Cloud security service function tree network intrusion detection system

A technology of network intrusion detection and security service, applied in the field of cloud security service function tree network intrusion detection system, which can solve the problems of difficult updating and difficult deployment, etc.

Active Publication Date: 2019-10-01
SUN YAT SEN UNIV
View PDF26 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The service function chain in the traditional network is tightly coupled with the underlying physical network topology, making it difficult to deploy and update. The realization of network functions depends on dedicated network function hardware devices statically deployed in various locations in the data center.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cloud security service function tree network intrusion detection system
  • Cloud security service function tree network intrusion detection system
  • Cloud security service function tree network intrusion detection system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] Such as figure 1 , figure 2 As shown, a cloud security service function tree network intrusion detection system includes a service tree topology arrangement module 1, a service tree topology mapping module 2, a flow feature database module 3, and a global resource monitoring module 4;

[0031] The flow feature database module 3 is used to store the network flow feature data of the network attack, and select the corresponding network attack flow feature data set in conjunction with the cloud security situation to construct a corresponding training set;

[0032] The service tree topology arrangement module 1 is used to construct a decision tree classification model in combination with the cloud security situation, use the training set constructed in the stream feature database module 3 to train and prune the decision tree model, and classify the trained decision tree The model is passed to the service tree topology mapping module 2;

[0033] The service tree topology m...

Embodiment 2

[0045] Such as image 3 as well as Figure 4 As shown, in this embodiment, the tree topology of the service function tree is combined with the characteristics of the network attack traffic identification and classification of the decision tree, and the characteristic rules of the decision tree nodes are matched and distributed to each VNF node of the service function tree. accomplish. Under the guidance of the decision tree classification idea, each path from the root node of the service tree to each leaf node is a VNF node path through which network traffic with certain characteristics flows. image 3 In the process of VNF communication across data centers, a virtualized container network is implemented. Two OVS virtual network bridges are built on the host machine through network virtualization technology, among which the br-int virtual network bridge mainly assumes the role of data packet exchange in the local network segment in the container data exchange network; the br...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of network monitoring, in particular to a cloud security service function tree network intrusion detection system, which comprises a service tree topology arrangement module, a service tree topology mapping module, a flow characteristic database module and a global resource monitoring module. According to the invention, a network function virtualization technology is utilized to provide cloud security resources; a security defense strategy is flexibly customized according to the cloud security situation, a cloud security service function tree is deployed in the direction close to a network attack source, and suspicious network traffic is subdivided and identified step by step; and according to the security defense strategy, in the subdivided cloud security service function tree branches, the corresponding cloud security VNFs can be dispatched according to the network flow characteristics of the current branch to carry out finer-grained processing, sothat the network security is greatly improved.

Description

technical field [0001] The invention relates to the field of network monitoring, and more specifically, relates to a cloud security service function tree network intrusion detection system based on decision tree classification implemented in an SDN\NFV cloud computing environment. Background technique [0002] In the process of communication between two hosts connected to the network, the transmission of data packets needs to pass through various network function nodes distributed throughout the data center, so as to ensure that users can be provided with security, speed, and Stable network service. When the network traffic of the business needs to be processed and delivered by the corresponding network function nodes in accordance with the established sequence required by the business logic, the network function nodes and links that these network traffic passes through are usually called service function chains. The service function chain in the traditional network is tigh...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06K9/62H04L29/06
CPCH04L63/1441H04L63/1425H04L63/1416G06F18/214
Inventor 余顺争罗经伦
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products