期刊文献+

SDN环境下网络流量监测与控制系统设计 被引量:3

Design of network traffic monitoring and control system in SDN
下载PDF
导出
摘要 由于SDN具有可软件定义的特性和控制与转发相分离的特点,SDN环境下网络流量测控与传统的IP网络显著不同。提出了一种基于s Flow技术的网络流量监测与控制系统,借助s Flow数据监测的功能,把数据收集的过程从SDN控制平面分离出来。构建了基于Open Daylight控制器与Mininet的实验环境,通过模拟拒绝服务攻击来产生异常流量,利用网络流量测控的方法实现了异常流量的拦截。 The core idea of SDN(software defined networking) is that the control plane and data plane are separated,which makes the network traffic can be flexible controlled. Since SDN has these characteristics, the traffic monitoring and control in SDN have significant differences with traditional IP networks. A network traffic monitoring and control system based on s Flow technology was presented. With the application of s Flow, the process of data collection was separated from the control plane of SDN. The experimental environment was constructed based on Open Daylight controller and Mininet, and the abnormal traffic was simulated by Do S(denial of service) attacks. The experiments show that the proposed network traffic monitoring and control system can effectively intercept the abnormal traffic.
出处 《电信科学》 北大核心 2015年第S1期163-167,共5页 Telecommunications Science
基金 国家电网公司科技项目"软件定义网络(SDN)体系及其电力应用关键技术研究" 国网智能电网研究院青年基金项目"支持电力应用SDN控制功能的网络流量可视化矩阵关键技术研究"(No.SGRI-HT-81-15-002)~~
关键词 软件定义网络 流量监测 拒绝服务 端口 SDN traffic monitoring Do S port
  • 相关文献

参考文献6

  • 1张朝昆,崔勇,唐翯翯,吴建平.软件定义网络(SDN)研究进展[J].软件学报,2015,26(1):62-81. 被引量:437
  • 2N. McKeown,et al.OpenFlow:Enabling innovation in Campus Networks. ACM SIGCOMM . 2008
  • 3Nunes B,Mendonca M,Nguyen X,et al.A survey of software-defined networking:Past,present,and future of programmable networks. IEEE Communications Letters . 2014
  • 4I Mousavi,Seyed Mohammad,M St-Hilaire.'Early detection of DDo S attacks against SDN controllers.'. 2015 International Conference on Computing Networking and Communications (ICNC) . 2015
  • 5孙长华,刘斌.分布式拒绝服务攻击研究新进展综述[J].电子学报,2009,37(7):1562-1570. 被引量:31
  • 6Stanford University.Clean slate program. http://cleanslate.stanford.edu/ . 2015

二级参考文献165

  • 1孙知信,李清东.路由器端防范DDos攻击机制综述[J].南京邮电大学学报(自然科学版),2007,27(1):89-96. 被引量:8
  • 2李金明,王汝传.基于VTP方法的DDoS攻击实时检测技术研究[J].电子学报,2007,35(4):791-796. 被引量:18
  • 3Worldwide Infrastructure Security Report,Volume Ⅲ[OL].Arbor Networks,http://www.arbornetworks.com/report,September 2007.
  • 4Dittrich D.Distributed Denial of Service(DDoS) Attacks/tools[OL].http://staff.washington.edu/dittricb/misc/ddos/.
  • 5Kargl F,Maier J,Weber M.Protecting web servers from distributed denial of service attacks[A].In Proc.International Conference on World Wide Web[C].2001.
  • 6Hussain A,Heidemann J,Papadopoulos C.A framework for classifying denial of service attacks[A].In Proc.ACM SIGCOMM[C].2003.
  • 7Mirkovic J,Reiher P.A taxonomy of DDoS attack and DDoS defense mechanisms[J].ACM SIGCOMM Computer Communications Review.2004,34(2):39-53.
  • 8Carl G,Kesidis G,Brooks R R,et al.Denial-of-service attackdetection techniques[J].IEEE Internet Computing.2006,10(1):82-89.
  • 9Peng T,Leckie C,Ramamohanarao K.Survey of network-based defense mechanisms countering the DoS and DDoS problems[J].ACM Computing Surveys.2007,39(1).
  • 10Symantec Internet Security Threat Report[OL].http://www.Symantec.com/business/theme.jsp? themeid = threatreport,April 8 2008.

共引文献466

同被引文献31

引证文献3

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部