CN108712364A - A kind of safety defense system and method for SDN network - Google Patents

A kind of safety defense system and method for SDN network Download PDF

Info

Publication number
CN108712364A
CN108712364A CN201810242274.XA CN201810242274A CN108712364A CN 108712364 A CN108712364 A CN 108712364A CN 201810242274 A CN201810242274 A CN 201810242274A CN 108712364 A CN108712364 A CN 108712364A
Authority
CN
China
Prior art keywords
user
interchanger
network
sdn
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810242274.XA
Other languages
Chinese (zh)
Other versions
CN108712364B (en
Inventor
朱辉
肖瑞
李晖
宋超
董健
杨舜嵬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xidian University
Original Assignee
Xidian University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xidian University filed Critical Xidian University
Priority to CN201810242274.XA priority Critical patent/CN108712364B/en
Publication of CN108712364A publication Critical patent/CN108712364A/en
Application granted granted Critical
Publication of CN108712364B publication Critical patent/CN108712364B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Small-Scale Networks (AREA)

Abstract

The invention belongs to technical field of network security, disclose a kind of safety defense system and method for SDN network, and authentication module is authenticated user identity;User accesses network for the first time, and unsecured protocol processing module distributes IP address to user, and the MAC Address of user, IP address and associated interchanger physical interface are recorded in the identifier database of the traffic filtering module;Traffic filtering module is filtered the flow of user by the identifier database;Unsecured protocol processing module handles the unsecured protocol flow of user, and the server that unsecured protocol flow is sent to SDN controllers or mandate is handled, and filters the response from other unauthorized devices.The safety of SDN network has been effectively ensured in the present invention.

Description

A kind of safety defense system and method for SDN network
Technical field
The invention belongs to the safety defense systems and method of technical field of network security more particularly to a kind of SDN network.
Background technology
Currently, the prior art commonly used in the trade is such:With cloud computing service universal and virtualization technology into Step, traditional network can no longer provide enough flexibilities, availability and flexibility to build cloud data center network.SDN is that is, soft Part defines network, has filled up this vacancy just, it is a kind of novel network architecture, passes through the programmable of one concentration of offer Control plane manages a series of physical equipment, while providing and be widely applied program and corresponding open interface, and will control Plane processed is decoupled with data plane.OpenFlow is that a kind of mainstream of SDN is realized, is had been deployed in various scenes, from garden Network is to cloud data center network.Although SDN have the advantages that relative to traditional network it is more flexible, expansible and programmable, It is also to be faced with some security threats identical or different with traditional network, however the defence method in traditional network and be not suitable for In SDN network, the reason is that most of network equipments in SDN network only have transfer capability, unlike the network in traditional network Equipment some defence methods of the deployment of intelligence enough, such as:Dynamic ARP monitors.And due to its global control plane, some Entire SDN network may be influenced by being confined to the attack of LAN.The patent " one of Jie Dian Information Technology Co., Ltds of Wenzhou City application Kind network safety system " (application number CN201710982049.5 publication number CN107566408A) discloses a kind of utilization physics hand The scheme that is on the defensive of section, including outer net, firewall box, behavior monitoring equipment, access control equipment, flow-control equipment and Inner net computer, it is characterised in that:The outer net and the two-way electric connection of firewall box, the firewall box are supervised with behavior The two-way electric connection of tube apparatus, the behavior monitoring equipment respectively with access control equipment and flow-control equipment are two-way electrically connects Connect, the access control equipment and flow-control equipment with the two-way electric connection of inner net computer, the inner net computer with The two-way electric connection of memory module, the output end of the behavior monitoring equipment unidirectionally electrically connect with the input terminal of anomaly assessment module Connect, the output end of the anomaly assessment module and the input terminal of circuit breaker are unidirectionally electrically connected, the output end of the circuit breaker with The input terminal of memory power is unidirectionally electrically connected, and the memory power includes lithium battery, database module and data comparison The input terminal of device, the memory power is unidirectionally electrically connected with the output end of Fingerprint Identification Unit and sound transducer respectively, institute The input terminal of the output end and memory module of stating memory power is unidirectionally electrically connected.This method is disadvantageous in that:Pass through Physical means are on the defensive, although can defend some attacks to a certain extent in this way, the availability of network cannot be protected Barrier, the reason is that being disconnected power supply by physical means, network can also disconnect therewith, influence the user experience of user.Nanjing science and engineering Patent " DDOS attack defending against network security system and method based on SDN frameworks " (application number of institute's application CN201710234826.8 publication number CN107018084A) a kind of DDOS defense schemes based on SDN are disclosed, feature exists In, including SDN switch and cleaning server, the SDN switch includes packet information extraction module, decision-making treatment mould Block, packet forwarding module and package informatin database, legitimate ip address database, illegal IP address database, the cleaning service Device includes that data packet unpacks module, characteristic matching module, similarity factor detection module and global traffic statistical module, data envelope Packet handing module.This method is disadvantageous in that:DDOS attack can only be targetedly defendd, to other attacks without defence energy Power, the reason is that this method is the defence method for DDOS attack.
In conclusion problem of the existing technology is:There are the availabilities of network for defence method in traditional network not It can be protected;DDOS attack can only be targetedly defendd, to other no defence capabilities of attack.Therefore, existing defender Case cannot provide perfect safety, or cannot provide preferable user experience, or not be suitable for SDN network.
Solve the difficulty and meaning of above-mentioned technical problem:It proposes one kind and being suitable for SDN network, dynamic security is various to attack Hit, and provide network high availability safety approach to ensure the network security and user experience of user.
Invention content
In view of the problems of the existing technology, the present invention provides a kind of safety defense system of SDN network and methods.
The invention is realized in this way a kind of safety defense method of SDN network, the Prevention-Security side of the SDN network Method includes:
Step 1, authentication module are authenticated user identity;
Step 2, user access network for the first time, and unsecured protocol processing module distributes IP address to user, and by user's MAC Address, IP address and associated interchanger physical interface are recorded in the identifier data of the traffic filtering module In library;
Step 3, traffic filtering module are filtered the flow of user by the identifier database;
Step 4, unsecured protocol processing module handles the unsecured protocol flow of user, by unsecured protocol Flow is sent to SDN controllers or the server of mandate is handled, and filters the response from other unauthorized devices.
Further, the step 1 specifically includes:
(1a) user by a kind of authentication method, including:EAP-TLS authentication methods of the 802.1x based on certificate, by identity Information is sent to direct-connected interchanger;
Subscriber identity information is sent to SDN controllers by (1b) direct-connected interchanger;
Subscriber identity information is sent to certificate server by (1c) SDN controllers, including but not limited to:RADIUS service Device;
(1d) certificate server is authenticated subscriber identity information, if by certification, is sent to the reception of SDN controllers Message;
(1e) SDN controllers, which receive, receives the interchanger physical interface that message then enables user-association.
Further, the step 5 specifically includes:
(5a) user adds data packet by the encryption key that the key submodule of the crypto module distributes It is close to be sent to the first jump interchanger;
(5b) first jumps interchanger and user data package is sent to controller or dedicated encryption device, passes through identifier number It is decrypted using the corresponding encryption key of source IP address according to library, the data packet after decryption returns to the first jump interchanger;
(5c) first jumps interchanger and the data packet after decryption is forwarded a to the last jump interchanger in a network;
(5d) final jump interchanger delivers a packet to controller or dedicated encryption device, passes through identifier data Library is encrypted using the corresponding encryption key of purpose IP address, and encrypted data packet returns to interchanger;
Encrypted data packet is transmitted to the corresponding user of destination IP by (5e) final jump interchanger.
Another object of the present invention is to provide a kind of safety of the SDN network of the safety defense method of the SDN network The safety defense system of system of defense, the SDN network includes:
Unsecured protocol processing module, for the unsecured protocol flow of broadcast transmission to be sent to SDN controllers or is awarded The server of power is handled, and filters the response from other unauthorized devices;
Traffic filtering module, for filtering the flow for carrying illegal identifier;
Authentication module is used for certification user identity, prevents unauthorized user from accessing network;
Crypto module is used for distributing user key, and the flow of encryption user.
Further, the traffic filtering module includes identifier database:For record the MAC Address of user, IP address, Associated exchange physical port, owner's title of certificate and encryption key, by the identifier database to customer flow It is filtered.
Further, the authentication module is utilized and is authenticated to the identity and MAC Address of user, including:802.1x EAP-TLS authentication methods based on certificate.
Further, the crypto module includes key submodule and encryption and decryption submodule:
Key submodule distributes encryption key and password or certificate for the authentication module for user, including:Point Send out the certificate needed for EAP-TLS authentication methods of the 802.1x based on certificate;
Encryption and decryption submodule, by SDN controllers or dedicated encryption device and a kind of Encryption Algorithm of selection, including: Advanced Encryption Standard AES256 carries out encryption and decryption to customer flow.
In conclusion advantages of the present invention and good effect are:The present invention includes insecure protocol processing module, and being used for will The server that the insecure protocol flow of broadcast transmission is sent to mandate is handled, and is filtered from other unauthorized devices Response;Traffic filtering module, for filtering the flow for carrying illegal identifier;Authentication module is used for certification user identity, Prevent unauthorized user from accessing network;Crypto module is used for distributing user key, and the flow of encryption user.The present invention has Effect ensure that the safety of SDN network.Experiment shows that compared with existing scheme, the attack type that can be defendd is more comprehensive, such as ARP deceptions, DHCP forgery attacks, MAC spoofing attacks, IP spoofing attack, TCAM exhaustion attacks, Denial of Service attack etc., and The availability performance of network accesses guarantee.
Description of the drawings
Fig. 1 is the safety defense method flow chart of SDN network provided in an embodiment of the present invention.
Fig. 2 is the safety defense method implementation flow chart of SDN network provided in an embodiment of the present invention.
Fig. 3 is the safety defense system structural schematic diagram of SDN network provided in an embodiment of the present invention;
In figure:1, unsecured protocol processing module;2, traffic filtering module;3, authentication module;4, encrypting module.
Specific implementation mode
In order to make the purpose , technical scheme and advantage of the present invention be clearer, with reference to embodiments, to the present invention It is further elaborated.It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not used to Limit the present invention.
As shown in Figure 1, the safety defense method of SDN network provided in an embodiment of the present invention includes the following steps:
S101:Authentication module is authenticated user identity;
S102:If user accesses network for the first time, unsecured protocol processing module distributes IP address to user, and by user's MAC Address, IP address and associated interchanger physical interface are recorded in the identifier data of the traffic filtering module In library;
S103:Traffic filtering module is filtered the flow of user by the identifier database;
S104:Unsecured protocol processing module handles the unsecured protocol flow of user, by unsecured protocol stream Amount is sent to SDN controllers or the server of mandate is handled, and filters the response from other unauthorized devices.
Step S101 is specifically included:
(1a) user is by a kind of authentication method, including but not limited to:EAP-TLS authenticating parties of the 802.1x based on certificate Identity information is sent to direct-connected interchanger by method;
Subscriber identity information is sent to SDN controllers by (1b) direct-connected interchanger;
Subscriber identity information is sent to certificate server by (1c) SDN controllers, including but not limited to:RADIUS service Device;
(1d) certificate server is authenticated subscriber identity information, if by certification, is sent to the reception of SDN controllers Message;
(1e) SDN controllers, which receive, receives the interchanger physical interface that message then enables user-association;
Step S105 is specifically included:
(5a) user adds data packet by the encryption key that the key submodule of the crypto module distributes It is close to be sent to the first jump interchanger;
(5b) first jumps interchanger and user data package is sent to controller or dedicated encryption device, passes through identifier number It is decrypted using the corresponding encryption key of source IP address according to library, the data packet after decryption returns to the first jump interchanger;
(5c) first jumps interchanger and the data packet after decryption is forwarded a to the last jump interchanger in a network;
(5d) final jump interchanger delivers a packet to controller or dedicated encryption device, passes through identifier data Library is encrypted using the corresponding encryption key of purpose IP address, and encrypted data packet returns to interchanger;
Encrypted data packet is transmitted to the corresponding user of destination IP by (5e) final jump interchanger.
As shown in Fig. 2, the safety defense system of SDN network provided in an embodiment of the present invention includes unsecured protocol processing mould Block 1, traffic filtering module 2, authentication module 3 and encrypting module 4, wherein:
Unsecured protocol processing module 1, for the unsecured protocol flow of broadcast transmission to be sent to SDN controllers or is awarded The server of power is handled, and filters the response from other unauthorized devices.For example, the ARP request of user passes through exchange The proxy arp function that machine is sent to SDN controllers is handled, and filtering comes from the arp response of other equipment;
Traffic filtering module 2, for filtering the flow for carrying illegal identifier.For example, interchanger receives a data Packet carries illegal MAC Address or IP address, then abandons the data packet;
Authentication module 3 is used for certification user identity, prevents unauthorized user from accessing network;
Crypto module 4 is used for distributing user key, and the flow of encryption user.
The safety defense system of the SDN network is generated by SDN controllers and controls rule i.e. flow table and transfer to exchange Machine realizes each module.
The safety defense system of the SDN network, the traffic filtering module 2 include identifier database:For recording MAC Address, IP address, associated exchange physical port, owner's title of certificate and the encryption key of user, passes through the mark Know symbol database to be filtered customer flow.
The safety defense system of the SDN network, the authentication module 3, using a kind of authentication method to user's Identity and MAC Address are authenticated, including but not limited to:EAP-TLS authentication methods of the 802.1x based on certificate.
The safety defense system of the SDN network, the crypto module 4, including key submodule and encryption and decryption submodule, Wherein:
Key submodule distributes encryption key and password or certificate for the authentication module for user, including but It is not limited to:Distribute the certificate needed for EAP-TLS authentication methods of the 802.1x based on certificate;
Encryption and decryption submodule, by SDN controllers or dedicated encryption device and a kind of Encryption Algorithm of selection, including but It is not limited to:Advanced Encryption Standard AES256 carries out encryption and decryption to customer flow.
The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all essences in the present invention All any modification, equivalent and improvement etc., should all be included in the protection scope of the present invention made by within refreshing and principle.

Claims (7)

1. a kind of safety defense method of SDN network, which is characterized in that the safety defense method of the SDN network includes:
Step 1, authentication module are authenticated user identity;
Step 2, user access network for the first time, and unsecured protocol processing module distributes IP address to user, and by the MAC of user Address, IP address and associated interchanger physical interface are recorded in the identifier database of the traffic filtering module In;
Step 3, traffic filtering module are filtered the flow of user by the identifier database;
Step 4, unsecured protocol processing module handle the unsecured protocol flow of user, by unsecured protocol flow The server for being sent to SDN controllers or mandate is handled, and filters the response from other unauthorized devices.
2. the safety defense method of SDN network as described in claim 1, which is characterized in that the step 1 specifically includes:
(1a) user by a kind of authentication method, including:EAP-TLS authentication methods of the 802.1x based on certificate, by identity information It is sent to direct-connected interchanger;
Subscriber identity information is sent to SDN controllers by (1b) direct-connected interchanger;
Subscriber identity information is sent to certificate server by (1c) SDN controllers, including but not limited to:Radius server;
(1d) certificate server is authenticated subscriber identity information, if by certification, is sent to the reception of SDN controllers and disappears Breath;
(1e) SDN controllers, which receive, receives the interchanger physical interface that message then enables user-association.
3. the safety defense method of SDN network as described in claim 1, which is characterized in that the step 5 specifically includes:
Hair is encrypted to data packet by the encryption key that the key submodule of the crypto module distributes in (5a) user Give the first jump interchanger;
(5b) first jumps interchanger and user data package is sent to controller or dedicated encryption device, passes through identifier database It is decrypted using the corresponding encryption key of source IP address, the data packet after decryption returns to the first jump interchanger;
(5c) first jumps interchanger and the data packet after decryption is forwarded a to the last jump interchanger in a network;
(5d) final jump interchanger delivers a packet to controller or dedicated encryption device, is made by identifier database It is encrypted with the corresponding encryption key of purpose IP address, encrypted data packet returns to interchanger;
Encrypted data packet is transmitted to the corresponding user of destination IP by (5e) final jump interchanger.
4. a kind of safety defense system of the SDN network of the safety defense method of SDN network as described in claim 1, feature It is, the safety defense system of the SDN network includes:
Unsecured protocol processing module, for the unsecured protocol flow of broadcast transmission to be sent to SDN controllers or mandate Server is handled, and filters the response from other unauthorized devices;
Traffic filtering module, for filtering the flow for carrying illegal identifier;
Authentication module is used for certification user identity, prevents unauthorized user from accessing network;
Crypto module is used for distributing user key, and the flow of encryption user.
5. the safety defense system of SDN network as claimed in claim 4, which is characterized in that the traffic filtering module includes Identifier database:For recording the MAC Address of user, owner's title of IP address, associated exchange physical port, certificate And encryption key, customer flow is filtered by the identifier database.
6. the safety defense system of SDN network as claimed in claim 4, which is characterized in that the authentication module utilizes The identity and MAC Address of user are authenticated, including:EAP-TLS authentication methods of the 802.1x based on certificate.
7. the safety defense system of SDN network as claimed in claim 4, which is characterized in that the crypto module includes key Submodule and encryption and decryption submodule:
Key submodule distributes encryption key and password or certificate for the authentication module for user, including:Distribution Certificate needed for EAP-TLS authentication methods of the 802.1x based on certificate;
Encryption and decryption submodule, by SDN controllers or dedicated encryption device and a kind of Encryption Algorithm of selection, including:It is advanced Encryption Standard AES 256 carries out encryption and decryption to customer flow.
CN201810242274.XA 2018-03-22 2018-03-22 Security defense system and method for SDN (software defined network) Active CN108712364B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810242274.XA CN108712364B (en) 2018-03-22 2018-03-22 Security defense system and method for SDN (software defined network)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810242274.XA CN108712364B (en) 2018-03-22 2018-03-22 Security defense system and method for SDN (software defined network)

Publications (2)

Publication Number Publication Date
CN108712364A true CN108712364A (en) 2018-10-26
CN108712364B CN108712364B (en) 2021-01-26

Family

ID=63866336

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810242274.XA Active CN108712364B (en) 2018-03-22 2018-03-22 Security defense system and method for SDN (software defined network)

Country Status (1)

Country Link
CN (1) CN108712364B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109088901A (en) * 2018-10-31 2018-12-25 杭州默安科技有限公司 Deception defence method and system based on SDN building dynamic network
CN110719301A (en) * 2019-11-19 2020-01-21 武汉思普崚技术有限公司 Attack defense method and system for flow adaptive scheduling
CN111211890A (en) * 2019-12-31 2020-05-29 江苏省未来网络创新研究院 SDN-based network security defense system and working method thereof
CN112165488A (en) * 2020-09-28 2021-01-01 杭州安恒信息安全技术有限公司 Risk assessment method, device and equipment and readable storage medium
CN113132382A (en) * 2021-04-19 2021-07-16 何文刚 Intelligent computer network information safety controller

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100546245C (en) * 2006-01-11 2009-09-30 西安电子科技大学 Stride the network authentication and the method for distributing key of security domain
CN103684922A (en) * 2013-12-23 2014-03-26 蓝盾信息安全技术股份有限公司 Outlet information privacy checking detection platform system based on SDN (self-defending network) and detection method
CN104468633A (en) * 2014-12-31 2015-03-25 蓝盾信息安全技术股份有限公司 SDN southing security proxy product
CN104506507A (en) * 2014-12-15 2015-04-08 蓝盾信息安全技术股份有限公司 Honey net safeguard system and honey net safeguard method for SDN (self-defending network)
CN106506534A (en) * 2016-12-09 2017-03-15 河南工业大学 A kind of ARP attack detection methods of SDN
CN107018084A (en) * 2017-04-12 2017-08-04 南京工程学院 DDOS attack defending against network security system and method based on SDN frameworks
KR20170090161A (en) * 2016-01-28 2017-08-07 동서대학교산학협력단 Mitigating System for DoS Attacks in SDN
CN107222433A (en) * 2017-04-18 2017-09-29 中国科学院信息工程研究所 A kind of access control method and system based on SDN path
US20170318043A1 (en) * 2016-04-27 2017-11-02 Korea Advanced Institute Of Science And Technology Method for detecting network anomaly in distributed software defined networking environment, apparatus therefor, and computer program therefor

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100546245C (en) * 2006-01-11 2009-09-30 西安电子科技大学 Stride the network authentication and the method for distributing key of security domain
CN103684922A (en) * 2013-12-23 2014-03-26 蓝盾信息安全技术股份有限公司 Outlet information privacy checking detection platform system based on SDN (self-defending network) and detection method
CN104506507A (en) * 2014-12-15 2015-04-08 蓝盾信息安全技术股份有限公司 Honey net safeguard system and honey net safeguard method for SDN (self-defending network)
CN104468633A (en) * 2014-12-31 2015-03-25 蓝盾信息安全技术股份有限公司 SDN southing security proxy product
KR20170090161A (en) * 2016-01-28 2017-08-07 동서대학교산학협력단 Mitigating System for DoS Attacks in SDN
US20170318043A1 (en) * 2016-04-27 2017-11-02 Korea Advanced Institute Of Science And Technology Method for detecting network anomaly in distributed software defined networking environment, apparatus therefor, and computer program therefor
CN106506534A (en) * 2016-12-09 2017-03-15 河南工业大学 A kind of ARP attack detection methods of SDN
CN107018084A (en) * 2017-04-12 2017-08-04 南京工程学院 DDOS attack defending against network security system and method based on SDN frameworks
CN107222433A (en) * 2017-04-18 2017-09-29 中国科学院信息工程研究所 A kind of access control method and system based on SDN path

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
MOHAN DHAWAN ET AL: "SPHINX: Detecting Security Attacks in Software-Defined Networks", 《NDSS》 *
张世轩等: "基于 SDN 构架的 DoS/DDoS 攻击检测与防御体系", 《电子技术应用网络与信息安全》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109088901A (en) * 2018-10-31 2018-12-25 杭州默安科技有限公司 Deception defence method and system based on SDN building dynamic network
CN110719301A (en) * 2019-11-19 2020-01-21 武汉思普崚技术有限公司 Attack defense method and system for flow adaptive scheduling
CN111211890A (en) * 2019-12-31 2020-05-29 江苏省未来网络创新研究院 SDN-based network security defense system and working method thereof
CN112165488A (en) * 2020-09-28 2021-01-01 杭州安恒信息安全技术有限公司 Risk assessment method, device and equipment and readable storage medium
CN113132382A (en) * 2021-04-19 2021-07-16 何文刚 Intelligent computer network information safety controller
CN113132382B (en) * 2021-04-19 2022-09-02 中文出版集团有限公司 Intelligent computer network information safety controller

Also Published As

Publication number Publication date
CN108712364B (en) 2021-01-26

Similar Documents

Publication Publication Date Title
CN110996318B (en) Safety communication access system of intelligent inspection robot of transformer substation
WO2020133655A1 (en) Lightweight authentication method supporting anonymous access of heterogeneous terminal in edge computing scenario
CN108712364A (en) A kind of safety defense system and method for SDN network
US9912480B2 (en) Network service packet header security
CN111245862A (en) System for safely receiving and sending terminal data of Internet of things
CN110999223A (en) Secure encrypted heartbeat protocol
CN106209883A (en) Based on link selection and the multi-chain circuit transmission method and system of broken restructuring
CN113872944A (en) Block chain-oriented zero-trust security architecture and cluster deployment framework thereof
CA2506418C (en) Systems and apparatuses using identification data in network communication
EP1726112A2 (en) Methods and apparatus for confidentiality protection for fibre channel common transport
CN104620556A (en) Method and devices for registering a client to a server
CN101729871A (en) Method for safe cross-domain access to SIP video monitoring system
CN114172930B (en) Large-scale Internet of things service domain isolated communication method and device, electronic equipment and storage medium
Touil et al. Secure and guarantee QoS in a video sequence: a new approach based on TLS protocol to secure data and RTP to ensure real-time exchanges
CN111726346A (en) Data secure transmission method, device and system
Aissaoui et al. A survey on cryptographic methods to secure communications for UAV traffic management
Cho et al. Secure open fronthaul interface for 5G networks
CN113645115B (en) Virtual private network access method and system
Liyanage et al. Secure hierarchical VPLS architecture for provider provisioned networks
CN115348118B (en) Network address and port number hiding method based on cryptographic technology
CN109246124B (en) Active defense method for encrypted information
CN210839642U (en) Device for safely receiving and sending terminal data of Internet of things
Aissaoui et al. UAV Traffic Management: A Survey On Communication Security
Sebbar et al. BCDS-SDN: Privacy and Trusted Data Sharing Using Blockchain Based on a Software-Defined Network's Edge Computing Architecture
AlAali et al. Cybersecurity Threats and Solutions of IoT Network Layer

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant