网络拓扑隐蔽自动探测技术的研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
从上世纪90年代以来,Internet和网络技术得到了长足的发展,网络安全问题变得日益严峻,自动网络拓扑发现作为网络安全管理的一项关键技术也得到了人们的重视。近年的研究表明,网络拓扑自动发现技术仍然存在一系列问题:网络拓扑数学模型不够准确,不能很好的反映真实网络结构;对网络中影响网络拓扑探测的因素过度简化,没有考虑实际网络中防火墙、代理服务器等对拓扑信息收集的影响,导致拓扑发现的完整性不高;拓扑发现算法不通用,没有统一接口,很难进行移植和第二次开发。
     以自治系统为对象,本文对网络拓扑自动探测技术进行了研究,取得了以下几个方面的成果:
     1.提出了一种分层的网络拓扑数学模型,用于准确地反映网络拓扑结构。在该模型中,网络层采用图模型,链路层采用树模型。
     2.首次将穿墙、穿代理和通信隐藏等技术应用于网络拓扑探测。一方面,网络环境中部署的防火墙和代理设备对网络拓扑的探测起到了很强的干扰作用,给拓扑检测工作带来了很大的困难,将穿透防火墙和穿透代理服务器技术应用于网络拓扑发现中,可以提高拓扑发现的效率和完备性。另一方面,网络拓扑发现是一种积极的网络管理方式,不应该对现有网络造成比较大的影响,也不能让探测到的拓扑信息被恶意程序利用,于是拓扑发现中的通信隐藏处理也很必要。
     3.研究并实现了一种联动的网络层拓扑发现算法。算法涵盖了ICMP、UDP、TCP等通用协议检测方法和SNMP协议检测方法。各检测模块独立工作,将获取的拓扑信息传送给拓扑发现管理模块,由拓扑管理模块分发整理后的拓扑信息,让各个拓扑检测模块进行自适应调整,达到了整体联动的效果。该算法能够很好的发现网络层拓扑,具有相当好的通用性。
     4.研究并实现一种新型的链路层拓扑发现算法。一方面,利用生成树协议STP来进行拓扑发现;另一方面,通过地址转发表信息来辅助确定子网中交换机与共享网段、不可网管交换机之间的连接关系。本算法综合了生成树发现算法和地址转发表发现算法的优点,具有良好的通用性。
     5.提出了一种多探测节点的分布式网络拓扑综合发现框架。该框架融合了网络层拓扑发现技术、链路层拓扑发现技术和拓扑显示技术,不仅可以有效的发现网络拓扑信息,还可以将这些拓扑信息以拓扑图的方式表达出来。设计并实现了其原型系统,仿真实验表明可以有效的进行网络拓扑发现。
Technology of internet and network has attained great development since 1990. Network security has become a more and more severe problem as well. At the same time, as a crucial technology of secure management in network, the technology of auto topology discovery in network is concerned by people. Studies in the recent years show that there are still some issues in the network topology auto-discovery technology. Network topology model is not accurate enough to reflect the real network structure; Over-simplified the factors that affect the detection to network topology, without considering the firewall, proxy server in the actual network and etc, leading to low integrity of topology discovery; Topology discovery algorithm is not universal, and there is not uniform interface in it, so it is difficult to transplant the algorithm and make second development.
     This paper focus on network topology auto-discovery technology, as autonomous system for researching object, there are the following five primary contributions.
     1. This thesis presents a layered mathematical model in network topology for accurately reflect the network topology structure. In this model, the network layer is described by graph model; the link layer is described by tree model.
     2. For the first time, we apply the technology of passing through firewall, passing through proxy, communication hiding, and other windows kernel technology to the detection of network topology. On the one hand, the deployment of firewall and proxy devices in the network environment produce bad effect on the detection of network topology, leading to great difficulties for network topology detecting. The technology of passing through firewall and proxy can be used to increase the efficiency and completeness of topology discovery. On the other hand, as an active approach in network management, the discovery of network topology should not make large impact on the existing network, nor allow malicious programs to make use of the topology information of topology discovery, so it is necessary to hide network communication in topology discovery.
     3. In this paper, we study and implement a linkage network layer topology discovery algorithm. It covers general protocols discovery method, containing ICMP protocol, UDP protocol and TCP protocol, and SNMP protocol detecting method. All detection modules work independently, and transfer the topology information which they get to the management module of topology discovery. Topology discovery management module distributes the topology information to the detection modules, so that all detection modules can adapt themselves to achieve the overall linkage effect. The algorithm is a good way to discover network layer topology with a very good versatility.
     4. We propose a novel link layer topology discovery algorithm. On the one hand, the algorithm uses the spanning tree protocol (STP) to discover topology; On the other hand, it determines the connection among the switches, sharing network segment, and non-managerial switches with the FDB. The algorithm combines the spanning-tree discovery algorithm and the forwarding discovery algorithm, so it offers good versatility.
     5. In the thesis, we propose a multi-node-distributed network topology discovery framework. The framework combines the network layer topology discovery techniques, link layer topology discovery techniques and the displaying technology. It can not only discover network topology information effectively, but also make topology maps express topology information. We design and implement the prototype system of the framework, simulation experiments show that it can work well.
引文
[1] Srinivas Mukkamala, Andrew H.Sung. Identifying Significant Features for Network Foresic Analysis Using Artificial Intelligent Techniques. International Journal of Digital Evidence,Vol 1 Issue 4 Winter 2003, pages:1-10.
    [2] Network Penetration & Vulnerability Testing. http://labmice.techtarget.com/security/ penetration.html, 2003.
    [3]王玲,钱华林.计算机取证技术及其发展趋势.软件学报,14(09) 2003, page(s): 1635-1636.
    [4] Vicka Corey, Charles Peterman, Sybil Shearin, etal. Network Forensics Analysis. IEEE, November 2002, pages: 60-66.
    [5]高献伟,郑捷文,杨泽明,许榕生.智能网络取证系统.计算机仿真,23(03) 2006, pages:95-98.
    [6]季伟东.网络管理系统中拓扑发现的研究[硕士学位论文].哈尔滨:哈尔滨理工大学.2004.
    [7] Fawad Nazir, Tallat Hussain Tarar, Faran Javed, etal. Constella: A Complete IP Network Topology Discovery Solution. Springer, 2007, pages: 425-436.
    [8] Hongsuda Tangmunarunkit, Ramesh Govindan, Scott Shenker. Internet Topology: Discovery and Policy Impact. Defense Advanced Research Projects Agency, 2003, pages: 1-10.
    [9] Yigal Bejerano, Yuri Breitbart, Minos Garofalakis, Rajeev Rastogi. Physical Topology Discovery for Large Multi-Subnet Networks. IEEE, 2003, pages: 342-352.
    [10] Basheer A.M.Madappuram, Peter M.Kelly, Liam J.McDaid. On Brain-inspired Connectivity and Hybrid Network Topologies. IEEE, November 2008, pages: 54-58.
    [11]杨国正,卢余良,夏阳.计算机网络拓扑发现技术研究.计算机工程与设计,27(24), December 2006, pages:4710-4712.
    [12]周俊生.一个IP网络拓扑自动发现系统的设计与实现.计算机工程,28(12),December 2002, pages:150-152.
    [13] Topology. http://en.wikipedia.org/wiki/Topology/. 2010.
    [14] Hamid Mukhtar, Hafiz Farooq Ahmad, Ki-Hyung Kim, etal. Autonomous Network Topology Discovery of Large Multi-subnet networks using lightweight probing. IEEE, November 2008, pages: 351-356.
    [15] Florida Center for Instructional Techonology College of Education, University of South Florida, 2005. http://rsscal.com/2008/ICE3M/topology.pdf.
    [16] Noriaki Kamiyama, Daisuke Satoh. Network Topology Design using Analytic Hierarchy Process. IEEE, November 2008, pages: 2048-2054.
    [17] Ring Network Topology. http://compnetworking.about.com/ od/networkdesign/ ig/Computer-Network-Topologies/Ring-Network-Topology-Diagram.htm.
    [18]周苗,杨家海,刘洪波,吴建平.Internet网络拓扑建模.软件学报,20(01),January 2009,pages:109-123.
    [19] HE Peng, QIU Jian-lin, LU Jian-de. Network Topology Map Layout Algorithm Designing for SeeLink NMS. Journal of Communication and Computer, 2(9), Sep 2005, pages: 1-6.
    [20] Adrian Inda, Gustavo Bravo, Federico Flores. Automatic Network Topology Generator for Transmission Planning. IEEE, 2009, pages: 1-9.
    [21] Zhenshan Liu, Qingxian Wang, Junyong Luo. A New Distributed Topology Discovery Technology for Ipv6 Networks. IEEE, 2007, pages: 627-632.
    [22] .Fred Baumhardt. ISA Server 2006. Microsoft Zirve 2007. http://www.microsoft.com tr/sunum/st/ST203ing.pdf.
    [23] Blue Coat Systems, Corsec Security. Blue Coat Systems, Inc. ProxySG Operating System v4.2.5.1. BlueCoat Systems, Inc 2007. http://www.commoncriteriaportal. org/files/epfiles/blue_coat_sec-e.pdf.
    [24] Kaspersky Internet Security 2009:使用者手册.卡巴斯基实验室. http://www.kaspersky.com.hk/products/homeuser/kis2010/chinese/KIS_Install_Guide.pdf.
    [25] User Guide for Zone Labs security software. Zone Labs, LLC, 2005. http://download.zonealarm.com/bin/media/pdf/zaclient60_user_manual.pdf.
    [26]连碧应,张小松,刘飞.基于NDIS的恶意程序通信隐藏检测方法.信息安全与通信保密.2009年第8期.
    [27] Mark Grennan. Firewall and Proxy Server HOWTO. 2006. http://www.ibiblio.org/ pub/Linux/docs/howto/other-formats/pdf/Firewall-HOWTO.pdf.
    [28] Bo Li, Jingsha He, Henghua Shi. Improving the Efficiency of Network Topology Discovery. IEEE, November 2008, pages: 189-194.
    [29] Donato Emma, Antonio Pescape, Giorgio Ventre. Discovering Topologies at Router Level. Springer, 2005, pages: 118-129.
    [30] Laurent Bobelin, Traian Muntean. Algorithms for network topology discovery using end-to-end measurements. IEEE, 2008, pages: 267-274.
    [31]廖海亮,胡光岷,钱峰,杨志豪.网络拓扑识别:基于traceroute的层析成像方法.计算机应用技术.26(01),Jan 2009. pages: 276-279.
    [32] Zohaib Najeeb, Fawad Nazir, Sajjad Haider. An Intelligent Self-Learning Algorithm for IP Network Topology Discovery. IEEE, November 2008, pages: 1-6.
    [33] Yuri Breitbart, Minos Garofalakis, Ben Jai, etal. Topology Discovery in Heterogeneous IP Networks: The NetInventory System. IEEE, 2004, pages: 401-413.
    [34] Bruce Lowekamp, David R.O’Hallaron, Thomas R.Gross. Topology Discovery for Large Ethernet Networks. SIGCOMM’01 ACM, August 2001, pages: 27-31.
    [35] I-Ping Hsich, Shang-Juh Kao. Topology Discovery for Coexisting Ipv6 and Ipv4 Networks. IEEE Computer Society. 2006, pages: 1-6.
    [36] TCP/IP详解卷2:实现. (美)Gary R.Wright, W.Richard Stevens,陆雪莹、蒋慧译,机械工业出版社.
    [37] Mudhakar Srivatsa, Bong-Jun Ko, Alina Beygelzimer, Venkateshwara. Scalable Topology Discovery and Link State Detection Using Routing Events. IEEE computer society, 2008, pages: 165-174.
    [38]白华暖.网络拓扑自动发现算法的研究与实现.河南教育学院学报(自然科学版),12(02),June 2003, pages:66-68.
    [39]陶兰,谭学飞.一种自适应的网络拓扑自动发现算法.中国农业大学学报,8(2),2003, pages:42-44.
    [40] Fawad Nazir, Mohsan Jameel, Tallat Hussain Tarar, etal. An Efficient Approach Towards IP Network Topology Discovery for Large Multi-subnet Networks. IEEE computer society, 2006, pages: 1-5.
    [41]夏晓忠,肖宗水,仇一泓,方长江.新颖的多区域多子网以太网物理拓扑发现算法.计算机工程,33(08),April 2007, pages:118-120.
    [42] Choonho Son, Junsuk Oh, Kyoung-Ho Lee, Kieung Kim, Jaehyung Yoo. Efficient Physical Topology Discovery for Large OSPF Networks. IEEE, 2008, pages: 325-330.
    [43] Hassan Gobjuka, Yuri Breitbart. Ethernet Topology Discovery for Networks with Incomplete Information. IEEE, 2007, pages: 631-638.
    [44]孔令文,谭景信.数据链路层网络拓扑发现算法研究.计算机工程与设计,29(19),Oct 2008, pages:4941-4944.
    [45]李延冰,马跃,王炜,万小强.基于生成树的链路层拓扑发现算法.计算机工程,32(18),September 2006, pages:109-113.
    [46] Boris Mejias, Alfredo-Cadiz, Peter Van Roy, Kim Mens. A Self-Adaptable Network Topology for Ambient Intelligence. IEEE computer society, 2008, pages: 219-224.
    [47] Andrea Di Pietro, Domenico Ficara, Stefano Giordano, etal. Network Topology Discovery Based on a Finite Set of Hypotheses. IEEE Globecom 2008, pages: 1-5.
    [48] Meng-Fu Shih, Alfred O.Hero III. Network Topology Discovery Using Finite Mixture Models. IEEE ICASSP, 2004, pages: 433-436.
    [49] Y Breitbart, M Garofalak is, C Martin, etal. Topology Discovery in Heterogeneous IP Networks. Proc of IN FOCOM2000. Tel Aviv Israel, 2000.
    [50] Bruce Lowekamp, Discovery and Application of Network Information. School of Computer Science Camegie Mellon University Pittsburgh, PA 15213.
    [51] N.G.Duffield, J.Horowitz, F.Lo Presti. Adaptive multicast topology inference, in Proc. IEEE Infocom 2001, April 2001.
    [52] Yasue Kishino, Tsutomu Terada, Masahiko Tsukamoto, etal. A Rule-Based Discovery Mechanism of Network Topology among Ubiquitous Chips. IEEE Xplorer. 2005, pages: 198-207.
    [53] Yide Wang, Dancheng Li, Chunyan Han, Zhiliang Zhu. Research and Application on Automatic Network Topology Discovery in ITSM System. IEEE computer society. 2009, pages: 336-340.
    [54] Yubin Yao, Dan Wang, Chuanqi Wang, Yong Li. A Fast Method of Local Network Topology. IEEE computer society, 2008, pages: 42-47.
    [55] Yantao Sun, Zhiqiang Shi, Zhimei Wu. A Discovery Algorithm for Physical Topology in Switched Ethernets. IEEE Conference. November 2005, pages: 311-317.
    [56] Ting-Qiang Yan, Xin Lu. Physical Topology Discovery in Network with Redundant Links. IEEE ICACIA 2008, pages: 351-354.
    [57] Myung-Hee Son, Bheom-Soon Joo, Byung-Chul Kim, Jae-Yong Lee. Physical Topology Discovery for Metro Ethernet Networks.ETRI Journal, 27(4), August 2005, pages: 335-366.
    [58] Myunghee Son, Yongjoon Lee, Cheolsig Pyo, etal. Physical Topological Discovery in Large Ethernet Networks.Proceedings of the 9th WSEAS International Conference on Communications. 2005.
    [59] Kaihua Xu, Jiwei Cao, Yuhua Liu, Shaohua Tao. An Algorithm of Topology Discovery in Large Multi-Subnet Physical Network. IEEE, June 2006, pages: 101-104.
    [60] David T.Stott. Layer-2 Path Discovery Using Spanning Tree MIBs. Avaya Lbs. March 2002, pages: 1-22.
    [61] Thi Thi Soe. Performance Analysis of Existing Distribution System for Distribution Substation. World Academy of Science, Engineering and Technology, 2008, pages: 457-461.
    [62]Jun Gao Steenkiste, P.Sch.of Comput.Sci, Carnegie Mellon Univ. Design and Evaluation of a Distribute Scalable Content Discovery System. IEEE. Jan 2004, pages: 54-66.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700