期刊文献+

SDN中IP欺骗数据分组网络溯源方法研究 被引量:4

Tracing IP-spoofed packets in software defined network
下载PDF
导出
摘要 IP数据分组溯源方法是指从目的地址出发,逐跳找到源主机。该方法在软件定义网络(SDN,software defined network)框架下,通过控制器向网络中相关SDN交换机添加探测流表项,并根据目标数据分组触发的有效溯源Packet-in消息,找到目标数据分组的转发路径及源主机。所提方案可以为调试网络故障提供方便,使网络管理员可以得到任意一个数据分组的转发路径,应对IP地址欺骗等网络安全问题。实验证明,该溯源方法能够及时、准确地找到目标数据分组的转发路径,不影响网络中其他数据流转发,且无明显的系统开销。 IP packets back tracing is to find the source host hop by hop from the destination. The method found the forwarding path of target packets and source host by adding probe entry into flow tables on SDN switches and analyzing the effective back tracing Packet-in messages sent by related switches. The proposed scheme can provide convenience for debugging network problems , so that the network administrator can obtain the forwarding paths of any data packets. Furthermore, it can help to solve the problem of IP spoofing. Experimental results prove that the traceability method can find the forwarding paths of target packets in a timely and accurate manner without affecting other traffic or significant system overhead.
作者 魏松杰 孙鑫 赵茹东 吴超 WEI Songjie;SUN Xin;ZHAO Rudong;WU Chao(School of Computer Science and Engineering,Nanjing University of Science and Technology,Nanjing 210094,China)
出处 《通信学报》 EI CSCD 北大核心 2018年第11期181-189,共9页 Journal on Communications
基金 国家自然科学基金资助项目(No.61472189) 赛尔网络下一代互联网技术创新项目(No.NGII20160105 No.NGII20170119)~~
关键词 SDN IP地址欺骗 IP溯源 探测流表项 SDN IP address spoofing IP trace back flow table probe entry
  • 相关文献

参考文献2

二级参考文献17

  • 1李金明,王汝传.DDoS攻击源追踪的一种新包标记方案研究[J].通信学报,2005,26(11):18-23. 被引量:13
  • 2MORRIS R T. A Weakness in the 4.2 BSD UNIX TCP/IP Software[R]. Computer Science Technical Report No.117, AT&T Bell Labs, 1985.
  • 3MOORE D, VOELKER G, SAVAGE S. Inferring Intemet denial-of-service activity[A].The 10th ACK USENIX Security Symposium[C]. Washington D C, 2002.
  • 4SAVADE S, WETHERALL D, KARLIN A, et al. Practical network support for IP traceback[A]. Proc of ACM SIGCOMM[C]. 2000. 295-306.
  • 5SNOREN A, PARTRIDGE C, SANCHEZ A, et al. Single-packet IP traceback[J]. ACM/IEEE Trans on Networking, 2002, 10(6): 721-734.
  • 6GAO Z Q, ANSARI N. A practical and robust Inter-domain marking scheme for IP traceback[J]. Computer Networks, 2007, 51(3): 732-750.
  • 7JIN G, YANG J G, WEI W, et al. Across-domain deterministic packet marking for IP traceback[A]. Second International Conference on Communications and Networking in China[C]. 2007.382-386.
  • 8KORKMAZ T, GONG C, SARAC K, et al. Single packet IP trace back in AS-level partial deployment scenario[A]. IEEE Globecom[C] 2007.95-108.
  • 9BELENKY A, ANSARI N. IP traceback with deterministic packet marking[J].IEEE Communication Letters, 2003, 7(4): 162-164.
  • 10QU Z Y, HUANG C F. A novel deterministic packet marking scheme for IP traceback[A]. Power Electronics and Intelligent Transportation System[C]. 2008. 897-883.

共引文献32

同被引文献20

引证文献4

二级引证文献13

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部