As a gateway to handle all intranet terminal traffic, SOHO router plays an important role in the network. In this paper, we introduced the security threats faced by SOHO routers, and on this basis, we propose a packet modification method of "Discard-Resend". The method does not affect the normal operation of the router, nor does it affect the normal communication between the two sides. We have done experiments on this packet modification method in several scenarios from the view of network security personnel and network attackers and achieved the desired results. The packet modification method of "Discard-Resend" is a basic work in the security research of SOHO router, and it is of great significance.
Network data security is very important for each user and service provider, and every process of network data transmission is at risk of being tampered with. In this paper, we proposed a bidirectional tampering method of network data for Linux system. In this method we use the combination of Netfilter and iptables, and use the NetfilterQueue module in Python to tamper with the packets entering and leaving a Linux host. This tampering operation is transparent to upper users and may cause domain name redirection or many other serious consequences which threaten the security of hosts. Finally, the feasibility of this tampering method is verified by experiments.
With the rapid development of the Internet and the increasingly complex and diverse network environment, it is of great significance to quickly and accurately obtain the topology environment of the target network for optimizing network management, locating network resources and ensuring network security. Most of the existing network topology detection methods are implemented based on the SNMP protocol, or use the Traceroute-like method for active detection. However, in a non-cooperative environment, that is, the router disables SNMP permissions or prohibits responding to probe packets to shield Traceroute probes, network probes will face problems such as missing information and blocked probes. Based on the original SNMP protocol detection, this paper adopts RIP, OSPF and other routing protocols to supplement the detection method, which greatly reduces the number of undetectable nodes. In addition, for a small number of router devices that are still undetectable, the Traceroute directional breakthrough method using the routing table as a clue is used to bypass these undetectable nodes, complete the missing information in the network topology, and further optimize and improve the detection results.
Access to the requested content is limited to institutions that have purchased or subscribe to SPIE eBooks.
You are receiving this notice because your organization may not have SPIE eBooks access.*
*Shibboleth/Open Athens users─please
sign in
to access your institution's subscriptions.
To obtain this item, you may purchase the complete book in print or electronic format on
SPIE.org.
INSTITUTIONAL Select your institution to access the SPIE Digital Library.
PERSONAL Sign in with your SPIE account to access your personal subscriptions or to use specific features such as save to my library, sign up for alerts, save searches, etc.