期刊文献+

SDN中基于交换机等级划分的安全路由策略 被引量:8

Security routing strategy based on switch hierarchies in software defined network
下载PDF
导出
摘要 软件定义网络引入了数据平面与控制平面的分离,同时也带来了比传统网络更多的攻击方式。针对软件定义网络从检测出异常到攻击防御结束过程中新流表项下发的安全性进行了研究,为交换机引入安全等级划分机制,根据交换机所处的状态,将交换机划分为三个安全等级,并将攻击检测与路由选择相结合。实验结果表明交换机等级划分的安全路由策略能够使软件定义网络面对攻击表现出动态可伸缩的能力,从而减小攻击对网络所造成的危害。 Software defined network introduces the separation between data plane and control plane, however it encounters more attacks than the traditional network. This paper introduced security hierarchies mechanism for software defined network switch based on the research on the security of new flow table entity delivery during the process from the detection of abnormal status to the completion of defense. According to the status of switches, it used three security levels to .classify the switches, and combined the attack detection and routing selection. Experimental results show that the security routing strategy based on switch security levels enables software defined network to show dynamic scalable capacity when it is faced with attack, which reduces the harm caused by the attacks on the network.
出处 《计算机应用研究》 CSCD 北大核心 2017年第2期522-525,共4页 Application Research of Computers
基金 国家"973"计划资助项目(2012CB315901) 国家自然科学基金资助项目(61379079) 河南省科技厅攻关资助项目(122102210042)
关键词 软件定义网络 攻击检测 安全等级划分 网络感知 software defined network attack detection security hierarchy network awareness
  • 相关文献

参考文献6

二级参考文献118

  • 1赵阔,胡亮,李博,孔令治,徐虹晶.基于CASL的入侵检测系统测试[J].吉林大学学报(信息科学版),2005,23(1):50-58. 被引量:5
  • 2马炫.求解k条最优路径问题的遗传算法[J].计算机工程与应用,2006,42(12):100-101. 被引量:29
  • 3林洁,杨立才,吴晓晴,叶杨.求解动态路径诱导K路最短问题的人工免疫优化方法[J].山东大学学报(工学版),2007,37(2):103-108. 被引量:6
  • 4冯登国.计算机通信网络安全[M].北京:清华大学出版社,2004.
  • 5DAVIES J. UNDERSTANDING IPv6 [ M]. Redmond, Washington State: Microsoft Press, 2004.
  • 6YANG X Y, ZENG M, ZHAO R, et al. A Novel LMS Method for Real-Time Network Traffic Prediction [ C ] //Lecture Notes in Computer Science. [ S. l. ] : Springer-Verlag Heidelberg, 2004: 127-136.
  • 7KENT S, ATKINSON R. Security Architecture for the Internet Protocol [ EB/OL]. (1998-01). [2007-12 ]. http. //www. faqs. org/rfcs/rfc2401. html.
  • 8XIANG Y, LIN Y, LEI W L, et al. Detecting DDOS Attack Based on Network Self-Similarity [J]. IEEE Proceedings-Communications, 2004, 151 (3): 292-295.
  • 9MIRKOVIC J, MARTIN J, REIHER P. A Taxonomy of DDoS Attacks and DDoS Defense Mechanisms [ C ] //ACM SIGCOMM Computer Communication Review. Portland : ACM Press, 2004 . 39-53.
  • 10JIN S Y, YEUNG D S. A Covariance Analysis Model for DDoS Attack Detection [ C ] //Communications, 2004 IEEE Int'l Conf. Paris : IEEE Communications Society, 2004, 4 : 1882-1886.

共引文献515

同被引文献81

引证文献8

二级引证文献33

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部