Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack defense method and system for flow self-adaptive scheduling

An adaptive, traffic-based technology, applied in transmission systems, digital transmission systems, and key distribution, can solve problems such as the blockage of the security channel between the controller and the attacked switch, the inability of users to access the attacked host, and serious consumption

Inactive Publication Date: 2020-01-21
武汉思普崚技术有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At the same time, the DDos attack in the SDN network system will seriously consume the resources of the attacked target host, making it impossible for users to access the attacked host normally, resulting in the blockage of the security channel between the controller and the attacked switch

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack defense method and system for flow self-adaptive scheduling
  • Attack defense method and system for flow self-adaptive scheduling

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0047] figure 1 It is a flow chart of the attack defense method for traffic adaptive scheduling provided by this application, and the method includes:

[0048] Obtain network traffic data and identify network types based on network characteristics;

[0049] When the network is identified as an SDN network, a control command is sent to the controller and the switch, and the control command carries the identification and address of the trusted agency CA in the middle of the network;

[0050] The controller and the switch receive the control instruction, and respectively send an identity authentication request to the network intermediate trusted in...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an attack defense method and system for flow self-adaptive scheduling. The method comprises the following steps: establishing a security encryption channel between a controllerand a switch, adding a trusted authority CA to authenticate and sign the controller and the switch, realizing bidirectional authentication between the controller and the switch, and performing key negotiation between the controller and the switch to realize targeted improvement of SDN network vulnerability; and scheduling the network flow of the attacked switch to other neighbor switches in real time. The link time delay is effectively reduced.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to an attack defense method and system for adaptive flow scheduling. Background technique [0002] In the existing SDN network, it is not mandatory to establish a TLS security channel between the controller and the switch, and the default state is disabled, which makes the network vulnerable, and there may be clear text communication between the controller and the switch, which can be intercepted by any third party Or modify the communication content between the two parties, which is vulnerable to man-in-the-middle attacks. There is no certificate verification between the controller and the switch. Attackers can easily intercept the request sent by the controller to the switch, pretend to be the controller to communicate with the switch, and obtain all the communication content between the switch and the controller. [0003] At the same time, the DDos attack in t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0844H04L9/3247H04L63/062H04L63/08H04L63/1425H04L63/1433H04L63/1441H04L63/20
Inventor 段彬
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products