Central controller protection method, device and system

A central controller and controller technology, applied in the field of network security, can solve problems such as central controller attacks, and achieve the effect of reducing processing pressure and avoiding downtime

Inactive Publication Date: 2018-03-30
BEIJING JIAOTONG UNIV
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem in the prior art that can only prevent unauthorized users from accessing information in the organization’s intranet without authorization, and wirelessly prevent the central controller in the organization’s intranet from being attacked, the embodiment of the present invention provides a central controller protection method and equipment and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Central controller protection method, device and system
  • Central controller protection method, device and system
  • Central controller protection method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0067] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0068] In order to facilitate the understanding of the present invention, at first the structure of the SDN network based on the OpenFlow protocol is described as follows:

[0069] The SDN network based on the OpenFlow protocol includes an OpenFlow switch (English: OpenFlow Switch) and an OpenFlow controller (English: OpenFlow Controller).

[0070] Among them, the OpenFlow switch is responsible for data forwarding based on the stored flow table, and the OpenFlow controller is responsible for routing control, that is to say, the OpenFlow controller can send the flow table to the OpenFlow switch through a secure channel, so as to achieve the purpose of controlling the OpenFlow switch for data forwarding , realizing the separation of data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a central controller protection method, equipment and system, belonging to the field of network security. The method includes: receiving the data packet sent by the terminal, matching the data packet with the flow table stored in the egress gateway; when the data packet does not match the stored flow table, accumulating the Counting value; when the time used for accumulating the counting value to the early warning threshold value is less than the predetermined time length threshold, an early warning message is sent to the central controller, and the early warning message is used to trigger the central controller to back up the information stored in the central controller to the redundant control The controller, together with the redundant controller, processes the data packet reported by the central controller. The present invention solves the problem in the related art that only illegal users can access the information in the organization's intranet from unauthorized access, and wirelessly avoids the central controller in the organization's intranet from being attacked; The effect of machine risk.

Description

technical field [0001] The invention relates to the field of network security, in particular to a central controller protection method, equipment and system. Background technique [0002] In order to better provide reliable Internet services for the fourth-generation mobile communication users, it is proposed to conduct mobile communication user access through centralized control in the future mobile Internet design. Software Defined Network (English: Software Defined Network, referred to as: SDN) adopts the idea of ​​centralized control, and its core technology OpenFlow realizes flexible control of network traffic by separating the control plane of network equipment from the data plane. The central controller in the SDN network architecture is the core of the entire network and is responsible for the functions of the entire network control plane. Once the central controller in the SDN is attacked, it will bring serious problems to the entire network. Therefore, the protect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04W12/08
CPCH04L63/0236H04L63/10H04L63/1416H04L67/1095H04W12/08
Inventor 陈佳王铭鑫周华春梁缘
Owner BEIJING JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products