CN112653658A - DDoS attack detection method based on information entropy under SDN environment - Google Patents

DDoS attack detection method based on information entropy under SDN environment Download PDF

Info

Publication number
CN112653658A
CN112653658A CN202010911737.4A CN202010911737A CN112653658A CN 112653658 A CN112653658 A CN 112653658A CN 202010911737 A CN202010911737 A CN 202010911737A CN 112653658 A CN112653658 A CN 112653658A
Authority
CN
China
Prior art keywords
module
main control
detection method
output end
method based
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010911737.4A
Other languages
Chinese (zh)
Inventor
曹明选
叶德望
郑周行
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Dexun Network Security Technology Co ltd
Original Assignee
Zhejiang Dexun Network Security Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Dexun Network Security Technology Co ltd filed Critical Zhejiang Dexun Network Security Technology Co ltd
Priority to CN202010911737.4A priority Critical patent/CN112653658A/en
Publication of CN112653658A publication Critical patent/CN112653658A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a DDoS attack detection method based on information entropy in an SDN environment, which belongs to the technical field of network security and comprises a main control end, wherein the main control end comprises a detection algorithm module, a threshold setting module, a feature classification module, a path calculation module and a topology sensing module, the detection algorithm module is arranged in the main control end, the threshold setting module is arranged at the output end of the detection algorithm module, the feature classification module is arranged at the output end of the threshold setting module, and the path calculation module is arranged at the output end of the feature classification module; the invention ensures the accuracy of the value, improves the interception quality and ensures the detection effect by arranging the window setting module, the threshold setting module and the detection algorithm module are arranged in the main control end, the protection effect is ensured by calculating the entropy value of the data packet and comparing the entropy value with the preset threshold, the misjudgment is prevented, and the working quality is improved.

Description

DDoS attack detection method based on information entropy under SDN environment
Technical Field
The invention belongs to the technical field of network security, and particularly relates to a DDoS attack detection method based on information entropy in an SDN environment.
Background
Distributed denial of service attacks can cause a plurality of computers to be attacked at the same time, so that the attacked target can not be used normally, the distributed denial of service attacks are already generated for a plurality of times, and a plurality of large websites can not be operated, thereby not only influencing the normal use of users, but also causing huge economic loss.
The prior art has the following problems:
when a computer is attacked by DDos, the detection can not be carried out in advance, the condition of error interception is easily caused by the accuracy of interception guarantee during the detection, the stability of data transmission is influenced, the safety of work is reduced, the working cost is increased, the attack source can not be determined in the detection process, the problem can not be eradicated from the source, and the processing cost is increased.
Disclosure of Invention
To solve the problems set forth in the background art described above. The invention provides a DDoS attack detection method based on information entropy in an SDN environment, which has the characteristic of good detection effect.
In order to achieve the purpose, the invention provides the following technical scheme: the DDoS attack detection method based on the information entropy under the SDN environment comprises a main control end, wherein the main control end comprises a detection algorithm module, a threshold setting module, a feature classification module, a path calculation module and a topology sensing module, the detection algorithm module is arranged inside the main control end, the threshold setting module is arranged at the output end of the detection algorithm module, the feature classification module is arranged at the output end of the threshold setting module, the path calculation module is arranged at the output end of the feature classification module, and the topology sensing module is arranged at the output end of the path calculation module.
Further, the main control end is internally provided with a data updating module.
Further, an edge switch is arranged on one side of the main control end and comprises a window setting module and a self-checking module, wherein the self-checking module is arranged inside the edge switch, and the window setting module is arranged on one side of the self-checking module.
Further, the output end of the window setting module is connected with the input end of the feature classification module.
Further, the input end of the edge switch is provided with an attack end, the output end of the main control end is provided with an agent end, and the output end of the agent end is provided with a victim host.
Compared with the prior art, the invention has the beneficial effects that:
the invention can set windows with different sizes and quantities in the edge switch by arranging the window setting module, and carries out classified quantitative transmission on the received data packets, thereby ensuring the accuracy of value taking, improving the interception quality and ensuring the detection effect;
the main control end is provided with a threshold value setting module and a detection algorithm module, the protection effect is ensured by calculating the entropy value of the data packet and comparing the entropy value with a preset threshold value, misjudgment is prevented, and the working quality is improved.
Drawings
FIG. 1 is a block diagram of the system of the present invention;
fig. 2 is a schematic view of the working process of the present invention.
In the figure: 1. an attack end; 2. an edge switch; 21. a window setting module; 22. a self-checking module; 3. a main control end; 31. a detection algorithm module; 32. a threshold setting module; 33. a feature classification module; 34. a path calculation module; 35. a topology awareness module; 36. a data update module; 4. an agent end; 5. the victim host.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, the present invention provides the following technical solutions: the DDoS attack detection method based on the information entropy under the SDN environment comprises a main control end 3, wherein the main control end 3 comprises a detection algorithm module 31, a threshold setting module 32, a feature classification module 33, a path calculation module 34 and a topology sensing module 35, the detection algorithm module 31 is arranged inside the main control end 3, the threshold setting module 32 is arranged at the output end of the detection algorithm module 31, the feature classification module 33 is arranged at the output end of the threshold setting module 32, the path calculation module 34 is arranged at the output end of the feature classification module 33, and the topology sensing module 35 is arranged at the output end of the path calculation module 34.
Further, a data updating module 36 is further disposed inside the main control terminal 3.
Further, one side of main control end 3 is provided with edge switch 2, and edge switch 2 includes window setting module 21 and self-checking module 22, and wherein, the inside of edge switch 2 is provided with self-checking module 22, and one side of self-checking module 22 is provided with window setting module 21.
Further, the output of the window setting module 21 is connected to the input of the feature classification module 33.
Further, an attack end 1 is arranged at the input end of the edge switch 2, an agent end 4 is arranged at the output end of the main control end 3, and a victim host 5 is arranged at the output end of the agent end 4.
Further, a DDoS attack detection method based on information entropy in an SDN environment, the detection method comprising:
firstly, when an attack end 1 attacks a victim host 5, a large number of data packets with the same destination address need to be transmitted to an edge switch 2 in advance, and the randomness of the network is reduced due to the same destination address;
when the data packet is transmitted to the edge switch 2, the window setting module 21 performs quantitative transmission on the data packet;
thirdly, the data packets transmitted in the window setting module 21 are classified through the characteristic classification module 33, entropy calculation is carried out through the detection algorithm module 31, then comparison is carried out with the threshold value in the threshold value setting module 32, and if the entropy is smaller than the threshold value, DDos attack is not detected;
when the entropy is greater than or equal to the threshold, it may be determined that the victim host 5 will be attacked by the DDos, and the path calculation module 34 and the topology awareness module 35 perform topology calculation to determine the source IP address and the source port of the packet.
The working principle and the using process of the invention are as follows: when the method is implemented, the edge switch 2 receives a large number of data packets with the same destination address, the data packets are quantitatively transmitted to the detection calculation module 31 through a preset window, the entropy value of the data packets is calculated, and then the entropy value is compared with a preset threshold value, so that the detection accuracy is ensured, the situation of misjudgment is prevented, the use quality is ensured, and the protection effect of the host computer is improved.
Although embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that changes, modifications, substitutions and alterations can be made in these embodiments without departing from the principles and spirit of the invention, the scope of which is defined in the appended claims and their equivalents.

Claims (6)

1. A DDoS attack detection method based on information entropy in an SDN environment comprises a main control end (3), and is characterized in that: the main control end (3) comprises a detection algorithm module (31), a threshold setting module (32), a feature classification module (33), a path calculation module (34) and a topology sensing module (35), wherein the detection algorithm module (31) is arranged inside the main control end (3), the threshold setting module (32) is arranged at the output end of the detection algorithm module (31), the feature classification module (33) is arranged at the output end of the threshold setting module (32), the path calculation module (34) is arranged at the output end of the feature classification module (33), and the topology sensing module (35) is arranged at the output end of the path calculation module (34).
2. The DDoS attack detection method based on information entropy in an SDN environment according to claim 1, characterized in that: and a data updating module (36) is also arranged in the main control end (3).
3. The DDoS attack detection method based on information entropy in an SDN environment according to claim 1, characterized in that: one side of master control end (3) is provided with marginal switch (2), marginal switch (2) are including window setting module (21) and self-checking module (22), wherein, the inside of marginal switch (2) is provided with self-checking module (22), one side of self-checking module (22) is provided with window setting module (21).
4. The DDoS attack detection method based on the information entropy under the SDN environment according to claim 3, characterized in that: the output end of the window setting module (21) is connected with the input end of the characteristic classification module (33).
5. The DDoS attack detection method based on the information entropy under the SDN environment according to claim 4, characterized in that: the input end of the edge switch (2) is provided with an attack end (1), the output end of the main control end (3) is provided with an agent end (4), and the output end of the agent end (4) is provided with a victim host (5).
6. The DDoS attack detection method based on the information entropy under the SDN environment according to any one of claims 1-5, characterized by comprising the following steps: the detection method comprises the following steps:
firstly, when an attack end (1) attacks a damaged host (5), a large number of data packets with the same destination address need to be transmitted to an edge switch (2) in advance, and the randomness of a network is reduced due to the fact that the destination addresses are the same;
when the data packet is transmitted to the edge switch (2), the window setting module (21) carries out quantitative transmission on the data packet;
thirdly, the data packets transmitted in the window setting module (21) are classified through a characteristic classification module (33), entropy calculation is carried out through a detection algorithm module (31), then comparison is carried out with a threshold value in a threshold value setting module (32), and if the entropy is smaller than the threshold value, DDos attack is not detected;
and fourthly, when the entropy value is larger than or equal to the threshold value, determining that the victim host (5) is attacked by DDos, performing topology calculation by the path calculation module (34) and the topology perception module (35), and determining the source IP address and the source port of the data packet.
CN202010911737.4A 2020-09-02 2020-09-02 DDoS attack detection method based on information entropy under SDN environment Pending CN112653658A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010911737.4A CN112653658A (en) 2020-09-02 2020-09-02 DDoS attack detection method based on information entropy under SDN environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010911737.4A CN112653658A (en) 2020-09-02 2020-09-02 DDoS attack detection method based on information entropy under SDN environment

Publications (1)

Publication Number Publication Date
CN112653658A true CN112653658A (en) 2021-04-13

Family

ID=75346117

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010911737.4A Pending CN112653658A (en) 2020-09-02 2020-09-02 DDoS attack detection method based on information entropy under SDN environment

Country Status (1)

Country Link
CN (1) CN112653658A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112702347A (en) * 2020-12-24 2021-04-23 滨州学院 SDN-based intrusion detection technology
CN114866350A (en) * 2022-07-06 2022-08-05 南京明博互联网安全创新研究院有限公司 SDN data plane low-rate attack detection method and system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110107880A (en) * 2010-03-26 2011-10-05 노기섭 Ddos detection method using fast information entropy and adaptive moving average window detector
CN106561016A (en) * 2015-11-19 2017-04-12 国网智能电网研究院 DDoS attack detection device and method for SDN controller based on entropy
CN109302378A (en) * 2018-07-13 2019-02-01 哈尔滨工程大学 A kind of SDN network ddos attack detection method
CN110602109A (en) * 2019-09-17 2019-12-20 东南大学 Application layer DDoS attack detection and defense method based on multi-feature entropy

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20110107880A (en) * 2010-03-26 2011-10-05 노기섭 Ddos detection method using fast information entropy and adaptive moving average window detector
CN106561016A (en) * 2015-11-19 2017-04-12 国网智能电网研究院 DDoS attack detection device and method for SDN controller based on entropy
CN109302378A (en) * 2018-07-13 2019-02-01 哈尔滨工程大学 A kind of SDN network ddos attack detection method
CN110602109A (en) * 2019-09-17 2019-12-20 东南大学 Application layer DDoS attack detection and defense method based on multi-feature entropy

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112702347A (en) * 2020-12-24 2021-04-23 滨州学院 SDN-based intrusion detection technology
CN114866350A (en) * 2022-07-06 2022-08-05 南京明博互联网安全创新研究院有限公司 SDN data plane low-rate attack detection method and system

Similar Documents

Publication Publication Date Title
US11057404B2 (en) Method and apparatus for defending against DNS attack, and storage medium
CN109962891B (en) Method, device and equipment for monitoring cloud security and computer storage medium
CN104836702A (en) Host network abnormal behavior detection and classification method under large flow environment
CN107209834B (en) Malicious communication pattern extraction device, system and method thereof, and recording medium
CN112653658A (en) DDoS attack detection method based on information entropy under SDN environment
CN112738107B (en) Network security evaluation method, device, equipment and storage medium
CN110247899B (en) System and method for detecting and relieving ARP attack based on SDN cloud environment
CN110071934B (en) Local sensitivity counting abstract method and system for network anomaly detection
CN110768946A (en) Industrial control network intrusion detection system and method based on bloom filter
CN107426136B (en) Network attack identification method and device
CN110719270A (en) FCM algorithm-based slow denial of service attack detection method
Gharvirian et al. Neural network based protection of software defined network controller against distributed denial of service attacks
TWI677209B (en) Domain name filtering method
CN106603471A (en) Firewall policy detection method and device
CN110381082B (en) Mininet-based attack detection method and device for power communication network
KR20110107880A (en) Ddos detection method using fast information entropy and adaptive moving average window detector
KR100756462B1 (en) Method for management a self-learning data in Intrusion prevention system and Method for handling a malicious traffic using the same
CN113726775B (en) Attack detection method, device, equipment and storage medium
CN112261004B (en) Method and device for detecting Domain Flux data stream
CN114726579A (en) Method, apparatus, device, storage medium and program product for defending against network attacks
CN110830518B (en) Traceability analysis method and device, electronic equipment and storage medium
CN113032782A (en) Virus transmission inhibition method
CN114268458A (en) Protection method of safety protection module for terminal public network safety communication
CN113347186A (en) Reflection attack detection method and device and electronic equipment
CN111885092A (en) DDoS attack detection method and processing method for edge nodes and SDN

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210413

RJ01 Rejection of invention patent application after publication