Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Self-adaptive distributed scheduling defense method and system

A distributed and adaptive technology, applied in transmission systems, digital transmission systems, and key distribution, it can solve problems such as serious consumption, users cannot normally access the attacked host, and the security channel between the controller and the attacked switch is blocked.

Inactive Publication Date: 2020-03-13
武汉思普崚技术有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] At the same time, the DDos attack in the SDN network system will seriously consume the resources of the attacked target host, making it impossible for users to access the attacked host normally, resulting in the blockage of the security channel between the controller and the attacked switch

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Self-adaptive distributed scheduling defense method and system
  • Self-adaptive distributed scheduling defense method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings, so that the advantages and features of the present invention can be more easily understood by those skilled in the art, so as to define the protection scope of the present invention more clearly.

[0049] figure 1 A flow chart of the defense method for adaptive distributed scheduling provided by this application, the method comprising:

[0050] Obtain network traffic data and identify network types based on network characteristics;

[0051] When the network is identified as an SDN network, a control command is sent to the controller and the switch, and the control command carries the identification and address of the trusted agency CA in the middle of the network;

[0052] The controller and the switch receive the control instruction, and respectively send an identity authentication request to the network intermediate trusted institution C...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a self-adaptive distributed scheduling defense method and system. The method comprises the following steps: establishing a security encryption channel between a controller and aswitch, adding a trusted authority CA to authenticate and sign the controller and the switch, realizing bidirectional authentication between the controller and the switch, and performing key negotiation between the controller and the switch to realize targeted improvement of SDN network vulnerability; and scheduling the network flow of the attacked switch to a plurality of other neighbor switchesin real time. The link time delay is effectively reduced.

Description

technical field [0001] The present application relates to the technical field of network security, in particular to a defense method and system for adaptive distributed scheduling. Background technique [0002] In the existing SDN network, it is not mandatory to establish a TLS security channel between the controller and the switch, and the default state is disabled, which makes the network vulnerable, and there may be clear text communication between the controller and the switch, which can be intercepted by any third party Or modify the communication content between the two parties, which is vulnerable to man-in-the-middle attacks. There is no certificate verification between the controller and the switch. Attackers can easily intercept the request sent by the controller to the switch, pretend to be the controller to communicate with the switch, and obtain all the communication content between the switch and the controller. [0003] At the same time, the DDos attack in th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08H04L9/06
CPCH04L9/0643H04L9/0838H04L9/0869H04L9/3247H04L9/3268H04L63/0823H04L63/0869H04L63/0876H04L63/1433H04L63/1458
Inventor 段彬
Owner 武汉思普崚技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products