期刊文献+

一种基于SDN中网络最大流的异常流量检测方法 被引量:4

An Anomaly Traffic Detection Method Based on Network Maximum Flow in SDN
下载PDF
导出
摘要 针对SDN网络安全架构的集中控制等特点,在攻击的源头对流量实时监控,使用对网络最大流算法对网络层中端口扫描攻击时产生的流的进行检测,并将检测到的异常流量与出口流量比对,来判断SDN网络中是否遭到攻击,最后利用高校的实验环境对该检测方法进行了验证与数据分析。 This article focuses on the centralized control of the SDN network security architecture. It monitors the traffic at the source of the attack in real time and uses the network's maximum flow algorithm to detect the flow generated during the port scan attack in the network layer and detects the abnormal traffic, which is compared with the export traffic to determine whether there is an attack in the SDN network. Finally, it uses the university's experimental environment to verify and analyze the data.
作者 余建 林志兴 YU Jian;LIN Zhi-xing(Sanming University Modern Education Technology Centre,Sanming 365004,China)
出处 《三明学院学报》 2018年第4期47-54,共8页 Journal of Sanming University
基金 福建省中青年教师教育科研项目(JAT170552) 福建省自然科学基金面上项目(2018J01560)
关键词 SDN 网络最大流 流量 检测 SDN network maximum flow traffic detection
  • 相关文献

参考文献2

二级参考文献14

  • 1Jun Jiang, Symeon Papavassiliou. A Network Fault Diagnostic Approach Based on a Statistical Traffic Normality Prediction Algorithm[ C]. Proceedings of IEEE GLOBECOM ,2003. 2918-2922.
  • 2Thottan Marina, Chuanyi Ji. Adaptive Thresholding for Proactive Network Problem Detection [ C ]. Rhode Island: IEEE International Workshop on Systems Management, Newport, 1998. 108-116.
  • 3Arnon Goldman. Anomaly Detection Based on an Iterative Local Statisticals Approach [ J ]. IEEE Signal Processing,2004,84 (7) :440-443.
  • 4Matthew V Mahoney. Network Traffic Anomaly Detection Based on Packet Bytes [ C ]. Melbourne, Florida, USA : ACM, SAC 2003,2003.
  • 5Joseph L Hellerstein, Fan Zhang, Perwez Shahabuddin. Characterizing Normal Operation of a Web Server: Application to Workload Forecasting and Problem Detection [ C ]. Proeeednigs of the Computer Measurement Group, 1998.
  • 6Yang Wei-Qing, Gu Lan. Time Series Analysis and Dynamic Data Modeling[ M ]. Beijing:Press of Beijing University of Science and Engineering, 1988.
  • 7V Alarcon-Aquino. Anomaly Detection in Communication Networks Using Wavelets[ C]. IEE Prec. of Commun. ,2001.
  • 8LAKHINA A, CROVELLA M, DIOT C.Diagnosing network- wide traffic anomalies[C].Proceedings of the ACMSIGCOMM. New York : ACM, 2004 : 219-230.
  • 9JACKSON J E, MUDHOLKAR G S.Control procedures for residuals associated with principal component analysis[J]. Technometrics, 1979,21 (3) : 341-349.
  • 10HANDIGOL N, HELLER B, JEYAKUMAR V, et al. Reproducible network experiments using container-based emulation[C].Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies.New York : ACM, 2012 : 253-264.

共引文献16

同被引文献37

引证文献4

二级引证文献3

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部