Software defined opportunity network DDoS defense method based on block chain

A software-defined and blockchain technology, applied in the computer field, can solve the problems of poor resistance to DDOS attacks, achieve the effects of improving accuracy, maintaining data reliability, and preventing tampering or destruction

Active Publication Date: 2019-08-09
WUHAN UNIV OF TECH
View PDF10 Cites 40 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of this, the present invention provides a blockchain-based software-defined opportunistic network DDoS defense method to solve or at least

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Software defined opportunity network DDoS defense method based on block chain
  • Software defined opportunity network DDoS defense method based on block chain
  • Software defined opportunity network DDoS defense method based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] The inventors of the present application found through a lot of practice that the software-defined opportunistic network is a special network structure that transmits messages through nodes moving freely and meeting randomly. -Forwarding" routing mode to form communication opportunities and communicate hop by hop. But this mode of communication also brings new problems. The software-defined opportunistic network does not require a fixed and reliable transmission channel between two nodes establishing communication, and does not require the network to have full connectivity, and the random movement of nodes will also lead to communication instability. In terms of security, the sparseness of nodes in software-defined opportunistic networks is high, so that malicious nodes can join the current network environment at will. Malicious nodes will spread false information maliciously. Secondly, malicious nodes will capture normal nodes to mislead them to carry out normal news. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a software defined opportunity network DDoS defense method based on a block chain. Firstly, the characteristic that the SDN can perform logic centralized management and controlon a control layer is utilized; the network state is dynamically monitored in real time; then, the possibility of existence of a DDoS amplification attack is analyzed by analyzing the traffic characteristics obtained by monitoring, an attacker address is determined according to a traceability algorithm, and finally, a public accessible attacker blacklist is maintained by using a block chain architecture to assist an application layer in malicious traffic filtering so as to realize defense of the DDoS attack. According to the method, the attack source tracking accuracy is improved, the storage of the attack source blacklist address is realized in combination with the block chain architecture, and the attack source storage architecture based on the distributed account book technology can effectively prevent the data from being tampered or damaged while maintaining the data reliability. The whole network can perform filtering in a data packet receiving stage by inquiring a blacklist address, so that the DDoS attack is prevented from the source.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a blockchain-based software-defined opportunistic network DDoS defense method. Background technique [0002] DDoS (distributed denial of service attack) means that the attacker manipulates a large number of zombie hosts through the network to jointly launch an attack on one or a small number of hosts, and paralyzes the attacker by converging service or resource requests that are several times that of a single host. Progress, the memory storage capacity or CPU computing power of general hosts are constantly improving, and the bandwidth of advanced servers has even reached the gigabit level, which increases the difficulty of effective implementation and actual effects of traditional DoS attacks. Compared with DDoS Traditional DoS attacks make full use of the connectivity characteristics of the network. The attacker invades thousands of foreign hosts through system vulnerabilities...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/1416H04L63/1441H04L63/1458
Inventor 颜昕马千里柳星
Owner WUHAN UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products