LAN monitoring device.
- each LAN monitoring / control device when transferring a reply packet from each LAN monitoring / control device to the management device, each LAN monitoring / control device stores the transfer relationship and is transmitted from the management device. When a specific LAN monitoring / control device-addressed packet is received, the destination LAN monitoring / control device is automatically determined and the packet is transferred. The stored information is updated each time a management packet is sent from the management device to all LAN monitoring and control devices. This is to dynamically respond to expansion of devices and connection position changes of management devices.
- normal packets are transferred through the blocked subnetwork by changing the authentication packet into an authentication packet.
- the LAN monitoring 'control device that is the first connection destination supplies connection information of devices that can be further connected to the added device, and to other connectable devices.
- the case where the connection information of the added device is distributed was explained.
- the range of connection can be expanded autonomously within the range where direct management communication can be performed via LAN.
- FIG. 1 is a diagram showing a network configuration of a network system 1000 according to the first embodiment.
- FIG. 2 is a block diagram of a LAN monitoring / control device 1 in the first embodiment.
- FIG. 3 is a diagram showing a connection between a LAN monitoring / control device 1 and a LAN monitoring / control device 3 according to the first embodiment.
- FIG. 4 is a flowchart showing a process in which the LAN monitoring / control device 1 transmits a management packet to the LAN monitoring / control device 3 in the first embodiment.
- FIG. 5 is a flowchart when a management packet authentication error occurs in the first embodiment.
- FIG. 6 is a flowchart showing an operation in which the management device 14 in Embodiment 1 collects monitoring information of all LAN monitoring and control devices 1-13.
- FIG. 7 is a flowchart showing blocking of the sub-network 26 in the first embodiment.
- FIG. 8 is a flow chart for explaining the case of partial restoration and full restoration in the first embodiment.
- FIG. 9 is a diagram showing a relay direction of a transparent packet in the first embodiment.
- FIG. 10 is a diagram showing blocking of transparent packets in the downstream direction in the first embodiment.
- FIG. 11 is a flowchart showing a procedure for adding a LAN monitoring control apparatus 1-13 in the first embodiment.
- FIG. 12 is a diagram showing a connection relationship between a LAN monitoring control apparatus and a network in the second embodiment.
- FIG. 13 is a block diagram of LAN monitoring / control device 1 and LAN monitoring / control device 3 in the second embodiment.
- FIG. 14 is a flowchart showing exchange of authentication packets in the second embodiment.
- FIG. 15 is a flowchart showing a normal relay operation in the third embodiment.
- FIG. 16 is a flowchart showing the operation when the LAN monitoring control device 1 in Embodiment 3 receives a management packet.
- FIG. 17 is a flowchart showing a process in which the LAN monitoring / control device 1 transmits a management packet in the third embodiment.
- FIG. 18 is a block diagram of a switch type LAN monitoring / control device 80 according to the fourth embodiment.
- FIG. 19 is a diagram showing a configuration example of a network using the switch type LAN monitoring and control device 80 according to the fourth embodiment.
- FIG. 20 is a diagram showing a connection between a switch-type LAN monitoring and control device 80 and a network in the fourth embodiment.
- FIG. 21 is a diagram showing a connection state of the switch-type LAN monitoring 'control device 80 in the fourth embodiment.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
Claims
Priority Applications (5)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/663,745 US20080117918A1 (en) | 2004-10-22 | 2004-10-22 | Relaying Apparatus and Network System |
EP04792831A EP1804431A1 (en) | 2004-10-22 | 2004-10-22 | Repeater and network system |
JP2006542144A JPWO2006043327A1 (ja) | 2004-10-22 | 2004-10-22 | 中継装置及びネットワークシステム |
PCT/JP2004/015689 WO2006043327A1 (ja) | 2004-10-22 | 2004-10-22 | 中継装置及びネットワークシステム |
CNA2004800442020A CN101044719A (zh) | 2004-10-22 | 2004-10-22 | 中继装置和网络系统 |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/JP2004/015689 WO2006043327A1 (ja) | 2004-10-22 | 2004-10-22 | 中継装置及びネットワークシステム |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2006043327A1 true WO2006043327A1 (ja) | 2006-04-27 |
Family
ID=36202752
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2004/015689 WO2006043327A1 (ja) | 2004-10-22 | 2004-10-22 | 中継装置及びネットワークシステム |
Country Status (5)
Country | Link |
---|---|
US (1) | US20080117918A1 (ja) |
EP (1) | EP1804431A1 (ja) |
JP (1) | JPWO2006043327A1 (ja) |
CN (1) | CN101044719A (ja) |
WO (1) | WO2006043327A1 (ja) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008054070A (ja) * | 2006-08-25 | 2008-03-06 | Alaxala Networks Corp | パケット交換装置 |
JP7111125B2 (ja) | 2020-04-15 | 2022-08-02 | 日本電気株式会社 | 通信処理システム、通信処理装置およびその制御方法と制御プログラム |
US11563604B2 (en) | 2016-03-24 | 2023-01-24 | Nec Corporation | Securing a connection from a device to a server |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070127364A1 (en) * | 2005-12-02 | 2007-06-07 | Research In Motion Limited | System and method for managing network traffic load upon outage of a network node |
US8619557B2 (en) * | 2005-12-02 | 2013-12-31 | Blackberry Limited | System and method for managing network traffic load upon outage of a network node |
US7941382B2 (en) * | 2007-10-12 | 2011-05-10 | Microsoft Corporation | Method of classifying and active learning that ranks entries based on multiple scores, presents entries to human analysts, and detects and/or prevents malicious behavior |
CN101478551B (zh) * | 2009-01-19 | 2011-12-28 | 清华大学 | 基于多核处理器的多域网包分类方法 |
US8767758B2 (en) * | 2009-11-03 | 2014-07-01 | Intel Corporation | Apparatus, system and method of prioritizing a management frame of a wireless network |
JP2016018384A (ja) * | 2014-07-08 | 2016-02-01 | 富士通株式会社 | ストレージ制御装置、ストレージシステム、及びプログラム |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002063084A (ja) * | 2000-08-21 | 2002-02-28 | Toshiba Corp | パケット転送装置、パケット転送方法、及びそのプログラムが格納された記憶媒体 |
JP2002335246A (ja) * | 2001-05-10 | 2002-11-22 | Nippon Telegr & Teleph Corp <Ntt> | ネットワークベース侵入検査方法及び装置並びにネットワークベース侵入検査用プログラム及びその記録媒体 |
JP2005005927A (ja) * | 2003-06-11 | 2005-01-06 | Nippon Telegr & Teleph Corp <Ntt> | ネットワークシステムと不正アクセス制御方法およびプログラム |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US4769811A (en) * | 1986-12-31 | 1988-09-06 | American Telephone And Telegraph Company, At&T Bell Laboratories | Packet switching system arranged for congestion control |
US5999612A (en) * | 1997-05-27 | 1999-12-07 | International Business Machines Corporation | Integrated telephony and data services over cable networks |
JP3259724B2 (ja) * | 1999-11-26 | 2002-02-25 | 三菱電機株式会社 | 暗号装置、暗号化器および復号器 |
US7657934B2 (en) * | 2002-01-31 | 2010-02-02 | Riverbed Technology, Inc. | Architecture to thwart denial of service attacks |
US7155658B2 (en) * | 2002-12-20 | 2006-12-26 | Intel Corporation | CRC calculation for data with dynamic header |
WO2004073264A1 (de) * | 2003-02-14 | 2004-08-26 | Siemens Aktiengesellschaft | Zugangskontrolle für ein paketorientiertes netz unter berücksichtigung von resilience anforderungen |
US20050243814A1 (en) * | 2004-04-16 | 2005-11-03 | Vieo, Inc. | Method and system for an overlay management system |
-
2004
- 2004-10-22 WO PCT/JP2004/015689 patent/WO2006043327A1/ja active Application Filing
- 2004-10-22 EP EP04792831A patent/EP1804431A1/en not_active Withdrawn
- 2004-10-22 CN CNA2004800442020A patent/CN101044719A/zh active Pending
- 2004-10-22 US US11/663,745 patent/US20080117918A1/en not_active Abandoned
- 2004-10-22 JP JP2006542144A patent/JPWO2006043327A1/ja not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2002063084A (ja) * | 2000-08-21 | 2002-02-28 | Toshiba Corp | パケット転送装置、パケット転送方法、及びそのプログラムが格納された記憶媒体 |
JP2002335246A (ja) * | 2001-05-10 | 2002-11-22 | Nippon Telegr & Teleph Corp <Ntt> | ネットワークベース侵入検査方法及び装置並びにネットワークベース侵入検査用プログラム及びその記録媒体 |
JP2005005927A (ja) * | 2003-06-11 | 2005-01-06 | Nippon Telegr & Teleph Corp <Ntt> | ネットワークシステムと不正アクセス制御方法およびプログラム |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2008054070A (ja) * | 2006-08-25 | 2008-03-06 | Alaxala Networks Corp | パケット交換装置 |
US11563604B2 (en) | 2016-03-24 | 2023-01-24 | Nec Corporation | Securing a connection from a device to a server |
JP7111125B2 (ja) | 2020-04-15 | 2022-08-02 | 日本電気株式会社 | 通信処理システム、通信処理装置およびその制御方法と制御プログラム |
Also Published As
Publication number | Publication date |
---|---|
EP1804431A1 (en) | 2007-07-04 |
CN101044719A (zh) | 2007-09-26 |
JPWO2006043327A1 (ja) | 2008-05-22 |
US20080117918A1 (en) | 2008-05-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102714627B (zh) | 网络系统和网络冗余方法 | |
US7499395B2 (en) | BFD rate-limiting and automatic session activation | |
CN1640090B (zh) | 分布式服务拒绝攻击的安全的自动化的响应装置与方法 | |
US6785226B1 (en) | System and method for data routing over a network | |
US6345299B2 (en) | Distributed security system for a communication network | |
US9813448B2 (en) | Secured network arrangement and methods thereof | |
JP4938135B2 (ja) | スパニングツリープロトコルによりセットアップされたネットワーク構成を保護するための方法 | |
US20070140449A1 (en) | "Always-on" telemetry system and method | |
US11411915B2 (en) | Leveraging MACsec key agreement (MKA) state events to trigger fast IGP/EGP convergence on MACsec encrypted links | |
EP1503536A1 (en) | Encryption device, encryption method, and encryption system | |
JP2006339933A (ja) | ネットワークアクセス制御方法、およびシステム | |
CN112822103B (zh) | 一种信息上报方法和信息处理方法及设备 | |
CN103210609A (zh) | 包括识别不期望数据的保护电路的用于在数据网络中进行通信的电子设备 | |
KR102587055B1 (ko) | 인공지능 기반 컴퓨터 이상 탐지 시스템 | |
WO2006043327A1 (ja) | 中継装置及びネットワークシステム | |
US6347338B1 (en) | Precomputed and distributed security system for a communication network | |
US20050008160A1 (en) | Central encryption management system | |
US20080095148A1 (en) | Mechanism for automatic global network configuration and switch parameter setting using radius/AAA | |
WO2018168262A1 (ja) | ネットワーク装置、監視制御装置、ネットワークシステム及びそれらの制御方法 | |
KR101881061B1 (ko) | 모드 변경이 가능한 양방향 통신 장치 및 방법 | |
Guttman et al. | Authentication and Confidentiality via IP sec | |
JP4421462B2 (ja) | 不正侵入検知システムおよび管理装置 | |
US11863544B2 (en) | Authenticating a node in a communication network of an automation installation | |
Avramopoulos et al. | A routing protocol with Byzantine robustness | |
JP5879223B2 (ja) | ゲートウェイ装置、ゲートウェイシステムおよび計算機システム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
WWE | Wipo information: entry into national phase |
Ref document number: 2006542144 Country of ref document: JP |
|
AK | Designated states |
Kind code of ref document: A1 Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BW BY BZ CA CH CN CO CR CU CZ DE DK DM DZ EC EE EG ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NA NI NO NZ OM PG PH PL PT RO RU SC SD SE SG SK SL SY TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW |
|
AL | Designated countries for regional patents |
Kind code of ref document: A1 Designated state(s): BW GH GM KE LS MW MZ NA SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG |
|
121 | Ep: the epo has been informed by wipo that ep was designated in this application | ||
WWE | Wipo information: entry into national phase |
Ref document number: 11663745 Country of ref document: US |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2004792831 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 200480044202.0 Country of ref document: CN |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
WWP | Wipo information: published in national office |
Ref document number: 2004792831 Country of ref document: EP |
|
WWP | Wipo information: published in national office |
Ref document number: 11663745 Country of ref document: US |