期刊文献+

基于SDN的恶意域名防护系统的研究与实现

Research and implementation of protection system against malicious domain name based on SDN
下载PDF
导出
摘要 基于SDN(软件定义网络)新型网络架构,研究并实现了恶意域名防护系统。分析了恶意域名防护系统的各功能模块及工作流程。使用Mininet虚拟平台搭建系统网络环境,基于Floodlight控制器开发系统的恶意域名防护模块,通过OpenFlow协议抽象底层网络资源,并开放REST API给上层的恶意域名防护管理器应用。设计了三个循序渐进的实验场景以验证系统的有效性。实验结果表明,基于SDN的恶意域名防护系统能有效防范用户访问恶意域名网站。 Based on the architecture of SDN (software-defined networking), this paper studied and realized the protection system against malicious domain name. And analyzed main functional modules and work flow of the protection system. It constructed environment of network for this system by using Mininet platform. Developed modules of the system based on Floodlight controller which can abstract underlying network resources by OpenFlow protocol and open REST API to upper management application. Finally, this paper verified performance of the system in three step-by-step scenes. Experimental results show that this system can effectively prevent users visiting malicious web sites.
出处 《计算机应用研究》 CSCD 北大核心 2017年第4期1166-1171,共6页 Application Research of Computers
基金 赛尔网络下一代互联网技术创新项目(NGII20150706)
关键词 软件定义网络 OpenFlow 恶意域名 恶意域名防护 software-defined networking OpenFlow malicious domain name protection against malicious domain name
  • 相关文献

参考文献6

二级参考文献236

  • 1程杰仁,殷建平,刘运,钟经伟.蜜罐及蜜网技术研究进展[J].计算机研究与发展,2008,45(z1):375-378. 被引量:35
  • 2[3]Kaspersky Lab.Malicious website evolution:January-June 2007.http://www.viruslist.com/en/analysis?pu-bid=204791968.2007-10-22.
  • 3[1]B Krishnamurthy.Mohonk:Mobile honeypots to trace unwanted traffic early.The ACM SIGCOMM Workshop on Network Troubleshooting (NetT'04),Portland,Oregon,USA,2004
  • 4[2]The Honeynet Project.http://www.honeynet.org,2007
  • 5[3]N Provos.A virtual honeypot framework.The 13th USENIX Security Symposium,San Diego,CA,USA,2004
  • 6[4]Hassan Artail,Haidar Safa,Malek Sraj,et al.A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks.Computers & Security,Alexandria,VA,USA,2006
  • 7[5]Z Kuwatly,Masri M Sraj,H Artail.A dynamic honeypot design for intrusion detection.ACS/IEEE Int'l Conf on Pervasive Services (ICPS 2004),Beirut,Lebanon,2004
  • 8[6]Xuxian Jiang,Dongyan Xu,Yi-Min Wang.Collapsar:A VM-based honeyfarm and reverse honeyfarm architecture for network attack capture and detention.Journal of Parallel and Distributed Computing,2006,66(9):1165-1180
  • 9[7]C Kreibich,J Crowcroft.Honeycomb:Creating intrusion detection signatures using honeypots.ACM SIGCOMM Computer Communication Review,2004,34(1):51-56
  • 10[8]Urjita Thakar.HoneyAnalyzer:Analysis and extraction of intrusion detection patterns & signatures using honeypot.The 2nd Int'l Conf on Innovations in Information Technology,Dubai,UAE,2005

共引文献801

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部