False flow rule injection attack detection and prevention system and method based on blockchain
A technique for injecting attack and prevention methods, applied in the field of computer network
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0031] In order to make the purpose, technical solutions and advantages of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly described below in conjunction with the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are part of the present invention Examples, not all examples. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
[0032] like figure 1 As shown, the embodiment of the present invention provides a block chain-based false flow rule injection attack detection and prevention system, including: a controller, a switch, and a block chain node;
[0033] The controller is used to carry SDN applications and generate flow rules for unmatched flows in the switch;
[0034] The switch is used to process ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


