期刊文献+

基于SDN的UDP反射攻击响应方案

UDP Reflection Attack Response Scheme Based on SDN
下载PDF
导出
摘要 针对字符发生器协议、域名系统协议、网络时钟协议、简单网络管理协议、简单服务发现协议这5种类型的用户数据报协议(UDP)反射攻击放大器,提出基于入侵检测系统(IDS)的UDP反射攻击响应方案。在定位到反射攻击放大器的前提下,结合网络边界的软件定义网络技术,采用基于OpenFlow流表的响应规则对控制命令报文进行过滤,从而阻止UDP反射攻击。在中国教育和科研计算机网南京主节点的网络边界上的测试结果验证了该响应方案的可操作性和有效性。 Based on an Intrusion Detection System(IDS),this paper proposes a response scheme for User Datagram Protocol(UDP)reflection attacks from 5 kinds of UDP reflection attack amplifiers,including Character Generator Protocol(CharGen),Domain Name System(DNS),Network Time Protocol(NTP),Simple Network Management Protocol(SNMP)and Simple Service Discovery Protocol(SSDP).After the reflection attack amplifier is located,the scheme combines Software Defined Network(SDN)on the network boundary with response rules based on OpenFlow tables to filter control command messages,so UDP reflection attacks can be prevented.Test results on the network boundary of Nanjing main node of China Education and Research Computer Network(CERNET)demonstrate the operability and effectiveness of the proposed response scheme.
作者 丁伟 张千风 周文烽 DING Wei;ZHANG Qianfeng;ZHOU Wenfeng(School of Cyber Science and Engineering,Southeast University,Nanjing 211189,China;School of Computer Science and Engineering,Southeast University,Nanjing 211189,China)
出处 《计算机工程》 CAS CSCD 北大核心 2020年第1期121-128,共8页 Computer Engineering
基金 国家自然科学基金(61602114) 国家重点研发计划(2018YFB1800202)
关键词 用户数据报协议 反射攻击放大器 软件定义网络 反射攻击响应 网络边界 User Datagram Protocol(UDP) reflection attack amplifier Software Defined Network(SDN) reflection attack response network boundary
  • 相关文献

参考文献3

二级参考文献16

  • 1赵煜,夏震,杨望,丁伟.Chargen反射DDoS攻击检测[J].中国教育网络,2014(6):51-52. 被引量:1
  • 2Zander S,Nguyen T,Armitage G.Automated Traffic Classification and Application Identification Using Machine Learning[C]//Proceedings of CLCN’05.Washington D.C.,USA:IEEE Computer Society Press,2005:250-257.
  • 3Liu Yun,Cheng Jieren,Yin Jianping,et al.Anomaly Detection for DDo S Attacks via Behavior Profiles Deviation Degree[C]//Proceedings of the 3rd International Conference on Computer Design and Applications.Washington D.C.,USA:IEEE Press,2011:13278-13282.
  • 4Phillip P,Seungwon S,Vinod Y,et al.A Security Enforcement Kernel for Open Flow Networks[C]//Proceedings of the 1st Workshop on Hot Topics in Software Defined Networks.New York,USA:ACM Press,2012:121-126.
  • 5Mc Keown N,Anderson T,Balakrishnan H.Open Flow:Enabling Innovation in Campus Networks[J].ACM SIGCOMM Computer Communication Review,2008,38(2):69-74.
  • 6Charfi Y,Wakamiya N,Murata M.Future Mobile Network Management with Attractor Selection[C]//Proceedings of the 9th Annual Conference on Wireless On-demand Network Systems and Services.Washington D.C.,USA:IEEE Press,2012:27-30.
  • 7Dan P.Trust in the Cloud:The Role of SDN[J].Network Security,2013,(3):5-6.
  • 8Braga R,Mota E,Passito A.Lightweight DDo S Flooding Attack Detection Using NOX/Open Flow[C]//Proceedings of the 35th Conference on Local Computer Networks.Washington D.C.,USA:IEEE Press,2010:408-415.
  • 9Mehdi S A,Khalid J,Khayam S A.Revisiting Traffic Anomaly Detection Using Software Defined Networking[C]//Proceedings of the 14th International Conference on Recent Advances in Intrusion Detection.Berlin,Germany:Springer,2011:161-180.
  • 10Giotis K,Argyropoulos C,Androulidakis G,et al.Combining Open Flow and s Flow for an Effective and Scalable Anomaly Detection And Mitigation Mechanism on SDN Environments[J].Computer Networks,2014,62(4):122-136.

共引文献24

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部