基于路径跳变的SDN网络防御技术

Liancheng Zhang, Qiang Wei, Kejun Gu, Huiqiang Yuwen
{"title":"基于路径跳变的SDN网络防御技术","authors":"Liancheng Zhang, Qiang Wei, Kejun Gu, Huiqiang Yuwen","doi":"10.1109/FSKD.2016.7603498","DOIUrl":null,"url":null,"abstract":"In order to enhance the ability of software defined network (SDN) proactive security protection, this paper puts forward a path hopping based SDN network defense (PH-SND) technology. PH-SND technology models the path hopping problem as a constraint solving problem, and utilizes satisfiability modulo theory solver to obtain multiple paths, which satisfy overlap and capacity constraints. According to the path hopping strategy and specific hopping slot, SDN controller installs corresponding flow entries into all OpenFlow switches along every path, and these switches can then use these flow entries to properly forward the corresponding protected flow, and randomly change the address and port information of this flow, which can not only realize random path hopping, and can also effectively hide original address and port information of both communication sides. Theoretical analysis and experimental results show that this proposed PH-SND technology can not only achieve transmission path hopping and address and port random hopping along every transmission path with a comparatively small communication delay and can also improve proactive security protection capability to resist network interception and analysis attack.","PeriodicalId":373155,"journal":{"name":"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","volume":"115 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2016-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"12","resultStr":"{\"title\":\"Path hopping based SDN network defense technology\",\"authors\":\"Liancheng Zhang, Qiang Wei, Kejun Gu, Huiqiang Yuwen\",\"doi\":\"10.1109/FSKD.2016.7603498\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In order to enhance the ability of software defined network (SDN) proactive security protection, this paper puts forward a path hopping based SDN network defense (PH-SND) technology. PH-SND technology models the path hopping problem as a constraint solving problem, and utilizes satisfiability modulo theory solver to obtain multiple paths, which satisfy overlap and capacity constraints. According to the path hopping strategy and specific hopping slot, SDN controller installs corresponding flow entries into all OpenFlow switches along every path, and these switches can then use these flow entries to properly forward the corresponding protected flow, and randomly change the address and port information of this flow, which can not only realize random path hopping, and can also effectively hide original address and port information of both communication sides. Theoretical analysis and experimental results show that this proposed PH-SND technology can not only achieve transmission path hopping and address and port random hopping along every transmission path with a comparatively small communication delay and can also improve proactive security protection capability to resist network interception and analysis attack.\",\"PeriodicalId\":373155,\"journal\":{\"name\":\"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)\",\"volume\":\"115 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2016-08-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"12\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/FSKD.2016.7603498\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/FSKD.2016.7603498","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 12

摘要

为了增强软件定义网络(SDN)的主动安全防护能力,提出了一种基于跳径的SDN网络防御(PH-SND)技术。PH-SND技术将路径跳变问题建模为约束求解问题,利用可满足模理论求解器得到满足重叠约束和容量约束的多条路径。SDN控制器根据路径跳变策略和特定的跳变槽位,在每条路径上的所有OpenFlow交换机中安装相应的流项,这些交换机可以利用这些流项正确转发相应的受保护流,并随机改变该流的地址和端口信息,既可以实现随机的路径跳变,又可以有效地隐藏通信双方原有的地址和端口信息。理论分析和实验结果表明,提出的PH-SND技术不仅可以实现传输路径跳变和每条传输路径上的地址和端口随机跳变,通信延迟较小,而且可以提高主动安全防护能力,抵御网络拦截和分析攻击。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Path hopping based SDN network defense technology
In order to enhance the ability of software defined network (SDN) proactive security protection, this paper puts forward a path hopping based SDN network defense (PH-SND) technology. PH-SND technology models the path hopping problem as a constraint solving problem, and utilizes satisfiability modulo theory solver to obtain multiple paths, which satisfy overlap and capacity constraints. According to the path hopping strategy and specific hopping slot, SDN controller installs corresponding flow entries into all OpenFlow switches along every path, and these switches can then use these flow entries to properly forward the corresponding protected flow, and randomly change the address and port information of this flow, which can not only realize random path hopping, and can also effectively hide original address and port information of both communication sides. Theoretical analysis and experimental results show that this proposed PH-SND technology can not only achieve transmission path hopping and address and port random hopping along every transmission path with a comparatively small communication delay and can also improve proactive security protection capability to resist network interception and analysis attack.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A novel electrons drifting algorithm for non-linear optimization problems Performance assessment of fault classifier of chemical plant based on support vector machine A theoretical line losses calculation method of distribution system based on boosting algorithm Building vietnamese dependency treebank based on Chinese-Vietnamese bilingual word alignment Optimizing self-adaptive gender ratio of elephant search algorithm by min-max strategy
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1