CN105871772A - Working method of SDN network architecture aimed at network attack - Google Patents

Working method of SDN network architecture aimed at network attack Download PDF

Info

Publication number
CN105871772A
CN105871772A CN201510024417.6A CN201510024417A CN105871772A CN 105871772 A CN105871772 A CN 105871772A CN 201510024417 A CN201510024417 A CN 201510024417A CN 105871772 A CN105871772 A CN 105871772A
Authority
CN
China
Prior art keywords
message
sdn
network
ids
sdn controller
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510024417.6A
Other languages
Chinese (zh)
Inventor
吴正明
张家华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201510024417.6A priority Critical patent/CN105871772A/en
Publication of CN105871772A publication Critical patent/CN105871772A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a working method of an SDN network architecture aimed at network attack. The method comprises: step S100, network initialization; step S200, distributed DDoS threat monitoring and / or SDN link status information collection; and step S300, threat treatment and / or data issuing. When a network is subjected to large-scale DDoS threat, the method can achieve route-optimized flow forwarding according to real-time status of a link, at the same time carry out DDoS threat identification and processing response quickly and accurately, and ensure the quality of network communication comprehensively.

Description

A kind of method of work of the SDN framework for network attack
Technical field
The present invention relates to network safety filed, particularly relate to a kind of SDN net for network attack The method of work of network framework.
Background technology
Currently, the network the most extensively connected has become as the important infrastructure of modern society.But, Along with the expansion of internet scale, the defect of traditional specifications system presents the most day by day.
Country's computer network emergence technology processes coordination center (CNCERT/CC) up-to-date issue Report shows: activities of hacker is increased, and back door, website, phishing, Web malice hang horse etc. Attack is in the trend of increasing substantially, wherein, and distributed denial of service attack (Distributed Denial of Service, DDoS) remain affect the Internet run safety topmost threat it One.In the past few years, the number of ddos attack, size, type all sharp rise.
How to pass through the technology difficulty that the realization of SDN framework is this area to the effectively defence of ddos attack Topic.
Summary of the invention
It is an object of the invention to provide the method for work of a kind of SDN framework, to solve existing network In the network security problem that caused of a large amount of ddos attacks, to realize quickly, efficiently, know all sidedly Not and defending DDoS (Distributed Denial of Service) attacks, and will threat process after break down with link after network topology become Change and distinguish, to provide corresponding message to send path.
In order to solve above-mentioned technical problem, the invention provides the work side of a kind of SDN framework Method.The method of work of described SDN framework, comprises the steps:
Step S100, netinit;Step S200, distributed DDoS threaten monitoring and/or Collect SDN link-state information;And step S300, threat process and/or data distributing.
Preferably, in order to preferably realize network configuration, netinit institute in described step S100 The device related to includes: SDN controller, IDS policy server and IDS equipment;
The step of netinit is as follows:
Step S101, described IDS policy server and IDS equipment set up special SSL channel; Step S102, described SDN controller builds network equipment information binding table, and by the network equipment Information binding table real-time update is in IDS equipment;Step S104, described SDN controller issues The stream table of mirror policy, will OF switch be all drags the port flow mirror image being loaded with main frame to be transmitted to Described IDS equipment;And step S105, described SDN controller issues DDoS threat identification Rule gives IDS equipment corresponding in each net territory.
Preferably, in described step S200, distributed DDoS threatens the method for monitoring to include: successively Link layer and the deceptive practices of internetwork layer address, internetwork layer and transport layer flag bit are arranged abnormal row For, and the formula that the floods aggressive behavior of application layer and transport layer detects;If said process detects Judge when message exists respective behavior, then this message is proceeded to step S300;To link layer and net The method that the deceptive practices of border layer address carry out detecting includes: by deception packet check module to deception Behavior detects, and first, calls network equipment information binding table by deception packet check module; Secondly, carried out being encapsulated in the type of message in Packet-In message by deception packet check module Resolve, to obtain corresponding source, purpose IP address, MAC Address and to upload this Packet-In The OF switch of message DPID and port numbers, and above-mentioned each information is believed with the network equipment respectively Corresponding information in breath binding table is compared;If the above-mentioned information matches in message, then message is entered Next detection of row;If the above-mentioned information in message is not mated, then message is proceeded to step S300;Institute State internetwork layer and transport layer flag bit arranges the method that Deviant Behavior carries out detecting and includes: reported by destruction Literary composition detection module arranges Deviant Behavior to flag bit and detects, and i.e. examines each flag bit of message Survey, to judge whether each flag bit meets ICP/IP protocol specification;If each flag bit of message meets, Then proceed to message carry out next detection;If each flag bit of message does not meets, then message is proceeded to step Rapid S300;The method that the formula that the floods aggressive behavior of described application layer and transport layer carries out detecting includes: By exception message detection module, the formula aggressive behavior of flooding is detected, i.e. detect mould at exception message Block builds the Hash table for identifying the formula attack message that floods, and according to the threshold values set in this Hash table Judge whether message has the formula aggressive behavior that floods, and will determine that result proceeds to step S300;And The method collecting SDN link-state information includes: according to each link overhead of SDN topological sum Calculate the backup path of main path;The flag bit of labelling backup path it is used for for the distribution of each backup path; According to backup path and respective flag position, each OF switch on this backup path issues stream list item.
In described step S300, the method for threat process and/or data distributing includes: take advantage of if message has Deceiving behavior, and attack threatens in OpenFlow territory, the most described IDS policy server is suitable to lead to Cross SDN controller shielding main frame;And threaten not in OpenFlow territory when attacking, then pass through It is clear that OF switch access interface flow corresponding to this message is redirected to flow by SDN controller The center of washing is filtered;If message has Deviant Behavior, the most described IDS policy server passes through SDN The flow of attacker or attack main frame is shielded by controller;If message has the formula that floods attacks row For, the OF corresponding to this message is exchanged by the most described IDS policy server by SDN controller Machine access interface flow is redirected to flow cleaning center and filters;And/or according to link load system Number calculates path optimizing, i.e. detects the link remaining bandwidth of two adjacent nodes, it is thus achieved that bearing of this link Carry coefficient, on the optimum road obtaining any two points according to this load factor and initialized network topological diagram Footpath, described SDN controller draws the forwarding flow table of correspondence according to this optimal path and issues each OF Switch.
Preferably, the shielding of described IDS policy server sends program and/or the method for main frame of message Including: first, build the corresponding Hash table of counting and set in respective threshold, i.e. unit interval, Building the first Hash table counting deceptive practices in described IDS policy server, flag bit sets Put the second Hash table that Deviant Behavior carries out counting, and that the formula aggressive behavior of flooding is counted Three Hash tables;Concurrently set first, second, third threshold values in first, second, third Hash table; Secondly, shielding sends program and/or the main frame of this message, i.e. for proceeding to IDS policy server The behavior of message, utilizes corresponding Hash table to count, when count value exceedes respective thresholds, and shielding Send program and/or the main frame of this message.
Further, in described step S300, the method for data distributing also includes: according to SDN The reason that topology changes, confirmation message issues path;That is, after SDN controller threat processes, By message by optimal path downward message, or after judging that main path breaks down, described in message coupling Stream list item is forwarded by backup path.
Beneficial effects of the present invention: DDoS is threatened filtering technique and routing optimality skill by (1) present invention Art merges, and when being monitored, shielding DDOS attack, can't cause blocking up of data, and And by monitoring and threat process being separated, effectively alleviate the burden of control plane, it is ensured that net Network is safer, the operation of colleges and universities;(2) the invention enables cannot be to address under legacy network architectural framework Forge ddos attack to be identified fundamentally being resolved with the difficult problem traced to the source;Deposit in a network In the case of ddos attack or normal big flow business, SDN controller can remain based on to link The real-time perception of the network parameters such as remaining bandwidth, it is achieved the routing optimality of normal stream amount, is substantially improved use The experience at family;(3) the process framework of the present invention uses open-ended modularity design, it is achieved that right The efficient detection of DDoS threat and sweetly disposition;(4) each module obtains packet information employing independently Interface design, reduce the coupling relatedness of intermodule;(5) each module uses the program number optimized According to structure, careful segmentation each process sub-process, improve the high cohesion characteristic of module;(6) present invention The also change to network link is distinguished by treating, i.e. if after SDN controller threat processes, By message by optimal path downward message, or after judging that main path breaks down, described in message coupling Stream list item is forwarded by backup path, effectively avoids because during exchange fault, data on flows is lost Lose.
Accompanying drawing explanation
In order to make present disclosure be more likely to be clearly understood, below according to specific embodiment also In conjunction with accompanying drawing, the present invention is further detailed explanation, wherein
Fig. 1 shows the structured flowchart of described SDN framework;
Fig. 2 shows the theory diagram of the theory diagram of IDS equipment;
Fig. 3 shows the workflow diagram of deception packet check module;
Fig. 4 shows the workflow diagram destroying packet check module;
Fig. 5 shows the overhaul flow chart of UDP Floodling;
Fig. 6 shows the overhaul flow chart of ICMP Floodling;
Fig. 7 shows that distributed DDoS threatens the FB(flow block) of the method for monitoring;
Fig. 8 shows the concrete topological diagram disposed of experiment scene;
Fig. 9 (a) shows what the Web server of the SDN framework not using the present invention was born Attack the curve chart of frequency;
Fig. 9 (b) shows and uses what the Web server of SDN framework of the present invention born to attack Hit the curve chart of frequency;
Figure 10 shows average transmission rate comparison diagram.
Detailed description of the invention
For making the object, technical solutions and advantages of the present invention of greater clarity, below in conjunction with concrete real Executing mode referring to the drawings, the present invention is described in more detail.It should be understood that these describe simply Exemplary, and it is not intended to limit the scope of the present invention.Additionally, in the following description, it is right to eliminate Known features and the description of technology, to avoid unnecessarily obscuring idea of the invention.
In software defined network (Software Defined Network, SDN) framework, when When one message (Packet) arrives OF switch, first to OF switch is carried Stream table mates.If the match is successful, the action executing just specified according to stream table forwards rule.As It fails to match for fruit, then this message is encapsulated in Packet In message by OF switch, is sent to SDN Controller, and this message exists in local cache by OF switch.Wait that SDN controller is made Go out decision-making, how to process this message.
Have a lot of main frame in network, then needing to set up one for All hosts in network is the Hash of key Table, referred to as " number of times Hash table group in violation of rules and regulations ", comprising: be suitable to cheating what message counted First Hash table, is suitable to destroying the second Hash table that message counts, and is suitable to attack the formula that floods Carry out the 3rd Hash table counted.The violation number of times of record respective hosts, the namely credibility of main frame.
Packet in network is real-time, so needing the threat message setting up in a kind of unit interval A key in the Hash table of counting, and the corresponding Hash table of each main frame, corresponding key assignments is The number of the threat data bag that the main frame of corresponding keys sends in the unit interval of record.This type of Hash table exists Key assignments corresponding for keys all in Hash table must be set to 0 by the unit interval " timeslice " at first;And The message of every kind of detection has been required for such table, just such as have detected 100 kinds of messages, just Need 100 this type of Hash tables.
And, each Hash table must have a corresponding threshold value.As long as one has main frame to exist in Hash table Accumulated counts in analog value.Check after counting whether this value exceedes the threshold value of setting.If it exceeds it is corresponding Threshold value, then the key assignments in violation number of times Hash table corresponding record counting.
On the basis of foregoing invention principle, the specific implementation process of the present embodiment is as follows.
Embodiment 1
Fig. 1 shows the structured flowchart of the SDN framework of the present invention.
As it is shown in figure 1, the SDN framework of the present invention, including: SDN controller, IDS are certainly Plan server, IDS equipment (i.e. intrusion detection device) and flow cleaning center;When IDS equipment Inspection To when there is the message of ddos attack feature, i.e. report to IDS decision service by SSL channel Device;Described IDS policy server, according to reporting information, is made and has ddos attack feature Process strategy corresponding to message, then this message is shielded by SDN controller or by this report OF switch access interface flow corresponding to literary composition is redirected to flow cleaning center and filters;With Time, collect current SDN link-state information by SDN controller, to provide corresponding message to send out Send path.
Wherein, ddos attack characterizing definition is: to link layer and the deceptive practices of internetwork layer address, The Deviant Behavior that internetwork layer and transport layer flag bit are arranged, and formula that application layer and transport layer are flooded Aggressive behavior.
Fig. 2 shows the theory diagram of the theory diagram of IDS equipment.
As in figure 2 it is shown, further, include in described IDS equipment:
Deception packet check module, the deceptive practices to link layer and internetwork layer address detect;
Destroying packet check module, the Deviant Behavior arranging internetwork layer and transport layer flag bit is examined Survey;
Exception message detection module, the formula aggressive behavior that floods application layer and transport layer detects;
By described deception packet check module, destroy packet check module, exception message detection module Successively message is detected;And if detection module detects when message exists above-mentioned respective behavior, then This message is proceeded to IDS policy server.
Further, described IDS policy server is suitable to when message has deceptive practices, and attacks threat In OpenFlow territory, then shield main frame by SDN controller;Maybe do not exist when attack threatens In OpenFlow territory, then by SDN controller, the OF switch corresponding to this message is accessed Port flow is redirected to flow cleaning center and filters;Described IDS policy server is further adapted for working as Message has Deviant Behavior, then entered the flow of attacker or attack main frame by SDN controller Row shielding;And when message has the formula aggressive behavior that floods, and the most described IDS policy server is suitable to lead to Cross SDN controller and the OF switch access interface flow corresponding to this message is redirected to flow Cleaning center filters.
The present invention uses from deception packet check module to destroying packet check module, then to exception message The order that detection module detects successively, wherein, each module obtains packet information and uses independent interface Design, reduces the coupling relatedness of intermodule;And each module uses the program data structure optimized, Careful segmentation each process sub-process, improves the high cohesion characteristic of module.This detection ordering improves Detection efficiency to message data, and reduce loss.
Fig. 3 shows the workflow diagram of deception packet check module.
As it is shown on figure 3, call network equipment information binding table by described deception packet check module, And packet cheating behavior is carried out by being suitable in the structure unit interval in described IDS policy server First Hash table of counting, and set the first threshold values in this first Hash table;Described deception message Detection module, resolves the type of the message being encapsulated in Packet-In message, to obtain phase The source answered, purpose IP address, MAC Address and upload the OF switch of Packet-In message No. DPID and port number information, and each information is corresponding to network equipment information binding table respectively Information is compared;If the above-mentioned information matches in message, then proceed to message destroy packet check mould Block;If the above-mentioned information in message is not mated, then proceed to described IDS policy server, message is entered Row abandons, and counts deceptive practices simultaneously, when this count value is more than the first threshold values, and shielding Send program and/or the main frame of this message.
Concrete, described deception packet check module judges for message carries out first time, i.e. judges Whether message is IP spoofing attack message, port spoofing attack message or MAC spoofing attack message.
Concrete steps include: parse source, target MAC (Media Access Control) address and OF the most in ethernet frames Switch entrance, then parses different messages according to different type of messages.When type of message is When IP, ARP, RARP, then parse corresponding source, purpose IP address then by these information pair Information in network equipment information binding table carries out coupling of tabling look-up, if matching corresponding information, then Give destruction packet check resume module.If not mating, then this message is proceeded to IDS policy server Process;And deceptive practices are carried out accumulated counts simultaneously, and when this count value is more than the first threshold values, screen Cover program and/or the main frame sending this message.
Floodlight has device manager module DeviceManagerImpl, when one Equipment is followed the tracks of the when of equipment mobile device in a network, and according to new stream definition equipment.
Equipment manager learns equipment from PacketIn asks, and obtains from PacketIn message Device network parameter information (information such as source, purpose IP, MAC, VLAN), by entity classification device Equipment is made a distinction into OF switch or main frame.Under default situations, entity classification device uses MAC Address and/or vlan table show an equipment, and the two attribute can uniquely identify an equipment. The important information of another one be equipment mount point (No. DPID of OF switch and port numbers) (, In an openflow region, an equipment can only have mount point, here an openflow Region refers to the set of the multiple OF switches being connected with same Floodlight example.Equipment Manager is also provided with expired time for IP address, mount point, equipment, and last timestamp is made The foundation the most expired for judging them.)
Therefore only need to call DeviceManagerImpl module inside network equipment information binding table module The IDeviceService provided, adds the monitoring of IDeviceListener simultaneously to this service Interface.
The monitoring interface that wherein IDeviceListener provides has:
Interface name Function
public void deviceAdded(IDevice device) Main frame adds response
public void deviceRemoved(IDevice device) Main frame removes response
public void deviceMoved(IDevice device) Host mobility responds
public void deviceIPV4AddrChanged(IDevice device) Host IP address changes response
public void deviceVlanChanged(IDevice device) Main frame VLAN changes response
ISP: IFloodlightProviderService, IDeviceService
Dependence interface: IFloodlightModule, IDeviceListener
According to the low and high level trigger mechanism of OF switch, (triggering Port extracted by netting twine to record in table The low level of Down, netting twine pulls out the high level into triggering Port Up) binding can be refreshed in real time Record in table.
Traditional ddos attack cannot touch, revise Switch DPID's and Switch Port Information, utilizes this advantage, can detect spoofing attack more flexibly.
Fig. 4 shows the workflow diagram destroying packet check module.
As shown in Figure 4, described IDS policy server builds being suitable to message in the unit interval Flag bit the second Hash table that Deviant Behavior carries out counting is set, and set in this second Hash table The second threshold values;Each flag bit of message is detected by described destruction packet check module, to judge Whether each flag bit meets ICP/IP protocol specification;If each flag bit of message meets, then by message Proceed to exception message detection module;If each flag bit of message does not meets, then proceed to described IDS decision-making Server, abandons message, and flag bit is arranged Deviant Behavior simultaneously and count, when this When count value is more than the second threshold values, shielding sends program and/or the main frame of this message.
Concrete, described destruction packet check module, judging for message being carried out second time, i.e. sentencing Whether disconnected message is the attack message with malice flag bit feature.Wherein, there is malice flag bit special The attack message levied includes but not limited to IP attack message, TCP attack message.Implement step to include: IP attack message and TCP/UDP attack message therein are realized the inspection of the flag bit of each message Survey, i.e. identify whether each flag bit meets ICP/IP protocol specification.If met, the most directly Transfer to abnormal number packet check resume module.If not meeting, then it is judged as attack message, proceeds to IDS Policy server processes.
With typical attack such as Tear Drop for row, IP packet header has an offset field and one Burst mark (MF), if assailant is arranged to incorrect value offset field, IP fragmentation message is just There will be the situation overlapping or disconnecting, target machine system will be collapsed.
In IP heading, having a protocol fields, this field specifies which kind of this IP message carries Agreement.The value of this field is less than 100, if assailant is big to the target machine substantial amounts of band of transmission The IP message of the protocol fields in 100, the protocol stack in target machine system will be destroyed, shape Become to attack.
Therefore in destroying packet check module, first extract each flag bit of message, then inspection is No normally.
If normal, then give subsequent module for processing.
If abnormal, then abandon this packet, and to corresponding Hash table rolling counters forward.If it is single When bit time inside counting device exceedes described second threshold values of setting, then call IDS policy server to phase The program answered carries out shielding and/or directly shielding corresponding main frame.
After being filtered by the packet of deception packet check module, follow-up destruction packet check module The handled address in packet is all real.So, effectively avoid target machine have received Destroying message, may directly result in the protocol stack collapse of target machine, even target machine directly collapses.
The process function destroying packet check module is substantially similar with deception packet check handling process, district It is not to destroy that packet check module parses is the flag bit of each message, then detects each mark Will position is the most normal.
If normal, just process directly to follow-up exception message detection module.
If abnormal, then abandon this packet, and Hash corresponding to main frame application reference mechanism Table inside counting device counts.If it exceeds the threshold values set, then shield corresponding attacker or directly Main frame is attacked in shielding.
The Hash table for identifying the formula attack message that floods is built at described exception message detection module, Described IDS policy server builds being suitable in the unit interval formula aggressive behavior of flooding is counted 3rd Hash table of number, and set the 3rd threshold values in the 3rd Hash table;Described exception message is examined Survey module, be suitable to judge whether described message has attack row according to the threshold values set in described Hash table For;If without aggressive behavior, then by data distributing;If having aggressive behavior, then proceed to described IDS certainly Plan server, abandons message, and counts aggressive behavior simultaneously, when count value exceedes During three threshold values, shielding sends program and/or the main frame of this message.
Concrete, described exception message detection module, judging for message being carried out third time, i.e. sentencing Whether disconnected message is the formula attack message that floods.
Concrete steps include: utilize to build identification flood formula attack message to the phase in Hash table Should record and add up, and detect whether to exceed threshold value, to judge whether the being formula attack message that floods.
Through above-mentioned deception packet check module, destroy filtering of two modules of packet check module, after The packet of continuous resume module substantially belongs to packet under normal circumstances.But, under normal circumstances, Also have ddos attack produce, in the prior art, normally only carry out cheat packet check module, Destroy packet check module, and in the technical program, ddos attack can be avoided as far as possible.
Following example are for for carrying out deception packet check module, destroying packet check modular filtration After, then the detailed description of the invention by exception message detection module shielding ddos attack.This embodiment party Formula is as a example by UDP Flooding and ICMP Flooding.
Fig. 5 shows the overhaul flow chart of UDP Floodling.
About UDP Floodling, as it is shown in figure 5, utilize udp protocol without setting up connection Mechanism, sends a large amount of UDP messages to target machine.Target machine can devote a tremendous amount of time process UDP Message, these UDP attack messages not only can make to deposit the cache overflow of UDP message, and Can take the substantial amounts of network bandwidth, target machine (or little) cannot receive legal UDP message.
Owing to different main frames sends a large amount of UDP message bags to single main frame, so certainly having The situation that udp port takies, so the technical program can receive the port of an ICMP not Up to bag.
So All hosts can be set up a Hash table by the technical program, it is specifically used to deposit unit The number of times of the unreachable packet of ICMP port is received in time.If it exceeds the threshold values set, the most directly Connect the corresponding attacker of shielding.
Fig. 6 shows the overhaul flow chart of ICMP Floodling.
About ICMP Floodling, as shown in Figure 6, ICMP Flooding is directly entered The inside counting of row unit interval.If it exceeds corresponding threshold values, then directly respective host is shielded accordingly Cover, although the method is simple, but the most effective.
Therefore, exception message detection module, if be detected that type of message be exception message detect class Type, then carry out corresponding enumerator and detect whether to exceed threshold value, if it does not exceed the threshold, also can be right This packet is issued by optimum routing policy.Threshold value if more than, then shielding is corresponding attacks Program, or directly respective host is shielded accordingly.
Described deception packet check module, destruction packet check module and exception message detection module middle mold Block judges when described message is above-mentioned attack message, then this attack message to be proceeded to IDS decision service Device, i.e. abandon described message, and shield program and/or the main frame sending this message.
When " deception packet check module ", " destroying packet check module " and " exception message inspection Survey module " need packet discard or need shielding threaten main frame when.Directly invoke IDS Policy server threatens process operation accordingly.
The concrete enforcement step of described IDS policy server includes:
The step abandoning described message, i.e. packet discard includes the following:
OF switch (OF switch), can be by these data in the case of not matching corresponding stream table Encapsulation is in Packet In message, and this packet is existed local delaying by OF exchange opportunity simultaneously In depositing, packet is deposited in the buffer, has a buffer area ID, and this No. ID also can be encapsulated in In the buffer_id of Packet In message, by the form of Packet out, Packet simultaneously Buffer_id in out message fills in buffer area ID (the corresponding Packet of packet to be abandoned Buffer_id in In message).
The step of shielding main frame includes the following:
OpenFlow protocol streams list structure is as follows:
Territory, packet header Enumerator Action
The structure in its middle wrapping head territory is:
IDS policy server includes that the step shielding application program includes the following:
In the territory, packet header of stream table, fill in corresponding matching field, and shield by arranging Wildcards Field, obtains shielding attacker or host information.Wherein, as attacker need to be shielded, then Following matching field is filled in territory, stream table packet header: IP, MAC, VLAN, Swtich DPID, Swtich Port, protocol type and port numbers thereof etc..As main frame need to be shielded, then in stream table packet header Territory is filled in: IP, MAC, VLAN, Swtich DPID, Swtich Port etc. mate word Section.Stream table action lists is empty, it is achieved the data packet discarding of attacker/main frame.Call each Kazakhstan Record value in uncommon table, calculates stream table time-out and is automatically deleted the time.Issue stream table mask program or Main frame.
Therefore, the technical program can effectively identify and filter attack packets.
Optionally, normal message can also issuing by the most optimum routing policy.
The step of optimum routing policy is as follows:
Initially enter and submit, to the topological interface (API) of SDN controller, the request of acquisition to, complete to obtain Net topology, then go out total network links remaining bandwidth by the total network links state computation obtained.
The calculating of described real-time optimal path, algorithm uses classical dijkstra's algorithm, algorithm Weights change the inverse of the total network links remaining bandwidth that previous step obtains into, the path calculated with guarantee It is the most unobstructed, the path that propagation delay time is minimum.The step that is embodied as about optimal path is being implemented It is discussed in detail in example 2.
Finally, the optimal path calculated is converted into the real-time optimal path plan being made up of stream table Slightly, issue.
Step S1, uses topology interface, the api interface that described SDN controller carries, makes Finding link with LLDP (Link Layer Discovery Protocol) and broadcast packet, then SDN controller is counted automatically Calculate network topology.
Step S2, the topological interface of SDN controller is to " real-time optimal path computation module " " full mesh topology acquisition module " topology obtains the feedback of request.
In step S3, " total network links state acquisition module " is to " OF switch query interface mould Block " file a request, obtain total network links state.Wherein, " OF switch query interface module " " OF switch characteristic enquiry module " and " OF switch status is carried at SDN controller Enquiry module " on the basis of expand, it is achieved that the calculating of link remaining bandwidth and query function.
Then, " OF switch query module " passes through step S4 all OF switches in network Send the broadcast packet of OF switch property request.OF in automatic network is received again by step S5 The message of switch characteristic feedback, parses the curr field inside message, obtains each OF exchange Machine port current bandwidth B.
Exchange it follows that this module sends OF by step S6 all OF switches in network The broadcast packet of machine status request, sends bag number, port transmission byte number, port reception including port The message status such as byte number, port receiver packet number.Then, this module by step S7 receive from In network, the message of OF switch status feedback, parses tx_bytes field, obtains sending byte Number N1, obtains current time t1.
Exchange it follows that this module sends OF by step S8 all OF switches in network The broadcast packet of machine status request, then, this module receives OF switch in automatic network by S9 The message of feedback of status, timing stops, and obtains current time t2.Parse tx_bytes field, Obtain sending byte number N2.
Then can calculate present port remaining bandwidth is: B-(N2-N1)/(t2-t1).
Then, the network topology that recycling obtains carries out the remaining bandwidth of each of the links and calculates:
If the connection between OF switch and OF switch, then obtain the OF of this both link ends The remaining bandwidth of switch ports themselves, the remaining bandwidth of this link be in two port remaining bandwidths relatively Little person.
If the connection between main frame and OF switch, then obtain the OF switch connecting main frame The remaining bandwidth of port, this link remaining bandwidth is the OF switch ports themselves of this main frame of connection and remains Remaining bandwidth.
Step S4, SDN controller sends to the whole network all OF switch with the form of broadcast Feature Request message.
Step S5, SDN controller receives OF switch in automatic network and feeds back to SDN controller Feature Reply message.
Step S6, SDN controller sends to the whole network all OF switch with the form of broadcast Stats Request message.
Step S7, SDN controller receives OF switch in automatic network and feeds back to SDN controller Stats Reply message.
Step S8, SDN controller sends to the whole network all OF switch with the form of broadcast Stats Request message.
Step S9, SDN controller receives OF switch in automatic network and feeds back to SDN controller Stats Reply message.
Step S10, the link remaining bandwidth information calculated is fed back to by OF switch query interface " total network links state acquisition module ".
Step S11, routing policy issues the most optimum routing policy that module calculates, will calculate The stream table gone out is handed down to the OF switch being correlated with by step S12.
Step S12, this interface is the api interface that SDN controller carries, and is used for issuing and calculates Optimum routing policy.
Crossing described optimal path strategy is while defence DDOS attack, the average transmission of network Time delay does not increase sharply.
Described SDN controller includes: path backup units, for according to SDN topological sum Each link overhead calculates the backup path of main path;Flag bit allocation unit, is used for as each backup path Distribution is for the flag bit of labelling backup path;Stream table issues unit, for according to backup path and right Flag bit each OF switch on this backup path is answered to issue stream list item;Described SDN controller is fitted After changing in SDN topology, the reason changed according to SDN topology, confirmation message Issue path;That is, after SDN controller DDoS threat processes, message is passed through optimal path Downward message, or after judging that main path breaks down, message mates described stream list item and passes through backup path Forward.Concrete, port can be obtained whether in the OpenFlow territory of SDN controller Go wrong, and then realize judging the reason that SDN topology changes.
Embodiment 2
The method of work of a kind of SDN framework on the basis of embodiment 1, with by detection and Centralized process, effectively alleviates the work load of SDN controller, improves detection efficiency And data transmission rate, and during by collecting SDN link-state information to avoid link to break down, Traffic loss.
The method of work of the SDN framework of the present invention, comprises the steps: step S100, net Network initializes;Step S200, distributed DDoS threatens monitoring and/or collects SDN Link State Information;And step S300, threat process and/or data distributing.
Further, in described step S100, device involved by netinit includes: SDN controls Device, IDS policy server and IDS equipment;The step of netinit is as follows: step S101, Described IDS policy server and IDS equipment set up special SSL channel;Step S102, described SDN controller builds network equipment information binding table, and by real-time for network equipment information binding table Update in IDS equipment;Step S104, described SDN controller issues the stream table of mirror policy, Will OF switch be all drags the port flow mirror image being loaded with main frame to be transmitted to described IDS equipment;With And step S105, described SDN controller issues DDoS threat identification rule in each net territory Corresponding IDS equipment.
In described step S200, distributed DDoS threatens the method for monitoring to include: successively to link layer Deviant Behavior, Yi Jiying are set with the deceptive practices of internetwork layer address, internetwork layer and transport layer flag bit Detect with the formula that the floods aggressive behavior of layer and transport layer;If message is judged in detection in said process When there is respective behavior, then this message is proceeded to step S300.
Fig. 9 shows that distributed DDoS threatens the FB(flow block) of the method for monitoring.
As it is shown in figure 9, concrete enforcement step includes:
Step S210, the deceptive practices to link layer and internetwork layer address detect.
Step S220, the Deviant Behavior arranging internetwork layer and transport layer flag bit detects.
Step S230, the formula aggressive behavior that floods application layer and transport layer detects.
Step S240, if passing sequentially through described step S210, step S220, step S230 by message After, step is judged when message exists deception, exception, aggressive behavior, then described message to proceed to step Rapid S300.
The method in described step S210, the deceptive practices of link layer and internetwork layer address detected Comprise the steps: step S211, call network equipment information by deception packet check module and tie up Determine table;Step S212, will be encapsulated in Packet-In message report by deception packet check module The type of literary composition resolves, to obtain corresponding source, purpose IP address, MAC Address and to upload No. DPID and port numbers of the OF switch of this Packet-In message, and above-mentioned each information is divided Do not compare with the corresponding information in network equipment information binding table;If the above-mentioned information in message Join, then message is proceeded to step S220;If the above-mentioned information in message is not mated, then message is turned Enter step S300.
Described step S220 arranges what Deviant Behavior detected to internetwork layer and transport layer flag bit Method includes: detect each flag bit of message, to judge whether each flag bit meets TCP/IP Protocol specification;If each flag bit of message meets, then message is proceeded to S230;If each mark of message Will position does not meets, then message is proceeded to step S300.
The side that the formula aggressive behavior that in described step S230 floods application layer and transport layer detects Method comprises the steps: step S231, builds at exception message detection module and floods formula for identification The Hash table of attack message;Step S232, by exception message detection module according to described Hash table The threshold values of middle setting judges that described message, whether for the formula attack message that floods, and will determine that result proceeds to step Data even without aggressive behavior, are then normally issued or by above-mentioned optimal path strategy by rapid S300 Issue;If having aggressive behavior, then take corresponding shielding measure.
Wherein, the method collecting SDN link-state information includes: for opening up according to SDN Flutter and the backup path of each link overhead calculating main path;For being used for labelling for the distribution of each backup path The flag bit of backup path;For according to backup path and respective flag position on this backup path each OF switch issues stream list item.
In described step S300, threat process/or the method for data distributing include:
If message has deceptive practices, and attack threatens in OpenFlow territory, the most described IDS Policy server is suitable to shield main frame by SDN controller;And do not exist when attacking to threaten In OpenFlow territory, then by SDN controller, the OF switch corresponding to this message is accessed Port flow is redirected to flow cleaning center and filters;If message has Deviant Behavior, then described The flow of attacker or attack main frame is shielded by IDS policy server by SDN controller; Concrete enforcement step includes: for destroying message aggression, due to the message that IDS equipment is currently processed Pass through deception packet check, so this message address is real.IDS policy server only need to lead to Cross the northbound interface of SDN controller to issue the stream table that action is Drop and by attacker or attack main The flow shielding of machine.But this is all the decision-making of coarseness, it is only applicable to the destruction report that attack packets is a small amount of Literary composition is attacked.
If message has the formula aggressive behavior that floods, the most described IDS policy server is controlled by SDN OF switch access interface flow corresponding to this message is redirected to flow cleaning center by device to be carried out Filter;Optionally, the result of protection can also be fed back to SDN by the safety equipment of flow cleaning center Controller, adjusts network strategy, it is achieved SDN and many in the case of being mixed with legacy network Dimension protection.
Further, go out path optimizing according to link load coefficient calculations, i.e. detect the chain of two adjacent nodes Road remaining bandwidth, it is thus achieved that the load factor of this link, according to this load factor and initialized network Topological diagram obtains the optimal path of any two points, and described SDN controller draws according to this optimal path Corresponding forwarding flow table also issues each OF switch.
The specific algorithm flow process of path optimizing is as follows:
If rN, (n-1)Be the link remaining bandwidth of two adjacent nodes, then its link load coefficient is:
/ * by SDN controller calculate link load coefficient */
U (a, b) be load factor between any two points and:
U ( a , b ) = Σ n = a b cos t n , ( n + 1 )
If initial network topology figure is G0, calculate the optimal path between any two points,
The method of program and/or main frame that the shielding of described IDS policy server sends message includes:
First, build the corresponding Hash table of counting and set in respective threshold, i.e. unit interval, institute Stating and build the first Hash table counting deceptive practices in IDS policy server, flag bit is arranged Deviant Behavior carries out the second Hash table counted, and count the formula aggressive behavior of flooding the 3rd Hash table;Concurrently set first, second, third threshold values in first, second, third Hash table; Secondly, shielding sends program and/or the main frame of this message, i.e. for proceeding to IDS policy server The behavior of message, utilizes corresponding Hash table to count, when count value exceedes respective thresholds, and shielding Send program and/or the main frame of this message.
In described step S300, the method for data distributing also includes: change according to SDN topology Reason, confirmation message issues path;That is, after SDN controller threat processes, message is led to Cross optimal path downward message, or after judging that main path breaks down, message mates described stream list item and leads to Cross backup path to forward.
Embodiment 3
The SDN framework of the present invention can define SDNQA (SDN Communication Quality Assurance Strategy) i.e. SDN communication quality guarantee strategies.
The test environment of the SDN framework of the present invention and test content are as follows:
Based on OpenFlow 1.3 agreement, test to threaten equipped with DDoS to filter and protect with communication quality The FloodlightSDN controller of barrier component, OF switch, IDS equipment and IDS decision-making clothes Communication between business device.
Test IDS equipment whether can abnormal aggression flow in real time monitoring network, and pass through SSL channel reports IDS policy server.
The information whether test IDS policy server can report according to IDS equipment, makes process The corresponding strategy attacking threat, and issued by the northbound interface of SDN controller.
Whether test SDN controller can generate according to network real time status and issue real-time optimization Forward-path.
Fig. 8 shows the concrete topological diagram disposed of experiment scene.
The concrete of experiment scene is disposed as shown in Figure 8., there are two empty nets network area based on centre. Wherein empty net A deploys this SDNQA system, and empty net B not yet disposes, and in each empty net All there is some ddos attack puppet's machines.Right side is experiment effect contrast district, including a Web Server and two subscriber's main stations, wherein run Tomcat and externally provide Web on Web server Service, subscriber's main station A, B are the main frame accessing void net A, B respectively.Left side is attack simulating district , there is a ddos attack machine in territory, and attack plane will control in empty net A and empty net B as main control computer Puppet's machine to Web server initiate hybrid-type ddos attack.
Based on above-mentioned experimental situation, in terms of two, the performance of SDNQA framework is verified: (1) Contrast the attack frequency that under hybrid-type ddos attack, Web server end is born;(2) contrast The formula that floods attacks the network average transfer delay caused.
Experimental result and analysis are as shown in Fig. 9 (a) and Fig. 9 (b).
The attack that Fig. 9 (a) is born by not using the Web server of the SDN framework of the present invention The curve chart of frequency.
The attack frequency that Fig. 9 (b) is born by using the Web server of the SDN framework of the present invention The curve chart of rate.
First, Web server end flow is flowed into situation to be analyzed.Attack plane controls each empty net In puppet's machine simultaneously to Web server initiate hybrid-type ddos attack, its highest frequency is 55Hz, during attack a length of 100 seconds.Intercept all of sequence of data packet of Web server, and divide Separate out the request sequence of each empty net, draw empty net A and the request sequence of empty net the flowed into server of B respectively Shown in row, attack frequency contrast such as Fig. 9 (a) that Web server is born and Fig. 9 (b).
Figure 10 is average transmission rate comparison diagram.
From fig. 10 it can be seen that the SDN framework of the present invention quickly identified within 0s~the 5s time period Typical ddos attack, and within the time period of 0s~40s, take filter protection measure.40s it After, network traffics tend to normal, and test subscriber's main station A can normally obtain web-page requests response always. And do not dispose and the empty net B of SDNQA system has substantial amounts of attack traffic to flow into always, test user Host B cannot obtain web-page requests response.
Secondly, from the sequence of data packet intercepted before, extract test subscriber's main station A and test user The request sequence of host B, the time delay of the average transmission of statistical data packet from each request sequence, Show that the average transmission time delay of two empty nets is to shown in such as Fig. 9 (a) and Fig. 9 (b).
It can be seen from fig. 10 that through routing optimality, the average transfer delay of empty net A not with The increase of data volume and increase sharply.As can be seen here, SDNQA framework can be based on shape real-time to network The perception of condition, convection current forward-path is optimized, thus there is ddos attack or normal in a network Network data transmission is ensured in the case of big flow business.

Claims (6)

1. a method of work for SDN framework, comprises the steps:
Step S100, netinit;
Step S200, distributed DDoS threatens monitoring and/or collects SDN link-state information;And
Step S300, threat process and/or data distributing.
The method of work of SDN framework the most according to claim 1, it is characterised in that in described step S100, the device involved by netinit includes: SDN controller, IDS policy server and IDS equipment;
The step of netinit is as follows:
Step S101, described IDS policy server and IDS equipment set up special SSL channel;
Step S102, described SDN controller builds network equipment information binding table, and by network equipment information binding table real-time update to IDS equipment;
Step S104, described SDN controller issues the stream table of mirror policy, will OF switch is all drags the port flow mirror image being loaded with main frame to be transmitted to described IDS equipment;And
Step S105, described SDN controller issues DDoS threat identification rule to IDS equipment corresponding in each net territory.
The method of work of SDN framework the most according to claim 2, it is characterised in that in described step S200, distributed DDoS threatens the method for monitoring to include:
Successively link layer and the deceptive practices of internetwork layer address, internetwork layer and transport layer flag bit are arranged Deviant Behavior, and
The formula that the floods aggressive behavior of application layer and transport layer detects;
If detection is judged when message exists respective behavior in said process, then this message is proceeded to step S300;
That is, the described method detecting the deceptive practices of link layer and internetwork layer address includes:
Deceptive practices are detected, i.e. by deception packet check module
First, network equipment information binding table is called by deception packet check module;
Secondly, resolved being encapsulated in the type of message in Packet-In message by deception packet check module, to obtain corresponding source, purpose IP address, MAC Address and to upload OF switch DPID and the port numbers of this Packet-In message, and above-mentioned each information is compared with the corresponding information in network equipment information binding table respectively;
If the above-mentioned information matches in message, then message is carried out next detection;
If the above-mentioned information in message is not mated, then message is proceeded to step S300;
Described internetwork layer and transport layer flag bit arrange the method that Deviant Behavior carries out detecting and include:
By destruction packet check module, flag bit is arranged Deviant Behavior to detect, i.e.
Each flag bit of message is detected, to judge whether each flag bit meets ICP/IP protocol specification;
If each flag bit of message meets, then proceed to message carry out next detection;
If each flag bit of message does not meets, then message is proceeded to step S300;
The method that the formula that the floods aggressive behavior of described application layer and transport layer carries out detecting includes:
By exception message detection module, the formula aggressive behavior of flooding is detected, i.e.
Build the Hash table for identifying the formula attack message that floods at exception message detection module, and judge whether message has the formula aggressive behavior that floods according to the threshold values set in this Hash table, and will determine that result proceeds to step S300;And
The method collecting SDN link-state information includes:
The backup path of main path is calculated according to SDN network topology and each link overhead;
The flag bit of labelling backup path it is used for for the distribution of each backup path;And
According to backup path and respective flag position, each OF switch on this backup path issues stream list item.
The method of work of SDN framework the most according to claim 3, it is characterised in that in described step S300, threat process/or the method for data distributing include:
If message has deceptive practices, and attack threatens in OpenFlow territory, and the most described IDS policy server is suitable to shield main frame by SDN controller;And threaten not in OpenFlow territory when attacking, then by SDN controller, the OF switch access interface flow corresponding to this message is redirected to flow cleaning center and filters;
If message has Deviant Behavior, the flow of attacker or attack main frame is shielded by the most described IDS policy server by SDN controller;
If message has the formula aggressive behavior that floods, the OF switch access interface flow corresponding to this message is redirected to flow cleaning center by SDN controller and filters by the most described IDS policy server;And/or
Path optimizing is gone out according to link load coefficient calculations, i.e. detect the link remaining bandwidth of two adjacent nodes, obtain the load factor of this link, obtaining the optimal path of any two points according to this load factor and initialized network topological diagram, described SDN controller draws the forwarding flow table of correspondence according to this optimal path and issues each OF switch.
The method of work of SDN framework the most according to claim 4, it is characterised in that the method for program and/or main frame that the shielding of described IDS policy server sends message includes:
First, build the corresponding Hash table of counting and set respective threshold, i.e.
In unit interval, building the first Hash table counting deceptive practices in described IDS policy server, flag bit arranges the second Hash table that Deviant Behavior carries out counting, and the 3rd Hash table counting the formula aggressive behavior of flooding;
Concurrently set first, second, third threshold values in first, second, third Hash table;
Secondly, shielding sends program and/or the main frame of this message, i.e.
For the behavior of the message proceeding to IDS policy server, utilizing corresponding Hash table to count, when count value exceedes respective thresholds, shielding sends program and/or the main frame of this message.
The method of work of SDN framework the most according to claim 5, it is characterised in that in described step S300, the method for data distributing also includes:
According to the reason of SDN network topological change, confirmation message issues path;That is, after SDN controller threat processes, by message by optimal path downward message, or after judging that main path breaks down, the message described stream list item of coupling is forwarded by backup path.
CN201510024417.6A 2015-01-18 2015-01-18 Working method of SDN network architecture aimed at network attack Pending CN105871772A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510024417.6A CN105871772A (en) 2015-01-18 2015-01-18 Working method of SDN network architecture aimed at network attack

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510024417.6A CN105871772A (en) 2015-01-18 2015-01-18 Working method of SDN network architecture aimed at network attack

Publications (1)

Publication Number Publication Date
CN105871772A true CN105871772A (en) 2016-08-17

Family

ID=56622800

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510024417.6A Pending CN105871772A (en) 2015-01-18 2015-01-18 Working method of SDN network architecture aimed at network attack

Country Status (1)

Country Link
CN (1) CN105871772A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411852A (en) * 2016-08-31 2017-02-15 浙江宇视科技有限公司 Distributed terminal access control method, and apparatus
CN108289104A (en) * 2018-02-05 2018-07-17 重庆邮电大学 A kind of industry SDN network ddos attack detection with alleviate method
CN108833430A (en) * 2018-06-29 2018-11-16 华中科技大学 A kind of topological guard method of software defined network
CN109257360A (en) * 2018-10-08 2019-01-22 江苏大学 Hidden information in SDN network based on transmission path is sent and analytic method

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411852A (en) * 2016-08-31 2017-02-15 浙江宇视科技有限公司 Distributed terminal access control method, and apparatus
CN106411852B (en) * 2016-08-31 2020-01-14 浙江宇视科技有限公司 Distributed terminal access control method and device
CN108289104A (en) * 2018-02-05 2018-07-17 重庆邮电大学 A kind of industry SDN network ddos attack detection with alleviate method
CN108289104B (en) * 2018-02-05 2020-07-17 重庆邮电大学 Industrial SDN network DDoS attack detection and mitigation method
CN108833430A (en) * 2018-06-29 2018-11-16 华中科技大学 A kind of topological guard method of software defined network
CN108833430B (en) * 2018-06-29 2020-05-19 华中科技大学 Topology protection method of software defined network
CN109257360A (en) * 2018-10-08 2019-01-22 江苏大学 Hidden information in SDN network based on transmission path is sent and analytic method
CN109257360B (en) * 2018-10-08 2020-08-28 江苏大学 Hidden information sending and analyzing method based on transmission path in SDN network

Similar Documents

Publication Publication Date Title
CN104539594B (en) Merge DDoS and threaten filtering and SDN frameworks, system and the method for work of routing optimality
CN104539625B (en) A kind of network security protection system and its method of work based on software definition
CN104660582B (en) The network architecture of the software definition of DDoS identifications, protection and path optimization
CN104539595B (en) It is a kind of to integrate the SDN frameworks and method of work for threatening processing and routing optimality
CN104468636A (en) SDN structure for DDoS threatening filtering and link reallocating and working method
CN105871773A (en) DDoS filtering method based on SDN network architecture
CN104378380A (en) System and method for identifying and preventing DDoS attacks on basis of SDN framework
US7743415B2 (en) Denial of service attacks characterization
CN104836702B (en) Mainframe network unusual checking and sorting technique under a kind of large traffic environment
Xing et al. Ripple: A programmable, decentralized {Link-Flooding} defense against adaptive adversaries
US7124440B2 (en) Monitoring network traffic denial of service attacks
CN103428224B (en) A kind of method and apparatus of intelligence defending DDoS (Distributed Denial of Service) attacks
CN102801738B (en) Distributed DoS (Denial of Service) detection method and system on basis of summary matrices
Shamsolmoali et al. Statistical-based filtering system against DDOS attacks in cloud computing
US20020095492A1 (en) Coordinated thwarting of denial of service attacks
US20020035628A1 (en) Statistics collection for network traffic
CN109327426A (en) A kind of firewall attack defense method
CN106357685A (en) Method and device for defending distributed denial of service attack
CN102263788A (en) Method and equipment for defending against denial of service (DDoS) attack to multi-service system
CN106357641A (en) Method and device for defending interest flooding attacks in information centric network
CN105871772A (en) Working method of SDN network architecture aimed at network attack
CN105871771A (en) SDN network architecture aimed at DDoS network attack
Song et al. Flow-based statistical aggregation schemes for network anomaly detection
CN108833430A (en) A kind of topological guard method of software defined network
Jiang et al. Bsd-guard: a collaborative blockchain-based approach for detection and mitigation of sdn-targeted ddos attacks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160817