Paper
19 May 2022 Multi-protocol comprehensive topology probe technology under non-cooperative conditions
Xuanting Lu, Qichao Yang, Shengli Liu, Pengfei Yang
Author Affiliations +
Proceedings Volume 12250, International Symposium on Computer Applications and Information Systems (ISCAIS 2022); 122500O (2022) https://doi.org/10.1117/12.2639490
Event: International Symposium on Computer Applications and Information Systems (ISCAIS2022), 2022, Shenzhen, China
Abstract
With the rapid development of the Internet and the increasingly complex and diverse network environment, it is of great significance to quickly and accurately obtain the topology environment of the target network for optimizing network management, locating network resources and ensuring network security. Most of the existing network topology detection methods are implemented based on the SNMP protocol, or use the Traceroute-like method for active detection. However, in a non-cooperative environment, that is, the router disables SNMP permissions or prohibits responding to probe packets to shield Traceroute probes, network probes will face problems such as missing information and blocked probes. Based on the original SNMP protocol detection, this paper adopts RIP, OSPF and other routing protocols to supplement the detection method, which greatly reduces the number of undetectable nodes. In addition, for a small number of router devices that are still undetectable, the Traceroute directional breakthrough method using the routing table as a clue is used to bypass these undetectable nodes, complete the missing information in the network topology, and further optimize and improve the detection results.
© (2022) COPYRIGHT Society of Photo-Optical Instrumentation Engineers (SPIE). Downloading of the abstract is permitted for personal use only.
Xuanting Lu, Qichao Yang, Shengli Liu, and Pengfei Yang "Multi-protocol comprehensive topology probe technology under non-cooperative conditions", Proc. SPIE 12250, International Symposium on Computer Applications and Information Systems (ISCAIS 2022), 122500O (19 May 2022); https://doi.org/10.1117/12.2639490
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Databases

Network security

Internet

Data transmission

Target detection

Telecommunications

Data modeling

RELATED CONTENT

Review of RFID security technology
Proceedings of SPIE (December 19 2021)
Talk to me using voice server to enable business...
Proceedings of SPIE (December 29 2000)
Firewall using Red Hat Linux 8.0
Proceedings of SPIE (October 02 2006)

Back to Top