A data flow traceability method based on sdn

A data flow and data technology, applied in the field of computer networks, to achieve the effect of efficient attack traceability

Active Publication Date: 2020-05-22
INST OF INFORMATION ENG CHINESE ACAD OF SCI
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the traditional network, it is difficult to ensure that the information of all terminals and networks can be accurately obtained, so this method cannot be well applied to source tracing to find the source of the attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A data flow traceability method based on sdn
  • A data flow traceability method based on sdn
  • A data flow traceability method based on sdn

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the above-mentioned features and advantages of the present invention more comprehensible, the following specific embodiments are described in detail in conjunction with the accompanying drawings.

[0036] The present invention provides an SDN-based data flow traceability method, the operation flow chart of which is as follows figure 1As shown, firstly, the SDN switch periodically samples the specified fields, and the sampling results are input to the specified server and wait for processing. The regular sampling of the specified fields means that the controller receives the sampling rules sent by the upper application, and the SDN switch analyzes the sampling rules and performs regular sampling according to the analyzed field parameters that need to be sampled. The adoption rule refers to the displacement and length of certain fields in the data packet to be sampled; for example, field A has a starting position of 16 in the data packet and a length of 8...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention provides an SDN-based data flow tracing method. The method comprises a first step of sampling a designated field regularly by an SDN switch, so as to obtain data package information Flow_ID and switch information, wherein the switch information comprises a switch identifier Switch_ID and a data package input port; a second step of dividing the data package information Flow_ID and switch information into groups with Flow_ID as a Key, so as to obtain a data set SA of each group, wherein i represents data sets of different groups; a third step of performing path analysis on the data set SA of each group according to a network topological structure G of the SDN; and a fourth step of determining a path start point according to a path analysis result, and performing path reconstruction, so as to obtain a path of a data package or a data flow. In the method, the path of the data package or the data flow is reconstructed, so that a source of an attack source can be traced.

Description

technical field [0001] The invention relates to the field of computer networks, in particular to an SDN-based data flow traceability method. Background technique [0002] Generally, in order to effectively prevent increasingly serious denial-of-service attacks, the fundamental method is to find the source of the attack. Containing the attack from the source is the most effective and economical method. When attacked, if the source of the attack cannot be located and punished, the attacker will be more reckless. Therefore, traceability technology occupies a very important position in the network defense system. With the increasing application of the Internet and the increasing number of cybercrimes, traceability technology can be traced back to the source of the attack, providing a basis for investigating the legal responsibility of the attacker. In the existing traceability technology theory, based on the method of data packet identification, it is necessary to use the limi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/1458H04L2463/146
Inventor 宋晨王利明史淼杨倩谢德俊
Owner INST OF INFORMATION ENG CHINESE ACAD OF SCI
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products