1. Field of the Invention
The present invention relates to a source address-fabricated packet detection unit, a source address-fabricated packet detection method, and a source address-fabricated packet detection program that detect the hacking or attacks carried out by fabricating a source address in an FW (Fire Wall), a router with a filtering function, or an IDS (Intruder Detection System) on a network.
2. Description of the Related Art
Currently, with the spread of a packet communication service in WWW (World Wide Web), E-mail, mobile phone, the Internet becomes a social infrastructure. Under the circumstances, a highly sophisticated security function has been demanded. To satisfy the demand, many products such as an FW, and IDS, that perform protection against the hacking or attacks becomes widespread. Of the hacking or attacks, what is seriously troubling is a fabrication of a source address of a packet.
Here, an operation of the FW in TCP (Transmission Control Protocol)/IP (Internet Protocol) network boundary will be described.
When the host 101 falsely replaces the source IP address in the IP header of the packet to be sent with the IP address B of the host 102, the packet sent from the host 101 has been regarded as the packet sent from the host 102, with the result that, the host 101 can access the host 103 through the FW 100 and illegally use the host 103.
As a means for preventing the illegal intrusion of the source address-fabricated packet, a filtering function of the FW can be taken. More specifically, the FW determines whether the source IP address of the packet directed from the outside to the inside of LAN corresponds to the IP address of the host existing in the inside of LAN. When determining the source IP address of the packet directed from the outside to the inside of LAN is the IP address of the host existing in the inside of LAN, the FW discards the sent packet. However, although such a filtering function of the FW can detect the packet in which the IP address has been falsely replaced with the host existing in the inside of LAN, but cannot detect the packet in which the IP address has been falsely replaced with the host existing outside of LAN.
On the other hand, some FWs have a filtering passage list. The filtering passage list is a list that describes source IP addresses that are allowed to be passed from the outside to the inside of LAN.
However, in the configuration shown in
The present invention has been made to solve the above problem, and an object thereof is to provide a source IP address-fabricated packet detection unit, a source IP address-fabricated packet detection method, and a source IP address-fabricated packet detection program capable of detecting a packet in which the IP address has been falsely replaced with the source IP address of the host existing outside of LAN and thereby protecting the inside of LAN from the hacking or attacks carried out by fabricating a source IP address,
According to a first aspect of the present invention, there is provided a source address-fabricated packet detection unit that detects a packet with a fabricated source address, comprising: a packet controller that controls the input/output of a packet and acquires a source address and time to live of the input packet; a reference time to live storage section that stores a reference time to live that represents a normal time to live range and source address in a correspondence manner; and an address fabrication determination section that compares the time to live of the input packet and reference time to live corresponding to the source address of the input packet to determine the presence or absence of the fabrication of the source address in the input packet based on the comparison result.
With the above configuration, it is possible to detect the packet with a fabricated source address by comparing the reference time to live for each source address that has been previously stored and the time to live of the input packet.
The source address-fabricated packet detection unit according to the present invention further comprises: a time to live storage section that stores the source address of the input packet and time to live in a correspondence manner; and a reference time to live calculation section that calculates a reference time to live for each source address based on the time to live that the time to live storage section has stored for each source address.
With the above configuration, it is possible to calculate the reference time to live for each source address by using the time to live collected for each source address.
In the source address-fabricated packet detection unit according to the present invention, when the address fabrication determination section has determined the absence of the source address fabrication, the packet controller allows the input packet to be passed through, and when the address fabrication determination section has determined the presence of the source address fabrication, the packet controller discards the input packet.
With the above configuration, it is possible to protect, in real time, the inside of LAN from the hacking or attacks carried out by fabricating the source address by discarding the address fabricated packet when detected.
The source address-fabricated packet detection unit according to the present invention further comprises a disconnection section that disconnects the connection between the source address and destination address of the input packet when the address fabrication determination section has determined the presence of the source address fabrication.
With the above configuration, when the source address-fabricated packet is detected, the fabricated packet is discarded. Further, the connection between the source address and destination address is disconnected. Therefore, it is possible to protect, in real time, the inside of LAN from the hacking or attacks carried out by fabricating the source address and prevent the continuation of the hacking or attacks.
The source address-fabricated packet detection unit according to the present invention further comprises an alert information notification section that sends alert information to an address that has been previously designated when the address fabrication determination section has determined the presence of the source address fabrication.
With the above configuration, when the source address-fabricated packet is detected, alert information related to the packet is notified to an administrator. Therefore, the administrator can grasp the hacking or attacks carried out by fabricating the source address and cope with it.
The source address-fabricated packet detection unit according to the present invention further comprises a log storage section that stores alert information as a log when the address fabrication determination section has determined the presence of the source address fabrication.
With the above configuration, when the source address-fabricated packet is detected, alert information related to the packet is recorded as a log. Therefore, it is possible to preserve the records of the hacking or attacks carried out by fabricating the source address and use the log as evidence of the hacking or attacks.
In the source address-fabricated packet detection unit according to the present invention, the source address is a source IP address, the time to live is a TTL value, the reference time to live is a reference TTL value representing a normal TTL value range, and the reference time to live storage section is a reference TTL value storage section.
With the above configuration, it is possible to detect the packet having a fabricated source IP address by comparing the reference TTL value for each source IP address that has been previously stored and the TTL value of the input packet.
The source address-fabricated packet detection unit according to the present invention further comprises: a TTL value storage section that stores the source IP address of the input packet and TTL value in a correspondence manner; and a reference TTL value calculation section that calculates a reference TTL value for each source IP address based on the TTL value that the TTL value storage section has stored for each source IP address. Further, in the source address-fabricated packet detection unit according to the present invention, the reference TTL value calculation section calculates a median value from the TTL value that the TTL value storage section has stored for each source IP address and sets a predetermined range including the median value as the reference TTL value corresponding to the source IP address. Further, in the source address-fabricated packet detection unit according to the present invention, the reference TTL value calculation section calculates an average value from the TTL value that the TTL value storage section has stored for each source IP address and sets a predetermined range including the average value as the reference TTL value corresponding to the source IP address.
With the above configuration, it is possible to calculate the reference TTL value for each source IP address by using the TTL value collected for each source IP address.
In the source address-fabricated packet detection unit according to the present invention, when the address fabrication determination section has determined the absence of the source IP address fabrication, the packet controller allows the input packet to be passed through, and when the address fabrication determination section has determined the presence of the source IP address fabrication, the packet controller discards the input packet.
With the above configuration, it is possible to protect, in real time, the inside of LAN from the hacking or attacks carried out by fabricating the source IP address by discarding the source IP address-fabricated packet when detected.
The source address-fabricated packet detection unit according to the present invention further comprises a disconnection section that disconnects the connection between the source IP address and destination IP address of the input packet when the address fabrication determination section has determined the presence of the source IP address fabrication. In the source address-fabricated packet detection unit according to the present invention, the disconnection section sends a reset packet to the source IP address and destination IP address to disconnect the connection between the source IP address and destination IP address.
With the above configuration, when the source IP address-fabricated packet is detected, the fabricated packet is discarded. Further, the connection between the source IP address and destination IP address is disconnected. Therefore, it is possible to protect, in real time, the inside of LAN from the hacking or attacks carried out by fabricating the source IP address and prevent the continuation of the hacking or attacks.
The source address-fabricated packet detection unit according to the present invention further comprises an alert information notification section that sends alert information to an address that has been previously designated when the address fabrication determination section has determined the presence of the source IP address fabrication. In the source address-fabricated packet detection unit according to the present invention, the alert information includes the source IP address, destination IP address, and TTL value of the input packet and reference TTL value.
With the above configuration, when the source IP address-fabricated packet is detected, alert information related to the packet is notified to an administrator. Therefore, the administrator can grasp the hacking or attacks carried out by fabricating the source IP address and cope with it. Note that the alert information may further include date and time.
The source address-fabricated packet detection unit according to the present invention further comprises a log storage section that stores alert information as a log when the address fabrication determination section has determined the presence of the source IP address fabrication. In the source address-fabricated packet detection unit according to the present invention, the alert information includes the source IP address, destination IP address, and TTL value of the input packet and reference TTL value.
With the above configuration, when the source IP address-fabricated packet is detected, alert information related to the packet is recorded as a log. Therefore, it is possible to preserve the records of the hacking or attacks carried out by fabricating the source IP address and use the log as evidence of the hacking or attacks.
According to a second aspect of the present invention, there is provided a source address-fabricated packet detection method for detecting a packet having a fabricated source IP address, comprising: controlling the input/output of a packet and acquiring a source IP address and TTL value of the input packet; storing the source IP address and TTL vale of the input packet in a correspondence manner; calculating the reference TTL value that represents a normal TTL value range for each source IP address based on the TTL value stored for each source IP address; storing the reference TTL value and source IP address in a correspondence manner; and comparing the TTL value of the input packet with the reference TTL value corresponding to the source IP address of the input packet to determine whether the source IP address in the input packet has been fabricated or not based on the comparison result.
With the above configuration, it is possible to detect the packet with a fabricated source IP address by comparing the reference TTL value for each source address calculated using the TTL value collected for each source IP address and the TTL value of the input packet.
The source address-fabricated packet detection method according to the present invention further comprises: allowing the input packet to be passed through when it has been determined that the source IP address has not been fabricated; and discarding the input packet when it has been determined that the source IP address has been fabricated.
With the above configuration, it is possible to protect, in real time, the inside of LAN from the hacking or attacks carried out by fabricating the source IP address by discarding the source IP address-fabricated packet when detected.
The source address-fabricated packet detection method according to the present invention further comprises disconnecting the connection between the source IP address and destination IP address of the input packet when it has been determined that the source IP address has been fabricated.
With the above configuration, when the source IP address-fabricated packet is detected, the fabricated packet is discarded. Further, the connection between the source IP address and destination IP address is disconnected. Therefore, it is possible to protect, in real time, the inside of LAN from the hacking or attacks carried out by fabricating the source IP address and prevent the continuation of the hacking or attacks.
The source address-fabricated packet detection method according to the present invention further comprises sending alert information to an address that has been previously designated when it has been determined that the source IP address has been fabricated.
With the above configuration, when the source IP address-fabricated packet is detected, alert information related to the packet is notified to an administrator. Therefore, the administrator can grasp the hacking or attacks carried out by fabricating the source IP address and cope with it.
The source address-fabricated packet detection method according to the present invention further comprises storing alert information as a log when it has been determined that the source IP address has been fabricated.
With the above configuration, when the source IP address-fabricated packet is detected, alert information related to the packet is recorded as a log. Therefore, it is possible to preserve the records of the hacking or attacks carried out by fabricating the source IP address and use the log as evidence of the hacking or attacks.
According to a third aspect of the present invention, there is provided a source address-fabricated packet detection program that has been stored in a computer-readable medium in order to allow a computer to detect the packet with a fabricated source IP address, comprising: controlling the input/output of a packet and acquiring a source IP address and TTL value of the input packet; storing the source IP address and TTL value of the input packet in a correspondence manner; calculating the reference TTL value that represents a normal TTL value range for each source IP address based on the TTL value stored for each source IP address; storing the reference TTL value and source IP address in a correspondence manner; and comparing the TTL value of the input packet with the reference TTL value corresponding to the source IP address of the input packet to determine whether the source IP address in the input packet has been fabricated or not based on the comparison result.
With the above configuration, it is possible to detect the packet with a fabricated source IP address by comparing the reference TTL value for each source address calculated using the TTL value collected for each source IP address and the TTL value of the input packet.
The source address-fabricated packet detection program according to the present invention further comprises: allowing the input packet to be passed through when it has been determined that the source IP address has not been fabricated; and discarding the input packet when it has been determined that the source IP address has been fabricated.
With the above configuration, it is possible to protect, in real time, the inside of LAN from the hacking or attacks carried out by fabricating the source IP address by discarding the source IP address-fabricated packet when detected.
The source address-fabricated packet detection program according to the present invention further comprises disconnecting the connection between the source IP address and destination IP address of the input packet when it has been determined that the source IP address has been fabricated.
With the above configuration, when the source IP address-fabricated packet is detected, the fabricated packet is discarded. Further, the connection between the source IP address and destination IP address is disconnected. Therefore, it is possible to protect, in real time, the inside of LAN from the hacking or attacks carried out by fabricating the source IP address and prevent the continuation of the hacking or attacks.
The source address-fabricated packet detection program according to the present invention further comprises sending alert information to an address that has been previously designated when it has been determined that the source IP address has been fabricated.
With the above configuration, when the source IP address-fabricated packet is detected, alert information related to the packet is notified to an administrator. Therefore, the administrator can grasp the hacking or attacks carried out by fabricating the source IP address and cope with it.
The source address-fabricated packet detection program according to the present invention further comprises storing alert information as a log when it has been determined that the source IP address has been fabricated.
With the above configuration, when the source IP address-fabricated packet is detected, alert information related to the packet is recorded as a log. Therefore, it is possible to preserve the records of the hacking or attacks carried out by fabricating the source IP address and use the log as evidence of the hacking or attacks.
Embodiments of the present invention will be described below in detail with reference to the accompanying drawings. In the present embodiment, a description will be given of a source address-fabricated packet detection unit in a TCP/IP network.
[First Embodiment]
Firstly, a TTL value that a source address-fabricated packet detection unit uses will be described. As shown in
The TTL value in the IP header is a Time To Live field of the IP header and indicates the threshold limit of the router number that a packet can be passed through. An initial value is set as the TTL value at first and the value is decremented by one every time the packet is passed through a router. When the TTL value has become 0, the packet is discarded and an ICMP type 11 error (time exceeded) packet is sent back.
Under the above operation condition, the TTL value of the packet falsely assuming the source IP address often differs from the TTL value of a normal packet. The reason is that the initial value of the TTL value often differs for each host, and that the number of hops from the source host to FW often differs between the two packets. The present invention takes advantages of this nature and compares the TTL value of the passed packet and a reference TTL value to detect the source IP address-fabricated packet. The reference TTL value is calculated based on the history of the TTL value corresponding to a source IP address and denotes a normal TTL value range. A source IP address-fabricated packet detection unit according to the present embodiment will be described below in detail. The source IP address-fabricated packet detection unit according to the present embodiment discards the source IP address-fabricated packet when detected.
The address fabrication determination section 2 determines whether the reference TTL value corresponding to the source IP address of the input packet has been set in a reference TTL value table or not (S2). Here, the reference TTL value table will be described. The reference TTL value table is stored in the reference TTL value storage section 5.
When the reference TTL value table does not include the reference TTL value corresponding to the source IP address of the input packet (N in S2), the flow shifts to S4. When the reference TTL value table includes the reference TTL value corresponding to the source IP address of the input packet (Y in S2), the address fabrication determination section 2 acquires the reference TTL value corresponding to the source IP address from the reference TTL value table and determines whether the TTL value of the input packet falls within reference TTL value range or not (S3).
When the TTL value of the input packet is out of reference TTL value range (N in S3), the address fabrication determination section 2 notifies the packet controller 1 that the input packet is a source IP address-fabricated packet. When receiving the notification, the packet controller 1 discards the input packet (S7) and ends the flow.
When the TTL value of the input packet falls within reference TTL value range (Y in S3), the address fabrication determination section 2 notifies the packet controller 1 that the source IP address of the input packet is normal and stores the TTL value of the input packet in the TTL value table (S4).
Here, the TTL table will be described. The TTL value table is stored in the TTL value storage section 3.
The reference TTL value calculation section 4 calculates the reference TTL values including the TTL values that have been newly stored in the TTL value table and stores the calculation results in the reference TTL value table (S5). The reference TTL value is calculated as a median value or average value of the TTL values for each source IP address in the TTL value table. The reference TTL value is allowed to have a range. For example, the reference TTL value can be set as “median value ±1”, or “average ±1”. It is possible to omit the TTL value storage section 3 and reference TTL value calculation 4 by allowing the reference TTL value table to store the reference TTL table previously.
When receiving the notification that the source IP address of the input packet is normal, the packet controller 1 transmits the input packet to the network (S6) and end the flow.
An operation example of the FW provided with the source address-fabricated packet detection unit according to the embodiment will next be described with reference to
For the sake of simplicity, only a determination made for the packet having the source IP address B will be described. The source address-fabricated packet detection unit 130 compares the TTL value of the input packet with the reference TTL value 251±1 corresponding to the source IP address of the input packet, When determining that the TTL value falls within reference TTL value range, the source address-fabricated packet detection unit 130 allows the input packet to be passed through. When determining that the TTL value is out of reference TTL value range, the source address-fabricated packet detection unit 130 discards the input packet. In the example of
As described above, in the present embodiment, when the source IP address-fabricated packet is detected, the detected packet is discarded, Therefore, it is possible to protect, in real time, the inside of LAN from the hacking or attacks carried out by fabricating the source IP address.
[Second Embodiment]
The source IP address-fabricated packet detection unit according to a second embodiment notifies an administrator of the information related to the fabricated packet when having detected the source IP address-fabricated packet.
At first, an operation of the packet controller 1A will be described. The packet controller 1A firstly receives an input packet from a network. Then, the packet controller 1A acquires the source IP address and TTL value of the input packet so as to output them to the address fabrication determination section 2A, and acquires connection information of the input packet so as to output it to the alert information notification section 21. After that, the packet controller 1A transmits the input packet to the network. The connection information includes a source IP address and destination IP address to be obtained from the IP header and a source port number and destination port number to be obtained from the TCP header. As shown in
Operations of the address fabrication determination section 2A and alert information notification section 21 will next be described.
When receiving the notification that the input packet is a source IP address fabricated packet, the alert information notification section 21 creates alert information (S21). The alert information includes, for example, date, time, connection information and TTL value of the input packet, and reference TTL value. The alert information notification section 21 then sends the alert information as a mail to the mail address of a designated administrator (S22) and ends the flow.
As described above, in the present embodiment, when the source IP address-fabricated packet is detected, alert information related to the packet is created and notified to an administrator. Therefore, the administrator can grasp the hacking or attacks carried out by fabricating the source IP address and cope with it.
[Third Embodiment]
The source IP address-fabricated packet detection unit according to a third embodiment records information related to the fabricated packet as a log when having detected the source IP address-fabricated packet.
An operation of the log storage section 31 will be described.
When receiving the notification that the input packet is a source IP address fabricated packet, the log storage section 31 creates alert information (S31). The log storage section 31 then records the alert information as a log (S32) and ends the flow.
As described above, in the present embodiment, when the source IP address-fabricated packet is detected, alert information related to the packet is created and recorded as a log. Therefore, it is possible to preserve the records of the hacking or attacks carried out by fabricating the source IP address and use the log as evidence of the hacking or attacks.
[Fourth Embodiment]
The source IP address-fabricated packet detection unit according to a fourth embodiment disconnects the connection between the source IP address and destination address of the fabricated packet when having detected the source IP address-fabricated packet.
At first, an operation of the packet controller 1B will be described. The packet controller 1B firstly receives an input packet from a network. Then the packet controller 1B acquires the source IP address and TTL value of the input packet so as to output them to the address fabrication determination section 2B, and outputs the input packet to the disconnection section 41. When receiving a notification that the input packet is a source IP address-fabricated packet, the packet controller 1B discards the input packet.
Operations of the address fabrication determination section 2B and disconnection section 41 will next be described.
When receiving the notification that the input packet is a source IP address-fabricated packet, the disconnection section 41 refers to the input packet and creates a reset packet for the source IP address and destination IP address (S41). The reset packet is a packet for forcibly terminating the TCP connection, more specifically, a packet that sets an RST flag bit among the flags in the TCP header. The disconnection section 41 then sends the reset packet to the source IP address and destination IP address (S42) and ends the flow.
As described above, in the present embodiment, when the source IP address-fabricated packet is detected, the fabricated packet is discarded. Further, the reset packet is created and sent to the source IP address and destination IP address to thereby disconnect the connection through TCP. Therefore, it is possible to protect, in real time, the inside of LAN from the hacking or attacks carried out by fabricating the source IP address and prevent the continuation of the hacking or attacks.
By programming the function of the source IP address-fabricated packet detection unit described in the first to fourth embodiments, it is possible to implement the function as a part of functions of the FW, router, or IDS and to allow the function to cooperate with other functions of them. It is, therefore, possible to increase the detection rate of the hacking or attacks.
According to the present invention, as described above, in a unit that relays or monitors a packet, it is possible to collect the TTL value for each source IP address of the passing packet to create the reference TTL value and to compare the TTL value of the passing packet with the reference TTL value to thereby detect the fabrication of the source IP address. Further, by creating alert information or discarding the packet when the fabrication of the source IP address has been detected, it is possible to protect the inside of LAN from the hacking or attacks carried out by fabricating a source address.
Number | Date | Country | |
---|---|---|---|
Parent | PCT/JP02/12583 | Dec 2002 | US |
Child | 11094247 | Mar 2005 | US |