Method for implementing abnormal traffic interception based on SDN

A technology of abnormal traffic and traffic, which is applied in the field of network security, can solve problems such as unsatisfactory and suspicious message interception and interception effects, and achieve the effect of flexible interception

Inactive Publication Date: 2015-06-03
国都兴业信息审计系统技术(北京)有限公司
View PDF7 Cites 35 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of the Internet, the openness and freedom of the network are getting higher and higher, and the importance of network security is also becoming more and more prominent. The current security solutions mostly use security defense technologies (such as firewall systems) and intrusion detection technologies (such as Intrusion detection system, intrusion prevention system, network audit system, database audit system, malicious code monitoring system, etc.), through security defense technology to prevent illegal users from entering the network, reduce network security risks, monitor and detect network anomalies through detection technology However, although the existing security methods have so

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing abnormal traffic interception based on SDN
  • Method for implementing abnormal traffic interception based on SDN
  • Method for implementing abnormal traffic interception based on SDN

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] SDN network is a new type of network innovation architecture, which is a way to realize network virtualization. Its core technology, OpenFlow, separates the control plane and data plane of network equipment, thereby realizing flexible control of network traffic and making the network a pipeline. Get smarter.

[0055] In the embodiment of the present invention, a network security monitoring system and an abnormal traffic interception system are set in the network. The abnormal traffic interception system includes an abnormal traffic interception interface module, an SDN controller, and an SDN forwarding device. The abnormal traffic interception interface module is connected to the SDN controller, and the SDN Controllers and SDN forwarding devices support the openflow protocol.

[0056] The network connection between the network security monitoring system and the abnormal traffic interception system, and between the abnormal traffic interception interface module and the S...

Embodiment 2

[0089] This embodiment provides a system for realizing abnormal traffic interception based on SDN, and its specific implementation structure is as follows Figure 5 As shown, it may specifically include the following modules: a network security monitoring system 51 and an abnormal traffic interception system 52 , and the abnormal traffic interception system 52 includes: a traffic interception interface module 521 , an SDN controller 522 and an SDN forwarding device 523 .

[0090] The traffic interception interface module 521 is used to extract abnormal traffic characteristic information in the network, formulate a corresponding traffic interception strategy according to the abnormal traffic characteristic information, and send the abnormal traffic characteristic information and traffic interception strategy to the SDN control device;

[0091] The SDN controller 522 is configured to generate a traffic interception matching entry of a forwarding device according to the abnormal ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the invention provide a method and a system for implementing abnormal traffic interception. The method mainly comprises the following steps: extracting abnormal traffic characteristic information in a network, developing an appropriate traffic interception policy according to the abnormal traffic characteristic information, and transmitting the abnormal traffic characteristic information and the traffic interception policy to an SDN (Software Defined Network) controller; generating a traffic interception matching table item of forwarding equipment by the SDN controller according to the abnormal traffic characteristic information and the traffic interception policy, and transmitting the traffic interception matching table item to SDN forwarding equipment; matching received characteristic information of a packet to be forwarded with the traffic interception matching table item by the SDN forwarding equipment, and after matching successfully, performing interception on the packet to be forwarded according to the traffic interception matching table item. The embodiments of the invention can effectively and flexibly intercept the abnormal traffic or attack of the network without affecting normal services of the network, and are applicable to enterprise networks, campus networks, data center networks, internet networks and other traditional networks or novel SDN networks for intercepting the abnormal traffic.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an SDN-based method for realizing abnormal traffic interception. Background technique [0002] With the rapid development of the Internet, the openness and freedom of the network are getting higher and higher, and the importance of network security is also becoming more and more prominent. The current security solutions mostly use security defense technologies (such as firewall systems) and intrusion detection technologies (such as Intrusion detection system, intrusion prevention system, network audit system, database audit system, malicious code monitoring system, etc.), through security defense technology to prevent illegal users from entering the network, reduce network security risks, monitor and detect network anomalies through detection technology However, although the existing security methods have solved the security problems of the network and equipment to a cer...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1441
Inventor 张佃徐亚非宋晓丽杨文勃王建国
Owner 国都兴业信息审计系统技术(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products