期刊文献+

基于OpenFlow架构的域内源地址验证方法 被引量:7

OpenFlow Based Intra-AS Source Address Validation
下载PDF
导出
摘要 源地址验证对网络安全、管理和计量都有重要意义.清华大学提出包括接入子网、域内和域间三个层次的源地址验证体系结构.其中域内用到一种基于集中计算路径的方法,但在传统网络环境限制下,其实现遇到很多问题.本文将利用软件定义网络对网络革新的便捷支持,基于OpenFlow网络对域内源地址验证方法进行重新设计与实现,并提出两种方案.一种是在已有路由表的基础上计算出域内任意两个子前缀间的路径并生成源地址前缀、目的地址前缀和入接口三元组作为过滤规则;另一种方案是重新设计新的路由算法,生成同时具有路由功能和验证源地址功能的四元组(源地址前缀、目的地址前缀、入接口和出接口)流表.并分别对两种方案做出对比,给出实验结果. Filtering out traffic with forged source IP address can greatly help improve the security, manageability and accountability of network. Tsinghua university proposed a source address validation architecture, dividing it into three levels: local suhnet, intra-AS and inter-AS. In the intra-AS, a method of calculating the path is used. But due to the limitations of current network equipment, the implementation of the method comes across a lot of difficulties. In this paper, with the solid basis provided by software defined net- work for network innovation, we re-design the intra-AS source address validation method based on OpenFlow network and introduce two programs. In the first program, we use existing routing table to calculate the path of any pair of subnet prefix and generate triples of source prefix, destination prefix and ingress interface as filtering rules. In the other program, we design a new routing algorithm to calculate quadruples of source address, destination address, ingress interface and outgoing interface that guarantee both routing and source address validation function. Besides, we show the experiment results of the two programs.
作者 肖佩瑶 毕军
出处 《小型微型计算机系统》 CSCD 北大核心 2013年第9期1999-2003,共5页 Journal of Chinese Computer Systems
基金 国家自然科学基金项目(61073172)资助 高等学校博士学科点专项科研基金项目(200800030034)资助
关键词 源地址验证 软件定义网络 OpenFlow source address validation software defined network OpenFlow
  • 相关文献

参考文献2

二级参考文献23

  • 1Kent S, Atkinson R. Security Architecture for the Internet Protocol. IETF, RFC2401. 1998
  • 2Bremler-Barr A, Levy H. Spoofing prevention method. In: Proc IEEE INFOCOM. Washington: IEEE, 2005. 536-547
  • 3Ferguson P, Senie D. Network Ingress Filtering: Defeating Denial of Service Attacks Which Employ IP Source Address Spoofing. IETF, RFC2827. 2000
  • 4Park K, Lee H. On the effectiveness of route-based packet filtering for distributed DoS attack prevention in power-law internets. ACM SIGCOMM Comput Commun Rev, 2001, 31 (4): 15-26
  • 5Li j, Mirkovic J, Wang M, et al. SAVE: source address validity enforcement protocol. In: Proc IEEE INFOCOM. Washington: IEEE, 2002. 3:1557-1566
  • 6Jin C, Wang H. Hop-count filtering: an effective defense against spoofed DDoS traffic. In: Proc ACM CCS. New York: ACM, 2003. 30-41
  • 7Snoeren A, Partridge C, Sanchez L, et al. A Hash-based IP traceback. ACM SIGCOMM Comput Commun Rev, 2001, 31(4): 3-14
  • 8Lee H, Thing V, Xu Y, et al. ICMP traceback with cumulative path, an effcient solution for IP traceback. Infor- mation and Communications Security. Berlin: Springer, 2003. 124-135
  • 9Savage S, Wetherall D, Karlin A, et al. Pratical network support for IP traceback. ACM SIGCOMM, Comput Commun Rev, 2000, 30(4): 295-306
  • 10Belenky A, A~sari N. IP traceback with deterministic packet marking. IEEE Commun Lett, 2003, 7(4): 162-164

共引文献27

同被引文献40

  • 1孙钦东,张德运,高鹏.基于时间序列分析的分布式拒绝服务攻击检测[J].计算机学报,2005,28(5):767-773. 被引量:55
  • 2Mc Keown N,Anderson T,Balakrishnan H,et al.Open Flow:enabling innovation in campus networks[J].ACM SIGCOMM Computer Communication Review,2008,38(2):69-74.
  • 3Shah S A,Faiz J,Farooq M,et al.An architectural evaluation of SDN controllers[C]//IEEE.2013 IEEE International Conference on IEEE.Budapest:ICC,2013:3504-3508.
  • 4Nadeau T D,Gray K.SDN:Software Defined Networks[M].北京:人民邮电出版社,2013:71-113.
  • 5Cahn A,Hoyos J,Hulse M,et al.Software-defined energy communication networks:from substation automation to future smart grids[C]//IEEE.20131EEE International Conference on IEEE.Vancouver:Smart Grid Comm,2013:558-563.
  • 6Gurbani V K,Scharf M,Lakshman T V,et al.Abstracting network state in Software Defined Networks(SDN)for rendezvous services[C]//IEEE.2012IEEE International Conference on IEEE.Ottawa:ICC,2012:6627-6632.
  • 7LAKHINA A, CROVELLA M, DIOT C.Diagnosing network- wide traffic anomalies[C].Proceedings of the ACMSIGCOMM. New York : ACM, 2004 : 219-230.
  • 8JACKSON J E, MUDHOLKAR G S.Control procedures for residuals associated with principal component analysis[J]. Technometrics, 1979,21 (3) : 341-349.
  • 9HANDIGOL N, HELLER B, JEYAKUMAR V, et al. Reproducible network experiments using container-based emulation[C].Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies.New York : ACM, 2012 : 253-264.
  • 10Open Networking Foundation.Software-defined networking:the new norm for networks[R].ONF White Paper,2012.

引证文献7

二级引证文献38

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部