Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

SDN-based data flow tracing method

A data flow and data technology, applied in the field of computer networks, to achieve the effect of efficient attack source tracing

Active Publication Date: 2017-08-18
INST OF INFORMATION ENG CAS
View PDF6 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the traditional network, it is difficult to ensure that the information of all terminals and networks can be accurately obtained, so this method cannot be well applied to source tracing to find the source of the attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SDN-based data flow tracing method
  • SDN-based data flow tracing method
  • SDN-based data flow tracing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the above-mentioned features and advantages of the present invention more comprehensible, the following specific embodiments are described in detail in conjunction with the accompanying drawings.

[0036] The present invention provides an SDN-based data stream traceability method, and its operation flow chart is as follows figure 1 As shown, first, the SDN switch periodically samples the specified fields, and the sampling results are input to the specified server and wait for processing. The periodical sampling of the specified field means that the controller receives the sampling rule issued from the upper-layer application, the SDN switch analyzes the sampling rule and performs periodical sampling according to the analyzed field parameters that need to be sampled. The adoption rule refers to the displacement and length of certain fields in the data packet to be sampled; for example, field A, the starting position of the data packet is 16, and the length i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an SDN-based data flow tracing method. The method comprises a first step of sampling a designated field regularly by an SDN switch, so as to obtain data package information Flow_ID and switch information, wherein the switch information comprises a switch identifier Switch_ID and a data package input port; a second step of dividing the data package information Flow_ID and switch information into groups with Flow_ID as a Key, so as to obtain a data set SA of each group, wherein i represents data sets of different groups; a third step of performing path analysis on the data set SA of each group according to a network topological structure G of the SDN; and a fourth step of determining a path start point according to a path analysis result, and performing path reconstruction, so as to obtain a path of a data package or a data flow. In the method, the path of the data package or the data flow is reconstructed, so that a source of an attack source can be traced.

Description

Technical field [0001] The invention relates to the field of computer networks, and in particular to a data stream traceability method based on SDN. Background technique [0002] Generally speaking, in order to effectively prevent increasingly serious denial of service attacks, the fundamental method is to find the source of the attack, and to contain the attack from the source is the most effective and economical method. If you cannot locate the source of the attack and punish it when you are under attack, the attacker will be more unscrupulous. Therefore, traceability technology occupies a very important position in the network defense system. With the growing scope of the Internet and the rapid increase in cyber crimes, traceability technology can be traced back to the source of the attack, providing a basis for investigating the legal responsibility of the attacker. In the existing traceability technology theory, the method based on data packet identification needs to use t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1458H04L2463/146
Inventor 宋晨王利明史淼杨倩谢德俊
Owner INST OF INFORMATION ENG CAS
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products