A camouflage-based cyberspace security defense method and system
A security defense and network space technology, applied in the field of network security, can solve problems such as lack of initiative and unfavorable malicious traffic research, and achieve the effect of increasing the probability of transferring to a disguised network
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] figure 1 It shows a flow chart of a camouflage-based cyberspace security defense method provided by the first embodiment of the present invention, which is described in detail as follows:
[0029] In step S11, the controller receives an IP packet including network address information forwarded by the switch.
[0030] In this step, the controller may be an SDN controller based on the OpenFlow protocol, and the switch may be a switch based on the OpenFlow protocol. After the switch receives the IP packet containing network address information, if it judges that there is no match with any flow table, it sends it to the controller, and the controller receives the IP packet containing network address information forwarded by the switch, and The above IP packet requests authorization. Specifically, the information stored in the flow table in the switch includes but is not limited to network address information, and the judging that no flow table matches it specifically incl...
Embodiment 2
[0057] Figure 5 It shows a structural block diagram of a cyberspace security defense system provided by the second embodiment of the present invention. For the convenience of description, only the parts related to this embodiment are shown, and the details are as follows:
[0058] The cyberspace security defense system includes a controller 21 and a switch 22; the controller 21 is used to receive the IP packet including network address information forwarded by the switch 22.
[0059] Specifically, the controller 21 and the switch 22 are logically separated, and in practice they can be integrated into the same unit to provide the same function.
[0060] Specifically, the controller 21 may be an SDN controller based on the OpenFlow protocol, and the switch 22 may be a switch based on the OpenFlow protocol. After the switch 22 receives the IP packet containing the network address information, if it judges that no flow table matches it, it sends it to the controller 21, and the ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


