期刊文献+

SDN中基于节点安全性能的规则冲突解决机制

Rule Conflict Settlement Mechanism in SDN Based on Node Security
下载PDF
导出
摘要 软件定义网络开放可编程的特点提高网络管理的灵活性,管理员通过OpenFlow协议下发流表项对网络进行管理。由于流表项的无状态性,攻击者可以通过改写交换机中的流规则,从而达到绕过安全规则实施攻击的目的。规则之间存在依赖性,直接删减流表项并不能解决冲突,并且可能引入新的冲突。针对这一问题,提出一种基于节点安全性的路径构造方法解决规则冲突,通过使用BP神经网络判断路由节点的状态,对异常节点,重路由过程中控制器将对相关节点进行隔离。仿真分析可知,该方法建立的安全路由路径可以有效打破冲突规则间的依赖性,进而解决规则冲突。 Network management flexibility of software-defined network is improved due to its open and programmable features. The administrator manages the network by issuing flow entries through the OpenFlow protocol. However, due to the statelessness of the flow entry, an attacker can rewrite the flow rule in the switch to implement the attack by passing the security rule. Due to the dependency between the rules, deleting the flow entry directly does not resolve the conflict and may introduce new conflicts. In order to solve this problem, this paper proposes a rerouting mechanism based on secure path to solve the rule conflict. The BP neural network is used to judge the state of the routing node. For the abnormal node, the controller will isolate the relevant nodes during rerouting. Simulation analysis shows that the secure routing path established by this method can effectively break the dependency between conflict rules and solve the rule conflicts.
作者 郝巍 伊鹏 江逸茗 HAO Wei;YIN Peng;JIANG Yiming(National Digital Switching System Engineering and Technological R&D Center, Zhengzhou 450002, China)
出处 《信息工程大学学报》 2018年第6期654-658,共5页 Journal of Information Engineering University
基金 国家863计划资助项目(2015AA016102) 国家自然科学基金资助项目(61521003)
关键词 SDN 规则冲突 BP神经网络 安全路由 SDN rule conflict BP neural network secure routing
  • 相关文献

参考文献4

二级参考文献143

  • 1王文成.BP神经网络中自适应学习率的研究[J].计算机科学,1995,22(4):48-50. 被引量:12
  • 2马炫.求解k条最优路径问题的遗传算法[J].计算机工程与应用,2006,42(12):100-101. 被引量:29
  • 3林洁,杨立才,吴晓晴,叶杨.求解动态路径诱导K路最短问题的人工免疫优化方法[J].山东大学学报(工学版),2007,37(2):103-108. 被引量:6
  • 4Fist A,Shamir A.How to prove yourself:practical solutions to identification and signature problems[C].In:Odlyzko A ed.Advances in Cryptology -CRYPTO'86.Berlin:Springer-Verlag,1987,186-194.
  • 5Kurosawa K,Heng S H.From digital signature to ID-based identification/signature[A].In:Bao F,Deng R,J Zhou eds.Public Key Cryptography-PKC'04[C].Berlin:Springer-Verlag,2004,248-261.
  • 6Bellare M,Namprempre C,Neven G.Security proofs for identity-based identification and signature schemes[A].In:C Cachin,J Camenisch eds.Advances in Cryptology-EUROCRYPT'04[C].Berlin:Springer-Verlag,2004,268-286.
  • 7Boneh D,Boyen X.Short signatures without random oracles[A].In:Cachin C,Camenisch J eds.Advances in CryptologyEUROCRYPT'04[C].Berlin:Springer-Verlag,2004,56-73.
  • 8Feige U,Fiat A,Shamir A.Zero-knowledge proofs of identity[J].Journal of Cryptology.Berlin:Springer-Verlag,1988,1(5):77-94.
  • 9Feige U,Shamir A.Witness indistinguishable and witness hiding protocols[A].In:ACM Symposium on Theory of Computing-STOC '90[C].ACM,1990,416-426.
  • 10Bellare M,Palacio A.GQ and schnorr identification schemes:proofs of security against impersonation under active and concurrent attacks[A].In:Yung M ed.Advances in Cryptology-CRYPTO '02[C].Berlin:Springer-Verlag,2002,162-177.

共引文献640

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部