Method for Overflow Attack Defense of SDN Network Flow Table Based on Stochastic Differential Equation

被引:0
|
作者
Xinhui Zhao
Qingxian Wang
Zehui Wu
Rui Guo
机构
[1] Information Engineering University,State Key Laboratory of Mathematics Engineering & Advanced Computing
[2] Physical Education College of Zhengzhou University,Modern Education Technology Center
[3] Zhengzhou University of Light Industry,Engineering Training Center
来源
Wireless Personal Communications | 2021年 / 117卷
关键词
Stochastic differential equation; Overflow of SDN network flow table; SDN network attack; Defense;
D O I
暂无
中图分类号
学科分类号
摘要
In order to avoid the overflow problem of network flow table caused by hackers attacking the network in the process of using the network, a method for overflow attack defense of SDN network flow table based on stochastic differential equation is proposed. In this method, the stochastic differential equation is first proposed, and the drift coefficient and diffusion coefficient of the equation are expanded and adjusted by Taylor. By using the limit theorem, the spillover attack of SDN network is weakly converged to an approximate two-dimensional Markov diffusion process, and the improved stochastic differential equation is obtained. Then, according to the stochastic nature of SDN network attack, the stochastic differential equation is transformed into an amplitude equation, which is based on the amplitude. The equation establishes a SDN attack detection scheme based on flow table statistics, which detects the spillover attacks of SDN network flow tables. Finally, according to the test results, it is proposed to use other switches instead of network flow table overflow switches to control the data upload rate, thus reducing the possibility of network crash and meeting the attack defense requirements of flow table overflow. The simulation results show that the proposed method has better detection performance and shorter running time, and can provide help for network security related work.
引用
收藏
页码:3431 / 3447
页数:16
相关论文
共 50 条
  • [31] Cooperative defense of DDoS attack based on machine learning in SDN
    Shang L.
    Chen M.
    Zhang L.
    Liu X.
    Shi T.
    Li B.
    Dianli Xitong Baohu yu Kongzhi/Power System Protection and Control, 2021, 49 (16): : 170 - 176
  • [32] DDoS Attack Detection Method for Space-Based Network Based on SDN Architecture
    JIA Min
    SHU Yuejie
    GUO Qing
    GAO Zihe
    XIE Suofei
    ZTECommunications, 2020, 18 (04) : 18 - 25
  • [33] SDN-Assisted Slow HTTP DDoS Attack Defense Method
    Hong, Kiwon
    Kim, Youngjun
    Choi, Hyungoo
    Park, Jinwoo
    IEEE COMMUNICATIONS LETTERS, 2018, 22 (04) : 688 - 691
  • [34] NFV-GUARD: Mitigating Flow Table-Overflow Attacks in SDN Using NFV
    Soylu, Mustafa
    Guillen, Luis
    Izumi, Satoru
    Abe, Toru
    Suganuma, Takuo
    PROCEEDINGS OF THE 2021 IEEE 7TH INTERNATIONAL CONFERENCE ON NETWORK SOFTWARIZATION (NETSOFT 2021): ACCELERATING NETWORK SOFTWARIZATION IN THE COGNITIVE AGE, 2021, : 263 - 267
  • [35] Basin flow concentration model based on stochastic differential equation
    Sun, Ying-Na
    Rui, Xiao-Fang
    Fu, Qiang
    Xing, Zhen-Xiang
    Shuili Xuebao/Journal of Hydraulic Engineering, 2011, 42 (02): : 187 - 191
  • [36] FLOW OF A STOCHASTIC DIFFERENTIAL-EQUATION
    MEYER, PA
    LECTURE NOTES IN MATHEMATICS, 1981, 850 : 103 - 117
  • [37] Optimal Network Defense Strategy Selection Method: A Stochastic Differential Game Model
    Mi, Yan
    Zhang, Hengwei
    Hu, Hao
    Tan, Jinglei
    Wang, Jindong
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [38] Analysis for Ad hoc network attack-defense based on stochastic game model
    1600, International Frequency Sensor Association (173):
  • [39] An Efficient Defense Mechanism for Spoofed IP Attack in SDN based CDNi
    Mowla, Nishat I.
    Doh, Inshil
    Chae, KiJoon
    2015 INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN), 2015, : 92 - 97
  • [40] Defending Blind DDoS Attack on SDN Based on Moving Target Defense
    Ma, Duohe
    Xu, Zhen
    Lin, Dongdai
    INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2014, PT I, 2015, 152 : 463 - 480