A LDoS attack detection method in SDN environment

An attack detection and environment technology, applied in electrical components, transmission systems, etc., can solve the problem that there is little research on LDoS attack detection

Active Publication Date: 2018-12-18
TIANJIN UNIV
View PDF9 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] At present, the research on the detection of LDoS attacks is still mainly concentrated in the traditional network architecture, and there are few researches on the detection of LDoS attacks under emerging network architectures such as SDN.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A LDoS attack detection method in SDN environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] (1) Locate the suspected switch by analyzing the Delta value. where Delt=in_package-out_package,

[0020] in_package is the number of data packets flowing into the switch per unit time, and out_package is the number of data packets flowing out of the switch. Under normal circumstances, the difference between the two should be small, that is, the inflow and outflow are in a relatively balanced state. When a short-term high-rate LDoS attack traffic flows in, a large number of data packets flood into the switch, causing the value of Delt to increase sharply. Therefore, this value can be used as a condition for pre-judging whether the switch is under an LDoS attack.

[0021] (2) Analyze the port flow of the suspected attacked switch located in step (1), and locate the suspected attacked port. The specific steps are: set a threshold s, sample the rate of each port of the switch, and the sampling period is T, and record the time t when the sampling value obtained by port sam...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an LDoS attack detection method under an SDN environment, comprising the following steps: positioning an exchange suspected to be attacked according to a difference Del between an incoming data packet and an outgoing data packet in a unit time of each exchange in an SDN network; Aiming at the switch suspected to be attacked, locating the incoming port of the attack trafficthrough the traffic statistics of each port, For each stream flowing into the port, counting the traffic information separately, and locating the source Mac and destination Mac information of the attack stream, so as to find the attack stream.

Description

technical field [0001] The invention relates to an LDoS attack detection method in an SDN environment. Background technique [0002] Low-rate denial of service (Low-rate Denial Of Service) attack is a new type of network attack that has emerged in recent years. It exploits the loopholes in the adaptive mechanism in the network, such as the congestion control mechanism in the TCP protocol, the queue management mechanism of the router, and the like. It adopts periodic high-rate short-time pulses, which make the network constantly change between stable state and unsteady state, seriously reducing the performance of the network. Since the LDoS attack traffic is a periodic short-term high-speed pulse, and the attack end remains silent most of the time, the average traffic of an LDoS attack is very low, which is slightly different from the normal traffic, which greatly increases the difficulty of detection. Low-rate denial-of-service (LDoS) attack is a new type of network attack...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1408H04L63/1458
Inventor 高镇周蕾冷俊儒李根
Owner TIANJIN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products