A ddos ​​attack detection system and method in sdn environment

An attack detection and environment technology, applied in transmission systems, electrical components, etc., can solve problems such as network vulnerability and single-point failure, and achieve the effect of reducing pressure, reducing false alarm rate, and improving detection speed.

Active Publication Date: 2021-06-15
NORTHEASTERN UNIV LIAONING
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the use of a centralized controller will have a relatively large effect, the controller itself also has some defects, that is, it may generate a single point of failure. Compared with the traditional network architecture, this will make the network using a centralized controller become more vulnerable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A ddos ​​attack detection system and method in sdn environment
  • A ddos ​​attack detection system and method in sdn environment
  • A ddos ​​attack detection system and method in sdn environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0037] The Mininet used in this embodiment is the virtual host required to create the topology in a standard Linux environment. The experimental environment uses ubuntu16.04. At the same time, Mininet also supports OpenFlow switches, OpenFlow controllers and secure link networks, and supports SDN and OpenFlow custom topology.

[0038] The present invention uses the OpenDaylight open source controller as the controller module under the SDN environment, and this controller is implemented based on the Java language, so before the design and development of the corresponding modules, it is necessary to install and configure the corresponding Java environment in the Ubuntu16.04 environment , that is, jdk, maven and other environments. In addition, before installing all software, you must first update apt, and then install git, which will be used as tools in subsequent installations.

[0039] The communication between two hosts requires a three-way TCP handshake. All requests from th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the field of intrusion detection algorithms in SDN, and discloses a DDoS attack detection system and method in an SDN environment. In order to identify abnormal traffic in the network in a timely and effective manner and reduce the consumption of network resources by DDoS attacks, a DDoS attack defense system is designed in combination with the MD‑SAL framework. The system includes an anomaly detection module, an anti-misjudgment module, a flow processing module, an anomaly storage module and an information viewing module. The system can identify the abnormal traffic in the network, timely alarm and notify the system to formulate corresponding defense measures, and finally check the attack information according to the source IP, destination IP and other RPC preset values ​​in advance, and realize the accurate classification of suspicious traffic based on the TDMC algorithm.

Description

technical field [0001] The invention belongs to the field of intrusion detection algorithms in SDN, and in particular relates to a DDoS attack detection system and method in an SDN environment. Background technique [0002] Nowadays, the development of Internet technology is changing with each passing day. Internet technology has brought great convenience to life, but at the same time it is also facing very serious problems in terms of security. Among them, DDoS attacks are seriously threatening the normal services of the Internet. DDoS is caused by many zombies. The large-scale distributed coordinated attack initiated by the host is the main factor that threatens the security of Internet services, and it also poses a great security problem to the security operation of major enterprises. Typical victims in this regard include large popular websites such as CNN, Yahoo, and Amazon, but more Internet companies increasingly rely on the stability, security, and availability of th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/101H04L63/1416H04L63/1425H04L63/1458
Inventor 毕远国郅明见郑文举项天敖胡兵陈香伊
Owner NORTHEASTERN UNIV LIAONING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products