Unlock instant, AI-driven research and patent intelligence for your innovation.

Anonymous communication system based on SDN

An anonymous communication and communication method technology, applied in the field of information security, can solve problems such as system security and anonymity destruction, and achieve the effects of avoiding malicious node injection, improving network request response rate, and improving defense capabilities

Active Publication Date: 2020-06-23
BEIJING INST OF COMP TECH & APPL
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] There are some nodes controlled by attackers in the network. Once such malicious nodes are added to the communication system, the security and anonymity of the system will be destroyed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous communication system based on SDN
  • Anonymous communication system based on SDN
  • Anonymous communication system based on SDN

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0026] The communication framework of the present invention mainly includes two processes of node IP address update and anonymous communication request and establishment, such as figure 1 shown.

[0027] The SDN-based anonymous communication system of the present invention can be regarded as an overlay network organized by an SDN controller and multiple hosts, and its network structure is as follows figure 2 As shown, the hosts in the network are divided into multiple clusters, and each cluster has a host as the administrator node of the cluster.

[0028] Among them, the SDN controller is used to maintain the mapping relationship of the administrator nodes in the network and the communication status information of al...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to an anonymous communication system based on an SDN, and belongs to the technical field of information security. According to the invention, a new anonymous communication systemis designed by combining the cluster idea and the SDN network centralized control idea, so that the anonymous communication service is safer and more reliable. The SDN-based network system architecture improves the difficulty of acquiring user privacy and the network request response rate of an attacker; a clustering mode and a node selection limiting strategy are adopted, so that security threats such as malicious node injection, flow analysis and single-point attack are avoided to a great extent, and the defense capability of the system is improved.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to an anonymous communication system based on SDN. Background technique [0002] With the rapid development of Internet technology, the network has been integrated into military, political, economic, social, daily life and other fields. While the network provides convenience to users, a large amount of sensitive private data such as user identity information, credit information, and financial information is also stolen by criminals. Although the data security and reliability problems generated during user communication can be better solved by encryption technology, encryption technology can only encrypt and confuse the information content in the network, but it is difficult to effectively hide the user's IP address. Once the network address If it is stolen, it is easy to expose more personal privacy information. Therefore, in the process of using the netwo...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0421H04L67/141
Inventor 王芳鸣常承伟贾琼杨枭王佳星马乐
Owner BEIJING INST OF COMP TECH & APPL