Unlock instant, AI-driven research and patent intelligence for your innovation.

Link flooding attack detection response mechanism in software-defined network

A technology of link flooding attack and software-defined network, which is applied in the direction of data exchange network, electrical components, digital transmission system, etc., and can solve problems such as unevenness and difficult unification of standards

Active Publication Date: 2019-10-18
NORTHEASTERN UNIV
View PDF1 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to their own development and different needs, each research group has added its own corresponding needs and understandings to the SDN network architecture, and the implementation methods are various and even uneven. Although this situation makes SDN more diverse and has There are many possibilities, but it also makes it difficult to unify the standards

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Link flooding attack detection response mechanism in software-defined network
  • Link flooding attack detection response mechanism in software-defined network
  • Link flooding attack detection response mechanism in software-defined network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to enable those skilled in the art to better understand the solutions of the present invention, the following will clearly and completely describe the technical solutions in the embodiments of the present invention in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments are only It is an embodiment of a part of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts shall fall within the protection scope of the present invention.

[0042] It should be noted that the terms "first" and "second" in the description and claims of the present invention and the above drawings are used to distinguish similar objects, but not necessarily used to describe a specific sequence or sequence. It is to be understood that the data so used are interchangeable under appropriate ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a link flooding attack detection response mechanism in a software-defined network. The system comprises a potential target link identification module, a link congestion monitoring module, a flow engineering module and a malicious host identification module, and comprises the following steps: the potential target link identification module obtains a flow path in a network topology through head space analysis by an SDN controller, and analyzes and identifies a target link of an attacker in the network topology; the link congestion monitoring module is used for monitoring the identified target link of the attacker in real time; after the traffic engineering module knows the condition of a congested link, link topology information and load distribution information of a network are collected and analyzed, the congested link is relieved through multiple times of rerouting, and meanwhile source host information is recorded in the malicious host identification module toanalyze a malicious host in a source host. The link flooding attack detection response system provided by the invention can be suitable for network scenes of various scales.

Description

technical field [0001] The invention relates to the technical field of link flood attack detection and response, in particular to a link flood attack detection and response mechanism in a software-defined network. Background technique [0002] SDN (Software-Defined Networking, software-defined network) originated from the Clean Slate project of Professor Nick McKeown of Stanford University in the United States. In order to conduct experiments using large-scale real traffic and applications in the network, Professor Nick McKeown and others proposed the concept of software-defined network architecture, and on this basis, studied how to separate logic control and data forwarding, and improve network flexibility, reliability, efficiency and network security issues. The proposal of the concept of SDN has enabled various research institutes, enterprises, and manufacturers to have a clear direction for the research of next-generation networks. However, due to their own developmen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/26H04L12/801
CPCH04L43/0882H04L43/10H04L47/10H04L63/1416H04L63/1458H04L2463/146
Inventor 于尧张召刘树美高宵佳
Owner NORTHEASTERN UNIV