[go: up one dir, main page]

WO2015174100A1 - Packet transfer device, packet transfer system, and packet transfer method - Google Patents

Packet transfer device, packet transfer system, and packet transfer method Download PDF

Info

Publication number
WO2015174100A1
WO2015174100A1 PCT/JP2015/050618 JP2015050618W WO2015174100A1 WO 2015174100 A1 WO2015174100 A1 WO 2015174100A1 JP 2015050618 W JP2015050618 W JP 2015050618W WO 2015174100 A1 WO2015174100 A1 WO 2015174100A1
Authority
WO
WIPO (PCT)
Prior art keywords
packet
address
frame
node
entity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/JP2015/050618
Other languages
French (fr)
Japanese (ja)
Inventor
小林 浩
友貴 末廣
博史 八槇
佐々木 良一
洋一郎 上野
香 佐野
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tokyo Denki University
Original Assignee
Tokyo Denki University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tokyo Denki University filed Critical Tokyo Denki University
Priority to JP2016519125A priority Critical patent/JPWO2015174100A1/en
Publication of WO2015174100A1 publication Critical patent/WO2015174100A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways

Definitions

  • the present invention relates to a packet transfer device, a packet transfer system, and a packet transfer method.
  • IP address spoofing By the way, according to the announcement by the National police Agency, about 97% of the attacks by botnets observed in 2012 were SYN (Synchronize) flood attack and UDP (User Datagram Protocol) flood attack, most of which were from the source IP The feature is that the address was spoofed (hereinafter, IP address spoofing or address spoofing). Taking countermeasures against IP address spoofing is expected to have a great effect as a countermeasure against cyber attacks.
  • IP address spoofing is successful is that routing on the Internet looks only at the destination IP address of the packet.
  • One of the ingress filtering technologies that try to prevent the IP address spoofed packet from entering the Internet is to check whether the source address of the received packet exists as route information in the route table.
  • URPF Unicast Reverse Path Forwarding
  • IEEE 802.1X there is an IEEE 802.1X standard that grants communication permission to a port by authentication so that a terminal other than a predetermined terminal does not access the network.
  • Some products can add a MAC address-based ingress filtering function to prevent frames from being transmitted from unauthenticated terminals via a repeater hub. Even if the terminal that received the message is infected with a bot virus or the like and transmits an IP address spoofing packet, the authentication LAN switch cannot prevent it.
  • DHCP Dynamic Host Configuration Protocol
  • DHCP Dynamic Host Configuration Protocol
  • IP trace back technology that tries to identify the source of the IP address spoofing packet
  • SDN Software Defined Network
  • ISP Internet Service Provider
  • Cyber attacks are a problem of the entire Internet, and even if IP address spoofing measures are partially introduced, the effect is insignificant. It seems to be extremely difficult to ask for the introduction of countermeasures to almost all of the countless ISPs, various organizations, and general users.
  • TCP / IP Transmission Control Protocol / Internet Protocol
  • DNS Domain Name System
  • e-mail etc.
  • Information should be widely disclosed which is the foundation of the government, “The power is domineering and untrustworthy” which hate the intervention of the government, bureaucrats and large corporations, and “The cracking act is commandment”.
  • the Internet which is rooted in democracy, is based on the sensible actions and behaviors of users, and there is no mechanism or organization that monitors or restricts usage.
  • IETF Internet Engineering Task Force
  • ICANN Internet Corporation for Assigned Names and Numbers
  • the idea is that the Internet is open but unprotected, and cracking that exploits it should be strictly disciplined.
  • IP address spoofing packet is a packet intended for some kind of cracking action, regardless of whether or not it is recognized by the person himself / herself. In other words, taking measures to prevent IP address spoofing packets from entering the Internet is in line with the idea of Internet culture.
  • the world of the Internet consists of contracts, and secondary / tertiary ISPs and users are connected and connected under a limited number of primary ISPs. Therefore, if the primary ISP recognizes the cost effectiveness of the present invention and decides to introduce it, the introduction can be defined as a contract clause including the subordinate ISP / organization user / general user.
  • Node used as a generic term
  • PC 26 used by a so-called general user
  • smartphone 24 used as a portable terminal
  • server 13 used as a stepping stone for cyber attacks
  • broadband routers There are broadband routers.
  • IoT Internet of Things
  • Such a node in the damage caused by address spoofing, spoofs the source IP address to the IP address targeted by the machines that are connected to the Internet 10 and are mainly attacked by machines, that is, M-to-M (Machine to Machine) terminals.
  • M-to-M Machine to Machine
  • DRDoS Distributed Reflection Denial of Service
  • an address spoof packet is sent if a device such as bypass (bypass) or direct connection of a personal computer to a WAN line and sending an attack packet is applied. Since these leak out to the outside (Internet 10), these are also nodes that should be targeted for address spoofing.
  • the network is a set of nodes including iMLBR11 and eMLBR12.
  • the set of nodes that is, the network is regarded as a node, and the set can be treated as a network. That is, the Internet 10 has a hierarchical and recursive structure. ing. Therefore, even if the network of the above-mentioned “connect anything” policy (Untrusted Internet 21) is connected to the Internet 10 via an existing router not according to the present invention (iMLBR11 or eMLBR12), it can be regarded as one of unreliable nodes. It will be good.
  • the Internet 10 has an HRS 23 (Home RADIUS (Remote Authentication Dial In User Service Server)) that functions as a home authentication server.
  • HRS 23 Home RADIUS (Remote Authentication Dial In User Service Server)
  • ISPs operating under various policies various organizations and general users can be monitored and controlled, and policies can be enforced or can be seen in the IP trace back. Measures such as taking out are unacceptable. In other words, whether or not the source IP address is spoofed is checked at the exit on the user side and the entrance of the Internet 10, and if it is an address spoofed packet, it is securely blocked.
  • the problem is that it is a versatile and technically feasible measure with the minimum necessary for blocking attack packets and illegal packets that are about to flow in.
  • the present invention has a supplicant that makes an authentication request, has no supplicant as well as a terminal whose authenticity is authenticated, and does not have an OS upgrade or a firewall function.
  • An address spoofing packet sent from a completely defenseless terminal is prevented from flowing into the Internet 10 and into the Internet 10.
  • attack packets and illegal packets that have passed through the above countermeasures and have flowed into the Internet 10 are prevented from flowing out into the Internet 10 and flowing into the Internet 10 in response to a request from the node that detected them.
  • the present invention manages the correspondence between the port or channel identification information, the source physical (so-called MAC) address, and the source logical (so-called IP) address of the packet transfer device (iMLBR and eMLBR). Then, it is checked whether or not this correspondence exists using the identification information of the port or channel that received the frame / packet as a key, and a packet that does not have a correspondence is regarded as an address spoofing packet and discarded. Further, a discard table is generated / updated in response to a request from a node that detects an attack packet or an illegal packet that has passed through the above measures and has flowed into the Internet, and discards a packet corresponding to the discard table.
  • the packet transfer apparatus is: A plurality of ports or a plurality of channels accommodating at least one node or at least one entity for encapsulating packets in each other in a frame; and Multi-layer for storing the correspondence between the identification information of the port or the channel, the transmission source physical address of the frame transmitted by the node or the entity, and the transmission source logical address of the packet extracted by decapsulating the frame ⁇ Binding table,
  • the multi-layer binding table is searched using the port or the channel that received the frame as a key, and when a pair of a source physical address and a source logical address of the frame exists in the banding table, the frame A transfer unit that encapsulates the packet extracted from the packet and transfers it to the next hop node toward the destination logical address of the packet, and discards the packet when it does not exist in the multilayer binding table.
  • the packet transfer apparatus is: A plurality of ports or a plurality of channels accommodating at least one node or at least one entity for encapsulating packets in each other in a frame; and Multi-layer for storing the correspondence between the identification information of the port or the channel, the transmission source physical address of the frame transmitted by the node or the entity, and the transmission source logical address of the packet extracted by decapsulating the frame ⁇ Binding table,
  • the multi-layer binding table is searched using the port or the channel that received the frame as a key, and when a pair of a source physical address and a source logical address of the frame exists in the banding table, the frame A transfer unit that transfers the packet extracted from the packet to a router that transfers the packet toward the destination logical address, and discards the packet when the packet is not present in the multilayer binding table.
  • the packet transfer apparatus is An authentication request packet or frame sent together with the received port or channel identification information from the transfer unit provided in another packet transfer apparatus connected in advance mediates an authentication request to the authentication server, and the authentication server Obtaining an authenticated authentication result, setting the communication service quality determined based on the authentication result as a storage target of the multilayer binding table, Check the existence of the requesting node or entity of the authentication request via the port or the channel, and update the multilayer binding table; A control unit that transmits the multilayer binding table to the transfer unit provided in another packet transfer device; The transfer unit The multilayer binding table transmitted from the control unit may be updated.
  • the discard table of the transfer unit receives a discard request from any node or entity connected to the port or channel, or periodically accesses a predetermined node or entity that is determined in advance, and acquires the discard request. Update The transfer unit A frame or packet corresponding to the discard table may be discarded.
  • the transfer unit and the control unit cooperate with each other, In response to the address resolution request frame addressed to its own device broadcasted by the node or the entity, the address resolution request frame is broadcasted from the same port or channel to the node or the entity, A pair of a source physical address and a source logical address of an address resolution response frame returned via the port or the channel, and a pair of a source physical address and a source logical address of the address resolution request frame addressed to the own apparatus. By verifying the authenticity of the physical address and the logical address of the node or the entity.
  • the control unit and the transfer unit are When the node or the entity has a fixed process identification address, the process identification address may be stored in the multilayer binding table.
  • DHCP Dynamic Host Configuration Protocol
  • layer 2 switch Layer 2 switch
  • W-LAN Wireless Local Area Network
  • the transfer unit or the control unit is When a packet transmitted by an authenticated node or entity is received, a predetermined value according to the communication protocol of the packet may be written in a predetermined field of the received packet. Further, when a packet transmitted by an unauthenticated node or entity is received, the predetermined field may be reset.
  • the packet transfer system is: A packet transfer device arranged on the Internet user side; A packet transfer device arranged on the Internet side, and the packet transfer device arranged on the Internet side sends an address spoof packet bypassing or passing through the packet transfer device arranged on the Internet user side. Even prevent the inflow to the Internet.
  • the packet transfer method includes: Identification information of a plurality of ports or a plurality of channels accommodating at least one node or at least one entity that encapsulates packets in a frame, and a transmission source physical address and transmission of the frame transmitted by the node or the entity Search the multi-layer binding table that stores the correspondence with the original logical address using the identification information of the port or channel to which the frame has been sent as a key, When a pair of a transmission source physical address and a transmission source logical address of the frame exists in the banding table, a packet extracted from the frame is encapsulated into a frame and a next hop node is directed toward the transmission destination logical address of the packet And a transfer procedure for discarding the packet when it does not exist in the multilayer binding table.
  • the packet transfer method includes: Identification information of a plurality of ports or a plurality of channels accommodating at least one node or at least one entity that encapsulates packets in a frame, and a transmission source physical address and transmission of the frame transmitted by the node or the entity Search the multi-layer binding table that stores the correspondence with the original logical address using the identification information of the port or channel to which the frame has been sent as a key, When a pair of a source physical address and a source logical address of the frame exists in the banding table, the frame is transferred to a router that transfers the packet taken out from the frame toward the destination logical address, When it does not exist in the binding table, it has a transfer procedure for discarding the packet.
  • the packet transfer device according to the present invention is deployed as a so-called edge router (iMLBR11) at the end of the Internet 10, the address spoofing packet, attack packet, and illegal packet are prevented from flowing into the Internet 10. Furthermore, if the packet transfer device according to the present invention is deployed as a so-called broadband router or the like (eMLBR12) on the Internet user side, the outflow of address spoofing packets, attack packets, and illegal packets to the Internet 10 is prevented.
  • edge router iMLBR11
  • eMLBR12 broadband router or the like
  • An example of the block diagram of the network which concerns on this embodiment is shown.
  • An example of the block diagram of eMLBR which concerns on this embodiment is shown.
  • An example of the block diagram of iMLBR which concerns on this embodiment is shown.
  • An example of the component of the network which has a some communication function which concerns on this embodiment is shown.
  • An example of the authentication between an IEEE 802.1X non-corresponding node and eMLBR using an ARP reflection according to the present embodiment and a forward packet transfer sequence is shown.
  • An example of the block diagram in the communication procedure which concerns on this embodiment is shown.
  • An example of the table in the communication procedure which concerns on this embodiment is shown.
  • the evaluation result which applied the packet transfer method concerning this embodiment is shown.
  • An example of the structure of the network which has a some communication function which concerns on this embodiment is shown.
  • 4 shows an example of an authentication and uplink packet transfer sequence between an IEEE 802.1X compatible node and an eMLBR according to the present embodiment.
  • 2 shows an example of a network having a plurality of communication functions according to the present embodiment.
  • An example of the mutual authentication between eMLBR-R (for general homes) and iMLBR and an uplink packet transfer sequence according to the present embodiment is shown.
  • An example of the structure of the network which has a some communication function which concerns on this embodiment is shown.
  • An example of the structure of the network which has a some communication function which concerns on this embodiment is shown.
  • An example of the evaluation environment of the responsiveness evaluation in the TV online data service by the band limitation according to the present embodiment is shown.
  • An example of the flow table of the responsiveness evaluation of TV online data service concerning this embodiment is shown.
  • the evaluation result of the responsiveness evaluation of TV online data service concerning this embodiment is shown.
  • the evaluation result of the responsiveness evaluation of TV online data service concerning this embodiment is shown.
  • An example of a sequence operation between the IEEE 802.1X compatible terminal and the eMLBR 12 according to the present embodiment is shown.
  • An example of adaptation of IPv6 in the packet transfer system according to the present embodiment will be shown.
  • An example of the block diagram of the network which concerns on this embodiment is shown.
  • Internet Generally, a computer network or a physical network connected to each other via a digital transmission medium is called a computer network or a physical network.
  • a proper noun of an internetwork that is open to the world that interconnects computer networks operated by ISP is the Internet (The Internet), which provides a packet communication service using a TCP / IP protocol system.
  • home routers eMLBR
  • private lines or public access lines telephone lines, ISDN lines, ADSL lines, optical lines, wireless lines, etc.
  • iMLBR edge router
  • NGN Next ⁇ ⁇ ⁇ ⁇ Generation ⁇ ⁇ ⁇ ⁇ Network
  • Packet A transfer unit (PDU: “Protocol” Data ”Unit) in layer 3 (network layer) for performing communication between end nodes, including a transmission source logical address and a transmission destination logical address, a packet type, and user data.
  • PDU Protocol
  • RFC packet 791 standard IP packets and ITU-T recommendation X. 25 packets are included.
  • the frame On the receiving side, the frame is decapsulated (including error check, message authentication by MACsec, etc., and decryption of the encrypted payload), and the packet is taken out.
  • PPP Point-to-Point-Protocol
  • HDLC High-Level-Data-Link-Control
  • ATM Asynchronous-Transfer-Mode
  • Node is used as a generic term for a host that generates and transmits / receives user packets, and a router or layer 3 switch that relays and forwards packets without generating user packets. Furthermore, since the Internet has a hierarchical and recursive structure, a network that is a set of nodes can be treated as a node. In this specification, a network is also treated as one of “nodes”.
  • Vendor-specific entities such as users, processes, clients, servers, mail accounts, NETBOIS names, host names, etc., and groups composed of them.
  • Port Physical port (so-called LAN or router switch port), virtual port configured by software using existing physical connection, interface for inputting / outputting data to / from the outside, etc. Identification information for each device Identified and managed by
  • Channel identification information such as a secure channel (SCI: Secure Channel Identifier) that can be identified using a shared key, such as MACsec, or a source MAC address may be used as channel identification information.
  • SI Secure Channel Identifier
  • Others include channels, slots, connections, sessions, flow labels, etc. assigned to nodes and entities using time blocks, spreading codes, resource blocks in TDMA, CDMA, OFDMA, etc. used in mobile communications, etc. Are identified and managed across multiple devices.
  • Multi-layer binding router A term used to describe the characteristics of the packet transfer apparatus according to the present invention. Further, address spoofing packets, attack packets, and illegal packets sent to the outside (Internet) are arranged on the user side. What prevents the outflow is called eMLBR (egress MLBR), and what is arranged as a so-called edge router at the end of the Internet and prevents inflow of address spoofing packets, attack packets, and illegal packets into the Internet is called iMLBR (ingress MLBR).
  • eMLBR egress MLBR
  • iMLBR iMLBR
  • eMLBR is installed at home, eMLBR-R (Residence), eMLBR-O (Organization) is deployed in organizations such as companies, eMLBR-C (Data Center) is deployed in data centers, etc. ), EMLBR-W (W-LAN Spot Service) for wireless LAN spot service, eMLBR-S (Sensor Network) for wireless sensor network and IoT, mobile communication network
  • eMLBR-M Mobile Network
  • Multi-layer binding (MLB) table Port 2 or channel identification information and source physical address (so-called MAC address or VPI (Virtual Path i Identifier) / VCI (Virtual Channel Identifier) used in ATM) (data link layer) ) Address) and a source logical address (so-called IPv4 address, IPv6 address, carrier layer specific layer 3 (network layer) address, etc.), and a predetermined expiration date (for example: 4 hours).
  • MAC address Virtual Path i Identifier
  • VCI Virtual Channel Identifier
  • IPv4 address IPv4 address
  • IPv6 address carrier layer specific layer 3 (network layer) address, etc.
  • predetermined expiration date for example: 4 hours.
  • a source process identification address may be added to the MLB table.
  • Discard table Analyzes packets sent from the victim node ReN that is mainly subjected to a cyber attack, or from the node ReN that has detected a packet that seems to be a cyber attack or a packet that seems to be a cyber attack packet. This is a table generated and updated based on the discard request information from the node DeN that recognizes the attack or damage or from the node ShN that distributes the discard request information to the entire Internet.
  • IEEE 802.1X An authentication standard used when connecting to a wired LAN or wireless LAN, which prevents only authorized nodes and entities from connecting to the network.
  • authentication according to IEEE 802.1X is not limited to a LAN switch (data link layer), but is applied to a packet transfer device (network layer) such as a layer 3 switch or a router.
  • the IEEE 802.1X authentication method includes MD5 (Message Digest Algorithm 5) and LEAP (Lightweight Extended AuthenticAP).
  • MD5 Message Digest Algorithm 5
  • LEAP Lightweight Extended AuthenticAP
  • TLS Transport Layer Security
  • PEAP Protected EAP
  • Supplicant A device, software, or entity on the authentication requesting side, authenticated side, or client side in the authentication of nodes or entities on the network.
  • Windows is a registered trademark 2000 (SP4)
  • Windows XP and later Windows
  • Mac OS X have a built-in supplicant function compatible with IEEE 802.1X.
  • Authenticator Takes the role of a proxy that receives requests from supplicants, mediates exchanges with authentication servers, and determines supplicant connection availability and communication service quality levels.
  • Authentication server Verifies the authenticity of nodes or entities (mutually) using a client ID and password, or a digital certificate, and notifies the authenticator whether to allow access from the client.
  • RADIUS Remote Authentication Register
  • RADIUS Remote Authentication Dial In User Service
  • LDAP Lightweight Directory Access Protocol
  • HLR Home Location Register Register
  • Communication service quality (QoS (Quality of Service): confidential communication, bandwidth limitation, bandwidth guarantee, delay / jitter guarantee, censorship, destination IP address restriction, communication possible protocol restriction, connection rejection, communication content recording, etc.
  • OpenFlow A network and concept that can dynamically set and change the network configuration, functions, and performance by software is called SDN (Software Defined Network), and OpenFlow is being developed with the intention of load balancing in cloud computing.
  • SDN Software Defined Network
  • OpenFlow is being developed with the intention of load balancing in cloud computing.
  • This is one of the technical standards for realizing SDN, and consists of an “OpenFlow controller” that controls the path control, an “OpenFlow switch” that controls the data transfer function, and an “OpenFlow protocol” for communication between the controller and the switch.
  • ARP Reflection The authenticity of logical and physical addresses of nodes or entities that do not support IEEE 802.1X, such as so-called smart home appliances such as digital televisions that do not support IEEE 802.1X, existing home routers, IoT, etc. This is a function defined in the present invention for simply verifying and blocking address spoofing packets. Specifically, a node transmits an address resolution (ARP (Address Resolution) Protocol) request packet via a port or channel of a default gateway (DGW) triggered by communication with another network, but the node is spoofing the address.
  • ARP Address Resolution Protocol
  • the eMLBR or iMLBR functioning as the DGW sends an ARP request to the node that sent the ARP request through the same port or channel.
  • the transmission is called ARP reflection.
  • FIG. 2 shows a configuration example of the egress multilayer binding packet transfer apparatus eMLBR according to the present embodiment
  • FIG. 3 shows a configuration example of the ingress multilayer binding packet transfer apparatus iMLBR.
  • the eMLBR 12 and iMLBR 11 function as a packet transfer device.
  • FIG. 2 is a diagram showing an example in which almost all functions necessary for the eMLBR 12 deployed on the user side are implemented.
  • eMLBR-R, eMLBR-O, eMLBR-C, eMLBR-W, eMLBR-S, eMLBR-M, etc. are selected and implemented according to their use.
  • the packet transfer apparatus according to the present embodiment may have an integrated structure having functions such as DHCP, W-LAN, and Layer 2 / VLAN. In this case, a packet transfer apparatus that realizes easy network management can be provided.
  • DHCP, W-LAN, Layer 2 / VLAN, etc. may be deployed as separate devices.
  • the function unit related to the routing function is not implemented or the function unit is stopped as an egress multi-layer binding filtering device that is placed in front of the existing router.
  • the transfer unit 14 of the eMLBR 12 functioning as a packet transfer device searches the MLB table using the port or channel that received the frame / packet as a key, and sends the frame / packet source physical address and source logical address to each other.
  • the packet may be transferred to the router that transfers the packet toward the destination logical address of the packet, and when not present in the MLB table, the packet may be discarded.
  • the eMLBR 12 includes a control unit 15.
  • the control unit 15 further receives a processing request for receiving a packet or a frame such as a DHCP request, an address resolution request, or an authentication request transmitted from the transfer unit 14 together with the received port or channel identification information.
  • Authentication using ARP reflection for non-IEEE802.1X compatible nodes such as digital TV and IoT and authentication unit that authenticates each other by exchanging digital certificates with iMLBR11, authenticating as an authenticator
  • An authentication mediation unit that mediates to a server, an authentication result acquisition unit that acquires an authentication result from the authentication unit and the authentication server, a correspondence relationship between port or channel identification information, a source physical address, a source logical address, and the like Generate and update the validity period as an MLB table LB table generation / updating unit, existence checking unit that checks the existence of a node or entity that has permitted communication and updates the validity period of the above-mentioned MLB table, encryption key generation / exchange unit that generates and exchanges an encryption key using MACsec, etc.
  • a discard table generating / updating unit that generates / updates a validity period based on a discard request from another node, a QoS determining unit that determines a communication service quality based on an authentication result (authentication level), and a DHCP request.
  • a NAT table generation unit that generates a bull, a processing result in each of these functional units, an ARP request packet for ARP reflection generated in the authentication unit, a packet for actuality confirmation generated in the actuality confirmation unit, and the like are transmitted to the transfer unit 14
  • Processing result transmission unit for performing the above, other functions not shown in the figure but necessary for control of the transfer unit 15 such as the layer 2 / VLAN switch unit, the IPsec tunnel mode support function, and the control program that is illegally intruded into the eMLBR 12
  • an integrity check function for checking whether or not a table or the like has been tampered with, a security hole discovered after the implementation, or a version upgrade function for adding a
  • the eMLBR 12 further includes a transfer unit 14, which further includes a plurality of communication systems required for wired (Ethernet (Ethernet is a registered trademark), optical signal, etc.) / Wireless (such as wireless LAN / mobile communication) communication.
  • a transfer unit 14 which further includes a plurality of communication systems required for wired (Ethernet (Ethernet is a registered trademark), optical signal, etc.) / Wireless (such as wireless LAN / mobile communication) communication.
  • Port unit that provides physical ports, or channel unit that provides multiple channels, physical signal reception / decryption unit, physical signal generation / transmission unit, encryption / decryption unit, reception that temporarily buffers packets or frames Buffer unit and transmission buffer unit, frame decapsulation unit that extracts packets from received frames, frame encapsulation unit that performs the reverse, source and destination physical addresses of received frames and packets, source and destination logical addresses , Layer 2, 3, 4 address to extract source and destination process identification addresses Extraction unit, QoS providing unit providing communication service quality specified for a port or channel, Layer 2 switch and layer 2 / VLAN switch unit providing VLAN function, MLB table unit storing MLB table, discard table Discarding table section to store, packet discarding section that searches the MLB table and discard table to discard packets, layer 3 switch section that performs packet forwarding processing by referring to the routing table, DHCP request, address resolution request, authentication request, etc.
  • a processing request transmission unit that transmits a frame or packet to the reception unit of the control unit 15 to request processing,
  • FIG. 3 is a diagram showing an example in which almost all functions necessary for the iMLBR 11 deployed at the end of the Internet 10 are installed. Since the function of each functional unit is almost the same as that of the eMLBR 12 of FIG. 2, detailed description is omitted, but the NAT function and the layer 2 / VLAN function are not necessary in principle. Further, the packet transfer apparatus according to the present embodiment may have an integrated structure having various functions such as DHCP. In this case, a packet transfer apparatus that realizes easy network management can be provided. On the other hand, although network management becomes complicated, DHCP etc. may be deployed as another device.
  • the function unit related to the routing function is not implemented or the function unit is stopped as an ingress multi-layer binding filtering device that is placed in front of the existing router.
  • the transfer unit 14 of the iMLBR 11 functioning as a packet transfer device searches the MLB table using the port or channel that received the frame / packet as a key, and sends the frame / packet source physical address and source logical address to each other.
  • the packet may be transferred to the router that transfers the packet toward the destination logical address of the packet, and when the pair does not exist in the MLB table, the packet may be discarded.
  • the iMLBR 11 includes a control unit 15 and performs mutual authentication by performing authentication for a node that does not support IEEE 802.1X or exchanging digital certificates between the eMLBR 12 and the iMLBR 11.
  • the iMLBR 11 includes a transfer unit 14, and the physical signal reception / decoding unit / generation / transmission unit is wired (Ethernet (Ethernet is a registered trademark), optical signal, etc.) / Wireless (wireless LAN / mobile communication, etc.) ) Has the necessary functions.
  • FIG. 4 shows the configuration of the network according to this embodiment.
  • the network configuration shown in FIG. 4 includes the Internet 10 including the iMLBR 11, an IEEE 802.1X-incompatible node, and the eMLBR 12.
  • the sequence diagram in FIG. 5 is a diagram showing an authentication and uplink packet transfer sequence between an eMLBR 12 and an IEEE 802.1X non-compliant node such as a digital television using ARP reflection.
  • FIG. 5 describes a user MAC frame / IP packet that is transmitted from a node toward an external network (Internet 10).
  • the exchange of the DHCP protocol and the like in the present embodiment is described in a simplified manner (for example, four exchanges such as DHCP Discover ⁇ DHCP Offer ⁇ DHCP Request ⁇ DHCP ACK).
  • descriptions of the functional units of the transfer unit 14 and the control unit 15 related to each step are also omitted.
  • a DHCP request packet is broadcasted (step S111).
  • the eMLBR 12 that has received the DHCP request temporarily registers in the MLB table A of the control unit 15 that stores the correspondence relationship between the received port identification information, the MAC address of the node, and the IP address to be assigned as the private IP address (step S112). ).
  • the node receives a DHCP response packet for assigning an IP address together with information necessary for connection to the network, such as a netmask of the eMLBR 12 and an IP address of the DGW (step S113).
  • the node that has received the DHCP response broadcasts an ARP request packet for requesting resolution of the DGW address (step S114).
  • the eMLBR 12 that has received the ARP request packet should return an ARP response to the ARP request from the eMLBR 12 if the node has not spoofed the address, so broadcast the ARP request packet (ARPF request) to the node, An ARP response packet from the node is received (steps S115 and S116).
  • the eMLBR 12 searches the MLB table A of the control unit 15 using the port that received the ARP response packet as a key, and temporarily registers from the MLB table A if there is no source IP address and source MAC address pair in the ARP response The correspondence relationship is deleted (steps S117 and S118).
  • Step S119 when it exists in the MLB table A, QoS (for example, as described later, for example, the uplink bandwidth is 10 kbps) is determined, and after valid period (for example, 4 hours) is set, it is registered in the MLB table A of the transfer unit 14 for regular registration. (Step S119).
  • QoS for example, as described later, for example, the uplink bandwidth is 10 kbps
  • valid period for example, 4 hours
  • the eMLBR 12 receives the user MAC frame / IP packet transmitted by the node after the eMLBR 12 returns the ARP response in step S120 as a response to the first ARP request (DGW address resolution) from the node (step S114). (Step S121), the eMLBR 12 checks whether the source IP address and the source MAC address of the received user MAC frame / IP packet exist in the MLB table A of the transfer unit 14 (Step S122). Discards the transmitted packet (step S123).
  • step S124 the ARP response in step S120 need not be performed because the node already knows the MAC address of eMLBR 12 in the ARP request (ARPF request) in step S115.
  • control unit 15 included in the eMLBR 12 performs real-time confirmation on a node or entity port or channel in cooperation with the transfer unit 14 (not necessarily periodically) (step S128 and step S128).
  • the MLB table A may be updated (the validity period is extended) according to the confirmation result in step S130.
  • the iMLBR 11 (ISP edge router) uses the identification information of the port that received the packet transferred in step S124 as a key, and the packet IP address (global IP address assigned to the eMLBR 12) and the MAC address (of the eMLBR 12). Whether the pair exists in the MLB table B of the transfer unit 14 is checked (step S125). If the pair does not exist in the MLB table B, the packet is discarded (step S126). On the other hand, if it exists in the MLB table B of the transfer unit 14, the next hop at the QoS determined in advance when the eMLBR 12 is authenticated (if the eMLBR 12 is authenticated as an IEEE 802.1X node by the iMLBR 11) Transfer to the node (step S127).
  • the terminal When authentication is performed by ARP reflection according to the present embodiment, it cannot be said that the terminal is more secure than IEEE802.1X authentication using an ID, password, or digital certificate. That is, since the authentication level is low, QoS is directed to the Internet 10, for example. Even if the upstream bandwidth is limited to about 10 kbps, if the downstream bandwidth is not limited, TV users can use the remote control for data communication with TV stations, screen transitions, and other Internet connection services via television. , None feel uncomfortable.
  • ARP reflection is performed in response to an ARP request from the node.
  • the node caches the IP address and MAC address of the eMLBR 12, and uses an ICMP packet to send an echo request (communication confirmation) to the eMLBR 12.
  • an echo request (echo reflection) or an ARP request is sent to the node, and the response packet / frame and the echo request packet from the node are sent.
  • the authenticity of the IP address and MAC address in various variations, such as checking the source IP address of the frame and the source MAC address and registering them in the MLB table of the control unit 15 and the transfer unit 14 if they match By verification It may be used testimony.
  • FIG. 6 shows an experimental example of the communication operation of ARP reflection using OpenFlow.
  • Host #A is trying to communicate with host #B via eMLBR12.
  • the eMLBR 12 executes OpenFlow and functions as a packet transfer apparatus according to the present embodiment.
  • the eMLBR 12 is composed of an OpenFlow controller 15 that is a control unit 15 and an OpenFlow switch 14 that is a transfer unit 14.
  • the OpenFlow switch 14 includes an MLB table.
  • the ARP request (step S211) transmitted from the host #A for address resolution of the DGW is sent to the OpenFlow controller 15, and the controller generates an ARP request (ARPF) for the host #A. And sent to the host #A via the OpenFlow switch (step S212).
  • ARPF ARP request
  • step S213 the ARP response is returned (step S213), and the OpenFlow controller The authenticity is verified by collating the ARP request sent in step S211 with the IP address MAC address of the ARP response returned in step S213, and if they match, they are provisionally registered in the MLB table of the OpenFlow controller 15, The data is positively registered in the MLB table of the OpenFlow switch 14 with Flow mod.
  • Trema-edge is mounted on a personal computer (OS: Ubuntu 12.04 (X64), CPU: Celeron 440@2.00 GHz, memory: 2GB), and the OpenFlow switch 14 has Open vSwitch 2 0.0 was mounted on another personal computer with the same specifications and operated as a layer 3 switch.
  • OS Ubuntu 12.04 (X64)
  • CPU Celeron 440@2.00 GHz
  • memory 2GB
  • the OpenFlow switch 14 has Open vSwitch 2 0.0 was mounted on another personal computer with the same specifications and operated as a layer 3 switch.
  • the correspondence relationship between the IP address and the MAC address accepted by each port of the switch is provisionally registered in the MLB table of the OpenFlow controller 15 and positively registered in the MLB table of the OpenFlow switch 14.
  • FIG. 7 shows the configuration of the flow table
  • FIG. 8 shows the transition of the flow table.
  • All ARP requests and packets related to ARPF that have arrived at the OpenFlow switch 14 functioning as a switch are inquired to the OpenFlow controller 15 by Packet-In (table: 0 in FIGS. 7 and 8), and other packets are inquired. Only those that have passed multiple flow table transitions (pipeline processing) are routed, or an inquiry to the controller is generated as Packet-In (same table: 180).
  • the OpenFlow switch 14 that has received the ARP request transmitted by the host #A at the port 1 performs a Packet-In operation to the OpenFlow controller 15 in the table 0 shown in FIGS. 7 and 8 (steps S211 and S311). .
  • the OpenFlow controller 15 temporarily registers the pair of the source IP address and source MAC address of the received ARP request frame / packet in the MLB table in the controller using the received port 1 as a key.
  • the OpenFlow controller 15 packet-outs an ARP request to the OpenFlow switch 14 as ARP reflection, and the switch sends this to the host #A from the port 1 (step S212).
  • the OpenFlow switch 14 that has received the ARP response returned from the host #A at the port 1 again generates Packet-In to the controller (steps S213 and S312).
  • the controller searches the MLB table in the controller using port 1 as a key, and if there is a pair of the source IP address and source MAC address of the ARP response from host #A, it determines that the same pair of nodes exists. Certify.
  • the controller performs a flow mod operation on the switch (step S214), and the flow entry having “port: 1” as a matching condition is stored in the physical port table (table: 60) and the flow entry having the same pair as a matching condition is set.
  • Write to the MLB table (table: 101) regular registration).
  • the OpenFlow switch 14 uses pipeline processing to make a transition to the MLB table of the received port in the process of processing the received packet (tables 60 and 101 in FIGS. 7 and 8). If there is a source IP / MAC address in the MLB table of the same port, the routing operation (FIG. 7 table: 180, step S316) proceeds, but if it is not in the MLB table, it is discarded (tables in FIGS. 7 and 8: 101). And 102).
  • a SYN flood attack experiment was conducted using the simple attack tool hping3.
  • An experiment was performed a plurality of times to transmit 10,000 packets to the attack destination while randomly changing the source IP address within the range of the network address (192.168.2.0/24).
  • the 10,000 packets that could reach the attack destination on average, about 30 packets ( ⁇ 10,000 ⁇ 256; original IP address of the attack source host), and the remaining 9,970 packets were discarded. It was confirmed in the log on the switch.
  • the MLB table function is turned on as shown in FIGS. 9 and 10 (FIG. 7). It was observed that both the tables are activated) and off (the table in FIG. 7: only 180 is activated), the higher the transmission rate, the higher the ICMP response packet non-arrival rate at the host #A. The CPU usage rate of 14 was less than 1%, and no packet loss at the switch was observed. This is because host #A attempting to receive a response packet while generating and transmitting an ICMP echo request packet falls into an overload state and misses the response packet.
  • FIG. 17 shows an evaluation environment for TV online data service responsiveness evaluation by bandwidth limitation
  • FIG. 18 shows a TV online data service responsiveness evaluation flow table.
  • NAPT exchange frequently occurs with Packet-In. Therefore, it is necessary to mount a closed NAPT exchange module in the switch.
  • 19 and 20 show the evaluation results of the responsiveness evaluation of the TV online data service.
  • FIG. 19 shows the evaluation result with the band (Kbps) as the vertical axis and the time (sec) as the horizontal axis, and the evaluation result with the display time (sec) as the vertical axis and the band (Kbps) as the horizontal axis.
  • FIG. 11 includes the Internet 10 including the iMLBR 11 and the HRS 23, the node, and the eMLBR 12.
  • FIG. 1 FIG. 11, FIG. 23, etc.
  • the HRS 23 is arranged inside the Internet.
  • a reliable organization such as an ISP prevents an authentication data or a program from being falsified due to unauthorized intrusion.
  • the HRS 23 is strictly managed, and may be arranged outside the Internet via the iMLBR 11 and the eMLBR 12. The same applies to the following.
  • FIG. 12 shows an example of a sequence operation between an IEEE 802.1X compatible node such as a personal computer and the eMLBR 12.
  • FIG. 12 describes a MAC frame / IP packet that is transmitted from a node to an external network (Internet 10).
  • exchange of EAP / RADIUS protocol including DHCP protocol in this embodiment conversion / relay processing of EAP message and RADIUS message by authenticator, key generation / exchange / MAC frame encryption / decryption by MACsec, etc.
  • keys generation / exchange / exchange / MAC frame encryption / decryption by MACsec, etc. are simplified or omitted.
  • descriptions of the functional units of the transfer unit 14 and the control unit 15 relating to each step are omitted.
  • the basic sequence is the same for eMLBR-W equipped with a wireless LAN function.
  • the MAC frame including the EAP message is transmitted with the multicast address, when the switching hub is arranged under the EgER, the MAC frame does not reach the authenticator. Changes to the IEEE 802.1X standard are required, such as assigning specific MAC addresses for EAP messages.
  • the operation of the sequence diagram of FIG. 12 will be described below.
  • the supplicant of the IEEE802.1X compatible node uses an extended authentication protocol (EAP: Extensible Authentication Protocol) EAPOL (EAP over LAN) to send an EAP message frame to the authenticator of the eMLBR 12 (step S411).
  • EAPOL Extensible Authentication Protocol
  • the eMLBR 12 that has received the EAPOL sends an EAP request (TLS) to the IEEE802.1X compatible node (step S412), exchanges EAP messages between the nodes and the eMLBR 12 (step S413), and the eMLBR 12 functions as a home authentication server.
  • TLS EAP request
  • RADIUS server 23 step S414
  • the RADIUS server transmits the authentication result to the eMLBR 12 (step S415).
  • the authenticator of the eMLBR 12 discriminates the authentication result (step S416), and if the authentication fails, informs the node of the EAP failure and ends the processing (step S417).
  • step S418 the EAP success is notified to the node (step S418), and a shared key is generated and exchanged between the node and the eMLBR 12 using the MACsec Key Agreement (MKA) protocol defined in IEEE 802.1X.
  • MKA MACsec Key Agreement
  • a secure channel is established (step S419).
  • confidential communication using shared key encryption defined by the same standard is performed, and message authentication is performed to check whether data has been tampered with during communication.
  • the eMLBR 12 determines a communication service quality (QoS) level, sets a valid period (for example, 4 hours), and identifies secure channel identification information.
  • QoS communication service quality
  • the key is provisionally registered in the MLB table A of the control unit 15 (step S421), Further, it is registered in the MLB table A of the transfer unit 14 (step S422).
  • a DHCP response that assigns an IP address together with information necessary for connection to the network, such as a netmask and an IP address of the DGW, is transmitted to the node (step S423).
  • the node transmits a user MAC frame in which the payload (user packet) is encrypted using the shared key and encapsulated in the MAC frame via the secure channel established with the eMLBR 12 (step S424).
  • the eMLBR 12 decapsulates / decrypts / messages the encrypted user MAC frame, and then searches the MLB table A of the transfer unit 14 using the secure channel identification information as a key (step S425). If the MAC address pair does not exist, the frame / packet is discarded (step S426).
  • the QoS determined in step S423 is converted to the global IP address of the eMLBR12 when NAT is assigned in step S421 (NAT).
  • NAT NAT
  • ISP edge router next hop node iMLBR11
  • control unit 15 and the transfer unit 14 included in the eMLBR 12 in the present embodiment cooperate with each other to appropriately check the existence by updating the encryption key between the node and the eMLBR 12 (step S432), and in step S433, depending on the confirmation result, the MLB The table A may be updated, that is, the validity period of the MLB table A may be extended.
  • the iMLBR 11 (ISP edge router) decapsulates / decrypts / messages the MAC frame transferred in step S427, and then searches the MLB table B of the transfer unit 14 using the secure channel identification information between the eMLBR 12 and the iMLBR 11 as a key. (Step S428), if there is no source IP address and source MAC address pair, the packet is discarded (Step S429). On the other hand, when the source IP address and source MAC address pair exist in the MLB table B, the user MAC frame is transferred to the next hop node toward the destination IP address with the designated QoS (steps S430 and S431).
  • a RADIUS server is used as an authentication server based on the IEEE802.1X standard for node or entity authentication, but authentication may be performed using another authentication server / standard such as LDAP.
  • the OS version upgrade status, firewall configuration status, virus detection software pattern file, package-type application programs and Java that are widely used and subject to cyber attacks
  • the update state of middleware such as a virtual machine may be examined and reflected in the determination of the authentication level, that is, the communication service quality.
  • FIG. 13 includes the Internet 10 including the iMLBR 11 and the HRS 23, the host 30, and the eMLBR-R12.
  • the eMLBR-R12 supplicant compatible with IEEE 802.1X connected to the network first sends an EAP message frame to the authenticator of iMLBR11 by EAPOL (step S511).
  • the iMLBR 11 that has received EAPOL sends an EAP request (TLS) to the eMLBR-R 12 (step S 512), exchanges EAP messages between the eMLBR-R 12 and the iMLBR 11 (step S 513), and the iMLBR 11 functions as a home authentication server.
  • TLS EAP request
  • the RADIUS server 23 step S514.
  • the RADIUS server transmits the authentication result to iMLBR 11 (step S515).
  • the authenticator of the iMLBR 11 discriminates the authentication result (step S516). If the authentication fails, the eMLBR-R 12 is notified of the EAP failure and the processing is terminated (step S517).
  • the eMLBR-R 12 When the authentication is successful, the eMLBR-R 12 is notified of the success of EAP (step S518), and the eMLBR-R 12 and the iMLBR 11 generate and exchange a shared key using the MKA protocol to establish a secure channel (step S519). ).
  • confidential communication using shared key encryption is performed, and message authentication for checking whether data has been tampered with is performed.
  • the iMLBR 11 determines a communication service quality (QoS) level, sets an effective period (for example, 4 hours), and secure channel Using the identification information as a key, provisionally registered in the MLB table A of the control unit 15 that stores the correspondence between the MAC address of the eMLBR-R12 and the IP address that is fixedly or dynamically assigned to the eMLBR-R12 (step S521). In addition, it is registered in the MLB table A of the transfer unit (step S522). Then, a DHCP response that assigns an IP address together with information necessary for connection to the network, such as a netmask and an IP address of the DGW, is returned to the eMLBR-R 12 (step S523).
  • QoS communication service quality
  • an IEEE802.1X-compatible node (such as a personal computer) is authenticated by the method described in the second embodiment, establishes a secure channel with eMLBR-R12, and uses the secure channel identification information as a key and the IP address of the node.
  • the encrypted user MAC frame is transmitted to the eMLBR 12 (step S524), and the eMLBR-R 12 transfers the secure channel identification information as a key.
  • the MLB table B of the unit 14 is searched, and if there is no source IP address / source MAC address pair of the same frame / packet, the eMLBR 12 discards the packet transmitted by the node (step S526).
  • the source private IP address is converted into a global IP address with a preset QoS, and via a secure channel between the eMLBR 12 and the iMLBR 11, that is, a shared key between the eMLBR 12 and the iMLBR 11
  • the user packet is encrypted using, and encapsulated in a MAC frame, and then transferred to the iMLBR 11 that is the next hop node with the designated QoS (step S527).
  • the iMLBR 11 searches the MLB table A of the transfer unit 14 for the frame / packet transferred in step S527 using the secure channel identification information between the eMLBR 12 and the iMLBR 11 as a key (step S528), and sends the source IP to the MLB table A. If the address and the source MAC address do not exist, the frame / packet is discarded (step S529). On the other hand, if it exists in the MLB table A, the user MAC frame is transferred to the next hop node with the designated QoS (step S530).
  • control unit 15 and the transfer unit 14 included in the iMLBR 11 in the present embodiment cooperate with each other to appropriately check the existence by updating the encryption key between the iMLBR 11 and the eMLBR 12 (step S532), and according to the confirmation result in step S533.
  • the MLB table A may be updated, that is, the validity period of the MLB table A may be extended.
  • the eMLBR 12 is authenticated by the RADIUS server via the iMLBR 11 in accordance with IEEE802.1X.
  • each of the eMLBR 12 and the iMLBR 11 can be trusted in advance by a CA (CA station). If a digital certificate that proves its authenticity has been obtained, it may be exchanged directly and mutually authenticated.
  • CA CA station
  • the ports in eMLBR 12 and iMLBR 11 are used for all frames / packets.
  • the channel is used as a key to check whether the source IP address and source MAC address pair exists in the MLB table, the outflow / inflow of address spoof packets to the Internet 10 can be prevented.
  • networks (providers) to which this is applied expand, cyber attacks based on various address spoofing, such as DDoS and DRDoS, and unauthorized intrusion into servers, etc. are expected to decrease drastically.
  • iMLBR11 deployed at the connection point with these networks will block packets outside the network address space described in the MLB table (Function as uRPF as described above), and by combining with a request for discarding, block an attacker's IP address or a packet whose address is spoofed randomly in the address space, etc. Can do.
  • the communication service quality of the accommodation port of iMLBR11 band narrowing, quarantine (discarding SYN flood attack packets, etc. by anomaly detection, discarding virus-contaminated packets by virus detection software, discarding encrypted packets, discarding spam mail, etc.) It is considered that the safety and security of the entire Internet 10 is significantly increased by limiting the above.
  • eMLBR12 and iMLBR11 become new attack targets when viewed from the cracker. For this purpose, it is necessary to make it robust to prevent unauthorized entry into these packet transfer apparatuses.
  • an attack against the software processing system of the control unit 15 such as an integrity check function, an EAP flood attack, an ARP flood attack, etc. is performed so that it can be detected even if a program, routing table, MLB table, etc. are tampered with.
  • a new security hole is found in eMLBR12 or iMLBR11, it is necessary to provide a version upgrade function so that a function corresponding to the emergence of a new cyber attack can be added to the control unit 15 and the transfer unit 14.
  • the packet transfer apparatus is not limited to IPv4, and may handle IPv6.
  • the reported address space is provisionally registered in the MLB table of the control unit 15, and after the IEEE 802.1X authentication, in units of IP addresses, in the MLB table of the transfer unit 14. You may register correctly.
  • the identification information of the port or channel that accommodates the server 13 is used as a key (from another DHCP or from the own device's DHCP, or an address held by the user).
  • a fixed process identification address (well-known port number) that identifies the process to be activated on the server 13 may also be a binding target.
  • the authentication level is low as described above.
  • a VLAN in which the terminal is isolated from other end nodes is configured, and is connected to an external network via a band-limited bridge.
  • the connection camera is a surveillance camera such as ITV (Industrial TeleVision)
  • the connection destination is limited. Therefore, by taking measures such as adding the destination IP address to the MLB table, illegal packets are leaked to the Internet 10 I can prevent it.
  • control unit 15 included in the iMLBR 11 or the eMLBR 12 appropriately checks the existence of the port or channel in which the node or entity is accommodated (not necessarily periodically), and maintains and updates the communication service quality (IEEE802.1. If MACsec is used in 1X, physical connection is confirmed, shared key is updated, existence confirmation response is not received for a certain period of time, the entry is deleted from the MLB table and the communication service is stopped. When a node moves to another port or channel After confirming the absence of the original port or channel, the authentication may be performed again and only the port or channel of the MLB table may be changed).
  • one or a plurality of eMLBRs 12 may be arranged in a multi-stage manner toward the Internet 10 in the user side network. Furthermore, the eMLBR 12 may be connected (multi-homing) to a plurality of iMLBRs 11 arranged at the end of the Internet 10.
  • the source IP address is set via an anonymous network (for example, Tor: The Onion Router).
  • an anonymous IP address for example, Tor: The Onion Router.
  • the anonymous IP address packet is not an address spoof packet, it prevents outflow / inflow to the Internet 10 like an address non-spoof packet. I can't.
  • the addresses (anonymous IP addresses) of Tor nodes which are supposed to be several thousand, are made public on the Internet and can be blacklisted.
  • an unauthorized access monitoring system / intrusion detection system IDS Intrusion Detection System
  • an intrusion prevention system IPS Intrusion Prevention System
  • the ReN40 Request Node
  • the ReN40 functioning as a response request node or response request entity monitors traffic in a data center, an institutional network, a DMZ (DeMilitized Zone), or a server that provides key points or services of the Internet 10.
  • the attack packet is sent to DeN42 (Deliver Node). It is a node that sends a packet that is presumed to be a packet and requests countermeasures.
  • the DeN 42 is a node of an organization that collects, analyzes, and aggregates attack packets sent from the ReN 40 and transmits discard request information when it is determined to be an attack.
  • the ShN 43 (Share Node) is a node that distributes the discard request information transmitted by the DeN 42 to the iMLBR 11 or eMLBR 12 that relays and forwards the discard target packet to the entire Internet 10 in the case of a large-scale attack.
  • DeN42, ShN43, etc. are described so as to be arranged inside the Internet.
  • the disposal request information, the program, etc. are not altered by unauthorized intrusion, etc. This means that a reliable organization such as an ISP strictly manages them, and may be arranged outside the Internet via the iMLBR 11 and the eMLBR 12.
  • the discard request information transmitted by the DeN 42 includes a source MAC address / source IP address / port number and a destination MAC address / destination IP address / port number of a packet to be discarded (attack, anonymous IP address, information leakage, etc.). Some or all pairs and validity periods are described together with a digital certificate or electronic signature of DeN42.
  • the ShN 43 Upon receipt of this, the ShN 43 applies the IP address of the iMLBR 11 or eMLBR 12 that is the discard request destination by applying a traceroute command or the like for examining the route information to the attack source IP address and the victim node IP address described in the discard request information. Is determined (address resolution), and the discard request information is delivered to the corresponding iMLBR11 or eMLBR12.
  • route information is acquired by transmitting an ICMP echo request packet while incrementing TTL by 1.
  • MLBR receives an ICMP echo request packet with TTL of 1
  • MLBR is displayed in the option field of the ICMP time exceeded packet.
  • Attribute information e.g., iMLBR deployed as an edge router, iMLBR deployed at the border with providers that have not yet installed MLBR, eMLBR-R for home, eMLBR-W for wireless LAN, eMLBR-C for data center, etc.
  • the IP address of the iMLBR11 or eMLBR12 existing on the transfer route and its attribute information may be acquired by writing the type, the node to be accommodated, the network attribute, etc.) and returning it to the route information investigation source (ShN43).
  • the discard request information may be transmitted to the iMLBR 11 or eMLBR 12 using a transfer protocol such as HTTP or SMTP.
  • a transfer protocol such as HTTP or SMTP.
  • the control unit 15 of the iMLBR 11 or eMLBR 12 Upon receiving the discard request information, the control unit 15 of the iMLBR 11 or eMLBR 12 confirms the authenticity of the discard request information from the attached digital certificate, generates / updates the discard table based on the discard request information, and transfers it. Transmitted to the unit 14. Thereafter, the transfer unit 14 refers to the MLB table for the received frame / packet and confirms that it is not an address spoofing packet. Then, the source IP address / port number and destination IP address / port number corresponding to the discard table, etc. It is checked whether it corresponds to an anonymous IP address registered as a pair or a black list, and if it corresponds, it is discarded (the MLB table may be inquired after collating with the discard table). If not, the process proceeds to the routing process.
  • the ReN 41 may be a personal computer, a tablet terminal, a smartphone, a digital TV, or the like that is equipped with a function equivalent to IDS or IPS or virus detection software. Also, if the ReN 40 has an attack packet analysis function and a delivery function equivalent to DeN42 and ShN43 and can identify the attacker's IP address, use the ICMP echo request packet directly applying the above traceroute command.
  • the discard request information may be delivered to the iMLBR 11 or eMLBR 12 using a transfer protocol such as HTTP or SMTP. Further, if the attack source is in a limited range, the DeN 42 may deliver the discard request information to the corresponding iMLBR 11 or eMLBR 12 directly by acting as the ShN 43 function.
  • iMLBR11 and eMLBR12 may implement the function of ReN40, and may function as ReN40.
  • iMLBR11 and eMLBR12 update the discard table by a discard request from DeN23, ShN43, etc., but iMLBR11 and eMLBR12 send discard request information to DeN23, ShN43, etc. by notification from DeN23 or ShN43.
  • the iMLBR 11 and the eMLBR 12 may access the DeN 23, the ShN 43, etc. periodically, and if there is new discard request information related to itself, it may be acquired.
  • an attack without address spoofing or the IP address of the end node (Tor node) of the above-mentioned anonymous network is registered (as a blacklist) in the discard table of iMLBR11 or eMLBR12 that accommodates the node.
  • the victim node's IP address, L4 port number, destination IP address, etc. in the discard table of the iMLBR11 or eMLBR12 that accommodates the victim node, the leakage of information leakage packets or Access to the C & C server can be blocked.
  • a cracking intention packet is targeted for countermeasures.
  • the cracking intention packet indicates an IP address spoofing (including impersonation) packet, an anonymous IP address packet, and an IP address non-spoofing attack packet.
  • the functions of the MLBR according to this embodiment are shown in (1) to (6) below.
  • -A generic term for host and router may be a node.
  • a network that is a set of nodes is also a node.
  • IEEE802.1X compatible terminal PC, smart phone, etc.
  • it is effective for suppressing cracking acts in authentication / quarantine and ensuring the soundness of the terminal.
  • it is difficult to be identified even if a bad thing is done via an anonymous network, and if it infects a bot, it will participate in a DDoS attack.
  • -IEEE802.1X non-compliant terminals Smart home appliances such as TVs and IoT.
  • OS update or FW there is no OS update or FW, and it may be a hotbed for cyber attacks.
  • Home router It is remotely controlled and may be involved in attacks.
  • -ISP of policy that can be connected with anything. In this case, it is unlikely that all ISPs will introduce countermeasures.
  • Anonymous network and Tor In this case, it is an anonymous address, not address spoofing.
  • Impersonation terminal is an anonymous address, not address spoofing.
  • FIG. 21 an example of a sequence operation between the above-described IEEE 802.1X compatible terminal and the eMLBR 12 is shown in FIG.
  • the sequence in FIG. 21 according to the present embodiment is different from the sequence in FIG. 12 in the second embodiment in that two servers are provided.
  • the server may include the quarantine server 31 and the RADIUS server 23 separately.
  • the eMLBR 12 is different from the sequence of FIG. 12 in the second embodiment in that a soundness statement is also exchanged when the eMLBR 12 mediates this to the RADIUS server 23 or the quarantine server 31 functioning as a home authentication server.
  • each server can transmit the authentication result and the quarantine result to the eMLBR 12 in step S515.
  • countermeasures against cyber attacks are shown below.
  • a targeted email attack the employee's terminal that unintentionally opened a forged email is used as a stepping stone in a connect-back, and the attacker then sends a command via the C & C server to open a back door on the core server while involving multiple terminals. It is an attack that creates and steals confidential information.
  • a disposal request describing the IP address of the C & C server and the IP address of the organization is accommodated in the eMLBR 12 and the C & C server of the organization.
  • eMLBR 12 and iMLBR 11 are sent, and thereafter, exchange of command packets with the C & C server is blocked.
  • a discard request describing the transmission destination IP address of leaked information is sent to the eMLBR 12 and iMLBR 11 of its own organization to prevent subsequent information leak.
  • DNS cache poisoning is an attack that causes cache DNS servers such as IPS, companies, and universities to cache fake DNS information.
  • cache DNS servers such as IPS, companies, and universities
  • By caching fake DNS information it is possible to conduct an action such as guiding a client such as an ISP customer, a company internal user, a university student or the like referring to the cache DNS server to a fake site.
  • DNS DNS poisoning An example of handling DNS DNS poisoning related to the third case is described below.
  • ISPs, companies, universities, and the like that are not properly subjected to ACL (Access Control List) have returned responses to inquiries from outside that are not clients.
  • ACL Access Control List
  • Such a cache DNS server is called an open resolver. Since the open resolver can make arbitrary inquiries from the outside, it can be said that it is easy to add poison. In addition, even an original client can make an arbitrary inquiry in a case where the client is infected with a virus and potted.
  • a cache DNS server that is not properly set up is subjected to a cache poisoning attack when there is even one malicious client or remotely operated client among the clients using this, and if successful, the cache DNS server May affect all clients using the server.
  • Kaminsky method delegation injection attack
  • transfer injection attack The following are specific methods for cash poisoning.
  • Kaminsky method delegation injection attack
  • transfer injection attack The following are specific methods for cash poisoning.
  • Kaminsky method delegation injection attack
  • transfer injection attack The following are specific methods for cash poisoning.
  • Kaminsky method delegation injection attack
  • transfer injection attack The following are specific methods for cash poisoning.
  • Kaminsky method delegation injection attack
  • transfer injection attack The following are specific methods for cash poisoning.
  • Currently implemented measures include setting an appropriate ACL on the cache DNS server, making it not an open resolver, and randomizing without fixing (or incrementally) the source port number when making external inquiries. Or introduce settings.
  • DNS DNS reflection attack
  • DNS generally has a larger data size for responses than for queries. This is an attack in which a large amount of responses are returned toward the target address by misusing this and performing a large number of inquiries by impersonating the source address as the target address.
  • CPE implementations that are open resolvers or open forwarders (inquiries are forwarded to the DNS server that is forwarded by the device for any inquiries from any device), and if attackers abuse it, including return traffic, etc. Larger traffic can be generated.
  • IP53B Inbound Port 53 Blocking
  • IP53B Inbound Port 53 Blocking
  • This is to block traffic from the ISP to the customer's port 53.
  • traffic to the open resolver and open forwarder can be suppressed, but careful introduction is required in consideration of the adverse effects of doing this (service disruption when customers set up a DNS server). It is being advanced.
  • MLBR since the DNS spoofing attack (DNS Amp) is based on an address spoofing packet, it can also be prevented by MLBR without the need for advanced specialized knowledge.
  • a computer system includes a controller, a switch that performs a relay operation specified by the flow entry for a received packet that matches the flow entry set by the controller, and a controller connected to the switch. To do.
  • the switch notifies the controller of the source address information of the received packet that does not match the flow entry set in itself (Packet-In). If the address information of the legitimate host terminal and the source address information do not match, the controller determines that the source address of the received packet is spoofed and sets a discard flow entry in the switch. Therefore, as compared with the invention according to the present embodiment, in the first related technology, a packet-in with a heavy processing load occurs each time a new address spoofing packet is received. In other words, in the present invention, a large number of address spoof packet attacks causes the switch to be overloaded and become inoperable.
  • the IP address and the MAC address are stored in the table in association with each other, and discarded when the IP address and the MAC address of the packet sent from the terminal are not in the table.
  • the terminal always transmits an ARP request packet by broadcast to resolve the address of the first-stage router prior to communication.
  • this ARP request packet the source MAC address and IP address are described. For this reason, even if a villain is from a different physical port, an ARP request packet can be captured by using a wireless network, etc., and an IP address and MAC address pair can be seen and impersonated by another person's PC.
  • the IP address and MAC address pairs are managed by the MLB table using the physical port or (secure) channel as a key, so even if the ARP request packet is stolen from another port or channel, it is impersonated. Packets from the terminal can be discarded.
  • the second related technology has a security problem in that it does not have a function of managing a physical port or a (secure) channel as a key.
  • the MAC address and the IP address are stored together, and the user sets the IP address assigned by the ISP to the terminal or intentionally. Even if a packet is received from a terminal that has not been assigned a pre-assigned IP address for a user who has altered the same IP address as that of another terminal, the packet is discarded within the bridge.
  • a table for managing MAC addresses and IP addresses in association with each other is provided. However, this is a by-product generated when the MAC bridge transmits an ARP request packet to the terminal to which the IP address is assigned and acquires the MAC address described in the returned ARP response packet. In the subsequent filtering, only the source MAC address is referred to.
  • the invention checks whether a pair of a MAC address and an IP address exists in the MLB table using a physical port or a (secure) channel as a key. As a result, even if the owner of the terminal does not spoof the IP address or MAC address, even if it is infected with malware and sent to a DDoS attack, etc. Inflow can be prevented.
  • NDP Network Datagram Protocol
  • ARP Address Resolution Protocol
  • NDP includes identification of MAC addresses of neighboring nodes on the link, address change / stop detection, check of reachability to neighboring nodes, detection of routers on the link and setting as a packet forwarding destination, etc.
  • FIG. 22 shows a comparison in the case where the IPv4 version of ARP reflection is applied to the IPv4 version in the packet transfer system according to the present embodiment.
  • RS packet route solicitation packet (RS): a packet used by the node for address resolution of the first-stage router RA packet (router response packet (RA): packet returned by the router in response to the RS packet)
  • NS packet Neighbor Solicitation (NS): A packet that resolves the MAC address of a specific node. It is almost the same as the IPv4 ARP packet.
  • -NA packet Neighbor Advertisement (NA)
  • the predetermined bit of the predetermined bit is set in the iMLBR 11 installed at the boundary with the network that relayed and forwarded these packets.
  • the authentication flag may be reset (“0”).
  • the present invention can be applied to the information and communication industry.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

The purposes of the present invention are to discard packets that have fraudulently flowed in and to subsequently prevent attack packets and fraudulent packets flowing undetected into the Internet from flowing out to or flowing into the Internet. The packet transfer device according to the present invention is equipped with: multiple ports or multiple channels; a binding table for storing identification information on the ports or channels and the correspondence relation between physical source addresses and logical source addresses; a discard table that is generated or updated as requested; and a transfer unit that transfers a packet to the next hop node when a physical source address-logical source address pair for the packet is present in the binding table, or discards the packet when the pair is not present in the binding table or when the packet corresponds to the discard table.

Description

パケット転送装置、パケット転送システム及びパケット転送方法Packet transfer apparatus, packet transfer system, and packet transfer method

 本発明は、パケット転送装置、パケット転送システム及びパケット転送方法に関する。 The present invention relates to a packet transfer device, a packet transfer system, and a packet transfer method.

 年々巧妙化・組織化しているサイバー攻撃は、2011年全世界で1兆米ドルの損害を与えたと言われるほど、地球規模での大きな脅威となってきた。とりわけ、ボットウィルスに感染した無数のPCでボットネットを形成し、それを操りWebサイトなどへ攻撃を仕掛けるDDoS攻撃は、これまでの「自分を守ろうとするセキュリティ技術」では防ぐことができず、インターネット全体での対策が必要となっている。 The cyber attacks that have become more sophisticated and organized year by year have become a major threat on a global scale, as it is said that in 2011 it was said to have caused US $ 1 trillion of damage worldwide. In particular, the DDoS attack that forms a botnet with a myriad of PCs infected with a bot virus and manipulates it to attack websites cannot be prevented with the conventional “security technology to protect myself” Countermeasures for the entire Internet are required.

 ところで、警察庁の発表によれば、2012年中に観測されたボットネットによる攻撃では、約97%がSYN(SYNchronize) flood攻撃とUDP(User Datagram Protocol) flood攻撃で、その大半が送信元IPアドレスを詐称(以下、IPアドレス詐称もしくはアドレス詐称)していたことが特徴となっている。IPアドレス詐称対策を行うことが、サイバー攻撃対策として大きな効果を挙げるものと期待される。 By the way, according to the announcement by the National Police Agency, about 97% of the attacks by botnets observed in 2012 were SYN (Synchronize) flood attack and UDP (User Datagram Protocol) flood attack, most of which were from the source IP The feature is that the address was spoofed (hereinafter, IP address spoofing or address spoofing). Taking countermeasures against IP address spoofing is expected to have a great effect as a countermeasure against cyber attacks.

 IPアドレス詐称が成功する背景には、インターネット上でのルーティングがパケットの宛先IPアドレスだけを見ていることにある。IPアドレス詐称パケットのインターネットへの流入を阻止しようとするイングレス・フィルタリング技術の一つに、受信したパケットの送信元アドレスが経路表に経路情報として存在するかを調べ、経路情報が見つかればそのパケットを転送し、見つからなければ廃棄するuRPF(Unicast Reverse Path Forwarding)があるが、経路表に記載されたネットワークアドレスのアドレス空間内でのアドレス詐称パケットを中継転送としてしまう不完全性のため、広く導入するまでには至っていない。 The reason why IP address spoofing is successful is that routing on the Internet looks only at the destination IP address of the packet. One of the ingress filtering technologies that try to prevent the IP address spoofed packet from entering the Internet is to check whether the source address of the received packet exists as route information in the route table. URPF (Unicast Reverse Path Forwarding), which is discarded if not found, but widely introduced due to imperfection of address spoofing packet in the address space of the network address described in the routing table It hasn't been done yet.

 また、予め決められた端末以外がネットワークにアクセスしないように認証によってポートに疎通許可を与えるIEEE802.1X規格がある。これにMACアドレスベースのイングレス・フィルタング機能を付加して、たとえリピータハブを介して未認証端末からフレームが送信されても阻止できる製品もあるが、データリンク層での対策であるため、認証を受けた端末がボットウィルスなどに感染しIPアドレス詐称パケットを送信しても、認証LANスイッチはそれを阻止することはできない。 In addition, there is an IEEE 802.1X standard that grants communication permission to a port by authentication so that a terminal other than a predetermined terminal does not access the network. Some products can add a MAC address-based ingress filtering function to prevent frames from being transmitted from unauthenticated terminals via a repeater hub. Even if the terminal that received the message is infected with a bot virus or the like and transmits an IP address spoofing packet, the authentication LAN switch cannot prevent it.

 さらに、企業などの内部ネットワーク向けに、DHCP(Dynamic Host Configuration Protocol)によるアドレス割り当てを監視し、それと整合しないパケットをフィルタリングするDHCP snooping技術や、単一のポリシーのもとに情報へのアクセス認可などをコントロールするTrusted Network Connect技術、他にもIPアドレス詐称パケットの発信源を特定しようとするIP trace back技術など、様々な試みや製品が出回っているが、いずれもサイバー攻撃を根絶する有効な解決手段とはなっていない(例えば、特許文献1を参照。)。 In addition, DHCP (Dynamic Host Configuration Protocol) address allocation by DHCP (Dynamic Host Configuration Protocol) is monitored for companies and other internal networks, and DHCP snooping technology that filters packets that do not match with it, access authorization to information based on a single policy, etc. Various attempts and products such as the Trusted Network Connect technology that controls the IP address, and the IP trace back technology that tries to identify the source of the IP address spoofing packet are on the market, all of which are effective solutions to eradicate cyber attacks. It is not a means (see, for example, Patent Document 1).

特開2003-289338号公報JP 2003-289338 A 国際公開第2012/077603号International Publication No. 2012/076603 特開2007-68190号公報JP 2007-68190 A US2003/0043853A1US2003 / 0043853A1

 ところで、関連技術のネットワーク機器では、これまでハードウェアとソフトウェアの両方をベンダーが開発し、それを組み合わせてネットワーク装置として提供していた。ベンダーごとに様々な機能や特徴を持った機器が存在する一方、機器のソフトウェアとハードウェアが一体となっているため、ベンダーが想定するアーキテクチャ以外のネットワーク構成や機能追加ができないのが実情であった。これに対して、SDN(Software Defined Network)は、ネットワークの構成や機能、性能などをソフトウェアの操作だけで動的に設定・変更できるようにしようとするネットワークや概念を指し、各所で開発が進められている。 By the way, in related technology network equipment, both hardware and software have been developed by vendors and combined to provide them as network devices. While devices with various functions and features exist for each vendor, the software and hardware of the devices are integrated, so the actual situation is that network configurations and functions other than the architecture assumed by the vendor cannot be added. It was. In contrast, SDN (Software Defined Network) refers to networks and concepts that allow network configuration, functions, and performance to be set and changed dynamically only by software operations. It has been.

 次に、インターネット文化とIPアドレス詐称対策との関わりにおける課題を説明する。インターネットは、様々なポリシーのもとにインターネットサービスプロバイダー(以下、ISP(Internet Service Provider))が自律的に運用しているネットワークを相互接続したものである。サイバー攻撃はインターネット全体の問題であり、IPアドレス詐称対策を部分的に導入してもその効果は微々たるものである。無数に存在するISPや様々な組織、一般利用者のほぼすべてに対策の導入を求めることは極めて困難なことのように思えよう。 Next, I will explain the issues related to the relationship between Internet culture and IP address spoofing. The Internet is obtained by interconnecting networks autonomously operated by an Internet service provider (hereinafter referred to as ISP (Internet Service Provider)) under various policies. Cyber attacks are a problem of the entire Internet, and even if IP address spoofing measures are partially introduced, the effect is insignificant. It seems to be extremely difficult to ask for the introduction of countermeasures to almost all of the countless ISPs, various organizations, and general users.

 しかしながら、インターネット文化には、TCP/IP(Transmission Control Protocol/Internet Protocol)やDNS(Domain Name System)、メールなどのインターネット基盤技術開発の原動力となった「情報は共有されるべき」や、民主主義の根幹をなす「情報は広く公開されるべき」、政府や官僚、大企業の介入を嫌う「権力は横暴で信用できない」、とともに「クラッキング行為は戒めよ」がある。 However, in Internet culture, TCP / IP (Transmission Control Protocol / Internet Protocol), DNS (Domain Name System), e-mail, etc. have become the driving force for Internet infrastructure technology development. “Information should be widely disclosed”, which is the foundation of the government, “The power is domineering and untrustworthy” which hate the intervention of the government, bureaucrats and large corporations, and “The cracking act is commandment”.

 すなわち、民主主義に根ざしたインターネットは、利用者の良識ある行為・行動を前提としており、利用を監視したり制限したりするメカニズムや組織はない。あるのはプロトコルの標準化を行うIETF(Internet Engineering Task Force)や、ドメイン名やIPアドレスなどの有限なインターネット資源を管理するICANN(Internet Corporation for Assigned Names and Numbers)などのインターネットガバナンスだけである。すなわち、インターネットはオープンだが無防備であり、これを悪用したクラッキング行為は厳に戒めるべきとする考えが根底にある。 That is, the Internet, which is rooted in democracy, is based on the sensible actions and behaviors of users, and there is no mechanism or organization that monitors or restricts usage. There are only Internet governance such as IETF (Internet Engineering Task Force) that standardizes protocols and ICANN (Internet Corporation for Assigned Names and Numbers) that manages finite Internet resources such as domain names and IP addresses. In other words, the idea is that the Internet is open but unprotected, and cracking that exploits it should be strictly disciplined.

 IPアドレス詐称パケットは、本人が認識しているか否かはともかく、何等かのクラッキング行為を意図したパケットであることは明らかである。すなわち、IPアドレス詐称パケットがインターネットに流入しないような対策を講じることは、インターネット文化の考え方に沿うものと言えよう。 It is clear that the IP address spoofing packet is a packet intended for some kind of cracking action, regardless of whether or not it is recognized by the person himself / herself. In other words, taking measures to prevent IP address spoofing packets from entering the Internet is in line with the idea of Internet culture.

 そして、インターネットの世界は契約で成り立っており、限られた数の一次ISPの下に、二次/三次ISPさらに利用者が契約し接続している。従って、一次ISPが本発明の費用対効果を認識し導入を決断すれば、下位のISP/組織ユーザ/一般ユーザを含めた契約条項として導入を規定できる。 And the world of the Internet consists of contracts, and secondary / tertiary ISPs and users are connected and connected under a limited number of primary ISPs. Therefore, if the primary ISP recognizes the cost effectiveness of the present invention and decides to introduce it, the introduction can be defined as a contract clause including the subordinate ISP / organization user / general user.

 図1及び図23に示すアドレス詐称対策の対象とすべきノードは(本明細書では、ユーザパケットを生成し送受信するホストと、ユーザパケットの生成は行わずパケットの中継転送を行うルータやスイッチを総称する用語として「ノード」を用いる)、利用者本人が意図としているか否かは別として、サイバー攻撃を行うもしくは加担させられるノードとして、いわゆる一般利用者が利用するPC26と、スマートフォン24及び携帯端末25や、サイバー攻撃の踏み台にされるサーバー13などの他に、最近では遠隔操作によって不正プログラムが埋め込まれサイバー攻撃に加担されるデジタルテレビ29や冷蔵庫、プリンタ、ITVカメラ、さらには既設の家庭用ブロードバンドルータなどがある。これらに加えて、IoT(Internet of Things)と呼ばれるセンサーや機器などの「モノ」が、2020年には全世界で260億台がインターネットに接続されると予想されている。これらがウィルスに感染したり、製造工程でマルウェアが埋め込まれ、電力網や鉄道などの社会インフラがサイバー攻撃に曝され、インターネットのみならず社会全体が大混乱に陥ることも懸念されている。 The nodes to be addressed against address spoofing shown in FIGS. 1 and 23 are (in this specification, a host that generates and transmits user packets, a router and a switch that relays and forwards packets without generating user packets) “Node” is used as a generic term), and a PC 26 used by a so-called general user, a smartphone 24, and a portable terminal as a node to perform a cyber attack or to participate in a cyber attack, whether or not the user intends 25, the server 13 used as a stepping stone for cyber attacks, and recently digital TV 29, refrigerators, printers, ITV cameras, and existing home appliances that have recently been embedded with malicious programs by remote control. There are broadband routers. In addition to this, 26 billion units of “things” such as sensors and devices called IoT (Internet of Things) are expected to be connected to the Internet in 2020. There are concerns that these will become infected with viruses, malware will be embedded in the manufacturing process, social infrastructure such as power grids and railways will be exposed to cyber attacks, and not only the Internet but also the entire society will be devastated.

 このようなノードは、アドレス詐称による被害において、インターネット10と接続して主としてマシン同士、すなわちM to M型(Machine to Machine)の端末が攻撃ターゲットとするIPアドレスに送信元IPアドレスを詐称してDRDoS(Distributed Reflection Denial of Service)攻撃に加担させられるケースも報告されている。さらにユーザ宅内に配置される家庭用ブロードバンドルータに当たる本発明のeMLBR12であっても、迂回(バイパス)あるいはWAN回線に直接パソコンを接続し攻撃パケットを送り込むなどの仕掛けが施されればアドレス詐称パケットを外部(インターネット10)に流出することになるため、これらもアドレス詐称対策の対象とすべきノードである。 Such a node, in the damage caused by address spoofing, spoofs the source IP address to the IP address targeted by the machines that are connected to the Internet 10 and are mainly attacked by machines, that is, M-to-M (Machine to Machine) terminals. There have also been reports of cases involving DRDoS (Distributed Reflection Denial of Service) attacks. Furthermore, even with the eMLBR 12 of the present invention, which corresponds to a home broadband router placed in a user's home, an address spoof packet is sent if a device such as bypass (bypass) or direct connection of a personal computer to a WAN line and sending an attack packet is applied. Since these leak out to the outside (Internet 10), these are also nodes that should be targeted for address spoofing.

 また、ネットワークは、iMLBR11及びeMLBR12が含まれるノードの集合であるが、このノードの集合すなわちネットワークをノードと見なし、さらにその集合をネットワークとして扱える、すなわちインターネット10は階層的かつ回帰的な構造をなしている。したがって、上述の「なんでも繋がせる」ポリシーのネットワーク(Untrusted Internet21)が、本発明(iMLBR11又はeMLBR12)によらない既設ルータを介してインターネット10に接続しても、それを信頼できないノードの一つと捉えれば良いことになる。なお、インターネット10は、ホーム認証サーバーとして機能するHRS23(Home RADIUS(Remote Authentication Dial In User Service Server)を有する。 The network is a set of nodes including iMLBR11 and eMLBR12. The set of nodes, that is, the network is regarded as a node, and the set can be treated as a network. That is, the Internet 10 has a hierarchical and recursive structure. ing. Therefore, even if the network of the above-mentioned “connect anything” policy (Untrusted Internet 21) is connected to the Internet 10 via an existing router not according to the present invention (iMLBR11 or eMLBR12), it can be regarded as one of unreliable nodes. It will be good. The Internet 10 has an HRS 23 (Home RADIUS (Remote Authentication Dial In User Service Server)) that functions as a home authentication server.

 しかしながら、多様なポリシーのもとで運用しているISPや様々な組織、一般利用者の行為・行動を監視・制御したり、ポリシーの強制もしくはIP trace backに見られるようにISPのポリシーを抉り出したりするような対策は、受け入れられ難い。すなわち、発信元IPアドレスを詐称しているか否かを利用者側の出口とインターネット10の入り口とでチェックし、アドレス詐称パケットであればそれを確実に遮断する、さらにこうした対策をすり抜けてインターネットに流入しようとする攻撃パケットや不正パケットを遮断するための必要最小限にして汎用性のある、そして技術的に実現可能な対策であることが課題である。 However, ISPs operating under various policies, various organizations and general users can be monitored and controlled, and policies can be enforced or can be seen in the IP trace back. Measures such as taking out are unacceptable. In other words, whether or not the source IP address is spoofed is checked at the exit on the user side and the entrance of the Internet 10, and if it is an address spoofed packet, it is securely blocked. The problem is that it is a versatile and technically feasible measure with the minimum necessary for blocking attack packets and illegal packets that are about to flow in.

 これは、仮に「なんでも繋がせる」ポリシーのISPがいたとしても、その存在を否定するものではなく、同ISPが運用するネットワーク(Untrusted Internet21)や「オニオンルーティング」と呼ばれる仮想回線接続により、通信を複数のノードを経由させることによって接続経路の匿名化を行う匿名ネットワークなどがあっても、これらのネットワークとの接続点(iMLBR11)での検疫を強化し、さらに帯域を狭めることによって攻撃パケットや不正パケットのインターネット10への流入を抑制すれば良いことを意味する。すなわち、上述の課題を満たし得る対策であれば、国際法の制定などを待たずに、民間ベースの契約で地球規模での導入が可能と考えられる。 This is not to deny the existence of an ISP with a policy of “connect anything”, but to communicate by a network operated by the ISP (Untrusted Internet 21) or a virtual circuit connection called “onion routing”. Even if there is an anonymous network that anonymizes the connection route by passing through multiple nodes, quarantine at the connection point (iMLBR11) with these networks is strengthened and the bandwidth is narrowed to attack packets and fraud This means that the flow of packets into the Internet 10 should be suppressed. In other words, measures that can satisfy the above-mentioned issues can be introduced on a global scale with private contracts without waiting for the establishment of international law.

 前記課題を解決するために、本発明は、認証要求を行うサプリカントを有し、その真正性が認証された端末はもとより、サプリカントを有せずしかもOSのバージョンアップやファイアウォール機能を持たないまったく無防備な端末(デジタルテレビなどのスマート家電)から送出されるアドレス詐称パケットのインターネット10への流出並びにインターネット10への流入を阻止する。さらに、上記対策をすり抜けてインターネット10に流入した攻撃パケットや不正パケットについても、これを検出したノードからの要請によって、以後、インターネット10への流出並びにインターネット10への流入を阻止する。 In order to solve the above-mentioned problems, the present invention has a supplicant that makes an authentication request, has no supplicant as well as a terminal whose authenticity is authenticated, and does not have an OS upgrade or a firewall function. An address spoofing packet sent from a completely defenseless terminal (smart home appliance such as a digital television) is prevented from flowing into the Internet 10 and into the Internet 10. Further, attack packets and illegal packets that have passed through the above countermeasures and have flowed into the Internet 10 are prevented from flowing out into the Internet 10 and flowing into the Internet 10 in response to a request from the node that detected them.

 上記目的を達成するため、本発明では、パケット転送装置(iMLBR及びeMLBR)のポート又はチャネルの識別情報と送信元物理(所謂MAC)アドレスと送信元論理(所謂IP)アドレスとの対応関係を管理し、フレーム/パケットを受信したポート又はチャネルの識別情報をキーにこの対応関係が存在するかを調べ、対応関係が存在しないパケットをアドレス詐称パケットとみなして廃棄する。さらに、上記対策をすり抜けてインターネットに流入した攻撃パケットや不正パケットを検出したノードからの要請を受けて廃棄テーブルを生成・更新し、この廃棄テーブルに該当するパケットを廃棄する。 In order to achieve the above object, the present invention manages the correspondence between the port or channel identification information, the source physical (so-called MAC) address, and the source logical (so-called IP) address of the packet transfer device (iMLBR and eMLBR). Then, it is checked whether or not this correspondence exists using the identification information of the port or channel that received the frame / packet as a key, and a packet that does not have a correspondence is regarded as an address spoofing packet and discarded. Further, a discard table is generated / updated in response to a request from a node that detects an attack packet or an illegal packet that has passed through the above measures and has flowed into the Internet, and discards a packet corresponding to the discard table.

 具体的には、本発明に係るパケット転送装置は、
 互いにパケットをフレームにカプセル化して送受信する少なくとも一つのノード又は少なくとも一つのエンティティを収容する複数のポート又は複数のチャネルと、
 前記ポート又は前記チャネルの識別情報と前記ノード又は前記エンティティが送信する前記フレームの送信元物理アドレスと前記フレームをデカプセル化して取り出したパケットの送信元論理アドレスとの対応関係を記憶しておくマルチレイヤ・バインディングテーブルと、
 前記フレームを受信した前記ポート又は前記チャネルをキーに前記マルチレイヤ・バインディングテーブルを検索し、前記フレームの送信元物理アドレスと送信元論理アドレスとの対が前記バンディングテーブルに存在するときは、前記フレームから取り出されたパケットをフレームにカプセル化して前記パケットの送信先論理アドレスに向けて次ホップノードへ転送し、前記マルチレイヤ・バインディングテーブルに存在しないときは前記パケットを廃棄する転送部と、を備える。
Specifically, the packet transfer apparatus according to the present invention is:
A plurality of ports or a plurality of channels accommodating at least one node or at least one entity for encapsulating packets in each other in a frame; and
Multi-layer for storing the correspondence between the identification information of the port or the channel, the transmission source physical address of the frame transmitted by the node or the entity, and the transmission source logical address of the packet extracted by decapsulating the frame・ Binding table,
The multi-layer binding table is searched using the port or the channel that received the frame as a key, and when a pair of a source physical address and a source logical address of the frame exists in the banding table, the frame A transfer unit that encapsulates the packet extracted from the packet and transfers it to the next hop node toward the destination logical address of the packet, and discards the packet when it does not exist in the multilayer binding table. .

 具体的には、本発明に係るパケット転送装置は、
 互いにパケットをフレームにカプセル化して送受信する少なくとも一つのノード又は少なくとも一つのエンティティを収容する複数のポート又は複数のチャネルと、
 前記ポート又は前記チャネルの識別情報と前記ノード又は前記エンティティが送信する前記フレームの送信元物理アドレスと前記フレームをデカプセル化して取り出したパケットの送信元論理アドレスとの対応関係を記憶しておくマルチレイヤ・バインディングテーブルと、
 前記フレームを受信した前記ポート又は前記チャネルをキーに前記マルチレイヤ・バインディングテーブルを検索し、前記フレームの送信元物理アドレスと送信元論理アドレスとの対が前記バンディングテーブルに存在するときは、前記フレームから取り出されたパケットの送信先論理アドレスに向けて転送するルータへ転送し、前記マルチレイヤ・バインディングテーブルに存在しないときは前記パケットを廃棄する転送部と、を備える。
Specifically, the packet transfer apparatus according to the present invention is:
A plurality of ports or a plurality of channels accommodating at least one node or at least one entity for encapsulating packets in each other in a frame; and
Multi-layer for storing the correspondence between the identification information of the port or the channel, the transmission source physical address of the frame transmitted by the node or the entity, and the transmission source logical address of the packet extracted by decapsulating the frame・ Binding table,
The multi-layer binding table is searched using the port or the channel that received the frame as a key, and when a pair of a source physical address and a source logical address of the frame exists in the banding table, the frame A transfer unit that transfers the packet extracted from the packet to a router that transfers the packet toward the destination logical address, and discards the packet when the packet is not present in the multilayer binding table.

 本発明に係るパケット転送装置は、
 予め接続された他のパケット転送装置に備わる前記転送部から、受信したポート又はチャネルの識別情報とともに送られてきた認証要求パケット又はフレームについて、認証サーバーへの認証要求を仲介し、前記認証サーバーが認証した認証結果を取得し、前記認証結果に基づいて決定した通信サービス品質を前記マルチレイヤ・バインディングテーブルの記憶の対象にし、
前記ポート又は前記チャネルを介して前記認証要求の要求元のノード又はエンティティの実在確認を行って、前記マルチレイヤ・バインディングテーブルを更新し、
前記マルチレイヤ・バインディングテーブルを他のパケット転送装置に備わる前記転送部に伝達する制御部を備え、
前記転送部は、
前記制御部が伝達してきた前記マルチレイヤ・バインディングテーブルを更新してもよい。
The packet transfer apparatus according to the present invention is
An authentication request packet or frame sent together with the received port or channel identification information from the transfer unit provided in another packet transfer apparatus connected in advance mediates an authentication request to the authentication server, and the authentication server Obtaining an authenticated authentication result, setting the communication service quality determined based on the authentication result as a storage target of the multilayer binding table,
Check the existence of the requesting node or entity of the authentication request via the port or the channel, and update the multilayer binding table;
A control unit that transmits the multilayer binding table to the transfer unit provided in another packet transfer device;
The transfer unit
The multilayer binding table transmitted from the control unit may be updated.

 本発明に係るパケット転送装置では、
 前記ポート又はチャネルに接続されるいずれかのノード又はエンティティからの廃棄要請を受け付け、或いは予め定められた所定のノード又はエンティティを定期的にアクセスし取得した廃棄要請に応じて前記転送部の廃棄テーブルを更新し、
前記転送部は、
前記廃棄テーブルに該当するフレーム又はパケットを廃棄してもよい。
In the packet transfer apparatus according to the present invention,
The discard table of the transfer unit receives a discard request from any node or entity connected to the port or channel, or periodically accesses a predetermined node or entity that is determined in advance, and acquires the discard request. Update
The transfer unit
A frame or packet corresponding to the discard table may be discarded.

 本発明に係るパケット転送装置では、
 前記転送部と前記制御部は、互いに連携して、
 前記ノード又は前記エンティティがブロードキャスト送信した自装置宛アドレス解決要求フレームに呼応して、前記ノード又は前記エンティティに対してアドレス解決要求フレームを同じポート又はチャネルからブロードキャスト送信し、
 前記ポート又は前記チャネルを介して返ってきたアドレス解決応答フレームの送信元物理アドレスと送信元論理アドレスの対と、前記自装置宛アドレス解決要求フレームの送信元物理アドレスと送信元論理アドレスの対とを照合することによって、前記ノード又は前記エンティティの物理アドレスと論理アドレスの真正性を検証し認証してもよい。
In the packet transfer apparatus according to the present invention,
The transfer unit and the control unit cooperate with each other,
In response to the address resolution request frame addressed to its own device broadcasted by the node or the entity, the address resolution request frame is broadcasted from the same port or channel to the node or the entity,
A pair of a source physical address and a source logical address of an address resolution response frame returned via the port or the channel, and a pair of a source physical address and a source logical address of the address resolution request frame addressed to the own apparatus. By verifying the authenticity of the physical address and the logical address of the node or the entity.

 本発明に係るパケット転送装置では、
 前記制御部及び前記転送部は、
 前記ノード又は前記エンティティが固定のプロセス識別アドレスを有する場合、前記プロセス識別アドレスを前記マルチレイヤ・バインディングテーブルに記憶する対象にしてもよい。
In the packet transfer apparatus according to the present invention,
The control unit and the transfer unit are
When the node or the entity has a fixed process identification address, the process identification address may be stored in the multilayer binding table.

 本発明に係るパケット転送装置では、
 DHCP(Dynamic Host Configuration Protocol)、レイヤ2スイッチ及びW-LAN(Wireless Local Area Network)各機能の一部又はすべてを含めた一体構造であってもよい。
In the packet transfer apparatus according to the present invention,
An integrated structure including a part or all of each function of DHCP (Dynamic Host Configuration Protocol), layer 2 switch, and W-LAN (Wireless Local Area Network) may be used.

 本発明に係るパケット転送装置では、
 前記転送部または前記制御部は、
 認証されたノード又はエンティティが送信したパケットを受信した場合、前記パケットの通信プロトコルに応じて予め定められた値を受信したパケットの所定のフィールドに書き込みを行ってもよい。また、未認証のノード又はエンティティが送信したパケットを受信した場合、前記所定のフィールドをリセットしてもよい。
In the packet transfer apparatus according to the present invention,
The transfer unit or the control unit is
When a packet transmitted by an authenticated node or entity is received, a predetermined value according to the communication protocol of the packet may be written in a predetermined field of the received packet. Further, when a packet transmitted by an unauthenticated node or entity is received, the predetermined field may be reset.

 具体的には、本発明に係るパケット転送システムは、
 インターネット利用者側に配置されるパケット転送装置と、
 インターネット側に配置されるパケット転送装置と、を備え、インターネット側に配置される前記パケット転送装置は、インターネット利用者側に配置される前記パケット転送装置を迂回又はすり抜けてアドレス詐称パケットが送られても、インターネットへの流入を阻止する。
Specifically, the packet transfer system according to the present invention is:
A packet transfer device arranged on the Internet user side;
A packet transfer device arranged on the Internet side, and the packet transfer device arranged on the Internet side sends an address spoof packet bypassing or passing through the packet transfer device arranged on the Internet user side. Even prevent the inflow to the Internet.

 具体的には、本発明に係るパケット転送方法は、
 互いにパケットをフレームにカプセル化して送受信する少なくとも一つのノード又は少なくとも一つのエンティティを収容する複数のポート又は複数のチャネルの識別情報と前記ノード又は前記エンティティが送信する前記フレームの送信元物理アドレスと送信元論理アドレスとの対応関係を記憶しておくマルチレイヤ・バインディングテーブルを、フレームが送られてきたポート又はチャネルの識別情報をキーに検索し、
 前記フレームの送信元物理アドレスと送信元論理アドレスとの対が前記バンディングテーブルに存在するときは、前記フレームから取り出したパケットをフレームにカプセル化して前記パケットの送信先論理アドレスに向けて次ホップノードへ転送し、前記マルチレイヤ・バインディングテーブルに存在しないときは前記パケットを廃棄する転送手順を有する。
Specifically, the packet transfer method according to the present invention includes:
Identification information of a plurality of ports or a plurality of channels accommodating at least one node or at least one entity that encapsulates packets in a frame, and a transmission source physical address and transmission of the frame transmitted by the node or the entity Search the multi-layer binding table that stores the correspondence with the original logical address using the identification information of the port or channel to which the frame has been sent as a key,
When a pair of a transmission source physical address and a transmission source logical address of the frame exists in the banding table, a packet extracted from the frame is encapsulated into a frame and a next hop node is directed toward the transmission destination logical address of the packet And a transfer procedure for discarding the packet when it does not exist in the multilayer binding table.

 具体的には、本発明に係るパケット転送方法は、
 互いにパケットをフレームにカプセル化して送受信する少なくとも一つのノード又は少なくとも一つのエンティティを収容する複数のポート又は複数のチャネルの識別情報と前記ノード又は前記エンティティが送信する前記フレームの送信元物理アドレスと送信元論理アドレスとの対応関係を記憶しておくマルチレイヤ・バインディングテーブルを、フレームが送られてきたポート又はチャネルの識別情報をキーに検索し、
 前記フレームの送信元物理アドレスと送信元論理アドレスとの対が前記バンディングテーブルに存在するときは、前記フレームから取り出したパケットの送信先論理アドレスに向けて転送するルータへ転送し、前記マルチレイヤ・バインディングテーブルに存在しないときは前記パケットを廃棄する転送手順を有する。
Specifically, the packet transfer method according to the present invention includes:
Identification information of a plurality of ports or a plurality of channels accommodating at least one node or at least one entity that encapsulates packets in a frame, and a transmission source physical address and transmission of the frame transmitted by the node or the entity Search the multi-layer binding table that stores the correspondence with the original logical address using the identification information of the port or channel to which the frame has been sent as a key,
When a pair of a source physical address and a source logical address of the frame exists in the banding table, the frame is transferred to a router that transfers the packet taken out from the frame toward the destination logical address, When it does not exist in the binding table, it has a transfer procedure for discarding the packet.

 本発明によるパケット転送装置を、インターネット10の端部に所謂エッジルータ(iMLBR11)として配備すれば、アドレス詐称パケットや攻撃パケット、不正パケットのインターネット10への流入を阻止する。さらに、本発明によるパケット転送装置を、インターネット利用者側で所謂ブロードバンドルータなど(eMLBR12)として配備すれば、アドレス詐称パケットや攻撃パケット、不正パケットのインターネット10への流出を阻止する。 If the packet transfer device according to the present invention is deployed as a so-called edge router (iMLBR11) at the end of the Internet 10, the address spoofing packet, attack packet, and illegal packet are prevented from flowing into the Internet 10. Furthermore, if the packet transfer device according to the present invention is deployed as a so-called broadband router or the like (eMLBR12) on the Internet user side, the outflow of address spoofing packets, attack packets, and illegal packets to the Internet 10 is prevented.

本実施形態に係るネットワークの構成図の一例を示す。An example of the block diagram of the network which concerns on this embodiment is shown. 本実施形態に係るeMLBRの構成図の一例を示す。An example of the block diagram of eMLBR which concerns on this embodiment is shown. 本実施形態に係るiMLBRの構成図の一例を示す。An example of the block diagram of iMLBR which concerns on this embodiment is shown. 本実施形態に係る複数の通信機能を有するネットワークの構成要素の一例を示す。An example of the component of the network which has a some communication function which concerns on this embodiment is shown. 本実施形態に係るARPリフレクションを用いたIEEE802.1X非対応ノードとeMLBR間の認証及び上りパケットの転送シーケンスの一例を示す。An example of the authentication between an IEEE 802.1X non-corresponding node and eMLBR using an ARP reflection according to the present embodiment and a forward packet transfer sequence is shown. 本実施形態に係る通信手順における構成図の一例を示す。An example of the block diagram in the communication procedure which concerns on this embodiment is shown. 本実施形態に係る通信手順におけるテーブルの一例を示す。An example of the table in the communication procedure which concerns on this embodiment is shown. 本実施形態に係る通信手順におけるフローチャートの一例を示す。An example of the flowchart in the communication procedure which concerns on this embodiment is shown. 本実施形態に係るパケット転送方法を適用した評価結果を示す。The evaluation result which applied the packet transfer method concerning this embodiment is shown. 本実施形態に係るパケット転送方法を適用した評価結果を示す。The evaluation result which applied the packet transfer method concerning this embodiment is shown. 本実施形態に係る複数の通信機能を有するネットワークの構成の一例を示す。An example of the structure of the network which has a some communication function which concerns on this embodiment is shown. 本実施形態に係るIEEE802.1X対応ノードとeMLBR間の認証及び上りパケットの転送シーケンスの一例を示す。4 shows an example of an authentication and uplink packet transfer sequence between an IEEE 802.1X compatible node and an eMLBR according to the present embodiment. 本実施形態に係る複数の通信機能を有するネットワークの一例を示す。2 shows an example of a network having a plurality of communication functions according to the present embodiment. 本実施形態に係るeMLBR-R(一般住宅向け)とiMLBR間の相互認証及び上りパケットの転送シーケンスの一例を示す。An example of the mutual authentication between eMLBR-R (for general homes) and iMLBR and an uplink packet transfer sequence according to the present embodiment is shown. 本実施形態に係る複数の通信機能を有するネットワークの構成の一例を示す。An example of the structure of the network which has a some communication function which concerns on this embodiment is shown. 本実施形態に係る複数の通信機能を有するネットワークの構成の一例を示す。An example of the structure of the network which has a some communication function which concerns on this embodiment is shown. 本実施形態に係る帯域制限によるTVオンラインデータサービスにおける応答性評価の評価環境の一例を示す。An example of the evaluation environment of the responsiveness evaluation in the TV online data service by the band limitation according to the present embodiment is shown. 本実施形態に係るTVオンラインデータサービスの応答性評価のフローテーブルの一例を示す。An example of the flow table of the responsiveness evaluation of TV online data service concerning this embodiment is shown. 本実施形態に係るTVオンラインデータサービスの応答性評価の評価結果を示す。The evaluation result of the responsiveness evaluation of TV online data service concerning this embodiment is shown. 本実施形態に係るTVオンラインデータサービスの応答性評価の評価結果を示す。The evaluation result of the responsiveness evaluation of TV online data service concerning this embodiment is shown. 本実施形態に係るIEEE802.1X対応端末とeMLBR12間のシーケンス動作の一例を示す。An example of a sequence operation between the IEEE 802.1X compatible terminal and the eMLBR 12 according to the present embodiment is shown. 本実施形態に係るパケット転送システムにおけるIPv6の適応例の一例を示す。An example of adaptation of IPv6 in the packet transfer system according to the present embodiment will be shown. 本実施形態に係るネットワークの構成図の一例を示す。An example of the block diagram of the network which concerns on this embodiment is shown.

 以下、本発明の実施形態について、図面を参照しながら詳細に説明する。なお、本発明は、以下に示す実施形態に限定されるものではない。これらの実施の例は例示に過ぎず、本発明は当業者の知識に基づいて種々の変更、改良を施した形態で実施することができる。なお、本明細書及び図面において符号が同じ構成要素は、相互に同一のものを示すものとする。 Hereinafter, embodiments of the present invention will be described in detail with reference to the drawings. In addition, this invention is not limited to embodiment shown below. These embodiments are merely examples, and the present invention can be implemented in various modifications and improvements based on the knowledge of those skilled in the art. In the present specification and drawings, the same reference numerals denote the same components.

 さらに、各実施形態で用いる以下に説明する用語は、すべての実施形態に共通に適用される。 Furthermore, the terms described below used in each embodiment are commonly applied to all the embodiments.

 インターネット:一般的にデジタル伝送媒体を介してコンピュータ同士を相互接続したものをコンピュータネットワークもしくは物理ネットワークと呼び、コンピュータネットワークを、パケット転送装置(ルータやレイヤ3スイッチ)を介して相互接続したものをインターネットワークという。ISPが運用するコンピュータネットワークを相互接続した全世界に開かれたインターネットワークの固有名詞が、インターネット(The Internet)であり、TCP/IPプロトコル体系を用いてパケット通信サービスを提供する。インターネットのパケット通信サービスを利用するには、利用者側ネットワークに配備される家庭用ルータなど(eMLBR)と、専用回線または公衆アクセス回線(電話回線やISDN回線、ADSL回線、光回線、無線回線など)を介して、インターネットの端部に配備されるエッジルータ(iMLBR)に接続する必要がある。なお、移動体通信網では、これまでTCP/IPに準じた独自のプロトコル体系を用いていたが、スマートフォンなどの導入に伴ってTCP/IPを用いたIPネットワークが運用されるようになり、またNGN(Next Generation Network)でもTCP/IPベースのパケット通信サービスが提供されている。本明細書では、これらもインターネットの構成要素として含める。 Internet: Generally, a computer network or a physical network connected to each other via a digital transmission medium is called a computer network or a physical network. A computer network connected to each other via a packet transfer device (router or layer 3 switch) is connected to the Internet. It is called work. A proper noun of an internetwork that is open to the world that interconnects computer networks operated by ISP is the Internet (The Internet), which provides a packet communication service using a TCP / IP protocol system. To use packet communication services on the Internet, home routers (eMLBR) deployed on the user side network, private lines or public access lines (telephone lines, ISDN lines, ADSL lines, optical lines, wireless lines, etc.) ) To the edge router (iMLBR) deployed at the end of the Internet. Mobile communication networks have used a unique protocol system based on TCP / IP so far, but with the introduction of smartphones and the like, IP networks using TCP / IP have become operational, NGN (Next パ ケ ッ ト Generation サ ー ビ ス Network) also provides a TCP / IP-based packet communication service. In this specification, these are also included as components of the Internet.

 パケット:エンドノード間の通信を行うためのレイヤ3(ネットワーク層)における転送単位(PDU: Protocol Data Unit)で、送信元論理アドレスと送信先論理アドレスや、パケットの種別、ユーザーデータを含む。RFC 791規格のIPパケットやITU-T勧告のX.25パケットなどを含む。 Packet: A transfer unit (PDU: “Protocol” Data ”Unit) in layer 3 (network layer) for performing communication between end nodes, including a transmission source logical address and a transmission destination logical address, a packet type, and user data. RFC packet 791 standard IP packets and ITU-T recommendation X. 25 packets are included.

 フレーム:デジタル伝送媒体を介して直接接続されている一つの物理ネットワーク内でのノード間の通信を行うためのレイヤ2(データリンク層)のPDUで、パケットを所定のフォーマットにカプセル化(MACヘッダやトレーラを付加したり、MACsecなどによるSecTAGの付加やペイロードの暗号化を含む)して送信する。受信側ではフレームをデカプセル(誤り検査、MACsecなどによるメッセージ認証、暗号化されたペイロードの復号を含む)してパケットを取り出す。MACフレームの他にPPP(Point to Point Protocol)フレーム、HDLC(High-Level Data Link Control)フレーム、ATM(Asynchronous Transfer Mode)セルなどを含む。 Frame: A PDU of layer 2 (data link layer) for performing communication between nodes in one physical network directly connected via a digital transmission medium, and encapsulating packets in a predetermined format (MAC header Or a trailer, or adding a SECTAG by MACsec or encrypting the payload). On the receiving side, the frame is decapsulated (including error check, message authentication by MACsec, etc., and decryption of the encrypted payload), and the packet is taken out. In addition to MAC frames, PPP (Point-to-Point-Protocol) frames, HDLC (High-Level-Data-Link-Control) frames, ATM (Asynchronous-Transfer-Mode) cells and the like are included.

 ノード:ユーザパケットを生成し送受信するホストと、ユーザパケットの生成は行わずパケットの中継転送を行うルータやレイヤ3スイッチを総称する用語として「ノード」を用いる。さらに、インターネットは階層的かつ回帰的な構造をなしているため、ノードの集合であるネットワークをノードとして扱うことができる。本明細書では、ネットワークも「ノード」の一つとして扱う。 Node: A “node” is used as a generic term for a host that generates and transmits / receives user packets, and a router or layer 3 switch that relays and forwards packets without generating user packets. Furthermore, since the Internet has a hierarchical and recursive structure, a network that is a set of nodes can be treated as a node. In this specification, a network is also treated as one of “nodes”.

 エンティティ:利用者、プロセス、クライアント、サーバー、メールアカウントや、NETBOIS名、ホスト名などのなどのベンダー特有のエンティティ、およびそれらから構成されるグループ。 Entity: Vendor-specific entities such as users, processes, clients, servers, mail accounts, NETBOIS names, host names, etc., and groups composed of them.

 ポート:物理ポート(所謂LANやルータのスイッチポート)や既存の物理接続を用いてソフトウェア的に構成される仮想ポート、外部とデータを入出力するためのインターフェースなどで、それぞれの装置ごとに識別情報によって識別され管理される。 Port: Physical port (so-called LAN or router switch port), virtual port configured by software using existing physical connection, interface for inputting / outputting data to / from the outside, etc. Identification information for each device Identified and managed by

 チャネル:MACsecのように共有鍵を用いて識別可能なセキュアチャネル(SCI:Secure Channel Identifier)などのチャネル識別情報や送信元MACアドレスをチャネル識別情報として用いてもよい。他に移動体通信などで用いられているTDMAやCDMA、OFDMAなどにおけるタイムスロットや拡散符号、リソースブロックを用いてノードやエンティティに割り当てられるチャネルやスロット、コネクション、セッション、フローラベルなどを含み、それぞれの装置もしくは複数の装置に跨って識別され管理される。 Channel: Channel identification information such as a secure channel (SCI: Secure Channel Identifier) that can be identified using a shared key, such as MACsec, or a source MAC address may be used as channel identification information. Others include channels, slots, connections, sessions, flow labels, etc. assigned to nodes and entities using time blocks, spreading codes, resource blocks in TDMA, CDMA, OFDMA, etc. used in mobile communications, etc. Are identified and managed across multiple devices.

 マルチレイヤ・バインディング・ルータ(MLBR): 本発明によるパケット転送装置の特徴を表す用語として用いるもので、さらに利用者側に配置されるアドレス詐称パケットや攻撃パケット、不正パケットの外部(インターネット)への流出を阻止するものをeMLBR(egress MLBR)、インターネットの端部に所謂エッジルータとして配置されアドレス詐称パケットや攻撃パケット、不正パケットのインターネットへの流入を阻止するものをiMLBR(ingress MLBR)と称する。さらに、eMLBRは家庭に配置されるものをeMLBR-R(Residence)、企業などの組織に配置されるものをeMLBR-O(Organization)、データセンターなどに配置されるものをeMLBR-C(Data Center)、無線LANスポットサービスなどに配置されるものをeMLBR-W(W-LAN Spot Service)、ワイヤレスセンサーネットワークやIoTに配置されるものをeMLBR-S(Sensor Network)、移動体通信網に配置されるものをeMLBR-M(Mobile Network)などと称し、様々な用途・形態に応じて適宜機能を取捨選択あるいは追加して適用することが可能である。
マルチレイヤ・バインディング・フィルタリング装置として、既設のルータの前段に配置しても同様の効果が得られる。
Multi-layer binding router (MLBR): A term used to describe the characteristics of the packet transfer apparatus according to the present invention. Further, address spoofing packets, attack packets, and illegal packets sent to the outside (Internet) are arranged on the user side. What prevents the outflow is called eMLBR (egress MLBR), and what is arranged as a so-called edge router at the end of the Internet and prevents inflow of address spoofing packets, attack packets, and illegal packets into the Internet is called iMLBR (ingress MLBR). Furthermore, eMLBR is installed at home, eMLBR-R (Residence), eMLBR-O (Organization) is deployed in organizations such as companies, eMLBR-C (Data Center) is deployed in data centers, etc. ), EMLBR-W (W-LAN Spot Service) for wireless LAN spot service, eMLBR-S (Sensor Network) for wireless sensor network and IoT, mobile communication network This is referred to as eMLBR-M (Mobile Network) or the like, and can be applied by appropriately selecting or adding functions according to various uses and forms.
A similar effect can be obtained even if the multi-layer binding filtering device is arranged in front of an existing router.

 マルチレイヤ・バインディング(MLB)テーブル: ポート又はチャネルの識別情報と、送信元物理アドレス(所謂MACアドレスやATMで用いるVPI(Virtual Path Identifier)/VCI(Virtual Channel Identifier)などのレイヤ2(データリンク層)アドレス)と、送信元論理アドレス(所謂IPv4アドレスやIPv6アドレスや通信事業者固有のレイヤ3(ネットワーク層)アドレスなど)との対応関係を記憶しておくテーブルで、所定の有効期限(例:4時間)を有する。サーバーの場合は、上記に加え送信元プロセス識別アドレス(所謂well-knownポート番号)もMLBテーブルに加えてもよい。 Multi-layer binding (MLB) table: Port 2 or channel identification information and source physical address (so-called MAC address or VPI (Virtual Path i Identifier) / VCI (Virtual Channel Identifier) used in ATM) (data link layer) ) Address) and a source logical address (so-called IPv4 address, IPv6 address, carrier layer specific layer 3 (network layer) address, etc.), and a predetermined expiration date (for example: 4 hours). In the case of a server, in addition to the above, a source process identification address (so-called well-known port number) may be added to the MLB table.

 廃棄テーブル:主にサイバー攻撃を受けている被害者ノードReNから、もしくはサイバー攻撃を受けていると判断したノードReNもしくはサイバー攻撃パケットと思われるパケットを検出したノードReNから送られてきたパケットを分析して攻撃又は被害を認定するノードDeNから、もしくは廃棄要請情報をインターネット全体に配信するノードShNからの廃棄要請情報をもとに生成・更新されるテーブルで、送信先/送信元物理アドレスや送信先/送信元論理アドレス、送信先/送信元プロセス識別アドレスの一部又はすべての対、匿名アドレスとそれらの有効期間を管理するテーブル。 Discard table: Analyzes packets sent from the victim node ReN that is mainly subjected to a cyber attack, or from the node ReN that has detected a packet that seems to be a cyber attack or a packet that seems to be a cyber attack packet. This is a table generated and updated based on the discard request information from the node DeN that recognizes the attack or damage or from the node ShN that distributes the discard request information to the entire Internet. A table for managing a destination / source logical address, a part or all of a destination / source process identification address, an anonymous address, and a validity period thereof.

 IEEE 802.1X:有線LANや無線LANへの接続時に使用する認証規格で、認証されたノードやエンティティ以外がネットワークに接続できないようにする規格。本発明では、IEEE 802.1Xによる認証をLANスイッチ(データリンク層)に限定するのではなく、レイヤ3スイッチやルータなどのパケット転送装置(ネットワーク層)へ適用する。IEEE802.1Xの認証方式には、本実施形態の説明の中で用いるTLS(Transport Layer Security)の他に、MD5(Message Digest Algorithm 5)やLEAP(Lightweight Extensible Authentication Protocol)、EAP-FAST(EAP-Flexible Authentication via Secure Tunneling)、TTLS(Tunneled Transport Layer Security)、PEAP(Protected EAP)があり、認証方法や認証レベルは異なるものの、これらを適用してもよい。 IEEE 802.1X: An authentication standard used when connecting to a wired LAN or wireless LAN, which prevents only authorized nodes and entities from connecting to the network. In the present invention, authentication according to IEEE 802.1X is not limited to a LAN switch (data link layer), but is applied to a packet transfer device (network layer) such as a layer 3 switch or a router. In addition to the TLS (Transport Layer Security) used in the description of this embodiment, the IEEE 802.1X authentication method includes MD5 (Message Digest Algorithm 5) and LEAP (Lightweight Extended AuthenticAP). There are Flexible Authentication via Secure Tunneling, TLS (Tunneled Transport Layer Security), and PEAP (Protected EAP), but these may be applied although the authentication method and authentication level are different.

 サプリカント:ネットワーク上のノードやエンティティの認証において、認証を要求する側、認証される側、クライアント側の機器やソフトウェア、エンティティ。なお、Windows(Windowsは登録商標) 2000(SP4)、Windows XP以降のWindows、及びMac OS XはIEEE802.1X対応のサプリカント機能を標準で内蔵している。 Supplicant: A device, software, or entity on the authentication requesting side, authenticated side, or client side in the authentication of nodes or entities on the network. Note that Windows (Windows is a registered trademark) 2000 (SP4), Windows XP and later Windows, and Mac OS X have a built-in supplicant function compatible with IEEE 802.1X.

 オーセンティケータ:サプリカントからの要求を受けて、認証サーバーとのやり取りを仲介し、サプリカントの接続可否や通信サービス品質のレベルを決めるプロキシの役割を担う。 Authenticator: Takes the role of a proxy that receives requests from supplicants, mediates exchanges with authentication servers, and determines supplicant connection availability and communication service quality levels.

 認証サーバー:クライアントIDとパスワードや、デジタル証明書を用いてノードもしくはエンティティの真正性を(相互に)検証し、クライアントからのアクセスを許可するかどうかをオーセンティケータに通知する。RADIUS(Remote Authentication Dial In User Service)、LDAP(Lightweight Directory Access Protocol)、移動体通信で用いられるHLR(Home Location Register )やMicrosoftのActive Directoryなどのベンダー特有の認証機構を含む Authentication server: Verifies the authenticity of nodes or entities (mutually) using a client ID and password, or a digital certificate, and notifies the authenticator whether to allow access from the client. RADIUS (Remote Authentication Register) such as RADIUS (Remote Authentication Dial In User Service), LDAP (Lightweight Directory Access Protocol), HLR (Home Location Register Register) including Microsoft Authenticator for mobile communications.

 通信サービス品質(QoS(Quality of Service)):秘匿通信、帯域制限、帯域保証、遅延・ジッタ保証、検閲、送信先IPアドレスの制限、通信可能プロトコルの制限、接続拒否、通信内容記録など。 Communication service quality (QoS (Quality of Service)): confidential communication, bandwidth limitation, bandwidth guarantee, delay / jitter guarantee, censorship, destination IP address restriction, communication possible protocol restriction, connection rejection, communication content recording, etc.

 OpenFlow:ネットワーク構成や機能、性能などをソフトウェアで動的に設定・変更できるネットワークやコンセプトをSDN(Software Defined Network)と呼び、OpenFlowはクラウドコンピューティングにおける負荷分散などを意図に開発が進められているSDNを実現する技術規格の一つで、経路制御を司る「OpenFlowコントローラ」と、データ転送機能を司る「OpenFlowスイッチ」、そしてコントローラとスイッチがコミュニケーションをするための「OpenFlowプロトコル」からなる。 OpenFlow: A network and concept that can dynamically set and change the network configuration, functions, and performance by software is called SDN (Software Defined Network), and OpenFlow is being developed with the intention of load balancing in cloud computing. This is one of the technical standards for realizing SDN, and consists of an “OpenFlow controller” that controls the path control, an “OpenFlow switch” that controls the data transfer function, and an “OpenFlow protocol” for communication between the controller and the switch.

 ARPリフレクション(ARPF):IEEE802.1Xに対応していないデジタルテレビなどの所謂スマート家電や既設の家庭用ルータ、IoTなど、IEEE802.1Xに非対応ノードもしくはエンティティの論理アドレスおよび物理アドレスの真正性を簡易的に検証し、アドレス詐称パケットを阻止するための本発明において定義する機能である。具体的には、ノードは他ネットワークとの通信を契機にデフォルトゲートウェイ(DGW)のポート又はチャネルを介してアドレス解決(ARP(Address Resolution Protocol))要求パケットを送信するが、ノードがアドレス詐称していなければ、DGWからのARP要求に対してARP応答を返すはずであることから、DGWとして機能するeMLBR又はiMLBRが、ARP要求を送ってきたノードに対して同じポート又はチャネルを介してARP要求を送信することをARPリフレクションと呼ぶ。 ARP Reflection (ARPF): The authenticity of logical and physical addresses of nodes or entities that do not support IEEE 802.1X, such as so-called smart home appliances such as digital televisions that do not support IEEE 802.1X, existing home routers, IoT, etc. This is a function defined in the present invention for simply verifying and blocking address spoofing packets. Specifically, a node transmits an address resolution (ARP (Address Resolution) Protocol) request packet via a port or channel of a default gateway (DGW) triggered by communication with another network, but the node is spoofing the address. Otherwise, since an ARP response should be returned in response to the ARP request from the DGW, the eMLBR or iMLBR functioning as the DGW sends an ARP request to the node that sent the ARP request through the same port or channel. The transmission is called ARP reflection.

 本実施形態に係るイーグレス・マルチレイヤ・バインディング・パケット転送装置eMLBRの構成例を図2に示し、イングレス・マルチレイヤ・バインディング・パケット転送装置iMLBRの構成例を図3に示す。なお、本実施形態においてeMLBR12及びiMLBR11は、パケット転送装置として機能する。 FIG. 2 shows a configuration example of the egress multilayer binding packet transfer apparatus eMLBR according to the present embodiment, and FIG. 3 shows a configuration example of the ingress multilayer binding packet transfer apparatus iMLBR. In the present embodiment, the eMLBR 12 and iMLBR 11 function as a packet transfer device.

 図2は、利用者側に配備されるeMLBR12に必要なほぼすべての機能を実装した例を示す図である。eMLBR-RやeMLBR-O、eMLBR-C、eMLBR-W、eMLBR-S、eMLBR-Mなどは、その用途によって取捨選択して実装される。また、本実施形態に係るパケット転送装置は、DHCPやW-LAN、レイヤ2/VLANなど各機能を有した一体型構造でもよい。この場合、容易なネットワーク管理を実現するパケット転送装置を提供することができる。一方で、ネットワーク管理は煩雑になるが、DHCPやW-LAN、レイヤ2/VLANなどは、別の装置として配備してもよい。さらに、ルーティング機能は既設のルータを使用するケースでは、ルーティング機能に係る機能部を実装しないもしくは当該機能部を停止したイーグレス・マルチレイヤ・バインディング・フィルタリング装置として既設のルータの前段に配置してもよい。具体的には、パケット転送装置として機能するeMLBR12の転送部14では、フレーム/パケットを受信したポート又はチャネルをキーにMLBテーブルを検索し、フレーム/パケットの送信元物理アドレスと送信元論理アドレスとの対がMLBテーブルに存在するときは、パケットの送信先論理アドレスに向けて転送するルータへ転送し、MLBテーブルに存在しないときはパケットを廃棄してもよい。 FIG. 2 is a diagram showing an example in which almost all functions necessary for the eMLBR 12 deployed on the user side are implemented. eMLBR-R, eMLBR-O, eMLBR-C, eMLBR-W, eMLBR-S, eMLBR-M, etc. are selected and implemented according to their use. Further, the packet transfer apparatus according to the present embodiment may have an integrated structure having functions such as DHCP, W-LAN, and Layer 2 / VLAN. In this case, a packet transfer apparatus that realizes easy network management can be provided. On the other hand, although network management becomes complicated, DHCP, W-LAN, Layer 2 / VLAN, etc. may be deployed as separate devices. Furthermore, in the case where the existing router is used for the routing function, the function unit related to the routing function is not implemented or the function unit is stopped as an egress multi-layer binding filtering device that is placed in front of the existing router. Good. Specifically, the transfer unit 14 of the eMLBR 12 functioning as a packet transfer device searches the MLB table using the port or channel that received the frame / packet as a key, and sends the frame / packet source physical address and source logical address to each other. When the pair exists in the MLB table, the packet may be transferred to the router that transfers the packet toward the destination logical address of the packet, and when not present in the MLB table, the packet may be discarded.

 eMLBR12は、制御部15を備え、制御部15はさらに受信したポート又はチャネルの識別情報とともに転送部14から伝達されてきたDHCP要求やアドレス解決要求、認証要求などのパケットやフレームを受け付ける処理要求受付部、デジタルテレビやIoTなどのIEEE802.1X非対応ノードに対するARPリフレクションを用いた認証や、iMLBR11との間でデジタル証明書の交換などを行って相互に認証し合う認証部、オーセンティケータとして認証サーバーへの仲介を行う認証仲介部、前記認証部及び認証サーバーからの認証結果を取得する認証結果取得部、ポート又はチャネルの識別情報と送信元物理アドレスと送信元論理アドレスなどとの対応関係をMLBテーブルとして有効期間を附して生成し更新するMLBテーブル生成・更新部、通信を許可したノード又はエンティティの実在確認を行い上述のMLBテーブルの有効期間を更新する実在確認部、MACsecなどによる暗号鍵の生成・交換を行う暗号鍵生成・交換部、他のノードからの廃棄要請に基づいて有効期間を附して生成・更新する廃棄テーブル生成・更新部、認証結果(認証レベル)に基づいて通信サービス品質を決定するQoS決定部、DHCP要求を行ってきたノードに対してIPアドレスを割り当てたり、ネットマスクやDGWのIPアドレスなど、ネットワークの接続に必要な情報を提供するDHCP部、eMLBR12配下で用いられる論理アドレスやプロセス識別アドレスを外部ネットワークで用いる論理アドレスやプロセス識別アドレスに変換するためのNATテーブルを生成するNATテーブル生成部、これらの各機能部での処理結果や認証部で生成するARPリフレクション用のARP要求パケットや実在確認部で生成する実在確認用のパケットなどを転送部14に伝達するための処理結果伝達部、その他図には示していないが転送部15の例えばレイヤ2/VLANスイッチ部などの制御に必要な機能や、IPsecのトンネルモード対応機能、eMLBR12に不正侵入され制御プログラムやテーブルなどが改ざんされていなすかを検査するための完全性検査機能、実装後に発見されたセキュリティホールや新しい機能を追加するためのバージョンアップ機能などを有してもよい。 The eMLBR 12 includes a control unit 15. The control unit 15 further receives a processing request for receiving a packet or a frame such as a DHCP request, an address resolution request, or an authentication request transmitted from the transfer unit 14 together with the received port or channel identification information. Authentication using ARP reflection for non-IEEE802.1X compatible nodes such as digital TV and IoT, and authentication unit that authenticates each other by exchanging digital certificates with iMLBR11, authenticating as an authenticator An authentication mediation unit that mediates to a server, an authentication result acquisition unit that acquires an authentication result from the authentication unit and the authentication server, a correspondence relationship between port or channel identification information, a source physical address, a source logical address, and the like Generate and update the validity period as an MLB table LB table generation / updating unit, existence checking unit that checks the existence of a node or entity that has permitted communication and updates the validity period of the above-mentioned MLB table, encryption key generation / exchange unit that generates and exchanges an encryption key using MACsec, etc. A discard table generating / updating unit that generates / updates a validity period based on a discard request from another node, a QoS determining unit that determines a communication service quality based on an authentication result (authentication level), and a DHCP request. Assign an IP address to the visited node, or provide a logical address or process identification address used under the eMLBR12, a DHCP unit that provides information necessary for network connection, such as a netmask or DGW IP address, on the external network NAT technology for conversion to a logical address or process identification address to be used A NAT table generation unit that generates a bull, a processing result in each of these functional units, an ARP request packet for ARP reflection generated in the authentication unit, a packet for actuality confirmation generated in the actuality confirmation unit, and the like are transmitted to the transfer unit 14 Processing result transmission unit for performing the above, other functions not shown in the figure but necessary for control of the transfer unit 15 such as the layer 2 / VLAN switch unit, the IPsec tunnel mode support function, and the control program that is illegally intruded into the eMLBR 12 And an integrity check function for checking whether or not a table or the like has been tampered with, a security hole discovered after the implementation, or a version upgrade function for adding a new function.

 また、eMLBR12は、転送部14をさらに備え、転送部14はさらに有線系(Ethernet(Ethernetは登録商標)や光信号など)/無線系(無線LAN/移動体通信など)通信に必要な複数の物理ポートを提供するポート部、又は及び複数のチャネルを提供するチャネル部、物理信号受信・復号部、物理信号生成・送信部、暗号化/復号部、パケットもしくはフレームを一時的にバッファリングする受信バッファ部及び送信バッファ部、受信したフレームからパケットを取り出すフレームデカプセル化部、その逆を行うフレームカプセル化部、受信したフレーム及びパケットの送信元及び送信先物理アドレス、送信元及び送信先論理アドレス、送信元及び送信先プロセス識別アドレスを抽出するレイヤ2、3、4アドレス抽出部、ポート又はチャネルに対して指定された通信サービス品質を提供するQoS提供部、レイヤ2スイッチ及びVLAN機能を提供するレイヤ2/VLANスイッチ部、MLBテーブルを格納するMLBテーブル部、廃棄テーブルを格納する廃棄テーブル部、MLBテーブルや廃棄テーブルを検索してパケットを廃棄するパケット廃棄部、ルーティングテーブルを参照してパケットの転送処理を行うレイヤ3スイッチ部、DHCP要求やアドレス解決要求、認証要求などのフレームもしくはパケットを制御部15の前記受付部へ伝達し処理を要求する処理要求伝達部、制御部15から伝達されてきた処理結果を該当する各機能部に反映もしくは中継する処理結果受付部などを有してもよい。 The eMLBR 12 further includes a transfer unit 14, which further includes a plurality of communication systems required for wired (Ethernet (Ethernet is a registered trademark), optical signal, etc.) / Wireless (such as wireless LAN / mobile communication) communication. Port unit that provides physical ports, or channel unit that provides multiple channels, physical signal reception / decryption unit, physical signal generation / transmission unit, encryption / decryption unit, reception that temporarily buffers packets or frames Buffer unit and transmission buffer unit, frame decapsulation unit that extracts packets from received frames, frame encapsulation unit that performs the reverse, source and destination physical addresses of received frames and packets, source and destination logical addresses , Layer 2, 3, 4 address to extract source and destination process identification addresses Extraction unit, QoS providing unit providing communication service quality specified for a port or channel, Layer 2 switch and layer 2 / VLAN switch unit providing VLAN function, MLB table unit storing MLB table, discard table Discarding table section to store, packet discarding section that searches the MLB table and discard table to discard packets, layer 3 switch section that performs packet forwarding processing by referring to the routing table, DHCP request, address resolution request, authentication request, etc. A processing request transmission unit that transmits a frame or packet to the reception unit of the control unit 15 to request processing, a processing result reception unit that reflects or relays the processing result transmitted from the control unit 15 to the corresponding functional units, etc. You may have.

 図3は、インターネット10側の端部に配備されるiMLBR11に必要なほぼすべての機能を実装した例を示す図である。各機能部の機能は図2のeMLBR12とほぼ同じであるので、詳しい説明は省略するが、NAT機能やレイヤ2/VLAN機能は原則不要である。また、本実施形態に係るパケット転送装置は、DHCPなど各機能を有した一体型構造でもよい。この場合、容易なネットワーク管理を実現するパケット転送装置を提供することができる。一方で、ネットワーク管理は煩雑になるが、DHCPなどは、別の装置として配備してもよい。さらに、ルーティング機能は既設のルータを使用するケースでは、ルーティング機能に係る機能部を実装しないもしくは当該機能部を停止したイングレス・マルチレイヤ・バインディング・フィルタリング装置として既設のルータの前段に配置してもよい。具体的には、パケット転送装置として機能するiMLBR11の転送部14では、フレーム/パケットを受信したポート又はチャネルをキーにMLBテーブルを検索し、フレーム/パケットの送信元物理アドレスと送信元論理アドレスとの対がバンディングテーブルに存在するときは、パケットの送信先論理アドレスに向けて転送するルータへ転送し、MLBテーブルに存在しないときはパケットを廃棄してもよい。 FIG. 3 is a diagram showing an example in which almost all functions necessary for the iMLBR 11 deployed at the end of the Internet 10 are installed. Since the function of each functional unit is almost the same as that of the eMLBR 12 of FIG. 2, detailed description is omitted, but the NAT function and the layer 2 / VLAN function are not necessary in principle. Further, the packet transfer apparatus according to the present embodiment may have an integrated structure having various functions such as DHCP. In this case, a packet transfer apparatus that realizes easy network management can be provided. On the other hand, although network management becomes complicated, DHCP etc. may be deployed as another device. Furthermore, in the case where the existing router is used for the routing function, the function unit related to the routing function is not implemented or the function unit is stopped as an ingress multi-layer binding filtering device that is placed in front of the existing router. Good. Specifically, the transfer unit 14 of the iMLBR 11 functioning as a packet transfer device searches the MLB table using the port or channel that received the frame / packet as a key, and sends the frame / packet source physical address and source logical address to each other. When the pair exists in the banding table, the packet may be transferred to the router that transfers the packet toward the destination logical address of the packet, and when the pair does not exist in the MLB table, the packet may be discarded.

 iMLBR11は、制御部15を備え、IEEE802.1X非対応ノードに対する認証や、eMLBR12とiMLBR11との間でデジタル証明書の交換などを行って相互認証を行う。また、iMLBR11は、転送部14を備え、物理信号受信・復号部/生成・送信部は、有線系(Ethernet(Ethernetは登録商標)や光信号など)/無線系(無線LAN/移動体通信など)に必要な機能を有する。 The iMLBR 11 includes a control unit 15 and performs mutual authentication by performing authentication for a node that does not support IEEE 802.1X or exchanging digital certificates between the eMLBR 12 and the iMLBR 11. In addition, the iMLBR 11 includes a transfer unit 14, and the physical signal reception / decoding unit / generation / transmission unit is wired (Ethernet (Ethernet is a registered trademark), optical signal, etc.) / Wireless (wireless LAN / mobile communication, etc.) ) Has the necessary functions.

(実施形態1)
 本実施形態では、ARPリフレクション(ARPF)によるデジタルテレビや、ファックスやスキャナー、プリンタなど複数の機能を搭載した複合機、さらにIoTなどのIEEE802.X非対応ホストのeMLBR12による認証及び上りパケットの転送シーケンスの動作例を説明する。本実施形態に係るネットワークの構成を図4に示す。図4に示すネットワーク構成は、iMLBR11を含んだインターネット10、IEEE802.1X非対応のノード及びeMLBR12で構成している。
(Embodiment 1)
In the present embodiment, a digital television by ARP reflection (ARPF), a multi-function machine equipped with a plurality of functions such as a fax, a scanner, and a printer, and IEEE802. An operation example of authentication and uplink packet transfer sequence by the eMLBR 12 of the X non-compliant host will be described. FIG. 4 shows the configuration of the network according to this embodiment. The network configuration shown in FIG. 4 includes the Internet 10 including the iMLBR 11, an IEEE 802.1X-incompatible node, and the eMLBR 12.

 図5におけるシーケンス図は、ARPリフレクションを用いたデジタルテレビなどのIEEE802.1X非対応ノードとeMLBR12間の認証及び上りパケットの転送シーケンスを示した図である。図5では、ノードから外部ネットワーク(インターネット10)に向けて送信されるユーザMACフレーム/IPパケットに係わるものについて記述している。本実施形態におけるDHCPプロトコルのやり取りなどは、簡略化して記述している(例えば、DHCP Discover⇒DHCP Offer⇒DHCP Request⇒DHCP ACKと4回やり取りする)。また、図及び説明が煩雑になるのを避けるため、各ステップに係わる転送部14及び制御部15の機能部の記述も省略している。 The sequence diagram in FIG. 5 is a diagram showing an authentication and uplink packet transfer sequence between an eMLBR 12 and an IEEE 802.1X non-compliant node such as a digital television using ARP reflection. FIG. 5 describes a user MAC frame / IP packet that is transmitted from a node toward an external network (Internet 10). The exchange of the DHCP protocol and the like in the present embodiment is described in a simplified manner (for example, four exchanges such as DHCP Discover → DHCP Offer → DHCP Request → DHCP ACK). In addition, in order to avoid complicated illustrations and explanations, descriptions of the functional units of the transfer unit 14 and the control unit 15 related to each step are also omitted.

 以下に、図5のシーケンス図の動作を説明する。IEEE802.1X非対応のノードが他ノードへ通信を開始する場合、DHCP要求パケットをブロードキャスト送信する(ステップS111)。DHCP要求を受信したeMLBR12は、受信したポートの識別情報と前記ノードのMACアドレスとプライベートIPアドレスとして割り当てるIPアドレスの対応関係を記憶しておく制御部15のMLBテーブルAに仮登録する(ステップS112)。ノードは、eMLBR12のネットマスクやDGWのIPアドレスなど、ネットワークへの接続に必要な情報とともにIPアドレスを割り当てる旨のDHCP応答パケットを受信する(ステップS113)。DHCP応答を受け取ったノードは、DGWのアドレスの解決要求する旨のARP要求パケットをブロードキャスト送信する(ステップS114)。 The operation of the sequence diagram of FIG. 5 will be described below. When a node that does not support IEEE 802.1X starts communication with another node, a DHCP request packet is broadcasted (step S111). The eMLBR 12 that has received the DHCP request temporarily registers in the MLB table A of the control unit 15 that stores the correspondence relationship between the received port identification information, the MAC address of the node, and the IP address to be assigned as the private IP address (step S112). ). The node receives a DHCP response packet for assigning an IP address together with information necessary for connection to the network, such as a netmask of the eMLBR 12 and an IP address of the DGW (step S113). The node that has received the DHCP response broadcasts an ARP request packet for requesting resolution of the DGW address (step S114).

 ARP要求パケットを受信したeMLBR12は、ノードがアドレス詐称していなければ、eMLBR12からのARP要求に対してARP応答を返すはずであることから、ARP要求パケット(ARPF要求)をノードにブロードキャスト送信し、ノードからのARP応答パケットを受け取る(ステップS115及びステップS116)。eMLBR12において、ARP応答パケットを受信したポートをキーに制御部15のMLBテーブルAを検索し、ARP応答の送信元IPアドレスと送信元MACアドレスの対が存在しない場合、MLBテーブルAから仮登録した前記対応関係を削除する(ステップS117及びステップS118)。一方、MLBテーブルAに存在する場合、QoS(後述するように、例えば上り帯域を10kbps)を決定し、さらに有効期間(例えば4時間)を設定の上、転送部14のMLBテーブルAに正登録する(ステップS119)。 The eMLBR 12 that has received the ARP request packet should return an ARP response to the ARP request from the eMLBR 12 if the node has not spoofed the address, so broadcast the ARP request packet (ARPF request) to the node, An ARP response packet from the node is received (steps S115 and S116). The eMLBR 12 searches the MLB table A of the control unit 15 using the port that received the ARP response packet as a key, and temporarily registers from the MLB table A if there is no source IP address and source MAC address pair in the ARP response The correspondence relationship is deleted (steps S117 and S118). On the other hand, when it exists in the MLB table A, QoS (for example, as described later, for example, the uplink bandwidth is 10 kbps) is determined, and after valid period (for example, 4 hours) is set, it is registered in the MLB table A of the transfer unit 14 for regular registration. (Step S119).

 次に、eMLBR12がノードからの最初のARP要求(DGWのアドレス解決)(ステップS114)に対する応答として、ステップS120によるARP応答を返した以降、ノードが送信したユーザMACフレーム/IPパケットをeMLBR12が受け取ると(ステップS121)、eMLBR12は、受け取ったユーザMACフレーム/IPパケットの送信元IPアドレス及び送信元MACアドレスが転送部14のMLBテーブルAに存在するか調べ(ステップS122)、存在しない場合、ノードが送信したパケットを破棄する(ステップS123)。 Next, the eMLBR 12 receives the user MAC frame / IP packet transmitted by the node after the eMLBR 12 returns the ARP response in step S120 as a response to the first ARP request (DGW address resolution) from the node (step S114). (Step S121), the eMLBR 12 checks whether the source IP address and the source MAC address of the received user MAC frame / IP packet exist in the MLB table A of the transfer unit 14 (Step S122). Discards the transmitted packet (step S123).

 一方、転送部14のMLBテーブルAに存在する場合、ステップS119で決定したQoSで、かつNATテーブルを参照してプライベートIPアドレスからグローバルIPアドレスにアドレス変換して、次ホップノードであるiMLBR11にMACフレームにカプセル化して転送し、iMLBR11がMACフレーム/IPパケットを受け取る(ステップS124)。なお、ステップS120によるARP応答は、ステップS115のARP要求(ARPF要求)で既にノードがeMLBR12のMACアドレスを知っているので、行わなくてもよい。 On the other hand, if it exists in the MLB table A of the transfer unit 14, it converts the address from the private IP address to the global IP address by referring to the NAT table with the QoS determined in step S 119, and sends the MAC to the next hop node iMLBR 11. The iMLBR 11 receives the MAC frame / IP packet after encapsulating it in a frame (step S124). Note that the ARP response in step S120 need not be performed because the node already knows the MAC address of eMLBR 12 in the ARP request (ARPF request) in step S115.

 また、本実施形態におけるeMLBR12が備える制御部15は、転送部14と連携してノードもしくはエンティティのポートもしくはチャネルでの実在確認を適宜(必ずしも定期的である必要はない)行い(ステップS128及びステップS129)、ステップS130で確認結果に応じてMLBテーブルAを更新(有効期間を延長)してもよい。 In addition, the control unit 15 included in the eMLBR 12 according to the present embodiment performs real-time confirmation on a node or entity port or channel in cooperation with the transfer unit 14 (not necessarily periodically) (step S128 and step S128). In step S129, the MLB table A may be updated (the validity period is extended) according to the confirmation result in step S130.

 iMLBR11(ISPエッジルータ)は、ステップS124で転送されてきたパケットを受信したポートの識別情報をキーに、パケットのIPアドレス(eMLBR12に割り当てられたグローバルIPアドレス)と(eMLBR12の)MACアドレスとの対が転送部14のMLBテーブルBに存在するか調べ(ステップS125)、MLBテーブルBに存在しない場合、パケットを廃棄する(ステップS126)。一方、転送部14のMLBテーブルBに存在する場合、予めeMLBR12の認証の際に決定されたQoS(eMLBR12がiMLBR11によってIEEE802.1Xノードとして認証されていれば、帯域制限されずに)で次ホップノードに転送する(ステップS127)。 The iMLBR 11 (ISP edge router) uses the identification information of the port that received the packet transferred in step S124 as a key, and the packet IP address (global IP address assigned to the eMLBR 12) and the MAC address (of the eMLBR 12). Whether the pair exists in the MLB table B of the transfer unit 14 is checked (step S125). If the pair does not exist in the MLB table B, the packet is discarded (step S126). On the other hand, if it exists in the MLB table B of the transfer unit 14, the next hop at the QoS determined in advance when the eMLBR 12 is authenticated (if the eMLBR 12 is authenticated as an IEEE 802.1X node by the iMLBR 11) Transfer to the node (step S127).

 本実施形態によるARPリフレクションで認証した場合は、IDやパスワード、あるいはデジタル証明書を用いるIEEE802.1X認証よりセキュアな端末とは言い切れない、すなわち認証レベルは低いため、QoSを例えばインターネット10へ向かう上り方向の帯域を10kbps程度に制限しても、下り方向は帯域制限しなければ、テレビの利用者はリモコン操作によるテレビ局とのデータ通信や画面の遷移、その他のテレビを介したインターネット接続サービスに、違和感を持つことはない。 When authentication is performed by ARP reflection according to the present embodiment, it cannot be said that the terminal is more secure than IEEE802.1X authentication using an ID, password, or digital certificate. That is, since the authentication level is low, QoS is directed to the Internet 10, for example. Even if the upstream bandwidth is limited to about 10 kbps, if the downstream bandwidth is not limited, TV users can use the remote control for data communication with TV stations, screen transitions, and other Internet connection services via television. , Never feel uncomfortable.

 したがって、OSのバージョンアップやファイアウォール機能を持たない無防備でサイバー攻撃の温床になりかねないスマート家電やIoTなどが、たとえボットウィルスに感染もしくは製造工程でマルウェアが埋め込まれ、送信元IPアドレスを攻撃ターゲットのIPアドレスに詐称して大量のパケットを送信するDRDoS攻撃、あるいは送信先IPアドレスを攻撃ターゲットのIPアドレスに設定し、送信元IPアドレスをランダムに変えながら大量のパケットを送信するDDoS攻撃などに加担させられても、アドレス詐称パケットのインターネット10への流出を阻止でき、たまたま端末の送信元IPアドレスに一致した攻撃パケットだけがインターネット10に流入するため、被害を最小限に抑えることができる。さらに、後述する実施形態5によって、攻撃パケットが長時間にわたってインターネット10に流出/流入することを阻止することもできる。 Therefore, smart home appliances and IoT that could become a hotbed of cyber attacks without OS version upgrades or firewall functions could become a hotbed for cyber attacks, even if they were infected with bot viruses or malware was embedded in the manufacturing process, and the source IP address was attack target For DRDoS attacks that send a large number of packets by spoofing the IP address, or for a DDoS attack that sets a destination IP address as the attack target IP address and transmits a large number of packets while randomly changing the source IP address Even if it is complied with, it is possible to prevent the address spoofed packet from flowing out to the Internet 10, and only attack packets that coincide with the transmission source IP address of the terminal happen to flow into the Internet 10, so that damage can be minimized. Furthermore, Embodiment 5 to be described later can prevent an attack packet from flowing out / inflowing into the Internet 10 for a long time.

 なお、本実施形態では、ノードからのARP要求に対してARPリフレクションを行うものとしているが、例えばノードがeMLBR12のIPアドレスとMACアドレスをキャッシュし、ICMPパケットを用いてeMLBR12へエコー要求(疎通確認)し、このパケット/フレームに対応するMLBテーブルをeMLBR12が保持していないとき、同ノードに対してエコー要求(エコーリフレクション)もしくはARP要求を送り、その応答パケット/フレームとノードからのエコー要求パケット/フレームの送信元IPアドレスと送信元MACアドレスを照合し、一致していれば、制御部15及び転送部14のMLBテーブルに登録するなど、色々なバリエーションでのIPアドレスおよびMACアドレスの真正性の検証による認証を用いてもよい。 In this embodiment, ARP reflection is performed in response to an ARP request from the node. For example, the node caches the IP address and MAC address of the eMLBR 12, and uses an ICMP packet to send an echo request (communication confirmation) to the eMLBR 12. When the MLB table corresponding to this packet / frame is not held by the eMLBR 12, an echo request (echo reflection) or an ARP request is sent to the node, and the response packet / frame and the echo request packet from the node are sent. / The authenticity of the IP address and MAC address in various variations, such as checking the source IP address of the frame and the source MAC address and registering them in the MLB table of the control unit 15 and the transfer unit 14 if they match By verification It may be used testimony.

 ここで、OpenFlowを用いたARPリフレクションの通信動作の実験例を図6に示す。ホスト♯AはeMLBR12を介してホスト♯Bと通信しようとしている。eMLBR12は、OpenFlowを実行し、本実施形態に係るパケット転送装置として機能する。eMLBR12は制御部15であるOpenFlowコントローラ15と、転送部14であるOpenFlowスイッチ14との二つから構成される。OpenFlowスイッチ14はMLBテーブルを備えている。また、図6では、ホスト#AがDGWのアドレス解決のために送信するARP要求(ステップS211)はOpenFlowコントローラ15に送られ、同コントローラにてホスト#Aに対してARP要求(ARPF)が生成され、OpenFlowスイッチを介してホスト#Aに送られる(ステップS212)。これは、前述したように相手がアドレス詐称している場合ARP応答を返さないだろうという仮定に基づくもので、相手がアドレス詐称していない場合ARP応答を返し(ステップS213)、OpenFlowコントローラにてステップS211で送ってきたARP要求とステップS213で返してきたARP応答のIPアドレスMACアドレスを照合することによってその真正性を検証し、一致していればOpenFlowコントローラ15のMLBテーブルに仮登録し、Flow modにてOpenFlowスイッチ14のMLBテーブルに正登録する。 Here, FIG. 6 shows an experimental example of the communication operation of ARP reflection using OpenFlow. Host #A is trying to communicate with host #B via eMLBR12. The eMLBR 12 executes OpenFlow and functions as a packet transfer apparatus according to the present embodiment. The eMLBR 12 is composed of an OpenFlow controller 15 that is a control unit 15 and an OpenFlow switch 14 that is a transfer unit 14. The OpenFlow switch 14 includes an MLB table. In FIG. 6, the ARP request (step S211) transmitted from the host #A for address resolution of the DGW is sent to the OpenFlow controller 15, and the controller generates an ARP request (ARPF) for the host #A. And sent to the host #A via the OpenFlow switch (step S212). This is based on the assumption that the ARP response will not be returned if the other party has spoofed the address as described above. If the other party has not spoofed the address, the ARP response is returned (step S213), and the OpenFlow controller The authenticity is verified by collating the ARP request sent in step S211 with the IP address MAC address of the ARP response returned in step S213, and if they match, they are provisionally registered in the MLB table of the OpenFlow controller 15, The data is positively registered in the MLB table of the OpenFlow switch 14 with Flow mod.

 OpenFlowコントローラ15の開発フレームワークとしてTrema-edgeをパソコン(OS: Ubuntu 12.04 (X64)、CPU: Celeron 440@2.00 GHz、メモリ:2GB)に実装し、OpenFlowスイッチ14にはOpen vSwitch 2.0.0を同じ仕様の別のパソコンに実装し、レイヤ3スイッチとして動作させた。このプログラムでは、スイッチの各ポートが受け入れるIPアドレスとMACアドレスの対応関係をOpenFlowコントローラ15のMLBテーブルに仮登録し、OpenFlowスイッチ14のMLBテーブルに正登録する。 As a development framework for the OpenFlow controller 15, Trema-edge is mounted on a personal computer (OS: Ubuntu 12.04 (X64), CPU: Celeron 440@2.00 GHz, memory: 2GB), and the OpenFlow switch 14 has Open vSwitch 2 0.0 was mounted on another personal computer with the same specifications and operated as a layer 3 switch. In this program, the correspondence relationship between the IP address and the MAC address accepted by each port of the switch is provisionally registered in the MLB table of the OpenFlow controller 15 and positively registered in the MLB table of the OpenFlow switch 14.

 次に、図6、図7及び図8を用いて、本実施形態の動作を説明する。フローテーブルの構成を図7、さらにフローテーブルの遷移を図8に示す。スイッチとして機能するOpenFlowスイッチ14に到着したARP要求やARPFに係わるパケットは、すべてOpenFlowコントローラ15へPacket-In(図7及び図8のテーブル:0)で処理方法を問い合わせるものとし、他のパケットは複数のフローテーブル遷移(パイプライン処理)を通過したもののみがルーティング処理されるか、Packet-Inとしてコントローラへの問い合わせが発生する(同テーブル:180)。 Next, the operation of this embodiment will be described with reference to FIGS. FIG. 7 shows the configuration of the flow table, and FIG. 8 shows the transition of the flow table. All ARP requests and packets related to ARPF that have arrived at the OpenFlow switch 14 functioning as a switch are inquired to the OpenFlow controller 15 by Packet-In (table: 0 in FIGS. 7 and 8), and other packets are inquired. Only those that have passed multiple flow table transitions (pipeline processing) are routed, or an inquiry to the controller is generated as Packet-In (same table: 180).

 ホスト♯Aが送信したARP要求をポート1で受信したOpenFlowスイッチ14は、図7及び図8に示したテーブル:0において、OpenFlowコントローラ15に対しPacket-In動作を行う(ステップS211及びステップS311)。OpenFlowコントローラ15は受信したポート1をキーに、受信したARP要求フレーム/パケットの送信元IPアドレスと送信元MACアドレスの対をコントローラ内のMLBテーブルに仮登録する。次いで、OpenFlowコントローラ15は、ARPリフレクションとしてOpenFlowスイッチ14に対してARP要求をPacket-Outし、スイッチはこれをホスト♯Aへポート1から送る(ステップS212)。ホスト♯Aが返してきたARP応答をポート1で受け取ったOpenFlowスイッチ14は、再度コントローラへPacket-Inを発生させる(ステップS213及びステップS312)。コントローラは、ポート1をキーにコントローラ内のMLBテーブルを検索し、ホスト♯AからのARP応答の送信元IPアドレスと送信元MACアドレスの対が存在すれば、同対のノードが実在すると判定し認証する。コントローラはスイッチに対してFlow Mod動作を行って(ステップS214)、「ポート:1」をマッチ条件とするフローエントリを物理ポートテーブル(テーブル:60)に、同対をマッチ条件とするフローエントリをMLBテーブル(テーブル:101)に書き込む(正登録する)。これにより、ポート1に上記対以外のIPパケットが受信されたときは、廃棄されることになる。
 以上の処理フローに則りホスト♯Aがコントローラによって認証され、各フローエントリがスイッチ内の該当テーブルに書き込まれたことを、フローエントリ確認コマンドを用いて確認した。
The OpenFlow switch 14 that has received the ARP request transmitted by the host #A at the port 1 performs a Packet-In operation to the OpenFlow controller 15 in the table 0 shown in FIGS. 7 and 8 (steps S211 and S311). . The OpenFlow controller 15 temporarily registers the pair of the source IP address and source MAC address of the received ARP request frame / packet in the MLB table in the controller using the received port 1 as a key. Next, the OpenFlow controller 15 packet-outs an ARP request to the OpenFlow switch 14 as ARP reflection, and the switch sends this to the host #A from the port 1 (step S212). The OpenFlow switch 14 that has received the ARP response returned from the host #A at the port 1 again generates Packet-In to the controller (steps S213 and S312). The controller searches the MLB table in the controller using port 1 as a key, and if there is a pair of the source IP address and source MAC address of the ARP response from host #A, it determines that the same pair of nodes exists. Certify. The controller performs a flow mod operation on the switch (step S214), and the flow entry having “port: 1” as a matching condition is stored in the physical port table (table: 60) and the flow entry having the same pair as a matching condition is set. Write to the MLB table (table: 101) (regular registration). As a result, when an IP packet other than the above pair is received at port 1, it is discarded.
Using the flow entry confirmation command, it was confirmed that the host #A was authenticated by the controller according to the above processing flow and each flow entry was written in the corresponding table in the switch.

 OpenFlowスイッチ14では、パイプライン処理を活用して、受信したパケットを処理する過程で受信したポートのMLBテーブルに遷移させる(図7及び図8のテーブル:60及び101)。同ポートのMLBテーブルに送信元IP/MACアドレスがあれば、ルーティング動作(図7 テーブル:180、ステップS316)に進めるが、MLBテーブルにないときは廃棄する(図7及び図8のテーブル:101及び102)。 The OpenFlow switch 14 uses pipeline processing to make a transition to the MLB table of the received port in the process of processing the received packet (tables 60 and 101 in FIGS. 7 and 8). If there is a source IP / MAC address in the MLB table of the same port, the routing operation (FIG. 7 table: 180, step S316) proceeds, but if it is not in the MLB table, it is discarded (tables in FIGS. 7 and 8: 101). And 102).

 本実装例の有効性を検証するために、簡易攻撃ツールhping3を用いてSYN flood攻撃実験を行った。送信元IPアドレスをネットワークアドレス(192.168.2.0/24)の範囲内でランダムに変更しながら、10,000パケットを攻撃先に送信する実験を複数回行った。その結果、攻撃先に到達できたのは10,000パケット中、平均して約30パケット(≒10,000÷256;攻撃元ホスト本来のIPアドレス)で、残りの約9,970パケットは廃棄されたことがスイッチ上のログで確認できた。 In order to verify the effectiveness of this implementation example, a SYN flood attack experiment was conducted using the simple attack tool hping3. An experiment was performed a plurality of times to transmit 10,000 packets to the attack destination while randomly changing the source IP address within the range of the network address (192.168.2.0/24). As a result, of the 10,000 packets that could reach the attack destination, on average, about 30 packets (≈10,000 ÷ 256; original IP address of the attack source host), and the remaining 9,970 packets were discarded. It was confirmed in the log on the switch.

 また、ホスト#Aからホスト#B宛にICMPエコー要求パケットを2.5kppsから160kppsまで送信レートを変えて送信したところ、図9及び図10の各々に示すようにMLBテーブル機能オン(図7のすべてのテーブルを活性化)とオフ(図7のテーブル:180のみ活性化)共に、送信レートが高くなるほどホスト#AでのICMP応答パケットの未着率が増えることが観測されたが、OpenFlowスイッチ14のCPU使用率は1%未満で、スイッチでのパケットロスも観測されなかった。これは、ICMPエコー要求パケットを生成・送信しながら、応答パケットの受信を行おうとするホスト#Aが過負荷状態に陥り、応答パケットを取りこぼしているためである。 Further, when the ICMP echo request packet is transmitted from the host #A to the host #B with the transmission rate changed from 2.5 kpps to 160 kpps, the MLB table function is turned on as shown in FIGS. 9 and 10 (FIG. 7). It was observed that both the tables are activated) and off (the table in FIG. 7: only 180 is activated), the higher the transmission rate, the higher the ICMP response packet non-arrival rate at the host #A. The CPU usage rate of 14 was less than 1%, and no packet loss at the switch was observed. This is because host #A attempting to receive a response packet while generating and transmitting an ICMP echo request packet falls into an overload state and misses the response packet.

 以上から、本実装がIPアドレス詐称に対し有効に機能し、少なくとも家庭用のeMLBR12として十分な性能を有し得ることが確認できた。 From the above, it was confirmed that this implementation functions effectively against IP address spoofing and can at least have sufficient performance as eMLBR12 for home use.

 また、図17には帯域制限によるTVオンラインデータサービスの応答性評価の評価環境を示し、図18にはTVオンラインデータサービスの応答性評価のフローテーブルを示す。図18では、NAPT交換は、Paket-Inが多発する。そこでスイッチ内に閉じたNAPT交換モジュールの実装が必要である。図19及び20は、TVオンラインデータサービスの応答性評価の評価結果を示す。図19は、帯域(Kbps)を縦軸とし時間(sec)を横軸として評価結果を示し、表示時間(sec)を縦軸とし帯域(Kbps)を横軸として評価結果を示した。 FIG. 17 shows an evaluation environment for TV online data service responsiveness evaluation by bandwidth limitation, and FIG. 18 shows a TV online data service responsiveness evaluation flow table. In FIG. 18, NAPT exchange frequently occurs with Packet-In. Therefore, it is necessary to mount a closed NAPT exchange module in the switch. 19 and 20 show the evaluation results of the responsiveness evaluation of the TV online data service. FIG. 19 shows the evaluation result with the band (Kbps) as the vertical axis and the time (sec) as the horizontal axis, and the evaluation result with the display time (sec) as the vertical axis and the band (Kbps) as the horizontal axis.

(実施形態2)
 本実施形態では、IEEE802.1Xを用いたパソコンなどのIEEE802.1X対応ノードとeMLBR12間での認証及び上りパケットの転送シーケンスの動作例を説明する。本実施形態に係るネットワーク構成を図11に示した。図11に示すネットワーク構成は、iMLBR11とHRS23とを含んだインターネット10、ノード及びeMLBR12で構成している。なお、図1や図11、図23などでは、HRS23がインターネットの内部に配置されるように記されているが、不正侵入などによって認証データやプログラムなどが改ざんされないよう、ISPなど信頼できる機関がHRS23を厳重管理することを意味するものであって、iMLBR11やeMLBR12を介して、インターネットの外側に配置されてもよい。以下も同様である。
(Embodiment 2)
In this embodiment, an operation example of an authentication and uplink packet transfer sequence between an IEEE 802.1X compatible node such as a personal computer using IEEE 802.1X and the eMLBR 12 will be described. A network configuration according to this embodiment is shown in FIG. The network configuration shown in FIG. 11 includes the Internet 10 including the iMLBR 11 and the HRS 23, the node, and the eMLBR 12. In FIG. 1, FIG. 11, FIG. 23, etc., it is described that the HRS 23 is arranged inside the Internet. However, a reliable organization such as an ISP prevents an authentication data or a program from being falsified due to unauthorized intrusion. This means that the HRS 23 is strictly managed, and may be arranged outside the Internet via the iMLBR 11 and the eMLBR 12. The same applies to the following.

 図12は、パソコンなどのIEEE802.1X対応ノードとeMLBR12間のシーケンス動作の例を示す。なお、図12では、ノードから外部ネットワーク(インターネット10)に向けて送信されるMACフレーム/IPパケットに係わるものについて説明する。また、本実施形態におけるDHCPプロトコルや、オーセンティケータによるEAPメッセージとRADIUSメッセージの変換・中継処理などを含むEAP/RADIUSプロトコルのやり取り、MACsecによる鍵の生成/交換/MACフレームの暗号化/復号などは、簡略化もしくは省略している。また、各ステップに係わる転送部14及び制御部15の機能部の記述も省略している。なお、無線LAN機能を搭載したeMLBR-Wなども、基本シーケンスは同じである。 FIG. 12 shows an example of a sequence operation between an IEEE 802.1X compatible node such as a personal computer and the eMLBR 12. Note that FIG. 12 describes a MAC frame / IP packet that is transmitted from a node to an external network (Internet 10). Also, exchange of EAP / RADIUS protocol including DHCP protocol in this embodiment, conversion / relay processing of EAP message and RADIUS message by authenticator, key generation / exchange / MAC frame encryption / decryption by MACsec, etc. Are simplified or omitted. Also, descriptions of the functional units of the transfer unit 14 and the control unit 15 relating to each step are omitted. The basic sequence is the same for eMLBR-W equipped with a wireless LAN function.

 なお、EAPメッセージを含んだMACフレームはマルチキャストアドレスで送信されるため、EgERの配下にスイッチングハブが配置されている場合、オーセンティケータに届かない。EAPメッセージ用に特定のMACアドレスを割り当てるなど、IEEE802.1X規格の変更が必要である。 In addition, since the MAC frame including the EAP message is transmitted with the multicast address, when the switching hub is arranged under the EgER, the MAC frame does not reach the authenticator. Changes to the IEEE 802.1X standard are required, such as assigning specific MAC addresses for EAP messages.

 以下に、図12のシーケンス図の動作を説明する。IEEE802.1X対応ノードのサプリカントは、拡張認証プロトコルである(EAP:Extensible Authentication Protocol)EAPOL(EAP over LAN)により、EAPメッセージフレームをeMLBR12のオーセンティケータに送る(ステップS411)。EAPOLを受け取ったeMLBR12は、EAP要求(TLS)をIEEE802.1X対応ノードに送出し(ステップS412)、ノードびeMLBR12間でEAPメッセージ交換を行い(ステップS413)、eMLBR12はこれをホーム認証サーバーとして機能するRADIUSサーバー23へ仲介する(ステップS414)。認証結果をRADIUSサーバーがeMLBR12へ送信する(ステップS415)。eMLBR12のオーセンティケータは、認証結果を判別(ステップS416)し、認証に失敗した場合はノードにEAP失敗を告げ処理を終了する(ステップS417)。 The operation of the sequence diagram of FIG. 12 will be described below. The supplicant of the IEEE802.1X compatible node uses an extended authentication protocol (EAP: Extensible Authentication Protocol) EAPOL (EAP over LAN) to send an EAP message frame to the authenticator of the eMLBR 12 (step S411). The eMLBR 12 that has received the EAPOL sends an EAP request (TLS) to the IEEE802.1X compatible node (step S412), exchanges EAP messages between the nodes and the eMLBR 12 (step S413), and the eMLBR 12 functions as a home authentication server. Mediate to the RADIUS server 23 (step S414). The RADIUS server transmits the authentication result to the eMLBR 12 (step S415). The authenticator of the eMLBR 12 discriminates the authentication result (step S416), and if the authentication fails, informs the node of the EAP failure and ends the processing (step S417).

 認証に成功した場合、ノードにEAP成功を伝える(ステップS418)とともに、ノードとeMLBR12との間で、IEEE802.1Xで定められたMACsec Key Agreement(MKA)プロトコルによる共有鍵の生成・交換を行い、セキュアチャネルを確立する(ステップS419)。以下、ノードとeMLBR12との間の通信では、同規格の定める共有鍵暗号を用いた秘匿通信が行われるとともに、通信中にデータが改ざんされていないかを検査するメッセージ認証が行われる。 If the authentication is successful, the EAP success is notified to the node (step S418), and a shared key is generated and exchanged between the node and the eMLBR 12 using the MACsec Key Agreement (MKA) protocol defined in IEEE 802.1X. A secure channel is established (step S419). Hereinafter, in communication between the node and the eMLBR 12, confidential communication using shared key encryption defined by the same standard is performed, and message authentication is performed to check whether data has been tampered with during communication.

 認証に成功したノードがDHCP要求をブロードキャスト送信する(ステップS420)と、eMLBR12は、通信サービス品質(QoS)レベルを決定し、さらに有効期間(例えば4時間)を設定するとともに、セキュアチャネルの識別情報をキーに、ノードのMACアドレスとノードに固定的(前回と同じ)あるいは動的に割り当てる(プライベート)IPアドレスとの対応関係を、制御部15のMLBテーブルAに仮登録し(ステップS421)、さらに転送部14のMLBテーブルAに正登録する(ステップS422)。その上で、ノードに対して、ネットマスクやDGWのIPアドレスなど、ネットワークへの接続に必要な情報とともにIPアドレスを割り当てるDHCP応答を送信する(ステップS423)。 When a node that succeeds in authentication transmits a DHCP request by broadcast (step S420), the eMLBR 12 determines a communication service quality (QoS) level, sets a valid period (for example, 4 hours), and identifies secure channel identification information. Using the key as a key, the correspondence between the MAC address of the node and the fixed (same as the previous) or dynamically assigned (private) IP address is provisionally registered in the MLB table A of the control unit 15 (step S421), Further, it is registered in the MLB table A of the transfer unit 14 (step S422). Then, a DHCP response that assigns an IP address together with information necessary for connection to the network, such as a netmask and an IP address of the DGW, is transmitted to the node (step S423).

 ノードは、以後、eMLBR12との間に確立したセキュアチャネルを介して、すなわちペイロード(ユーザパケット)を、上記共有鍵を用いて暗号化しMACフレームにカプセル化したユーザMACフレームを送信し(ステップS424)、eMLBR12は暗号化ユーザMACフレームをデカプセル化/復号/メッセージ認証を行った後、セキュアチャネルの識別情報をキーに、転送部14のMLBテーブルAを検索し(ステップS425)、送信元IPアドレス及びMACアドレスの対が存在しない場合、同フレーム/パケットを破棄する(ステップS426)。 Thereafter, the node transmits a user MAC frame in which the payload (user packet) is encrypted using the shared key and encapsulated in the MAC frame via the secure channel established with the eMLBR 12 (step S424). The eMLBR 12 decapsulates / decrypts / messages the encrypted user MAC frame, and then searches the MLB table A of the transfer unit 14 using the secure channel identification information as a key (step S425). If the MAC address pair does not exist, the frame / packet is discarded (step S426).

 一方、MLBテーブルAに送信元IPアドレス及び送信元MACアドレス対が存在する場合、ステップS423で決定したQoSで、ステップS421でプライベートIPアドレスを割り当てた場合にはeMLBR12のグローバルIPアドレスに変換(NAT)してから、eMLBR12とiMLBR11間ですでに確立しているセキュアチャネルを介して、すなわちeMLBR12とiMLBR11間の共有鍵を用いてユーザパケットを暗号化しMACフレームにカプセル化してから次ホップノードであるiMLBR11に転送し、iMLBR11(ISPエッジルータ)が暗号化ユーザMACフレームを受け取る。 On the other hand, when the source IP address / source MAC address pair exists in the MLB table A, the QoS determined in step S423 is converted to the global IP address of the eMLBR12 when NAT is assigned in step S421 (NAT). ) And then encrypt the user packet via the secure channel already established between eMLBR12 and iMLBR11, that is, using the shared key between eMLBR12 and iMLBR11, and encapsulate it in the MAC frame before being the next hop node iMLBR11 (ISP edge router) receives the encrypted user MAC frame.

 また、本実施形態におけるeMLBR12が備える制御部15と転送部14は連携して、ノード及びeMLBR12間で暗号鍵の更新による実在確認を適宜行い(ステップS432)、ステップS433で確認結果に応じてMLBテーブルAを更新、すなわちMLBテーブルAの有効期間を延長してもよい。 In addition, the control unit 15 and the transfer unit 14 included in the eMLBR 12 in the present embodiment cooperate with each other to appropriately check the existence by updating the encryption key between the node and the eMLBR 12 (step S432), and in step S433, depending on the confirmation result, the MLB The table A may be updated, that is, the validity period of the MLB table A may be extended.

 iMLBR11(ISPエッジルータ)は、ステップS427で転送されたMACフレームをデカプセル化/復号/メッセージ認証してから、eMLBR12とiMLBR11間のセキュアチャネル識別情報をキーに転送部14のMLBテーブルBを検索し、(ステップS428)、送信元IPアドレス及び送信元MACアドレスの対が存在しない場合、パケットを廃棄する(ステップS429)。一方、MLBテーブルBに送信元IPアドレス及び送信元MACアドレス対が存在する場合、指定されたQoSで宛先IPアドレスに向けて次ホップノードにユーザMACフレームを転送する(ステップS430及びステップS431)。 The iMLBR 11 (ISP edge router) decapsulates / decrypts / messages the MAC frame transferred in step S427, and then searches the MLB table B of the transfer unit 14 using the secure channel identification information between the eMLBR 12 and the iMLBR 11 as a key. (Step S428), if there is no source IP address and source MAC address pair, the packet is discarded (Step S429). On the other hand, when the source IP address and source MAC address pair exist in the MLB table B, the user MAC frame is transferred to the next hop node toward the destination IP address with the designated QoS (steps S430 and S431).

 なお、本実施形態ではノード又はエンティティの認証にIEEE802.1X規格に基づき、認証サーバーとしてRADIUSサーバーを用いているが、LDAPなど他の認証サーバー/規格を用いて認証を行ってもよい。 In this embodiment, a RADIUS server is used as an authentication server based on the IEEE802.1X standard for node or entity authentication, but authentication may be performed using another authentication server / standard such as LDAP.

 さらに、ノード又はエンティティの認証もしくは実在確認の際に、OSのバージョンアップ状態や、ファイアウォールの設定状態、ウィルス検知ソフトウェアのパターンファイル、広く利用されサイバー攻撃の対象にされ易いパッケージ型のアプリケーションプログラムやJava仮想マシンなどのミドルウェアの更新状態などを調べ、認証レベルすなわち通信サービス品質の決定に反映させてもよい。この結果を利用者に伝えることによって、利用者に対して端末をよりセキュアな状態に保つよう促すことも可能になる。 In addition, when authenticating or checking the existence of a node or entity, the OS version upgrade status, firewall configuration status, virus detection software pattern file, package-type application programs and Java that are widely used and subject to cyber attacks The update state of middleware such as a virtual machine may be examined and reflected in the determination of the authentication level, that is, the communication service quality. By conveying this result to the user, it is possible to prompt the user to keep the terminal in a more secure state.

(実施形態3)
 本実施形態では、IEEE802.1Xに対応したeMLBR-R12(一般住宅向け)とiMLBR11間の相互認証及び上りパケットの転送シーケンスの動作例を説明する。本実施形態に係るネットワーク構成を図に示す。図13に示すネットワーク構成は、iMLBR11とHRS23とを含んだインターネット10、ホスト30及びeMLBR-R12で構成している。
(Embodiment 3)
In the present embodiment, an operation example of mutual authentication and uplink packet transfer sequence between eMLBR-R12 (for general residential use) and iMLBR11 compatible with IEEE 802.1X will be described. A network configuration according to the present embodiment is shown in the figure. The network configuration shown in FIG. 13 includes the Internet 10 including the iMLBR 11 and the HRS 23, the host 30, and the eMLBR-R12.

 ノードから外部ネットワーク(インターネット10)に向けて送信されるMACフレーム/パケットに係わるものについて説明する。なお、本実施形態におけるオーセンティケータによるEAPメッセージとRADIUSメッセージの変換・中継処理などを含むEAP/RADIUSプロトコルのやり取り、MACsecによる鍵の生成/交換/MACフレームの暗号化/復号などは、簡略化もしくは省略している。また、各ステップに係わる転送部14及び制御部15の機能部の記述も省略している。 A description will be given of MAC frames / packets transmitted from a node to an external network (Internet 10). Note that the exchange of EAP / RADIUS protocols including conversion / relay processing of EAP messages and RADIUS messages by the authenticator in the present embodiment, key generation / exchange / MAC frame encryption / decryption by MACsec, etc. are simplified. Or it is omitted. Also, descriptions of the functional units of the transfer unit 14 and the control unit 15 relating to each step are omitted.

 以下に、図14のシーケンス図の動作を説明する。ネットワークに接続したIEEE802.1X対応のeMLBR-R12のサプリカントは、まずEAPOLにより、EAPメッセージフレームをiMLBR11のオーセンティケータに送る(ステップS511)。EAPOLを受け取ったiMLBR11は、EAP要求(TLS)をeMLBR-R12に送出し(ステップS512)、eMLBR-R12及びiMLBR11間でEAPメッセージ交換を行い(ステップS513)、iMLBR11はこれをホーム認証サーバーとして機能するRADIUSサーバー23へ仲介する(ステップS514)。認証結果をRADIUSサーバーがiMLBR11へ送信する(ステップS515)。iMLBR11のオーセンティケータは、認証結果を判別(ステップS516)し、認証に失敗した場合はeMLBR-R12にEAP失敗を告げ処理を終了する(ステップS517)。 The operation of the sequence diagram of FIG. 14 will be described below. The eMLBR-R12 supplicant compatible with IEEE 802.1X connected to the network first sends an EAP message frame to the authenticator of iMLBR11 by EAPOL (step S511). The iMLBR 11 that has received EAPOL sends an EAP request (TLS) to the eMLBR-R 12 (step S 512), exchanges EAP messages between the eMLBR-R 12 and the iMLBR 11 (step S 513), and the iMLBR 11 functions as a home authentication server. To the RADIUS server 23 (step S514). The RADIUS server transmits the authentication result to iMLBR 11 (step S515). The authenticator of the iMLBR 11 discriminates the authentication result (step S516). If the authentication fails, the eMLBR-R 12 is notified of the EAP failure and the processing is terminated (step S517).

 認証に成功した場合、eMLBR-R12にEAP成功を伝える(ステップS518)とともに、eMLBR-R12とiMLBR11との間で、MKAプロトコルによる共有鍵の生成・交換を行い、セキュアチャネルを確立する(ステップS519)。以下、eMLBR-R12とiMLBR11との間の通信では、共有鍵暗号を用いた秘匿通信が行われるとともに、途中でデータが改ざんされていないかを検査するメッセージ認証が行われる。 When the authentication is successful, the eMLBR-R 12 is notified of the success of EAP (step S518), and the eMLBR-R 12 and the iMLBR 11 generate and exchange a shared key using the MKA protocol to establish a secure channel (step S519). ). Hereinafter, in the communication between the eMLBR-R 12 and the iMLBR 11, confidential communication using shared key encryption is performed, and message authentication for checking whether data has been tampered with is performed.

 認証に成功したeMLBR-R12がDHCP要求をブロードキャスト送信する(ステップS520)と、iMLBR11は、通信サービス品質(QoS)レベルを決定し、さらに有効期間(例えば4時間)を設定するとともに、セキュアチャネルの識別情報をキーに、eMLBR-R12のMACアドレスと、eMLBR-R12に固定的あるいは動的に割り当てるIPアドレスとの対応関係を記憶しておく制御部15のMLBテーブルAに仮登録し(ステップS521)、さらに転送部のMLBテーブルAに正登録する(ステップS522)。その上で、eMLBR-R12に対して、ネットマスクやDGWのIPアドレスなど、ネットワークへの接続に必要な情報とともにIPアドレスを割り当てるDHCP応答を返す(ステップS523)。 When the eMLBR-R 12 that has succeeded in authentication broadcasts a DHCP request (step S520), the iMLBR 11 determines a communication service quality (QoS) level, sets an effective period (for example, 4 hours), and secure channel Using the identification information as a key, provisionally registered in the MLB table A of the control unit 15 that stores the correspondence between the MAC address of the eMLBR-R12 and the IP address that is fixedly or dynamically assigned to the eMLBR-R12 (step S521). In addition, it is registered in the MLB table A of the transfer unit (step S522). Then, a DHCP response that assigns an IP address together with information necessary for connection to the network, such as a netmask and an IP address of the DGW, is returned to the eMLBR-R 12 (step S523).

 以後、IEEE802.1X対応ノード(パソコンなど)は、実施形態2で述べた方法で認証を受け、eMLBR-R12との間でセキュアチャネルを確立し、セキュアチャネル識別情報をキーにノードのIPアドレスとMACアドレス及びQoSの対を転送部14のMLBテーブルBに正登録されてから、eMLBR12に対し暗号化ユーザMACフレームを送信し(ステップS524)、eMLBR-R12ではセキュアチャネルの識別情報をキーに転送部14のMLBテーブルBを検索し、同フレーム/パケットの送信元IPアドレスと送信元MACアドレスの対が存在しない場合、eMLBR12は、ノードが送信したパケットを破棄する(ステップS526)。一方、MLBテーブルBに存在する場合、予め設定されたQoSで、また送信元プライベートIPアドレスをグローバルIPアドレスに変換し、eMLBR12とiMLBR11間のセキュアチャネルを介して、すなわちeMLBR12とiMLBR11間の共有鍵を用いてユーザパケットを暗号化しMACフレームにカプセル化してから次ホップノードであるiMLBR11に、指定されたQoSで転送する(ステップS527)。 Thereafter, an IEEE802.1X-compatible node (such as a personal computer) is authenticated by the method described in the second embodiment, establishes a secure channel with eMLBR-R12, and uses the secure channel identification information as a key and the IP address of the node. After the MAC address / QoS pair is correctly registered in the MLB table B of the transfer unit 14, the encrypted user MAC frame is transmitted to the eMLBR 12 (step S524), and the eMLBR-R 12 transfers the secure channel identification information as a key. The MLB table B of the unit 14 is searched, and if there is no source IP address / source MAC address pair of the same frame / packet, the eMLBR 12 discards the packet transmitted by the node (step S526). On the other hand, if it exists in the MLB table B, the source private IP address is converted into a global IP address with a preset QoS, and via a secure channel between the eMLBR 12 and the iMLBR 11, that is, a shared key between the eMLBR 12 and the iMLBR 11 The user packet is encrypted using, and encapsulated in a MAC frame, and then transferred to the iMLBR 11 that is the next hop node with the designated QoS (step S527).

 iMLBR11は、ステップS527で転送されてきたフレーム/パケットについて、eMLBR12とiMLBR11間のセキュアチャネルの識別情報をキーに転送部14のMLBテーブルAを検索し(ステップS528)、MLBテーブルAに送信元IPアドレス及び送信元MACアドレスが存在しない場合、同フレーム/パケットを廃棄する(ステップS529)。一方、MLBテーブルAに存在する場合、指定されたQoSで次ホップノードに、ユーザMACフレームを転送する(ステップS530)。また、本実施形態におけるiMLBR11が備える制御部15及び転送部14は連携して、iMLBR11及びeMLBR12間で暗号鍵の更新による、実在確認を適宜行い(ステップS532)、ステップS533で確認結果に応じてMLBテーブルAを更新、すなわちMLBテーブルAの有効期間を延長してもよい。 The iMLBR 11 searches the MLB table A of the transfer unit 14 for the frame / packet transferred in step S527 using the secure channel identification information between the eMLBR 12 and the iMLBR 11 as a key (step S528), and sends the source IP to the MLB table A. If the address and the source MAC address do not exist, the frame / packet is discarded (step S529). On the other hand, if it exists in the MLB table A, the user MAC frame is transferred to the next hop node with the designated QoS (step S530). In addition, the control unit 15 and the transfer unit 14 included in the iMLBR 11 in the present embodiment cooperate with each other to appropriately check the existence by updating the encryption key between the iMLBR 11 and the eMLBR 12 (step S532), and according to the confirmation result in step S533. The MLB table A may be updated, that is, the validity period of the MLB table A may be extended.

(実施形態4)
 上記実施形態では、eMLBR12はIEEE802.1Xに則ってiMLBR11を介してRADIUSサーバーで認証を受けることとしているが、図15に示す本実施形態では、eMLBR12とiMLBR11各々が予め信頼できる認証局(CA局)から認証を受け、その真正性を証明するデジタル証明書を取得していれば、これを直接交換し合い相互に認証してもよい。
(Embodiment 4)
In the above embodiment, the eMLBR 12 is authenticated by the RADIUS server via the iMLBR 11 in accordance with IEEE802.1X. However, in the present embodiment shown in FIG. 15, each of the eMLBR 12 and the iMLBR 11 can be trusted in advance by a CA (CA station). If a digital certificate that proves its authenticity has been obtained, it may be exchanged directly and mutually authenticated.

 以上に述べた実施形態に基づいたアドレス詐称対策を適用することによって、たとえIPsecを用いたトランスポートモードあるいはトンネルモードによる暗号化通信が行われても、すべてのフレーム/パケットについてeMLBR12及びiMLBR11でポート又はチャネルをキーに送信元IPアドレスと送信元MACアドレスの対がMLBテーブルに存在するかチェックするため、インターネット10へのアドレス詐称パケットの流出/流入を阻止できる。そして、これを適用したネットワーク(プロバイダー)が広がっていくにつれてDDoSやDRDoSなど、様々なアドレス詐称を前提としたサイバー攻撃やサーバーなどへの不正侵入などが激減するものと思われる。 By applying the address spoofing countermeasure based on the embodiment described above, even if encrypted communication is performed in the transport mode or tunnel mode using IPsec, the ports in eMLBR 12 and iMLBR 11 are used for all frames / packets. Alternatively, since the channel is used as a key to check whether the source IP address and source MAC address pair exists in the MLB table, the outflow / inflow of address spoof packets to the Internet 10 can be prevented. As networks (providers) to which this is applied expand, cyber attacks based on various address spoofing, such as DDoS and DRDoS, and unauthorized intrusion into servers, etc. are expected to decrease drastically.

 また、たとえ一部の「何でも繋がせる」プロバイダーもしくはネットワークや匿名ネットワークなどがあっても、これらのネットワークとの接続点に配備するiMLBR11ではMLBテーブルに記述されたネットワークアドレス空間から外れたパケットを遮断(前述のuRPFとして機能する)することができ、さらに廃棄要請と組み合わせることによって被害者IPアドレスなどと対で攻撃者のIPアドレスあるいはアドレス空間内でランダムにアドレス詐称しているパケットを遮断することができる。さらに、iMLBR11の収容ポートの通信サービス品質(帯域を狭め、検疫(アノマリ検出によるSYN flood攻撃パケットなどの廃棄や、ウィルス検知ソフトによるウィルス混入パケットの廃棄、暗号化パケットの廃棄、スパムメールの廃棄など)を強化するなど)を限定することによって、インターネット10全体の安心・安全性が格段に高まるものと考えられる。 In addition, even if there are some "connect anything" providers or networks or anonymous networks, iMLBR11 deployed at the connection point with these networks will block packets outside the network address space described in the MLB table (Function as uRPF as described above), and by combining with a request for discarding, block an attacker's IP address or a packet whose address is spoofed randomly in the address space, etc. Can do. Furthermore, the communication service quality of the accommodation port of iMLBR11 (band narrowing, quarantine (discarding SYN flood attack packets, etc. by anomaly detection, discarding virus-contaminated packets by virus detection software, discarding encrypted packets, discarding spam mail, etc.) It is considered that the safety and security of the entire Internet 10 is significantly increased by limiting the above.

 しかし、クラッカーから見ればeMLBR12やiMLBR11が新たな攻撃対象となる。このためには、これらのパケット転送装置へ不正侵入されないよう頑健な作りにする必要がある。また、たとえ侵入されプログラムやルーティングテーブル、MLBテーブルなどが改ざんされてもそれを検出できるように完全性検査機能、またEAP flood攻撃やARP flood攻撃など、制御部15のソフトウェア処理系に対する攻撃が行われても、それらを転送部14で遮断するような自己防御機能を備えておく必要がある。さらに、eMLBR12やiMLBR11に新たなセキュリティホールが見つかった場合や、新たなサイバー攻撃の出現に対応した機能を制御部15や転送部14に追加できるようバージョンアップ機能を備えておく必要がある。 However, eMLBR12 and iMLBR11 become new attack targets when viewed from the cracker. For this purpose, it is necessary to make it robust to prevent unauthorized entry into these packet transfer apparatuses. In addition, an attack against the software processing system of the control unit 15 such as an integrity check function, an EAP flood attack, an ARP flood attack, etc. is performed so that it can be detected even if a program, routing table, MLB table, etc. are tampered with. However, it is necessary to have a self-protection function that blocks them by the transfer unit 14. Furthermore, when a new security hole is found in eMLBR12 or iMLBR11, it is necessary to provide a version upgrade function so that a function corresponding to the emergence of a new cyber attack can be added to the control unit 15 and the transfer unit 14.

 本実施形態に係るパケット転送装置はIPv4に限定されるものではなく、IPv6も扱ってもよい。また、グローバルIPアドレス既得ユーザに対しては、届け出のあったアドレス空間を制御部15のMLBテーブルに仮登録しておき、IEEE802.1X認証を経てIPアドレス単位に、転送部14のMLBテーブルに正登録してもよい。 The packet transfer apparatus according to the present embodiment is not limited to IPv4, and may handle IPv6. In addition, for users who have already obtained global IP addresses, the reported address space is provisionally registered in the MLB table of the control unit 15, and after the IEEE 802.1X authentication, in units of IP addresses, in the MLB table of the transfer unit 14. You may register correctly.

 さらに、iMLBR11又はeMLBR12が、サーバー13を収容する場合には、サーバー13を収容するポートもしくはチャネルの識別情報をキーに、(別設置のDHCPもしくは自装置内のDHCPから、あるいはユーザが保有するアドレス空間から)サーバー13に割り当てられたIPアドレスとサーバー13のMACアドレスに加え、サーバー13上で起動するプロセスを識別する固定のプロセス識別アドレス(well-knownポート番号)もバインディングの対象にしてもよい。これによって、たとえ悪意ある攻撃者によって不正侵入用のポートが作られても、同ポートからの情報流失などを防ぐことが可能になる。 Furthermore, when the iMLBR 11 or eMLBR 12 accommodates the server 13, the identification information of the port or channel that accommodates the server 13 is used as a key (from another DHCP or from the own device's DHCP, or an address held by the user). In addition to the IP address assigned to the server 13 and the MAC address of the server 13 (from space), a fixed process identification address (well-known port number) that identifies the process to be activated on the server 13 may also be a binding target. . As a result, even if a malicious attacker creates a port for unauthorized intrusion, it is possible to prevent information loss from the port.

 また、ARPリフレクションを適用する場合は、前述したように認証レベルが低いことから、例えば、当該端末を他のエンドノードから隔離したVLANを構成し、帯域制限を施したブリッジを介して外部ネットワークに接続する、またITV(Industrial TeleVision)などの監視カメラであれば、接続先は限定されるため、宛先IPアドレスをMLBテーブルに追加するなどの対策を施すことによって、インターネット10に不正パケットが流出することを阻止できる。 In addition, when applying ARP reflection, the authentication level is low as described above. For example, a VLAN in which the terminal is isolated from other end nodes is configured, and is connected to an external network via a band-limited bridge. If the connection camera is a surveillance camera such as ITV (Industrial TeleVision), the connection destination is limited. Therefore, by taking measures such as adding the destination IP address to the MLB table, illegal packets are leaked to the Internet 10 I can prevent it.

 さらに、iMLBR11又はeMLBR12が備える制御部15は、ノードもしくはエンティティが収容されているポートもしくはチャネルでの実在確認を適宜(必ずしも定期的である必要はない)行い、通信サービス品質を維持更新(IEEE802.1XにおけるMACsecの使用、物理的接続の確認、共有鍵の更新、一定時間実在確認応答がなければMLBテーブルからエントリーを削除し通信サービスを停止する、ノードが別のポートもしくはチャネルに移動したときは元のポートもしくはチャネルでの不在を確認してから、新たに認証し直しMLBテーブルのポートもしくはチャネルのみ変更するなど)してもよい。 Furthermore, the control unit 15 included in the iMLBR 11 or the eMLBR 12 appropriately checks the existence of the port or channel in which the node or entity is accommodated (not necessarily periodically), and maintains and updates the communication service quality (IEEE802.1. If MACsec is used in 1X, physical connection is confirmed, shared key is updated, existence confirmation response is not received for a certain period of time, the entry is deleted from the MLB table and the communication service is stopped. When a node moves to another port or channel After confirming the absence of the original port or channel, the authentication may be performed again and only the port or channel of the MLB table may be changed).

 なお、一つのポート又はチャネルが収容するノードもしくはエンティティは複数であってもよい。この場合には、該ポート又はチャネルの識別情報をキーとするMLBテーブルには、複数の送信元IPアドレスと送信元MACアドレスの対が登録されることになる。 Note that there may be a plurality of nodes or entities accommodated by one port or channel. In this case, a plurality of pairs of source IP addresses and source MAC addresses are registered in the MLB table using the port or channel identification information as a key.

 また、eMLBR12は、ユーザ側ネットワークにおいてインターネット10に向けて一台もしくは複数台が多段的に配備されてもよい。さらに、eMLBR12は、インターネット10の端部に配備されている複数台のiMLBR11に対して、接続(マルチホーミング)されてもよい。 Also, one or a plurality of eMLBRs 12 may be arranged in a multi-stage manner toward the Internet 10 in the user side network. Furthermore, the eMLBR 12 may be connected (multi-homing) to a plurality of iMLBRs 11 arranged at the end of the Internet 10.

(実施形態5)
 上記の実施形態の導入によって、アドレス詐称パケットのインターネット10への流入、ひいてはサイバー攻撃が激減するものと考えられるが、アドレス詐称を伴わない攻撃(例えば、送信元IPアドレスをランダムに変えながらSYN food攻撃する場合には、一定の確率で真の送信元IPアドレスで攻撃パケットがインターネット10へ流出/流入する。また、ウィルスに感染したパソコンや遠隔操作されたデジタルテレビなどから、利用者が知らない間にアドレス詐称せずに攻撃に加担させられる。)は、防ぐことができない。さらに、DDoS攻撃などの首謀者が所謂C&C(Command and Control)サーバーを介してボットに指令を発信する際に、匿名ネットワーク(例えば、Tor:The Onion Routerなど)を経由して送信元IPアドレスを隠ぺい化(以下、匿名IPアドレスと呼ぶ)する行為が広く行われているが、匿名IPアドレスパケットはアドレス詐称パケットではないため、アドレス非詐称パケットと同様に、インターネット10への流出/流入を防ぐことができない。ただし、Torネットワークであれば、数千台あるとされているTorノードのアドレス(匿名IPアドレス)は、インターネット上で公開されており、ブラックリスト化が可能である。
(Embodiment 5)
The introduction of the above-described embodiment is thought to drastically reduce the inflow of address spoofing packets to the Internet 10, and thus cyber attacks, but attacks that do not involve address spoofing (for example, SYN food while changing the source IP address at random) In the case of an attack, an attack packet with a true source IP address is leaked / inflowed to the Internet 10 with a certain probability, and the user does not know from a virus-infected personal computer or a remotely operated digital TV. It is impossible to prevent them from participating in the attack without spoofing the address in the meantime.) Furthermore, when a mastermind such as a DDoS attack sends a command to a bot via a so-called C & C (Command and Control) server, the source IP address is set via an anonymous network (for example, Tor: The Onion Router). Although the act of concealment (hereinafter referred to as anonymous IP address) is widely performed, since the anonymous IP address packet is not an address spoof packet, it prevents outflow / inflow to the Internet 10 like an address non-spoof packet. I can't. However, in the case of a Tor network, the addresses (anonymous IP addresses) of Tor nodes, which are supposed to be several thousand, are made public on the Internet and can be blacklisted.

 本実施形態は、上記問題に対する対策で、他のノードからの要請によってiMLBR11やeMLBR12が廃棄テーブルを生成・更新し、それに合致したパケットを廃棄する動作例について説明する。 In this embodiment, an example of an operation in which the iMLBR 11 and the eMLBR 12 generate / update a discard table in response to a request from another node and discard a packet that matches the countermeasure as a countermeasure against the above problem.

 具体的には、図16に示すように、不正アクセス監視システム/侵入検知システムIDS(Intrusion Detection System)や侵入防止システムIPS(Intrusion Prevention System)、匿名ネットワークもしくは匿名IPアドレス検出システムなどを稼働させた対処要請ノードもしくは対処要請エンティティとして機能するReN40(Request Node)は、インターネット10の要所やサービスを提供しているデータセンターや組織内ネットワーク、DMZ(DeMilitarized Zone)、サーバー内でトラフィックを監視し、明確な攻撃や攻撃によると推定される輻輳、匿名IPアドレスを検知するとDeN42(Deliver Node)へ攻撃パケットと推測されるパケットを送り対処を要請するノードである。また、DeN42は、ReN40から送られた攻撃パケットを収集・分析・集約し、攻撃と判定したときに廃棄要請情報を発信する機関のノードである。ShN43(Share Node)は、DeN42が発信した廃棄要請情報を、廃棄対象パケットを中継転送しているiMLBR11又はeMLBR12へ、大規模な攻撃であればインターネット10全体に配送するノードである。なお、図16には、DeN42やShN43などが、インターネットの内部に配置されるように記されているが、前述のHRS23と同様に、不正侵入などによって廃棄要請情報やプログラムなどが改ざんされないよう、ISPなど信頼できる機関がこれらを厳重管理することを意味するものであって、iMLBR11やeMLBR12を介して、インターネットの外側に配置されてもよい。 Specifically, as shown in FIG. 16, an unauthorized access monitoring system / intrusion detection system IDS (Intrusion Detection System), an intrusion prevention system IPS (Intrusion Prevention System), an anonymous network or an anonymous IP address detection system, etc. were operated. The ReN40 (Request Node) functioning as a response request node or response request entity monitors traffic in a data center, an institutional network, a DMZ (DeMilitized Zone), or a server that provides key points or services of the Internet 10, When a clear attack or congestion estimated to be caused by an attack or an anonymous IP address is detected, the attack packet is sent to DeN42 (Deliver Node). It is a node that sends a packet that is presumed to be a packet and requests countermeasures. The DeN 42 is a node of an organization that collects, analyzes, and aggregates attack packets sent from the ReN 40 and transmits discard request information when it is determined to be an attack. The ShN 43 (Share Node) is a node that distributes the discard request information transmitted by the DeN 42 to the iMLBR 11 or eMLBR 12 that relays and forwards the discard target packet to the entire Internet 10 in the case of a large-scale attack. In FIG. 16, DeN42, ShN43, etc. are described so as to be arranged inside the Internet. However, like the above-mentioned HRS23, the disposal request information, the program, etc. are not altered by unauthorized intrusion, etc. This means that a reliable organization such as an ISP strictly manages them, and may be arranged outside the Internet via the iMLBR 11 and the eMLBR 12.

 DeN42が発信する廃棄要請情報には、廃棄対象(攻撃や匿名IPアドレス、情報漏洩など)パケットの送信元MACアドレス/送信元IPアドレス/ポート番号と送信先MACアドレス/送信先IPアドレス/ポート番号の一部又はすべての対と有効期間が、DeN42のデジタル証明書もしくは電子署名とともに記述されている。これを受取ったShN43は、廃棄要請情報に記述されている攻撃元IPアドレス及び被害者ノードのIPアドレスそれぞれまでの経路情報を調べるtracerouteコマンドなどを応用して廃棄要請先のiMLBR11やeMLBR12のIPアドレスを割り出(アドレス解決)し、該当するiMLBR11又はeMLBR12へ廃棄要請情報を配送する。具体的には、TTLを1ずつ増やしながらICMPエコー要求パケットを送信することによって経路情報を取得するが、TTLが1のICMPエコー要求パケットをMLBRが受信すると、ICMP時間超過パケットのオプションフィールドにMLBRの属性情報(例えば、エッジルータとして配備するiMLBR、MLBR未導入のプロバイダーとの境界に配備するiMLBR、家庭用のeMLBR-R、無線LAN用のeMLBR-W、データセンター用のeMLBR-Cなどの種別や、収容するノードやネットワークの属性など)を書き込んで経路情報の調査元(ShN43)に返すことによって、転送経路上に存在するiMLBR11やeMLBR12のIPアドレスとその属性情報を取得してもよい。その後、HTTPやSMTPなどの転送プロトコルを用いて当該iMLBR11やeMLBR12へ廃棄要請情報を送信してもよい。被害者ノードを収容するiMLBR11やeMLBR12についても、同様にすればよい。ICMPパケットとHTTPやSMTPなどの転送プロトコルを用いることによって、転送経路上にファイアウォールがあっても遮断されることなくファイアウォールを通過できる。 The discard request information transmitted by the DeN 42 includes a source MAC address / source IP address / port number and a destination MAC address / destination IP address / port number of a packet to be discarded (attack, anonymous IP address, information leakage, etc.). Some or all pairs and validity periods are described together with a digital certificate or electronic signature of DeN42. Upon receipt of this, the ShN 43 applies the IP address of the iMLBR 11 or eMLBR 12 that is the discard request destination by applying a traceroute command or the like for examining the route information to the attack source IP address and the victim node IP address described in the discard request information. Is determined (address resolution), and the discard request information is delivered to the corresponding iMLBR11 or eMLBR12. Specifically, route information is acquired by transmitting an ICMP echo request packet while incrementing TTL by 1. When MLBR receives an ICMP echo request packet with TTL of 1, MLBR is displayed in the option field of the ICMP time exceeded packet. Attribute information (e.g., iMLBR deployed as an edge router, iMLBR deployed at the border with providers that have not yet installed MLBR, eMLBR-R for home, eMLBR-W for wireless LAN, eMLBR-C for data center, etc. The IP address of the iMLBR11 or eMLBR12 existing on the transfer route and its attribute information may be acquired by writing the type, the node to be accommodated, the network attribute, etc.) and returning it to the route information investigation source (ShN43). . Thereafter, the discard request information may be transmitted to the iMLBR 11 or eMLBR 12 using a transfer protocol such as HTTP or SMTP. The same applies to iMLBR11 and eMLBR12 that accommodate the victim node. By using an ICMP packet and a transfer protocol such as HTTP or SMTP, even if there is a firewall on the transfer path, it can pass through the firewall without being blocked.

 廃棄要請情報を受取ったiMLBR11又はeMLBR12の制御部15では、添付されているデジタル証明書から廃棄要請情報の真正性を確認してから、廃棄要請情報に基づいて廃棄テーブルを生成・更新し、転送部14に伝達する。転送部14では、以後、受信したフレーム/パケットについてMLBテーブルと照会してアドレス詐称パケットでないことを確認した後、廃棄テーブルに該当する送信元IPアドレス/ポート番号と送信先IPアドレス/ポート番号などの対もしくはブラックリストとして登録されている匿名IPアドレスに該当しないかを調べ、該当する場合は廃棄する(廃棄テーブルと照合してからMLBテーブルに照会してもよい)。該当しない場合は、ルーティング処理に進む。 Upon receiving the discard request information, the control unit 15 of the iMLBR 11 or eMLBR 12 confirms the authenticity of the discard request information from the attached digital certificate, generates / updates the discard table based on the discard request information, and transfers it. Transmitted to the unit 14. Thereafter, the transfer unit 14 refers to the MLB table for the received frame / packet and confirms that it is not an address spoofing packet. Then, the source IP address / port number and destination IP address / port number corresponding to the discard table, etc. It is checked whether it corresponds to an anonymous IP address registered as a pair or a black list, and if it corresponds, it is discarded (the MLB table may be inquired after collating with the discard table). If not, the process proceeds to the routing process.

 本実施形態において、ReN41はIDS又はIPS相当の機能あるいはウィルス検知ソフトを実装したパソコン、タブレット端末、スマートフォン、デジタルテレビなどであってもよい。また、ReN40がDeN42及びShN43相当の攻撃パケットの分析機能や配送機能などを有し、攻撃者のIPアドレスを特定できる場合には、直接、前述のtracerouteコマンドを応用したICMPエコー要求パケットを用いることによって、ReN41から攻撃者までの転送経路上に存在するiMLBR11やeMLBR12のIPアドレスとその属性情報、さらにICMP時間超過パケットが返ってくる順序から、iMLBR11やeMLBR12の位置関係(被害者ノードを収容するMLBRか攻撃者ノードを収容するMLBRかの判別)を把握することができる。その後、HTTPやSMTPなどの転送プロトコルを用いて、当該iMLBR11又はeMLBR12へ廃棄要請情報を配送してもよい。さらに、攻撃元が限られた範囲である場合は、DeN42はShN43の機能を代行し直接該当するiMLBR11又はeMLBR12へ上述の方法で廃棄要請情報を配送してもよい。また、iMLBR11及びeMLBR12はReN40の機能を実装し、ReN40として機能してもよい。
加えて、上記実施形態では、iMLBR11及びeMLBR12はDeN23やShN43などからの廃棄要請によって廃棄テーブルを更新するとしているが、DeN23やShN43からの通知によってiMLBR11及びeMLBR12がDeN23やShN43などに廃棄要請情報を取りにいく、あるいは定期的にiMLBR11及びeMLBR12がDeN23やShN43などをアクセスし、自己に関係する新たな廃棄要請情報があればそれを取得してもよい。
In the present embodiment, the ReN 41 may be a personal computer, a tablet terminal, a smartphone, a digital TV, or the like that is equipped with a function equivalent to IDS or IPS or virus detection software. Also, if the ReN 40 has an attack packet analysis function and a delivery function equivalent to DeN42 and ShN43 and can identify the attacker's IP address, use the ICMP echo request packet directly applying the above traceroute command. From the IP address and attribute information of iMLBR11 and eMLBR12 existing on the transfer path from ReN41 to the attacker and the order in which ICMP time exceeded packets are returned, the positional relationship between iMLBR11 and eMLBR12 (accommodates victim nodes) Whether the MLBR accommodates the attacker node or the MLBR). Thereafter, the discard request information may be delivered to the iMLBR 11 or eMLBR 12 using a transfer protocol such as HTTP or SMTP. Further, if the attack source is in a limited range, the DeN 42 may deliver the discard request information to the corresponding iMLBR 11 or eMLBR 12 directly by acting as the ShN 43 function. Moreover, iMLBR11 and eMLBR12 may implement the function of ReN40, and may function as ReN40.
In addition, in the above embodiment, iMLBR11 and eMLBR12 update the discard table by a discard request from DeN23, ShN43, etc., but iMLBR11 and eMLBR12 send discard request information to DeN23, ShN43, etc. by notification from DeN23 or ShN43. The iMLBR 11 and the eMLBR 12 may access the DeN 23, the ShN 43, etc. periodically, and if there is new discard request information related to itself, it may be acquired.

 本実施形態によって、アドレス詐称を伴わない攻撃や、前述の匿名ネットワークの端部ノード(Torノード)のIPアドレスを、同ノードを収容するiMLBR11又はeMLBR12の廃棄テーブルに(ブラックリストとして)登録しておくことによって、「何でも繋がせる」ネットワークと匿名ネットワークを経由してきた攻撃パケットを廃棄することが可能になり、インターネット10への流入/流出を阻止することができる。さらに、被害者ノードのIPアドレスとL4ポート番号、送信先IPアドレスなどの対を、被害者ノードを収容するiMLBR11やeMLBR12の廃棄テーブルに登録しておくことによって、以後、情報漏洩パケットの流出やC&Cサーバーへのアクセスなどを阻止することができる。 According to this embodiment, an attack without address spoofing or the IP address of the end node (Tor node) of the above-mentioned anonymous network is registered (as a blacklist) in the discard table of iMLBR11 or eMLBR12 that accommodates the node. This makes it possible to discard the attack packet that has passed through the network that can connect anything and the anonymous network, and can prevent inflow / outflow to the Internet 10. Further, by registering the victim node's IP address, L4 port number, destination IP address, etc. in the discard table of the iMLBR11 or eMLBR12 that accommodates the victim node, the leakage of information leakage packets or Access to the C & C server can be blocked.

(実施形態6)
 本実施形態では、マルチレイヤ・バインディング・ルータ(MLBR)によるサイバー攻撃の対策について以下に述べる。まず、本実施形態では、クラッキング意図パケットを対策の対象とする。クラッキング意図パケットは、IPアドレス詐称(成りすましを含む)パケット、匿名IPアドレスパケット及びIPアドレス非詐称攻撃パケットを示す。
(Embodiment 6)
In the present embodiment, countermeasures against cyber attacks by a multilayer binding router (MLBR) will be described below. First, in the present embodiment, a cracking intention packet is targeted for countermeasures. The cracking intention packet indicates an IP address spoofing (including impersonation) packet, an anonymous IP address packet, and an IP address non-spoofing attack packet.

 本実施形態に係るMLBRの機能を以下(1)~(6)に示す。
(1)ノードもしくはエンティティからの接続要求があった時、その真正性と健全性を認証・検疫するとともに、認証・検疫レベルに応じて提供するQoSを決定する。
(2)物理ポートor(セキュア)チャネルをキーに、ノードもしくはエンティティのIPアドレスとMACアドレスとの対応関係をMLBテーブルに登録する。
(3)パケットを受信した物理ポート又はチャネルをキーにMLBテーブルを検索し、パケットの送信元IPアドレスとMACアドレスの対が存在するときは、次ホップノードへ指定されたQoSで転送し、存在しないときはアドレス詐称or成りすましパケットとみなして破棄する。
(4)物理ポートまたはチャネルを介して適宜ノードもしくはエンティティの実在及び健全性確認を行い、MLBテーブルを更新(有効期間を延長)する。
(5)他のノードからの正当な廃棄要請を受けて破棄テーブルを更新し、以後、廃棄テーブルに該当する匿名のアドレスパケットやアドレス非詐称攻撃パケットを廃棄する。
(6)利用者(egress)に配置するeMLBR12と、インターネット側(ingress)に配備するiMLBR11により、クラッキング意図パケットのインターネットへの流出及び流出を阻止する。
The functions of the MLBR according to this embodiment are shown in (1) to (6) below.
(1) When there is a connection request from a node or entity, authenticity and soundness are authenticated and quarantined, and QoS to be provided is determined according to the authentication and quarantine level.
(2) The correspondence between the IP address and MAC address of a node or entity is registered in the MLB table using the physical port or (secure) channel as a key.
(3) The MLB table is searched using the physical port or channel that received the packet as a key, and if there is a packet source IP address and MAC address pair, it is transferred to the next hop node with the specified QoS, and exists If not, it is considered as address spoofing or spoofing and discarded.
(4) Existence and soundness of the node or entity are appropriately checked via the physical port or channel, and the MLB table is updated (the validity period is extended).
(5) In response to a valid discard request from another node, the discard table is updated, and thereafter, anonymous address packets and address non-spoofing attack packets corresponding to the discard table are discarded.
(6) The eMLBR 12 arranged on the user (egress) and the iMLBR 11 arranged on the Internet side (ingless) prevent the outflow and outflow of the cracking intention packet to the Internet.

 本実施形態に係るMLBRにおけるサイバー攻撃の対策の対象となるノードをについて以下に具体的なノードを列挙する。
・ホストとルータの総称をノードとしてもよい。この場合、ノードの集合であるネットワークもノードとなる。
・IEEE802.1X対応端末(PCやスマートフォン等)この場合、認証・検疫におけるクラッキング行為の抑止と端末の健全性確保に有効である。しかし、匿名ネットワーク経由で悪事を行っても特定され難く、ボットに感染すればDDoS攻撃に加担し。また、遠隔操作や成りすましされ(見かけ上)アドレス詐称せずに悪事加担も考えられる。
・IEEE802.1X非対応端末(テレビ等のスマート家電やIoT)。この場合OSのアップデートやFWはなく、サイバー攻撃の温床になることも考えられる。
・家庭用ルータ。遠隔操作され、攻撃に加担も考えられる。
・何でもつながせるポリシーのISP。この場合、すべてのISPが対策を導入することは考えにくい。
・匿名ネットワーク及びTor等。この場合、匿名アドレスであって、アドレス詐称ではない。
・成りすまし端末。
Specific nodes are listed below for the nodes that are targets of cyber attack countermeasures in the MLBR according to the present embodiment.
-A generic term for host and router may be a node. In this case, a network that is a set of nodes is also a node.
IEEE802.1X compatible terminal (PC, smart phone, etc.) In this case, it is effective for suppressing cracking acts in authentication / quarantine and ensuring the soundness of the terminal. However, it is difficult to be identified even if a bad thing is done via an anonymous network, and if it infects a bot, it will participate in a DDoS attack. In addition, it is possible to take care of wrongs without remote control or spoofing (apparently) address spoofing.
-IEEE802.1X non-compliant terminals (Smart home appliances such as TVs and IoT). In this case, there is no OS update or FW, and it may be a hotbed for cyber attacks.
・ Home router. It is remotely controlled and may be involved in attacks.
-ISP of policy that can be connected with anything. In this case, it is unlikely that all ISPs will introduce countermeasures.
・ Anonymous network and Tor. In this case, it is an anonymous address, not address spoofing.
・ Impersonation terminal.

 ここで、上述したIEEE802.1X対応端末とeMLBR12間のシーケンス動作の例を図21に示す。本実施形態に係る図21のシーケンスでは、実施形態2における図12のシーケンスとは、サーバーを2つ備える点で相違する。具体的には、サーバーは、検疫サーバー31及びRADIUSサーバー23を別々に備えてもよい。また、ステップS514では、eMLBR12はこれをホーム認証サーバーとして機能するRADIUSサーバー23又は検疫サーバー31へ仲介する際、健全性ステートメント交換も行う点で実施形態2における図12のシーケンスと相違する。また、上述の構成の違いにより、図14に対し図21では、ステップS515において、認証結果及び検疫結果をそれぞれのサーバーがeMLBR12へ送信することができる。 Here, an example of a sequence operation between the above-described IEEE 802.1X compatible terminal and the eMLBR 12 is shown in FIG. The sequence in FIG. 21 according to the present embodiment is different from the sequence in FIG. 12 in the second embodiment in that two servers are provided. Specifically, the server may include the quarantine server 31 and the RADIUS server 23 separately. In step S514, the eMLBR 12 is different from the sequence of FIG. 12 in the second embodiment in that a soundness statement is also exchanged when the eMLBR 12 mediates this to the RADIUS server 23 or the quarantine server 31 functioning as a home authentication server. Further, due to the difference in the configuration described above, in FIG. 21 as compared to FIG. 14, each server can transmit the authentication result and the quarantine result to the eMLBR 12 in step S515.

 以下に、具体的なケースを用いながら本実施形態に係るサイバー攻撃に対応策を説明する。第1のケースでは、標的型メール攻撃に対する対応策について以下に示す。標的型メール攻撃では、偽装メールを不用意に開封した社員の端末がコネクトバックで踏み台にされ、以後、C&Cサーバーを介して攻撃者が指令を送り複数の端末を巻き込みながら基幹サーバーにバックドアを作り、機密情報を盗み出す攻撃である。 Hereinafter, countermeasures against cyber attacks according to this embodiment will be described using specific cases. In the first case, countermeasures against targeted email attacks are shown below. In a targeted email attack, the employee's terminal that unintentionally opened a forged email is used as a stepping stone in a connect-back, and the attacker then sends a command via the C & C server to open a back door on the core server while involving multiple terminals. It is an attack that creates and steals confidential information.

 第1のケースに係る標的型メール攻撃に対し、本実施形態では4つの対応例を述べる。1つ目は、攻撃者の多くがC&Cサーバーに指令を送るときに匿名アドレスを用いるが、本対策では匿名ネットワークの使用を不能にする。2つ目は、基幹サーバーは、自己のポート番号を含めてMLBテーブルに登録しておくことによって、バックドアからの情報漏洩を防ぐ。 In the present embodiment, four response examples are described for the targeted mail attack according to the first case. First, anonymous addresses are used when many attackers send commands to the C & C server, but this measure disables the use of anonymous networks. Second, the basic server prevents information leakage from the back door by registering it in the MLB table including its own port number.

 3つ目は、IDSなどで組織ネットワーク内での攻撃若しくは攻撃の兆候を検出次第C&CサーバーのIPアドレスと自組織のIPアドレスを記述した廃棄要請を自組織のeMLBR12及びC&Cサーバーを収容しているeMLBR12とiMLBR11に送り、以後、C&Cサーバーとの間の指令パケットのやり取りを阻止する。4つ目は、漏洩情報の送信先IPアドレスを記述した廃棄要請を自組織のeMLBR12とiMLBR11に送り、以後の情報漏洩を阻止する。 Third, as soon as an attack or sign of attack is detected in the organization network using IDS or the like, a disposal request describing the IP address of the C & C server and the IP address of the organization is accommodated in the eMLBR 12 and the C & C server of the organization. eMLBR 12 and iMLBR 11 are sent, and thereafter, exchange of command packets with the C & C server is blocked. Fourthly, a discard request describing the transmission destination IP address of leaked information is sent to the eMLBR 12 and iMLBR 11 of its own organization to prevent subsequent information leak.

 次に、第2のケースでは、ワイヤレスセンサーネットワーク攻撃に対する対応策について以下に示す。ワイヤレスセンサーネットワーク攻撃では、アドホック型のセンサーネットワークを形成しているIOTが次々にマルウェアに感染もしくはIoTの製造工程でマルウェアが埋め込まれ、攻撃者がC&Cサーバーを介してIOTに様々な指令を送り、データの改ざん、情報の盗み出し、機器や社会インフラの暴走などを行わせ、システムを制御不能状態にする攻撃である。 Next, in the second case, countermeasures against wireless sensor network attacks are shown below. In wireless sensor network attacks, IOTs that form ad-hoc type sensor networks are successively infected with malware or embedded in the IoT manufacturing process, and the attacker sends various commands to the IOT via the C & C server. This is an attack that makes the system uncontrollable by tampering with data, stealing information, or running away equipment or social infrastructure.

 第2のケースに係るワイヤレスセンサーネットワーク攻撃に対し、本実施形態では3つの対応例を述べる。1つ目は、匿名アドレスの使用を不能する。2つ目は、センサーネットワークを収容しているeMLBR12のQoSとして、インターネット接続先IPアドレスを限定しておけばIoTがC&Cサーバーなどへアクセスすることを阻止できる。3つ目は、QoSとして帯域制限しておけば、IoTの帯域攻撃等への使用を不能にする。 In this embodiment, three response examples are described for the wireless sensor network attack according to the second case. The first disables the use of anonymous addresses. Second, IoT can be prevented from accessing a C & C server or the like if the IP address of the Internet connection destination is limited as the QoS of the eMLBR 12 accommodating the sensor network. Thirdly, if the bandwidth is limited as QoS, the use of the IoT for band attacks is disabled.

 次に、第3のケースでは、DNSキャッシュポイズニングに対する対応策について以下に示す。DNSキャッシュポイズニングでは、IPS、企業、大学などのキャッシュDNSサーバーに対して偽のDNS情報をキャッシュさせる攻撃である。偽のDNS情報をキャッシュさせることにより、そのキャッシュDNSサーバーを参照するISPの顧客、企業の社内ユーザ、大学の学生などクライアントを偽のサイトに誘導させるなどの行為が可能となる攻撃である。 Next, in the third case, countermeasures against DNS cash poisoning are shown below. DNS cache poisoning is an attack that causes cache DNS servers such as IPS, companies, and universities to cache fake DNS information. By caching fake DNS information, it is possible to conduct an action such as guiding a client such as an ISP customer, a company internal user, a university student or the like referring to the cache DNS server to a fake site.

 第3のケースに係るDNSキャッシュポイズニングに対する対応例を以下に述べる。ACL(Access Control List)が適切に施されていないISPや企業、大学などでは、本来クライアントではない外部からの問い合わせに対して応答を返してしまっている。こういったキャッシュDNSサーバーをオープンリゾルバと呼ぶ。オープンリゾルバは外部から任意の問い合わせができるため、毒を入れやすい状況にあるといえる。また、本来のクライアントであっても、ウイルスに感染してポット化されているようなケースでは任意の問い合わせが可能である。 An example of handling DNS DNS poisoning related to the third case is described below. ISPs, companies, universities, and the like that are not properly subjected to ACL (Access Control List) have returned responses to inquiries from outside that are not clients. Such a cache DNS server is called an open resolver. Since the open resolver can make arbitrary inquiries from the outside, it can be said that it is easy to add poison. In addition, even an original client can make an arbitrary inquiry in a case where the client is infected with a virus and potted.

 従って、適切な対応設定が施されていないキャッシュDNSサーバーは、これを利用するクライアントに1台でも悪意あるクライアント若しくは遠隔操作されたクライアントがいた場合にキャッシュポイズニング攻撃を受けて、成功するとそのキャッシュDNSサーバーを利用するすべてのクライアントに影響を与える可能性がある。 Therefore, a cache DNS server that is not properly set up is subjected to a cache poisoning attack when there is even one malicious client or remotely operated client among the clients using this, and if successful, the cache DNS server May affect all clients using the server.

 キャッシュポイズニングの具体的な手法としては、以下のようなものが挙げられる。例えば、カミンスキーメソッド、委任インジェクション攻撃、移転インジェクション攻撃である。現在行われている対策としては、キャッシュDNSサーバーに適切なACLを設定し、オープンリゾルバでなくすこと、外部へ問い合わせを行う際の送信元ポート番号を固定(又はインクリメンタル)せず、ランダマイズ化する実装若しくは設定を導入すること。 The following are specific methods for cash poisoning. For example, Kaminsky method, delegation injection attack, and transfer injection attack. Currently implemented measures include setting an appropriate ACL on the cache DNS server, making it not an open resolver, and randomizing without fixing (or incrementally) the source port number when making external inquiries. Or introduce settings.

 また、近年では、キャッシュDNSサーバー自身はランダマイズしていても、インターネットへ出ていく途中経路にNAT装置やFirewallが存在した場合、その装置がポート番号を固定若しくはインクリメンタルマッピングしてしまうケースも見られるため、そういった中継に介在する装置のケアも必要である。昨今のISPではIPアドレスの枯渇に対応するため、LSN(Large Scale NAT)を採用しているケースもあり、それらの実装の中にもポートのマッピングがきちんとランダマイズ化されない実装があるという。このように、現在行われている対策は、キャッシュDNSサーバーだけにとどまらず、ISPや企業、大学内のネットワーク全体にわたって、高度な専門知識を持ったネットワーク管理者が注意深く設定し管理運用しなければならないのが実情である。 In recent years, even if the cache DNS server itself is randomized, if a NAT device or Firewall exists on the way to the Internet, there are cases where the device fixes the port number or performs incremental mapping. Therefore, it is also necessary to care for the devices that intervene in such relays. In recent ISPs, there are cases where LSN (Large Scale NAT) is adopted to cope with the exhaustion of IP addresses, and among these implementations, there are implementations in which port mapping is not properly randomized. In this way, current measures are not limited to cache DNS servers, but must be carefully set and managed by network administrators with advanced expertise across ISPs, corporations, and university networks. The fact is not to be.

 これに対して、MLBRによる対策では、DNSキャッシュポイズニング、攻撃者が権威DNSサーバーのIPアドレスに詐称して直接キャッシャDNSサーバーに毒を入れるか、遠隔操作で善良な利用者のPCなどから権威DNSサーバーのIPアドレスに詐称して毒を入れることが考えられるが、その際に攻撃者はTorネットワークなどを使って送信元IPアドレスを匿名化する。MLBRでは、匿名アドレスパケットはインターネットへの流入/流出を阻止する。またIPアドレス詐称パケットはMLBR内で破棄するので、高度な設定など必要とせずにDNSキャッシュポイズニングを防ぐことができる。 On the other hand, in the countermeasures by MLBR, DNS cache poisoning, the attacker spoofs the IP address of the authoritative DNS server and directly poisons the cashier DNS server, or the authoritative DNS from a good user's PC by remote control. It is conceivable that the server IP address is spoofed and poisoned. At that time, the attacker anonymizes the source IP address using the Tor network or the like. In MLBR, anonymous address packets block inflow / outflow to the Internet. In addition, since the IP address spoofing packet is discarded in the MLBR, DNS cache poisoning can be prevented without requiring advanced settings.

 次に、第4のケースでは、DNSリフレクション攻撃(DNS Amp)に対する対応策について以下に示す。DNSリフレクション攻撃では、一般にはDNSは問い合わせよりも応答のほうがデータサイズが大きい。これを悪用し送信元アドレスをターゲットのアドレスに偽装して大量の問い合わせを行うことでターゲットのアドレスに向かって大量の応答が返る攻撃である。 Next, in the fourth case, countermeasures against DNS reflection attack (DNS Amp) are shown below. In a DNS reflection attack, DNS generally has a larger data size for responses than for queries. This is an attack in which a large amount of responses are returned toward the target address by misusing this and performing a large number of inquiries by impersonating the source address as the target address.

 第4のケースに係るDNSリフレクション攻撃に対する対応例を以下に述べる。
どんな相手からの問い合わせでも応答するということから先ほどのオープンリゾルバが踏み台とされるケースは多い。また、家庭用ブロードバンドルータを代表とするCPE(Customer Premises Equipment)が踏み台とされるケースも多々ある。
A response example for the DNS reflection attack according to the fourth case will be described below.
There are many cases where the open resolver is used as a stepping stone because it responds to inquiries from any party. In many cases, CPE (Customer Equipment Equipment) represented by a home broadband router is used as a stepping stone.

 これはオープンリゾルバ若しくはオープンフォワーダー(どこからの問い合わせでもその機器でフォワード設定しているDNSサーバーへ問い合わせフォワードする)となっているCPE実装が多く出回っており、攻撃者が悪用すると折り返しトラフィックなども含めてより大きなトラフィックを発生させることができる。 There are many CPE implementations that are open resolvers or open forwarders (inquiries are forwarded to the DNS server that is forwarded by the device for any inquiries from any device), and if attackers abuse it, including return traffic, etc. Larger traffic can be generated.

 対策として国内ISPやCATV業者が現在取り組みを始めつつあるものとして、IP53B(Inbound Port 53 Blocking)がある。これはISPから顧客のポート53へのトラフィックを遮断するというものである。これにより、オープンリゾルバやオープンフォワーダーへのトラフィックを抑止することができるが、これを実施した場合の弊害(顧客がDNSサーバーを立てていた場合にサービス妨害となる)を考慮して慎重な導入が進められている。これに対して、MLBRによる対策としては、DNSリフレクション攻撃(DNS Amp)では、アドレス詐称パケットがベースとなるので、これも高度な専門知識など必要とせずにMLBRで妨ぐことができる。 As a countermeasure, IP53B (Inbound Port 53 Blocking) is currently being implemented by domestic ISPs and CATV operators. This is to block traffic from the ISP to the customer's port 53. As a result, traffic to the open resolver and open forwarder can be suppressed, but careful introduction is required in consideration of the adverse effects of doing this (service disruption when customers set up a DNS server). It is being advanced. On the other hand, as a countermeasure by MLBR, since the DNS spoofing attack (DNS Amp) is based on an address spoofing packet, it can also be prevented by MLBR without the need for advanced specialized knowledge.

 第1の関連技術では(例えば、特許文献2参照。)、コンピュータシステム、コントローラ、及びネットワーク監視方法における、データセンターでのアドレス詐称対策が用いられている。具体的には、詐称アドレスを利用した不正アクセスや妨害に対するセキュリティ強度を向上させる。第1の関連技術によるコンピュータシステムは、コントローラと、コントローラによって設定されたフローエントリに適合する受信パケットに対し、当該フローエントリで規定された中継動作を行うスイッチと、スイッチに接続されたコントローラを具備する。 In the first related technology (see, for example, Patent Document 2), address spoofing measures in a data center are used in a computer system, a controller, and a network monitoring method. Specifically, the strength of security against unauthorized access and obstruction using a spoofed address is improved. A computer system according to a first related technique includes a controller, a switch that performs a relay operation specified by the flow entry for a received packet that matches the flow entry set by the controller, and a controller connected to the switch. To do.

 スイッチは、自身に設定されたフローエントリに適合しない受信パケットの送信元アドレス情報を、コントローラに通知(Packet―In)する。コントローラは、正当なホスト端末のアドレス情報と送信元アドレス情報とが一致しない場合、受信パケットの送信元アドレスが詐称されていると判定し、廃棄フローエントリをスイッチに設定する。したがって、本実施形態に係る発明と比べ、第1の関連技術では、新たなアドレス詐称パケットを受信するごとに処理負荷が重いPacket-Inが発生する。すなわち、この発明では大量のアドレス詐称パケット攻撃によって、スイッチは過負荷状態に陥り動作不能に陥る。 The switch notifies the controller of the source address information of the received packet that does not match the flow entry set in itself (Packet-In). If the address information of the legitimate host terminal and the source address information do not match, the controller determines that the source address of the received packet is spoofed and sets a discard flow entry in the switch. Therefore, as compared with the invention according to the present embodiment, in the first related technology, a packet-in with a heavy processing load occurs each time a new address spoofing packet is received. In other words, in the present invention, a large number of address spoof packet attacks causes the switch to be overloaded and become inoperable.

 第2の関連技術では、IPアドレスとMACアドレスを対応付けてテーブルに格納し、端末から送られたパケットのIPアドレスとMACアドレスがテーブルにない時は破棄する。具体的には、端末は、通信に先立って初段ルータのアドレス解決のため、ARP要求パケットを必ずブロードキャスト送信する。このARP要求パケットには、送信元のMACアドレスとIPアドレスとが記述されている。このため、悪人がたとえ異なる物理ポートからであってもARP要求パケットをWiresharkなどでキャプチャし、IPアドレスとMACアドレス対を盗み見、他人のPCに成りすますことができる。 In the second related technology, the IP address and the MAC address are stored in the table in association with each other, and discarded when the IP address and the MAC address of the packet sent from the terminal are not in the table. Specifically, the terminal always transmits an ARP request packet by broadcast to resolve the address of the first-stage router prior to communication. In this ARP request packet, the source MAC address and IP address are described. For this reason, even if a villain is from a different physical port, an ARP request packet can be captured by using a wireless network, etc., and an IP address and MAC address pair can be seen and impersonated by another person's PC.

 一方本実施形態に係る発明では、物理ポート又は(セキュア)チャネルをキーにIPアドレスとMACアドレス対をMLBテーブルで管理するため、他ポート又はチャネルからARP要求パケットを盗み見て成りすまししても、成りすまし端末からのパケットを破棄できる。なお、これまではNICの製造メーカで付与したMACアドレスを書き換えることは事実上不可能であったが、OpenFlowなどのSDN技術の出現によって、任意に書き換えられるようになった。したがって、本実施形態に係る発明と比べ、第2の関連技術では、物理ポートまたは(セキュア)チャネルをキーに管理する機能を有しない点でセキュリティ上の問題がある。 On the other hand, in the invention according to the present embodiment, the IP address and MAC address pairs are managed by the MLB table using the physical port or (secure) channel as a key, so even if the ARP request packet is stolen from another port or channel, it is impersonated. Packets from the terminal can be discarded. Until now, it has been virtually impossible to rewrite the MAC address assigned by the NIC manufacturer, but with the advent of SDN technology such as OpenFlow, it has been arbitrarily rewritten. Therefore, compared with the invention according to the present embodiment, the second related technology has a security problem in that it does not have a function of managing a physical port or a (secure) channel as a key.

 第3の関連技術では(例えば、特許文献3及び特許文献4参照。)、MACアドレスとIPアドレスを合わせて記憶して、ユーザがISPから付与されたIPアドレスを端末に設定したり、故意に他の端末と同一のIPアドレスに改ざんするユーザに対して、予め付与されたIPアドレスを設定していない端末からのパケットは受信してもブリッジ内で破棄する。具体的には、MACアドレスとIPアドレスを対応付けて管理するテーブルを具備する。しかし、これは、IPアドレスが付与された端末に対してMACブリッジがARP要求パケットを送信し、返送されてきたARP応答パケットに記述されているMACアドレスを取得する際に生成される副産物であり、以後のフィルタリングで参照するのは送信元MACアドレスのみである。 In the third related technology (see, for example, Patent Document 3 and Patent Document 4), the MAC address and the IP address are stored together, and the user sets the IP address assigned by the ISP to the terminal or intentionally. Even if a packet is received from a terminal that has not been assigned a pre-assigned IP address for a user who has altered the same IP address as that of another terminal, the packet is discarded within the bridge. Specifically, a table for managing MAC addresses and IP addresses in association with each other is provided. However, this is a by-product generated when the MAC bridge transmits an ARP request packet to the terminal to which the IP address is assigned and acquires the MAC address described in the returned ARP response packet. In the subsequent filtering, only the source MAC address is referred to.

 したがって、例えば端末がマルウェアに感染しIPアドレス詐称パケットを送信しても阻止できず、第3の関連技術では、MACブリッジ(レイヤ2のパケット転送装置)であり、基本的にMACアドレスしか参照しないことによる問題が発生する。一方、本実施形態に係る発明では、物理ポート又は(セキュア)チャネルをキーにMACアドレスとIPアドレスの対がMLBテーブルに存在するか否かをチェックするもので、フィルタリングで参照する対象が異なる。これによって、たとえ端末の所有者がIPアドレスやMACアドレスの詐称を行っていなくても、マルウェアに感染しDDoS攻撃などに加担させられてIPアドレス詐称パケットを送信しても、インターネットへの流出と流入を阻止できる。 Therefore, for example, even if a terminal is infected with malware and transmits an IP address spoof packet, it cannot be blocked, and in the third related technology, it is a MAC bridge (layer 2 packet transfer device) and basically refers only to the MAC address. Cause problems. On the other hand, the invention according to the present embodiment checks whether a pair of a MAC address and an IP address exists in the MLB table using a physical port or a (secure) channel as a key. As a result, even if the owner of the terminal does not spoof the IP address or MAC address, even if it is infected with malware and sent to a DDoS attack, etc. Inflow can be prevented.

 ここで、本実施形態に係るパケット転送システムにおけるARPリフレクションのIPv6版の適応を具体的に述べる。IPv6では、IPv4用のARP(Address Resolution Protocol)の代わりにNDP(Neighbor Discovery Protocol)を用いる。NDPには、リンク上に存在する近隣ノードのMACアドレスの判別やアドレスの変更・停止検出、近隣ノードへの到達性のチェック、リンク上にいるルータの検出及びパケットの転送先としての設定などの機能があり、各々で用いるパケットの呼称が異なる。また、NDPには、ブロード送信がないため、代わりにマルチキャスト送信を用いる。また、図22は、本実施形態に係るパケット転送システムにおけるIPv4版のARPリフレクションをIPv6の適応した場合の対比を示している。 Here, the adaptation of the IPv6 version of ARP reflection in the packet transfer system according to the present embodiment will be specifically described. In IPv6, NDP (Neighbor Discovery Protocol) is used instead of ARP (Address Resolution Protocol) for IPv4. NDP includes identification of MAC addresses of neighboring nodes on the link, address change / stop detection, check of reachability to neighboring nodes, detection of routers on the link and setting as a packet forwarding destination, etc. There is a function, and the name of the packet used in each is different. Since NDP does not have broad transmission, multicast transmission is used instead. FIG. 22 shows a comparison in the case where the IPv4 version of ARP reflection is applied to the IPv4 version in the packet transfer system according to the present embodiment.

 IPv6版の適応で用いられる機能の用語を以下に挙げる。
・RSパケット(ルータ要請パケット(RS:Router Solicitation)):ノードが初段ルータのアドレス解決に用いるパケット
・RAパケット(ルータ応答パケット(RA:Router Advertisement)):RSパケットに対してルータが返すパケット
・NSパケット(近隣要請パケット(NS:Neighbor Solicitation)):特定のノードのMACアドレスを解決するパケット。IPv4のARPパケットとほぼ同じ。
・NAパケット(近隣通知パケット(NA:Neighbor Advertisement))NSパケットに対する応答パケット
The terminology of functions used in adaptation of IPv6 version is listed below.
RS packet (router solicitation packet (RS)): a packet used by the node for address resolution of the first-stage router RA packet (router response packet (RA): packet returned by the router in response to the RS packet) NS packet (Neighbor Solicitation (NS)): A packet that resolves the MAC address of a specific node. It is almost the same as the IPv4 ARP packet.
-NA packet (Neighbor Advertisement (NA)) Response packet to NS packet

 なお、前述したように本発明によるMLBRをインターネット全体並びにすべての利用者サイドに配備することは、事実上不可能である。このための対策として、eMLBR12を介して所定の認証や検疫を受けて接続を許可されたノードまたはエンティティが送信したパケットでeMLBR12で廃棄されなかったものについて、例えば転送部14または制御部15において、IPv4であれば例えばIPヘッダのサービスタイプフィールドの未定義ビット(最後方の2ビット)に、IPv6であればトラフィッククラスフィールドの所定ビット(最後方の2ビット)に認証フラグとして“1”を書き込むことによってその真正性を表示するようにしてもよい。さらに、未認証のノードまたは未認証のエンティティが送信したパケット、すなわちeMLBR12を通っていないパケットについては、これらのパケットを中継転送してきたネットワークとの境界に設置されるiMLBR11にて、前記所定ビットの認証フラグをリセット(“0”)するようにしてもよい。これによって、MLBR未導入のプロバイダのネットワークから送られてきたパケットや、eMLBR12をバイパスしてインターネットに流入させようとしたパケットは、これを受信したiMLBR11や、パケットの送信先ノードを収容するiMLBR11やeMLBR12でパケットが認証を受けたノードまたはエンティティから送信されたものか否かを確認することが可能になり、認証フラグが“0”のパケットについては検疫サイトに配送し、クラッキング意図パケットか否かを詳細に検査する、あるいはその扱い(廃棄するか詳細な検疫検査を行うなど)を受信者に委ねることが可能になる。なお、認証フラグが“1”のパケットは、認証を受けたノードまたはエンティティから送信されたことを示すものであって、同パケットがマルウェアに感染していない、すなわち安全性が保証されていることを意味するものではない。 As described above, it is practically impossible to deploy the MLBR according to the present invention to the entire Internet and all user sides. As a countermeasure for this, for a packet transmitted by a node or entity that has received a predetermined authentication or quarantine via eMLBR 12 and permitted to be connected, but not discarded by eMLBR 12, for example, in transfer unit 14 or control unit 15, For IPv4, for example, “1” is written as an authentication flag in undefined bits (last 2 bits) of the service type field of the IP header, and for IPv6, predetermined bits (last 2 bits) of the traffic class field. Thus, the authenticity may be displayed. Further, for packets transmitted by an unauthenticated node or an unauthenticated entity, that is, packets not passing through the eMLBR 12, the predetermined bit of the predetermined bit is set in the iMLBR 11 installed at the boundary with the network that relayed and forwarded these packets. The authentication flag may be reset (“0”). As a result, packets sent from the network of providers that have not yet installed MLBR, and packets that bypass eMLBR 12 and enter the Internet, iMLBR 11 that received this packet, iMLBR 11 that accommodates the packet destination node, It becomes possible to confirm whether or not the packet is transmitted from the authenticated node or entity in the eMLBR 12, and if the authentication flag is “0”, it is delivered to the quarantine site and whether or not it is a cracking intention packet. Can be inspected in detail, or it can be left to the recipient (such as discarding or performing a detailed quarantine inspection). A packet with an authentication flag of “1” indicates that the packet is transmitted from an authenticated node or entity, and the packet is not infected with malware, that is, safety is guaranteed. Does not mean.

 本発明は情報通信産業に適用することができる。 The present invention can be applied to the information and communication industry.

10:インターネット
11:iMLBR
12:eMLBR
13:サーバー
14:転送部(Open Flow Switch)
15:制御部(Open Flow Controller)
20:Mobile Network
21:Untrusted Internet
22:HLR
23:HRS
24:スマートフォン
25:携帯電話
26:PC
27:タブレットPC
28:電話器
29:デジタルテレビ
30:ホスト
31:検疫サーバー
40:ReN(Request Node)
41:ホスト/ReN
42:DeN(Deliver Node)
43:ShN(Share Node)
10: Internet 11: iMLBR
12: eMLBR
13: Server 14: Transfer unit (Open Flow Switch)
15: Control unit (Open Flow Controller)
20: Mobile Network
21: Untrusted Internet
22: HLR
23: HRS
24: Smartphone 25: Mobile phone 26: PC
27: Tablet PC
28: Telephone 29: Digital TV 30: Host 31: Quarantine server 40: ReN (Request Node)
41: Host / ReN
42: DeN (Deliver Node)
43: ShN (Share Node)

Claims (11)

 互いにパケットをフレームにカプセル化して送受信する少なくとも一つのノード又は少なくとも一つのエンティティを収容する複数のポート又は複数のチャネルと、
 前記ポート又は前記チャネルの識別情報と前記ノード又は前記エンティティが送信する前記フレームの送信元物理アドレスと前記フレームをデカプセル化して取り出したパケットの送信元論理アドレスとの対応関係を記憶しておくマルチレイヤ・バインディングテーブルと、
 前記フレームを受信した前記ポート又は前記チャネルをキーに前記マルチレイヤ・バインディングテーブルを検索し、前記フレームの送信元物理アドレスと送信元論理アドレスとの対が前記マルチレイヤ・バンディングテーブルに存在するときは、前記フレームから取り出されたパケットをフレームにカプセル化して前記パケットの送信先論理アドレスに向けて次ホップノードへ転送し、前記マルチレイヤ・バインディングテーブルに存在しないときは前記パケットを廃棄する転送部と、を備える
ことを特徴とするパケット転送装置。
A plurality of ports or a plurality of channels accommodating at least one node or at least one entity for encapsulating packets in each other in a frame; and
Multi-layer for storing the correspondence between the identification information of the port or the channel, the transmission source physical address of the frame transmitted by the node or the entity, and the transmission source logical address of the packet extracted by decapsulating the frame・ Binding table,
When the multi-layer binding table is searched using the port or the channel that received the frame as a key, and a pair of a source physical address and a source logical address of the frame exists in the multi-layer banding table A transfer unit that encapsulates the packet extracted from the frame and forwards it to the next hop node toward the destination logical address of the packet, and discards the packet when it does not exist in the multilayer binding table; A packet transfer apparatus comprising:
 互いにパケットをフレームにカプセル化して送受信する少なくとも一つのノード又は少なくとも一つのエンティティを収容する複数のポート又は複数のチャネルと、
 前記ポート又は前記チャネルの識別情報と前記ノード又は前記エンティティが送信する前記フレームの送信元物理アドレスと前記フレームをデカプセル化して取り出したパケットの送信元論理アドレスとの対応関係を記憶しておくマルチレイヤ・バインディングテーブルと、
 前記フレームを受信した前記ポート又は前記チャネルをキーに前記マルチレイヤ・バインディングテーブルを検索し、前記フレームの送信元物理アドレスと送信元論理アドレスとの対が前記バンディングテーブルに存在するときは、前記フレームから取り出されたパケットの送信先論理アドレスに向けて転送するルータへ転送し、前記マルチレイヤ・バインディングテーブルに存在しないときは前記パケットを廃棄する転送部と、を備える
ことを特徴とするパケット転送装置。
A plurality of ports or a plurality of channels accommodating at least one node or at least one entity for encapsulating packets in each other in a frame; and
Multi-layer for storing the correspondence between the identification information of the port or the channel, the transmission source physical address of the frame transmitted by the node or the entity, and the transmission source logical address of the packet extracted by decapsulating the frame・ Binding table,
The multi-layer binding table is searched using the port or the channel that received the frame as a key, and when a pair of a source physical address and a source logical address of the frame exists in the banding table, the frame A packet transfer apparatus comprising: a transfer unit that transfers the packet extracted from the packet to a router that transfers the packet to a destination logical address and discards the packet when the packet is not present in the multilayer binding table .
 前記パケット転送装置は、
 予め接続された他のパケット転送装置に備わる前記転送部から、受信したポート又はチャネルの識別情報とともに送られてきた認証要求パケット又はフレームについて、認証サーバーへの認証要求を仲介し、前記認証サーバーが認証した認証結果を取得し、前記認証結果に基づいて決定した通信サービス品質を前記マルチレイヤ・バインディングテーブルの記憶の対象にし、
前記ポート又は前記チャネルを介して前記認証要求の要求元のノード又はエンティティの実在確認を行って、前記マルチレイヤ・バインディングテーブルを更新し、
前記マルチレイヤ・バインディングテーブルを他のパケット転送装置に備わる前記転送部に伝達する制御部を備え、
前記転送部は、
前記制御部が伝達してきた前記マルチレイヤ・バインディングテーブルを更新する
ことを特徴とする請求項1に記載のパケット転送装置。
The packet transfer device includes:
An authentication request packet or frame sent together with the received port or channel identification information from the transfer unit provided in another packet transfer apparatus connected in advance mediates an authentication request to the authentication server, and the authentication server Obtaining an authenticated authentication result, setting the communication service quality determined based on the authentication result as a storage target of the multilayer binding table,
Check the existence of the requesting node or entity of the authentication request via the port or the channel, and update the multilayer binding table;
A control unit that transmits the multilayer binding table to the transfer unit provided in another packet transfer device;
The transfer unit
The packet transfer apparatus according to claim 1, wherein the multi-layer binding table transmitted by the control unit is updated.
 前記制御部は、
 前記ポート又はチャネルに接続されるいずれかのノード又はエンティティからの廃棄要請を受け付け、或いは予め定められた所定のノード又はエンティティを定期的にアクセスし取得した廃棄要請に応じて前記転送部の廃棄テーブルを更新し、
前記転送部は、
前記廃棄テーブルに該当するフレーム又はパケットを廃棄する
ことを特徴とする請求項1から3のいずれかに記載のパケット転送装置。
The controller is
The discard table of the transfer unit receives a discard request from any node or entity connected to the port or channel, or periodically accesses a predetermined node or entity that is determined in advance, and acquires the discard request. Update
The transfer unit
4. The packet transfer apparatus according to claim 1, wherein a frame or a packet corresponding to the discard table is discarded.
 前記転送部と前記制御部は、互いに連携して、
 前記ノード又は前記エンティティがブロードキャスト送信した自装置宛アドレス解決要求フレームに呼応して、前記ノード又は前記エンティティに対してアドレス解決要求フレームを同じポート又はチャネルからブロードキャスト送信し、
 前記ポート又は前記チャネルを介して返ってきたアドレス解決応答フレームの送信元物理アドレスと送信元論理アドレスの対と、前記自装置宛アドレス解決要求フレームの送信元物理アドレスと送信元論理アドレスの対とを照合することによって、前記ノード又は前記エンティティの物理アドレスと論理アドレスの真正性を検証し認証する
ことを特徴とする請求項1から4のいずれかに記載のパケット転送装置。
The transfer unit and the control unit cooperate with each other,
In response to the address resolution request frame addressed to its own device broadcasted by the node or the entity, the address resolution request frame is broadcasted from the same port or channel to the node or the entity,
A pair of a source physical address and a source logical address of an address resolution response frame returned via the port or the channel, and a pair of a source physical address and a source logical address of the address resolution request frame addressed to the own apparatus. 5. The packet transfer apparatus according to claim 1, wherein the authenticity of the physical address and the logical address of the node or the entity is verified and authenticated by collating each other.
 前記制御部及び前記転送部は、
 前記ノード又は前記エンティティが固定のプロセス識別アドレスを有する場合、前記プロセス識別アドレスを前記マルチレイヤ・バインディングテーブルに記憶する対象にする
ことを特徴とする請求項1から5のいずれかに記載のパケット転送装置。
The control unit and the transfer unit are
6. The packet transfer according to claim 1, wherein when the node or the entity has a fixed process identification address, the process identification address is a target to be stored in the multilayer binding table. apparatus.
 DHCP(Dynamic Host Configuration Protocol)、レイヤ2スイッチ及びW-LAN(Wireless Local Area Network)各機能の一部又はすべてを含めた一体構造である
ことを特徴とする請求項1から6のいずれかに記載のパケット転送装置。
7. The integrated structure including a part or all of each function of DHCP (Dynamic Host Configuration Protocol), layer 2 switch, and W-LAN (Wireless Local Area Network). Packet transfer equipment.
 前記転送部または前記制御部は、
 認証されたノード又はエンティティが送信したパケットを受信した場合、前記パケットの通信プロトコルに応じて予め定められた値を受信したパケットの所定のフィールドに書き込み、未認証のノード又はエンティティが送信したパケットを受信した場合、前記所定のフィールドをリセットする
ことを特徴とする請求項1から7のいずれかに記載のパケット転送装置。
The transfer unit or the control unit is
When a packet transmitted by an authenticated node or entity is received, a predetermined value according to the communication protocol of the packet is written in a predetermined field of the received packet, and a packet transmitted by an unauthenticated node or entity is 8. The packet transfer apparatus according to claim 1, wherein when the packet is received, the predetermined field is reset.
 インターネット利用者側に配置されるパケット転送装置と、
 請求項1から8のいずれかに記載のインターネット側に配置されるパケット転送装置と、を備え、インターネット側に配置される前記パケット転送装置は、インターネット利用者側に配置される前記パケット転送装置を迂回又はすり抜けてアドレス詐称パケットが送られても、インターネットへの流入を阻止する
ことを特徴とするパケット転送システム。
A packet transfer device arranged on the Internet user side;
9. The packet transfer apparatus disposed on the Internet side according to claim 1, wherein the packet transfer apparatus disposed on the Internet side includes the packet transfer apparatus disposed on the Internet user side. What is claimed is: 1. A packet transfer system characterized in that even if an address spoof packet is sent by detouring or passing through, the packet forwarding system prevents inflow to the Internet.
 互いにパケットをフレームにカプセル化して送受信する少なくとも一つのノード又は少なくとも一つのエンティティを収容する複数のポート又は複数のチャネルの識別情報と前記ノード又は前記エンティティが送信する前記フレームの送信元物理アドレスと送信元論理アドレスとの対応関係を記憶しておくマルチレイヤ・バインディングテーブルを、フレームが送られてきたポート又はチャネルの識別情報をキーに検索し、
 前記フレームの送信元物理アドレスと送信元論理アドレスとの対が前記バンディングテーブルに存在するときは、前記フレームから取り出したパケットをフレームにカプセル化して前記パケットの送信先論理アドレスに向けて次ホップノードへ転送し、前記マルチレイヤ・バインディングテーブルに存在しないときは前記パケットを廃棄する転送手順を有する
ことを特徴とするパケット転送方法。
Identification information of a plurality of ports or a plurality of channels accommodating at least one node or at least one entity that encapsulates packets in a frame, and a transmission source physical address and transmission of the frame transmitted by the node or the entity Search the multi-layer binding table that stores the correspondence with the original logical address using the identification information of the port or channel to which the frame has been sent as a key,
When a pair of a transmission source physical address and a transmission source logical address of the frame exists in the banding table, a packet extracted from the frame is encapsulated into a frame and a next hop node is directed toward the transmission destination logical address of the packet A packet transfer method comprising: transferring a packet to the packet and discarding the packet when the packet does not exist in the multilayer binding table.
 互いにパケットをフレームにカプセル化して送受信する少なくとも一つのノード又は少なくとも一つのエンティティを収容する複数のポート又は複数のチャネルの識別情報と前記ノード又は前記エンティティが送信する前記フレームの送信元物理アドレスと送信元論理アドレスとの対応関係を記憶しておくマルチレイヤ・バインディングテーブルを、フレームが送られてきたポート又はチャネルの識別情報をキーに検索し、
 前記フレームの送信元物理アドレスと送信元論理アドレスとの対が前記バンディングテーブルに存在するときは、前記フレームから取り出したパケットの送信先論理アドレスに向けて転送するルータへ転送し、前記マルチレイヤ・バインディングテーブルに存在しないときは前記パケットを廃棄する転送手順を有する
ことを特徴とするパケット転送方法。
Identification information of a plurality of ports or a plurality of channels accommodating at least one node or at least one entity that encapsulates packets in a frame, and a transmission source physical address and transmission of the frame transmitted by the node or the entity Search the multi-layer binding table that stores the correspondence with the original logical address using the identification information of the port or channel to which the frame has been sent as a key,
When a pair of a source physical address and a source logical address of the frame exists in the banding table, the frame is transferred to a router that transfers the packet taken out from the frame toward the destination logical address, A packet transfer method comprising a transfer procedure of discarding the packet when it does not exist in the binding table.
PCT/JP2015/050618 2014-05-14 2015-01-13 Packet transfer device, packet transfer system, and packet transfer method Ceased WO2015174100A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
JP2016519125A JPWO2015174100A1 (en) 2014-05-14 2015-01-13 Packet transfer device, packet transfer system, and packet transfer method

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2014-100321 2014-05-14
JP2014100321 2014-05-14

Publications (1)

Publication Number Publication Date
WO2015174100A1 true WO2015174100A1 (en) 2015-11-19

Family

ID=54479647

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2015/050618 Ceased WO2015174100A1 (en) 2014-05-14 2015-01-13 Packet transfer device, packet transfer system, and packet transfer method

Country Status (2)

Country Link
JP (1) JPWO2015174100A1 (en)
WO (1) WO2015174100A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017200153A (en) * 2016-04-28 2017-11-02 学校法人東京電機大学 Communication apparatus, communication system, communication control method, and program
JP2017201774A (en) * 2016-04-28 2017-11-09 学校法人東京電機大学 COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
JP2017212705A (en) * 2016-05-27 2017-11-30 学校法人東京電機大学 COMMUNICATION CONTROL DEVICE, COMMUNICATION SYSTEM, COMMUNICATION CONTROL METHOD, AND PROGRAM
CN111510300A (en) * 2020-04-10 2020-08-07 中国联合网络通信集团有限公司 Data processing method, device, equipment and computer readable storage medium
JP2021524090A (en) * 2018-05-21 2021-09-09 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Selectively provide mutual transport layer security using alternate server names
US20210344714A1 (en) * 2019-08-22 2021-11-04 Huawei Technologies Co., Ltd. Cyber threat deception method and system, and forwarding device
JP2021192554A (en) * 2016-08-24 2021-12-16 Necプラットフォームズ株式会社 Relay device, communication system, relay method, and relay program

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011081104A1 (en) * 2010-01-04 2011-07-07 日本電気株式会社 Communication system, authentication device, control server, and communication method and program
JP2012175482A (en) * 2011-02-23 2012-09-10 Fujitsu Ltd Terminal connection setting method of network communication device, operation monitoring device, and network communication device
WO2012153913A1 (en) * 2011-05-12 2012-11-15 주식회사 이스트소프트 Method of defending against a spoofing attack by using a blocking server

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2011081104A1 (en) * 2010-01-04 2011-07-07 日本電気株式会社 Communication system, authentication device, control server, and communication method and program
JP2012175482A (en) * 2011-02-23 2012-09-10 Fujitsu Ltd Terminal connection setting method of network communication device, operation monitoring device, and network communication device
WO2012153913A1 (en) * 2011-05-12 2012-11-15 주식회사 이스트소프트 Method of defending against a spoofing attack by using a blocking server

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2017200153A (en) * 2016-04-28 2017-11-02 学校法人東京電機大学 Communication apparatus, communication system, communication control method, and program
JP2017201774A (en) * 2016-04-28 2017-11-09 学校法人東京電機大学 COMMUNICATION DEVICE, COMMUNICATION METHOD, AND PROGRAM
JP2017212705A (en) * 2016-05-27 2017-11-30 学校法人東京電機大学 COMMUNICATION CONTROL DEVICE, COMMUNICATION SYSTEM, COMMUNICATION CONTROL METHOD, AND PROGRAM
JP2021192554A (en) * 2016-08-24 2021-12-16 Necプラットフォームズ株式会社 Relay device, communication system, relay method, and relay program
JP2023060297A (en) * 2016-08-24 2023-04-27 Necプラットフォームズ株式会社 Relay device, relay method, and relay program
JP7553624B2 (en) 2016-08-24 2024-09-18 Necプラットフォームズ株式会社 Relay device, relay method, and relay program
JP2021524090A (en) * 2018-05-21 2021-09-09 インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation Selectively provide mutual transport layer security using alternate server names
JP7203444B2 (en) 2018-05-21 2023-01-13 インターナショナル・ビジネス・マシーンズ・コーポレーション Selectively provide mutual transport layer security using alternate server names
US20210344714A1 (en) * 2019-08-22 2021-11-04 Huawei Technologies Co., Ltd. Cyber threat deception method and system, and forwarding device
US12074908B2 (en) * 2019-08-22 2024-08-27 Huawei Technologies Co., Ltd. Cyber threat deception method and system, and forwarding device
CN111510300A (en) * 2020-04-10 2020-08-07 中国联合网络通信集团有限公司 Data processing method, device, equipment and computer readable storage medium
CN111510300B (en) * 2020-04-10 2023-04-18 中国联合网络通信集团有限公司 Data processing method, device, equipment and computer readable storage medium

Also Published As

Publication number Publication date
JPWO2015174100A1 (en) 2017-04-20

Similar Documents

Publication Publication Date Title
Abad et al. An analysis on the schemes for detecting and preventing ARP cache poisoning attacks
EP1779589B1 (en) Arrangement for tracking ip address usage based on authenticated link identifier
US9602485B2 (en) Network, network node with privacy preserving source attribution and admission control and device implemented method therfor
US7360245B1 (en) Method and system for filtering spoofed packets in a network
US7984493B2 (en) DNS based enforcement for confinement and detection of network malicious activities
Gangan A review of man-in-the-middle attacks
Hijazi et al. Address resolution protocol spoofing attacks and security approaches: A survey
WO2015174100A1 (en) Packet transfer device, packet transfer system, and packet transfer method
CN1968272B (en) Method used for remitting denial of service attack in communication network and system
Lu et al. An SDN‐based authentication mechanism for securing neighbor discovery protocol in IPv6
CN105207778A (en) Method of realizing package identity identification and digital signature on access gateway equipment
CN115694951A (en) Data transmission method, device and system based on virtualization network
Tripathi et al. An ICMP based secondary cache approach for the detection and prevention of ARP poisoning
McPherson et al. Source address validation improvement (SAVI) threat scope
Singh et al. A detailed survey of ARP poisoning detection and mitigation techniques
Shete et al. DHCP protocol using OTP based two-factor authentication
US8590031B2 (en) Methods, systems, and computer program products for access control services using a transparent firewall in conjunction with an authentication server
KR100856918B1 (en) IP address authentication method and IP6-based network system in IP6-based network
Kwak et al. Trust domain based trustworthy networking
JP4768547B2 (en) Authentication system for communication devices
Janbeglou et al. Redirecting outgoing DNS requests toward a fake DNS server in a LAN
US20060123475A1 (en) Apparatus and method for traversing gateway device using a plurality of batons
Pahlevan Signaling and Policy Enforcement for Cooperative Firewalls
Choi et al. LIPS: Lightweight internet permit system for stopping unwanted packets
Teku A study on the nature of ipv6 intrusions and the road map towards their detection & prevention

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15792171

Country of ref document: EP

Kind code of ref document: A1

ENP Entry into the national phase

Ref document number: 2016519125

Country of ref document: JP

Kind code of ref document: A

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15792171

Country of ref document: EP

Kind code of ref document: A1