Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Central controller protection method, device and system

A central controller and controller technology, applied in the field of network security, can solve problems such as central controller attacks, and achieve the effect of reducing processing pressure and avoiding downtime

Inactive Publication Date: 2015-12-30
BEIJING JIAOTONG UNIV
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem in the prior art that can only prevent unauthorized users from accessing information in the organization’s intranet without authorization, and wirelessly prevent the central controller in the organization’s intranet from being attacked, the embodiment of the present invention provides a central controller protection method and equipment and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Central controller protection method, device and system
  • Central controller protection method, device and system
  • Central controller protection method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0068] In order to facilitate the understanding of the present invention, at first the structure of the SDN network based on the OpenFlow protocol is described as follows:

[0069] The SDN network based on the OpenFlow protocol includes an OpenFlow switch (English: OpenFlowSwitch) and an OpenFlow controller (English: OpenFlowController).

[0070] Among them, the OpenFlow switch is responsible for data forwarding based on the stored flow table, and the OpenFlow controller is responsible for routing control, that is to say, the OpenFlow controller can send the flow table to the OpenFlow switch through a secure channel, so as to achieve the purpose of controlling the OpenFlow switch for data forwarding , realizing the separation of data f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a central controller protection method, device and system and belongs to the field of network security. The central controller protection method comprises the steps that data packets sent by a terminal are received and are matched with a flow table stored in an exit gateway; when the data packets are not matched with the stored flow table, count values for indicating the number of unmatched data packets are accumulated; when the time length required by the accumulated count values to reach an early warning threshold value is smaller than a predetermined time length threshold value, early warning information is sent to the central controller and is used for triggering the central controller to back up the information stored in the central controller into a redundant controller and processing the data packets reported by the central controller jointly with the redundant controller. The problem that illegal users can be prevented from exceeding their authorities to access information in an organization intranet but the central controller in the organization intranet cannot be prevented from being attacked in the related arts is solved, and the effect of avoiding the risk that the central controller is attacked and accordingly the central controller goes down is achieved.

Description

technical field [0001] The invention relates to the field of network security, in particular to a central controller protection method, equipment and system. Background technique [0002] In order to better provide reliable Internet services for the fourth-generation mobile communication users, it is proposed to conduct mobile communication user access through centralized control in the future mobile Internet design. Software Defined Network (English: Software Defined Network, referred to as: SDN) adopts the idea of ​​centralized control, and its core technology OpenFlow realizes flexible control of network traffic by separating the control plane of network equipment from the data plane. The central controller in the SDN network architecture is the core of the entire network and is responsible for the functions of the entire network control plane. Once the central controller in the SDN is attacked, it will bring serious problems to the entire network. Therefore, the protect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04W12/08
CPCH04L63/0236H04L63/10H04L63/1416H04L67/1095H04W12/08
Inventor 陈佳王铭鑫周华春梁缘
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products