Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An sdn southbound security proxy product

A security proxy and security product technology, applied in the field of SDN southbound security proxy products, can solve problems such as inability to manage the platform in a unified manner, inability to achieve isolation, and SDN is vulnerable to attacks, and achieves the effect of meeting network requirements, saving resources, and improving management.

Active Publication Date: 2017-10-10
蓝盾信息安全技术有限公司
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Security issues of SDN itself: As a new technology, SDN is also vulnerable to attacks
[0009] However, this method divides the research on multi-controllers into the problem that multiple controllers are provided by one operator and multiple controllers are provided by multiple operators, and a unified platform cannot be established for unified management.
The SDN switch and the SDN controller communicate directly, and the task of security detection is completely shared between these two network elements, and effective isolation cannot be achieved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An sdn southbound security proxy product
  • An sdn southbound security proxy product
  • An sdn southbound security proxy product

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037]The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0038] An SDN southbound security proxy product can implement a multi-controller SDN network and ensure the security of SDN control traffic in the SDN network. It is a network virtualization layer located between the physical hardware and software architecture, which intercepts the information transmitted between the SDN switch and the SDN controller, and implements it as an SDN agent. This product uses a southbound protocol such as OpenFlow to communicate with the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an SDN southing security proxy product. The SDN southing security proxy product is composed of a function module set, a basic module set, an information database and a third-party security product interface. According to the SDN southing security proxy product, a SDN with multiple connectors is achieved, and SDN traffic control safety the SDN is guaranteed.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to an SDN southbound security proxy product. Background technique [0002] Software-defined networking (SDN for short) technology separates the control plane and data plane of the network, and provides a new solution for the development of new network applications and future Internet technologies. OpenFlow initially provided a real experimental platform for campus network researchers to design their innovative network architecture. Subsequently, researchers such as McKeown began to promote the concept of SDN, which attracted widespread attention from academia and industry. [0003] Security issues of SDN itself: As a new technology, SDN is also vulnerable to attacks. First, according to Chris Weber, co-founder of Casaba Security, centralizing control into an SDN controller can blur the boundaries of protective layered hardware, such as firewalls. Second, according to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0281H04L63/0884
Inventor 杨育斌程丽明柯宗贵
Owner 蓝盾信息安全技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products