Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Attack detection method and system for SDN network

An attack detection and network technology, applied in the field of network security, can solve the problems of not forcing the establishment of TLS security channel and being vulnerable to man-in-the-middle attacks

Active Publication Date: 2020-02-25
武汉思普崚技术有限公司
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the existing SDN network, it is not mandatory to establish a TLS security channel between the controller and the switch, and the default state is disabled, which makes the network vulnerable, and there may be clear text communication between the controller and the switch, which can be intercepted by any third party Or modify the content of communication between the two parties, which is vulnerable to man-in-the-middle attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Attack detection method and system for SDN network
  • Attack detection method and system for SDN network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0045] figure 1 A flow chart of the attack detection method of the SDN network provided by the application, the method comprising:

[0046] Obtain network traffic data and identify network types based on network characteristics;

[0047] Use the OpenFlow protocol to collect traffic statistics, analyze and extract the feature vector in the network traffic data, and aggregate the flow entry transmission rate, data packet transmission rate, data transmission rate, data packet average, duration standard deviation, data packet from the feature vector One or more of standard deviation and one-way flow meter ratio;

[0048] One or more of the feature ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an attack detection method and system for an SDN network. The method comprises the following steps: establishing a security encryption channel between a controller and a switch,adding a trusted authority CA to authenticate and sign the controller and the switch, realizing bidirectional authentication between the controller and the switch, and performing key negotiation between the controller and the switch to realize targeted improvement of SDN network vulnerability; and acquiring a plurality of key parameters by aggregating the feature vectors of the network traffic data, so that the system is helped to detect attacks better.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to an attack detection method and system for an SDN network. Background technique [0002] In the existing SDN network, it is not mandatory to establish a TLS security channel between the controller and the switch, and the default state is disabled, which makes the network vulnerable, and there may be clear text communication between the controller and the switch, which can be intercepted by any third party Or modify the communication content between the two parties, which is vulnerable to man-in-the-middle attacks. There is no certificate verification between the controller and the switch. Attackers can easily intercept the request sent by the controller to the switch, pretend to be the controller to communicate with the switch, and obtain all the communication content between the switch and the controller. [0003] At the same time, how to better detect network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/045H04L63/06H04L63/0823H04L63/0853H04L63/0869H04L63/1416H04L63/1433
Inventor 段彬
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products