Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mining-based continuous attack detection method and system

An attack detection and encryption algorithm technology, applied in transmission systems, digital transmission systems, and key distribution, can solve the problem of separation of persistent network attacks

Inactive Publication Date: 2020-02-21
武汉思普崚技术有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At the same time, for persistent network attacks, it is difficult to separate persistent network attacks from network activities with a single detection method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mining-based continuous attack detection method and system
  • Mining-based continuous attack detection method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0045] figure 1 A flow chart of the mining-based continuous attack detection method provided by this application, the method includes:

[0046] Obtain network traffic data and identify network types based on network characteristics;

[0047] When the network is identified as an SDN network, a control command is sent to the controller and the switch, and the control command carries the identification and address of the trusted agency CA in the middle of the network;

[0048] The controller and the switch receive the control instruction, and respectively send an identity authentication request to the network intermediate trusted institution CA, an...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a mining-based continuous attack detection method and system. The method comprises the following steps of establishing a security encryption channel between a controller and a switch, adding a trusted authority CA to authenticate the signs of the controller and the switch so as to realize the bidirectional authentication between the controller and the switch, and performingkey negotiation between the controller and the switch to realize the targeted improvement of SDN network vulnerability; reducing the flow logs based on popularity and connection directions, and providing the flexible configuration of the time windows.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a mining-based continuous attack detection method and system. Background technique [0002] In the existing SDN network, it is not mandatory to establish a TLS security channel between the controller and the switch, and the default state is disabled, which makes the network vulnerable, and there may be clear text communication between the controller and the switch, which can be intercepted by any third party Or modify the communication content between the two parties, which is vulnerable to man-in-the-middle attacks. There is no certificate verification between the controller and the switch. Attackers can easily intercept the request sent by the controller to the switch, pretend to be the controller to communicate with the switch, and obtain all the communication content between the switch and the controller. [0003] At the same time, for persistent network a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
CPCH04L9/0838H04L9/0869H04L9/3247H04L9/3263H04L63/0227H04L63/0823H04L63/1416H04L63/1433
Inventor 段彬
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products