SDN (software defined network) framework, system and working method combining DDoS (distributed denial of service) threat filtering and routing optimization
A working method and routing technology, applied in the field of network security, can solve network security problems and other problems, achieve the effect of reducing burden, ensuring communication quality, and reducing coupling correlation
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0082] figure 2 A block diagram of the SDN network architecture of the present invention is shown.
[0083] Such as figure 2 As shown, a kind of SDN network framework, comprises: application plane, data plane and control plane; Wherein data plane, when any IDS device (ie intrusion detection device) in the data plane detects attack threat, notify application plane to enter into The attack type analysis process; the application plane is used to analyze the attack type, and customize the corresponding attack threat processing strategy according to the attack type; the control plane provides the attack threat processing interface for the application plane, and provides the optimal path calculation and / or Attack Threat Identification Interface.
[0084] The attack threat includes but not limited to: DDOS attack threat.
[0085] figure 2 In the application plane, attack type analysis, attack threat processing strategy, data plane attack behavior monitoring, attack threat shi...
Embodiment 2
[0088] image 3 A structural block diagram of the SDN system of the present invention is shown.
[0089] Such as image 3 As shown, an SDN system includes: a controller, an IDS decision server, a distributed IDS device, and a traffic cleaning center; when any IDS device detects a message with DDoS attack characteristics, it will report to the IDS decision server; the IDS decision server formulates a processing strategy corresponding to the message with DDoS attack characteristics according to the reported information, and then shields the message through the controller or accesses the port flow of the switch corresponding to the message Redirect to traffic cleaning center for filtering.
[0090] Among them, the characteristics of DDoS attack are defined as: spoofing of link layer and Internet layer addresses, abnormal behavior of Internet layer and transport layer flag setting, and flood attack behavior of application layer and transport layer.
[0091] Figure 4 It shows ...
Embodiment 3
[0180] Based on Embodiment 1 and Embodiment 2, a working method of an SDN system that integrates DDoS threat filtering and routing optimization can effectively reduce the workload of the controller through distributed detection and centralized processing, and improve detection efficiency and data transfer rate.
[0181] The working method of the SDN system integrating DDoS threat filtering and route optimization of the present invention includes the following steps: step S100, network initialization; step S200, distributed DDoS threat monitoring; and step S300, threat processing and / or route optimization.
[0182] Further, the devices involved in network initialization in step S100 include: a controller, an IDS decision server and distributed IDS devices;
[0183] The steps of network initialization are as follows:
[0184] Step S101, the IDS decision server establishes a dedicated SSL communication channel with each IDS device; Step S102, the controller builds a network devi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com