An authentication scheme for trusted network probing based on multiple mechanisms integrating
Wang Bin,Li Qi,Zhang Yu,Shi Jiantao,Zhu Guopu
School of Cyberspace Science, Harbin Institute of Technology
Abstract: To ensure the security of network topology information while maintaining the network′s flexibility and tunability, this paper introduced an authentication technology for trusted network probing that integrates multiple mechanisms. This technology combines trusted authentication based on IP addresses, token-based authentication, and hash chain-based authentication, balancing efficiency and security. Through this method, network administrators can protect network topology information without blocking legitimate topology probing. A topology probing tool supporting this technology was developed, and the technique was implemented on Linux hosts using Netfilter technology. Experimental results demonstrated that this technology can effectively identify trusted probes, with a slight increase in latency compared to traditional Traceroute.