基于Open vSwitch的可信交換機(jī)STP協(xié)議的可信改進(jìn)
發(fā)布時間:2018-05-19 10:29
本文選題:STP + 網(wǎng)絡(luò)安全。 參考:《北京工業(yè)大學(xué)》2014年碩士論文
【摘要】:計(jì)算機(jī)網(wǎng)絡(luò)技術(shù)飛速發(fā)展和規(guī)模不斷擴(kuò)大的同時,也引來了無數(shù)互聯(lián)網(wǎng)安全問題,人們對網(wǎng)絡(luò)安全這一問題也越來越重視?尚啪W(wǎng)絡(luò)成為近年來網(wǎng)絡(luò)安全領(lǐng)域的研究熱點(diǎn)。將可信與傳統(tǒng)網(wǎng)絡(luò)結(jié)合,勢必為網(wǎng)絡(luò)安全提供更好的安全保障,可信網(wǎng)絡(luò)必將不斷發(fā)展并有望在未來取代傳統(tǒng)網(wǎng)絡(luò)。 以太網(wǎng)是當(dāng)今最流行的局域網(wǎng)技術(shù)。隨著以太網(wǎng)業(yè)務(wù)的不斷發(fā)展,人們對以太網(wǎng)安全也越來越重視,對網(wǎng)絡(luò)自愈功能的要求也越來越高。生成樹協(xié)議(STP)是以太網(wǎng)交換機(jī)運(yùn)行的主要協(xié)議之一,其目的是用來解決交換拓?fù)渲械奈锢砣哂喈a(chǎn)生的問題。當(dāng)網(wǎng)絡(luò)出現(xiàn)環(huán)路時,STP會動態(tài)的建立一棵生成樹,使冗余鏈路處于阻塞狀態(tài),從而抑制廣播風(fēng)暴等問題。而當(dāng)網(wǎng)絡(luò)出現(xiàn)故障時,冗余鏈路又可以馬上從阻塞狀態(tài)轉(zhuǎn)到激活狀態(tài),代替失效的主鏈路正常工作。 交換機(jī)通過相互交換網(wǎng)橋協(xié)議數(shù)據(jù)單元(BPDU)的方式進(jìn)行信息交換,從而建立生成樹。每臺交換機(jī)都擁有一個唯一的身份標(biāo)示:網(wǎng)橋ID(BID),具有最小BID的交換機(jī)將被選舉為根網(wǎng)橋。由于這個特性,攻擊者可以偽裝成具有最小BID的交換機(jī),,成為根網(wǎng)橋,從而窺探網(wǎng)絡(luò)流量,發(fā)起網(wǎng)絡(luò)攻擊,這種攻擊被稱為根接管攻擊(root take-over attack)。當(dāng)網(wǎng)絡(luò)拓?fù)浒l(fā)生變化時,生成樹需重計(jì)算,這容易造成攻擊者的一些其他攻擊行為,如ID改變攻擊、沉默攻擊等。國外學(xué)者從三個方面闡述了生成樹協(xié)議的缺陷:1)缺少BPDU認(rèn)證機(jī)制;2)STP慢收斂;3)缺少根監(jiān)管。針對生成樹協(xié)議的攻擊也暴露了鏈路層網(wǎng)絡(luò)協(xié)議的不足,并將高層網(wǎng)絡(luò)至于危險(xiǎn)之中。盡管一些問題被研究多年,且不斷有學(xué)者提出解決方案,但仍舊存在很多問題。 為了增強(qiáng)2層網(wǎng)絡(luò)的安全及可信性,本文將可信網(wǎng)絡(luò)與傳統(tǒng)網(wǎng)絡(luò)結(jié)合,提出一種基于可信平臺的生成樹協(xié)議,旨在通過一個輕量級的認(rèn)證機(jī)制,達(dá)到局域網(wǎng)交換機(jī)的高可信性。如果正確的實(shí)施在每臺可信交換機(jī)上,可信STP的認(rèn)證機(jī)制可保證局域網(wǎng)中交換機(jī)對其他交換機(jī)聲明的拓?fù)湫畔⒌目尚判。為了?yàn)證改進(jìn)后的可信STP,本文還提出了一個可信評估模型,它通過使用基于規(guī)范的狀態(tài)機(jī)對STP進(jìn)行可信評估。本文通過在Open vSwitch上實(shí)現(xiàn)一個可信STP原型來對其進(jìn)行功能測試。實(shí)驗(yàn)表明,該可信STP協(xié)議能夠達(dá)到安全目標(biāo),并能在較低的計(jì)算負(fù)載和較好的收斂時間下有效的避免STP攻擊。
[Abstract]:With the rapid development and expansion of computer network technology, there are also numerous Internet security problems. People pay more and more attention to the problem of network security. In recent years, trusted network has become a research hotspot in the field of network security. The combination of trusted network and traditional network is bound to provide a better security guarantee for network security. Trusted network will continue to develop and is expected to replace the traditional network in the future. Ethernet is the most popular LAN technology nowadays. With the continuous development of Ethernet service, people pay more and more attention to Ethernet security, and the requirement of network self-healing function is higher and higher. Spanning Tree Protocol (STP) is one of the main protocols for Ethernet switch to solve the problem of physical redundancy in switching topology. When the network appears loop, STP will dynamically set up a spanning tree, make the redundant link in blocking state, so as to suppress the broadcast storm and other problems. When the network fails, the redundant link can be switched from blocking state to active state immediately, instead of the failure of the main link. Switches exchange information by exchanging data units of bridge protocol (BPDU) to establish spanning tree. Each switch has a unique identity: bridge ID ID, and the switch with the smallest BID will be elected as the root bridge. Because of this feature, an attacker can disguise himself as a switch with the smallest BID and become a root bridge to peek into network traffic and launch a network attack, which is called root take-over attack. When the network topology changes, the spanning tree needs to be recomputed, which can easily lead to some other attacks, such as ID change attack, silent attack and so on. Foreign scholars have explained the defects of spanning tree protocol from three aspects: 1) lack of BPDU authentication mechanism and 3) lack of root supervision. The attack against spanning tree protocol also exposes the deficiency of link layer network protocol and puts the high layer network in danger. Although some problems have been studied for many years and many scholars have put forward solutions, there are still many problems. In order to enhance the security and credibility of the two-layer network, this paper combines the trusted network with the traditional network, and proposes a spanning tree protocol based on trusted platform, which aims to achieve the high credibility of LAN switch through a lightweight authentication mechanism. If implemented correctly on each trusted switch, the authentication mechanism of trusted STP can guarantee the credibility of the topology information declared by the switch in LAN. In order to verify the improved trusted STP, this paper also proposes a trusted evaluation model, which uses a canonical state machine for trusted evaluation of STP. This paper implements a trusted STP prototype on Open vSwitch to test its function. Experiments show that the trusted STP protocol can achieve security goals and can effectively avoid STP attacks under lower computational load and better convergence time.
【學(xué)位授予單位】:北京工業(yè)大學(xué)
【學(xué)位級別】:碩士
【學(xué)位授予年份】:2014
【分類號】:TP393.04;TP393.08
【參考文獻(xiàn)】
相關(guān)期刊論文 前1條
1 沈昌祥;張煥國;王懷民;王戟;趙波;嚴(yán)飛;余發(fā)江;張立強(qiáng);徐明迪;;可信計(jì)算的研究與發(fā)展[J];中國科學(xué):信息科學(xué);2010年02期
本文編號:1909753
本文鏈接:http://sikaile.net/guanlilunwen/ydhl/1909753.html
最近更新
教材專著