基于端口跳变的SDN网络防御技术研究
详细信息    查看全文 | 推荐本文 |
  • 英文篇名:Research Port Hopping SDN Network-Based Defense Technology
  • 作者:甘宏 ; 潘丹
  • 英文作者:GAN Hong;PAN Dan;Guangzhou City Construction College;
  • 关键词:拒绝服务攻击 ; 端口跳变 ; 移动目标防御 ; 控制器.
  • 英文关键词:denial of service attacks;;port hopping;;moving target defense;;controller
  • 中文刊名:JSKX
  • 英文刊名:Jiangxi Science
  • 机构:广州城建职业学院;
  • 出版日期:2016-04-18 13:28
  • 出版单位:江西科学
  • 年:2016
  • 期:v.34;No.154
  • 基金:国家自然科学基金(61272067);; 广东省自然基金团队研究项目(S2012030006242)
  • 语种:中文;
  • 页:JSKX201602021
  • 页数:6
  • CN:02
  • ISSN:36-1093/N
  • 分类号:98-103
摘要
通过持续改变服务端口来隐藏服务标识和迷惑攻击者,是端口跳变、移动目标防御典型技术,利用SDN逻辑集中控制与网络可编程特性,提出基于端口跳变的SDN网络防御技术,使用SDN控制器承担服务端的端口跳变功能,不但可减轻服务端负载,且可提前检测过滤恶意数据包,并能抵御内部攻击者。理论分析与实验结果表明,所提技术对SDN控制器负载增加较少,可有效抵御Do S攻击。
        By constantly changing the service port to hide service marks,and confuse attackers is the port hopping,typical of defense technology is a moving target,the use of SDN and network centralized control logic programmable features,proposed port-based hopping SDN network defense technology,use SDN controllers bear the service side of the port hopping function,not only reduce the server load,and can be detected in advance filter malicious packets,and can withstand internal attackers.Theoretical analysis and experimental results show that the proposed technique SDN controller load increases less effective against Do S attacks.
引文
[1]Carvalho M.Moving-target defenses for computer networks[J].IEEE Security&Privacy,2014,12(2):73-76.
    [2]Xu J,Guo P Y,Zhao M Y,et al.Comparing different movingtarget defense techniques[C]//Proc of the 1st ACM Workshop on Moving Target Defense,2014:97-107.
    [3]Hansman S,Hunt R.A taxonomy of network and computer attacks[J].Computers&Security,2005,24(1):31-43.
    [4]Jarraya Y,Madi T,Debbabi M.A survey and a layered taxonomy of software-defined networking[J].IEEE Communications Surveys&Tutorials,2014,16(1):1-29.
    [5]Nunes B A A,Mendonca M,Nguyen X,et al.A survey of software-defined networking:past,present,and future of programmable networks[J].IEEE Communications Surveys&Tutorials,2014,16(3):1617-1634.
    [6]Xia W F,Wen Y G,Foh C H,et al.A survey on software-defined networking[J].IEEE Communications Surveys&Tutorials,2014,17(1):27-51.
    [7]Jammal M,Singh T,Shami A,et al.Software defined networking:state of the art and research challenges[J].Computer Networks,2014,72:74-98.
    [8]Farhady H,Lee H,Nakao A.Software-defined networking:a survey[J].Computer Networks,2015,81:79-95.
    [9]左青云,陈鸣,赵广松,等.基于Open Flow的SDN技术研究[J].软件学报,2013,24(5):1078-1097.
    [10]张朝昆,崔勇,唐翯祎,等.软件定义网络(SDN)研究进展[J].软件学报,2015,26(1):62-81.
    [11]Akhunzada A,Ahmed E,Gani A,et al.Securing software defined networks:taxonomy,requirements,and open issues[J].IEEE Communications Magazine,2015,53(4):36-44.
    [12]Alsmadi I,Xu D.Security of software defined networks:a survey[J].Computers&Security,2015,53:79-108.
    [13]Kloti R,Kotronis V,Smith P.Openflow:a security analysis[C]//Proc of the 21st IEEE International Conference on Network Protocols,2013:1-6.
    [14]Braga R,Mota E,Passito A.Lightweight ddos flooding attack detection using nox/openflow[C]//Proc of the35th Annual IEEE Conference on Local Computer Networks,2010:408-415.
    [15]Wang B,Zheng Y,Lou W J,et al.Ddos attack protection in the era of cloud computing and software-defined networking[J].Computer Networks,2015,81:308-319.
    [16]Mousavi S M.Early Detection of DDos Attacks in Software Defined Networks Controller[M].Ottawa:Carleton University,2014.
    [18]Hoque N,Bhuyan M H,Baishya R C,et al.Network attacks:taxonomy,tools and systems[J].Journal of Network and Computer Applications,2014,40:307-324.
    [19]Raza M H,Sivakumar S C,Nafarieh A,et al.A comparison of software defined network(sdn)implementation strategies[J].Procedia Computer Science,2014,32:1050-1055.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700