SDN-based source address authentication method

An authentication method and source address technology, applied in the computer field, can solve problems such as lack of global control, poor computing power, and IP address masquerade attacks, and achieve the effect of improving communication security and performance

Active Publication Date: 2021-04-16
UNIV OF ELECTRONICS SCI & TECH OF CHINA
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In order to overcome the defects and deficiencies in the above-mentioned prior art, the present invention provides a source address authentication method based on SDN. The purpose of the invention of the present invention is to solve the problem that the IP address in the above-mentioned prior art has no detection mechanism and is easily disguised by hackers. Attacks; the network can only be reissued according to the IP address of the packet, unable to resist DOS attacks, and server resources are maliciously occupied; poor computing power, lack of global control

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SDN-based source address authentication method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] The technical solution of the present invention will be described in further detail below in conjunction with the accompanying drawings.

[0032] As attached to the manual figure 1 , as shown in the system architecture diagram based on the SDN source address authentication method of the present invention, the system architecture based on the SDN source address authentication method of the present invention is mainly divided into four parts: OpenFlow controller, certificate authenticator, RADIUS server and SDN network.

[0033] The OpenFlow controller adopts FloodlightV1.2, an open source controller developed by BigSwitch Company, and host access management applications and topology management modules are mainly deployed on the controller. The host access management application program is an upper-layer application that communicates with the controller through the northbound interface. It mainly manages the authority of the terminal to access network resources, and manag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an SDN-based source address authentication method and relates to the technical field of computers. The present invention is based on SDN technology, through the OpenFlow protocol, and the linkage between the self-configured certificate authenticator on the Floodlight controller and the RADIUS server, the identity authentication of the access host is realized, that is, the source address authentication, so as to ensure that both communication parties are safe users. , the present invention is compatible with IPv4 or IPv6 network environment.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to network digital certificate authentication and the realization of an upper layer application module of an SDN controller, and more specifically to an SDN-based source address authentication method. Background technique [0002] Due to the imperfect authentication technology of information sending source, network communication security has always been regarded by hackers as a key breakthrough in masquerading attacks, which has always been a research hotspot in the field of network security. [0003] With the continuous evolution and development of computer networks and communication technologies, online communication around the world has almost become a daily topic for human beings. As of November 2018, the number of global users of the online communication software "WeChat" reached 1 billion, and the active users of "Whats" and "Facebook" even reached 1.5 billion and 1....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823H04L63/10H04L63/1416H04L63/1458
Inventor 唐勇李明单冉冉汪文勇
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products