SDN DDoS detection method and system based on neural network

A neural network and detection method technology, applied in the field of network security, can solve problems such as reducing network utilization, increasing costs, and poor actual results

Active Publication Date: 2020-02-11
CHONGQING UNIV OF POSTS & TELECOMM +1
View PDF8 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there are still deficiencies in some aspects
For example, the first method of using SVM to detect DDoS only uses a small number of data samples for training. It cannot detect new types of attacks combined in multiple ways, and the detection accuracy needs to be improved. More importantly, in actual scenarios, DDoS The amount of data is often 20G or even higher, so the actual effect of this method is not good
The second is to implement DDoS detection at the entrance of network traffic by modifying the OpenFlow switch. This method can indeed deal with DDoS traffic in the most timely manner, but this will greatly increase the cost and violate the decoupling and principle of separating the control and forwarding planes.
[0004] Most DDoS detections are based on the principle of intrusion detection, using machine learning algorithms for direct detection. If DDoS attacks do not occur and such complex and load-increasing DDoS detections are performed, network utilization will be greatly reduced.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SDN DDoS detection method and system based on neural network
  • SDN DDoS detection method and system based on neural network
  • SDN DDoS detection method and system based on neural network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0037] The present invention proposes a DDoS detection method based on neural network SDN, such as figure 1 , including the following steps:

[0038]Collect and analyze the packet_in packets sent by the Openflow switch to the OpenFlow controller;

[0039] Analyze the received packet_in packet, and extract all the fields and corresponding values ​​of the packet;

[0040] Based on the principle of three-way decision-making, use the probability model of Naive B...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network security, in particular to an SDN (Software Defined Network) DDoS (Distributed Denial of Service) detection method and detection system based ona neural network, and the system comprises an information extraction module, an abnormality early warning module, a flow table information collection module, an information processing module and a detection module, the information extraction module is used for extracting source IP address and destination IP address information in the packet _ in; the abnormity early warning module is used for obtaining a threshold value of an abnormity alarm by utilizing a naive Bayes probability model according to a three-way decision principle, and sending out an abnormity early warning if the probability of the type of the data packet is calculated to be lower than the threshold value; the flow table information collection module is used for collecting flow table data; the information processing moduleis used for carrying out standardized, normalized and dimensionality-reduced data operation on the collected OpenFlow flow table data. According to the invention, the abnormal information in the network can be quickly judged and early warned in the software-defined network, and the network cannot be overloaded.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a neural network-based DDoS detection method and system in an SDN network. Background technique [0002] In the era of cloud computing and big data, massive data storage and processing require high-performance servers to support, and cloud computing is actually an application after virtualizing resource pools, based on virtualization technology. Both cloud computing and virtualization require centralized control, and the three most important concepts of SDN are: programmable (open API interface), separation of control plane and data plane, and centralized control model. The SDN-based network architecture can more easily realize network virtualization, thereby providing support for services related to big data. However, Distributed Denial of Service (DDoS) has always been a key research object in the field of network security. It seriously threatens the development of ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06N3/08
CPCG06N3/08H04L63/1416H04L63/1458
Inventor 尚凤军熊雄罗雪兰
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products