Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Collaborative theory-based DDoS (Distributed Denial of Service Attack) defense system and method

A technology of attack defense system and synergy theory, which is applied in the field of DDoS attack defense system based on synergy theory, can solve problems such as easy DDoS attacks, achieve strong security and robustness, improve robustness, and reduce false alarm rates.

Active Publication Date: 2017-07-04
SUN YAT SEN UNIV
View PDF7 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since in the SDN network, all networks rely on a single controller, the controller can easily become the target of DDoS attacks, making this new type of network face new network security issues

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Collaborative theory-based DDoS (Distributed Denial of Service Attack) defense system and method
  • Collaborative theory-based DDoS (Distributed Denial of Service Attack) defense system and method
  • Collaborative theory-based DDoS (Distributed Denial of Service Attack) defense system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] The present invention provides a DDoS attack defense system based on the synergy theory. The system architecture is mainly composed of two parts: an SDN controller and a cleaning device group.

[0048] Such as figure 1 As shown, the SDN controller includes modules located at the control layer and modules located at the application layer using the REST API interface provided by the controller. The modules at the control layer mainly include: incoming packet statistics module, traffic statistics module, flow table configuration module and device management module. The modules at the application layer mainly include: defense strategy configuration module, interaction management module and log recording module.

[0049] At the control layer of the SDN controller, the incoming packet statistics module is used to perform statistical analysis on the Packet-In packets sent to the controller, and based on the analysis results, it is determined that the switch under the false IP...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a collaborative theory-based DDoS (Distributed Denial of Service Attack) defense system, which comprises a controller and cleaning equipment arranged on a switchboard, wherein the controller monitors a port of a full-network switchboard, and then pulls monitored network flow of an abnormal port of the switchboard to the cleaning equipment; the cleaning equipment is used for analyzing and cleaning the received network flow and supplying a security defense strategy to the controller based on an analysis result; and the controller configures the switchboard based on the security defense strategy, so as to relieve the attack.

Description

technical field [0001] The present invention relates to the field of network security, and more specifically, to a DDoS attack defense system and method based on synergy theory. Background technique [0002] With the rapid development and in-depth application of computer science and technology, changes in cyberspace are constantly changing and affecting people's way of life. As people rely more and more on the Internet, many confidential information about enterprises, individuals, and even countries are involved on the Internet, so the issue of network security has always been an important topic in the process of technological development. [0003] Among the many network attack methods existing on the Internet at present, Distributed Denial of Service Attack (Distributed Denial of Service Attack, DDoS for short) is the most common and highly destructive attack method. Most distributed denial-of-service attacks come from botnets, which cooperate with each other to launch den...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1416H04L63/1425H04L63/1458
Inventor 黄以华黄阳欣
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products