An OpenFlow switch in an OpenFlow environment includes an attack determination module to collect statistical information on packet processing with respect to incoming packets to be processed in the OpenFlow switch at a predetermined period interval to determine whether a DDoS attack occurs. The Openflow switch also includes an attack responding module to perceive a feature of the DDoS attack by using the incoming packets introduced into the OpenFlow switch after the determination of the occurrence of the DDoS attack and process the incoming packets in line with the perceived feature of the DDoS attack. Therefore, it is possible to determine and responds to DDoS attacks in the OpenFlow switches.

FIELD

The present invention relates to a technique of processing a Distributed Denial of Service (DDoS) attack in an OpenFlow environment, and more particularly, to a DDoS attack processing apparatus and method in OpenFlow switches to receive incoming packets, which is capable of determining and responding to DDoS attacks in the OpenFlow switches.

BACKGROUND

An OpenFlow technique is a technique to construct a virtual network optimized in each service on a physical network for operation of the virtual network. The virtual network includes an OpenFlow controller for controlling centrally the entire network, OpenFlow switches for processing incoming data packets that are introduced into the OpenFlow switches under a control scheme settled by the OpenFlow controller, and an OpenFlow protocol that is responsible for communication between the OpenFlow switch and the OpenFlow controller.

On the other hand, a DDoS attack is an attempt to employ several hundred of thousands of zombie PCs and send massive attack traffics to a target server causing the server to deny normal services.

The DDoS attack may occur even in an OpenFlow environment. More specifically, at the time of the receipt of unrecognized incoming packets, the switches send signaling messages to the controller, and the controller then transfers processing information related to the packets to all the switches that need to participate in processing the packets. For example, if the number of the switches under the control of the controller is 'N', and all the switches participate in the packet processing, the controller generates the maximum 'N' number of signaling messages to transfer them to all the switches. In other words, in order to process one new flow, the controller should process the maximum N+1 number of signaling messages.

Meanwhile, a DDoS attacker generates several hundred of thousands of flows exploiting several hundred of thousands of zombie PCs (assuming it to be M) that the switches are not recognizable to attack the switches. The switches inquire of the controller how to process the M number of unrecognizable flows in such a manner as described above, and hence the controller should process the maximum M*(N+1) number of signaling messages.

That is, the reason why the DDoS attack in the OpenFlow environment results in obstacles much larger than an existing DDoS attack is that the attacker attacks all the switches managed by the controller, i.e., the N number of switches, instead of attacking only one switch. In this case, the controller needs to process as many as the N*M*(N+1) number of signaling messages. The processing of these messages causes the controller to fall into a denial of services. For example, it is assumed that the controller manages 10 numbers of switches, the attacker produces 100,000 numbers of flows, and an attack is performed by changing source IPs and ports every minute. The controller 10 then processes ten million or more signaling packets per minute, which results in falling into a denial of service.

In the OpenFlow environment, the other serious security vulnerability is that, in the technical nature, it is extremely difficult to determine whether a DDoS attackoccurs. In general, the determination of the occurrence of the DDoS attackneeds to perceive header information of the incoming packets in real-time and rapidly identify an unusual feature of the attack traffics, for example, a sudden increase in a ratio of ICMP packets to overall traffics. In other words, the determination of the DDoS attack can be achieved by an apparatus or module that is capable of observing the header information of all incoming packets in real time.

The OpenFlow is a technique which allows the controller to dedicate to a network and flow control function and the switches to dedicate to only packet forwarding in a manner as prescribed by the controller. Therefore, the determination of the DDoS attack is done by the controller, which is responsible for control functions. This leads to a security vulnerability in the OpenFlow technology. As mentioned above, it is because that whether the DDoS attackoccurs should be made through the inspection of the packet header information, but these packet-processing task is done by the switches used to role of packet forwarding instead of the controller. In other words, the reason is that the controller, which is responsible for determining whether the DDoS attack occurs, receives only information on the overview of the number of packets, the number of bytes and the like that are processed and transmitted by the switches every particular cycle and does not process the packets.

Therefore, there are limitations in determining whether the DDoS attack occurs with only the overview information in terms of overhead, in terms of time, and in terms of accuracy. First, from the standpoint of time, the controller receives information from the switches at least two or three times at a specific periodic interval, compares between the differences of the received information, and roughly estimates whether the DDoS attack occurs. After that, for accurate judgment, the controller sends signaling messages onto the switches, requests the switches to transmit detailed information necessary for detecting the DDoSattack, and receives the detailed information to determine whether the attackfinally occurs. When it is determined that the attack has happened, a countermeasure should be established and transferred back to the switches via signaling messages for setting the switches. During that time, the OpenFlow network has already damaged by an attacker.

Secondly, in terms of overhead, the controller requests the switches to send the detailed information necessary to determine whether the attack occurs. In this regard, the controller may request only the number of packets and number of bytes that have been processed by each interface of the switches, but the controller may request detailed information on the number of packets and number of bytes that have been processed by a group, by a table and by its table entry as well as by the interface of the switches in order to increase the accuracy. However, the information may be a significant overhead to the controller since the number of table entries amounts to several thousand to several tens of thousands and the controller requests the detailed information of all the switches that are managed by the controller. Further, as mentioned above, the controller additionally process as many as the total N*M*(N+1) number of signaling messages every minute, and hence the controller becomes rapidly fall into a denial of service.

Finally, in terms of accuracy, the DDoS attack can be typically determined as a signature-based attack and a behavior-based attack. However, it is difficult for the controller to determine accurately whether the signature-based attack and behavior-based attack occur through the use of only the information on the number of packets and bytes that can be obtained from the switches.

As such, it is difficult to determine whether the DDoS attack occurs with only the overview information sent by the switches, and even if determined, not only it may take a long time for the determination, but also the accuracy of the determination may degrade significantly.

Even if the controller successfully determines the occurrence of the DDoS attackbased on statistical information that has been sent from the switches, the most difficult problem is to judge which flow is sent by the attacker and which source is a zombie PC.

This is the reason that the processing on the packets is directly done on the switches with no responding capability against the DDoS attack, but the DDoSattack substantially happens in the controller to take advantage of statistical-based indirect information that is transmitted from the switches.

As mentioned earlier, therefore, the response to the DDoS attack should be made on an apparatus that can inspect the header information of all the incoming packets in real time, e.g., the switches for the OpenFlow technology.

SUMMARY

In view of the above, the present invention provides an apparatus and method for determining whether a DDoS attack occurs and responding to the DDoS attack, which is mounted in OpenFlow switches and capable of determining whether theDDoS attack occurs and responding to the DDoS attack by the switches themselves.

In accordance with an aspect of the exemplary embodiment of the present invention, there is provided an OpenFlow switch in an OpenFlow environment, which includes: an attack determination module configured to collect statistical information on packet processing with respect to incoming packets to be processed in the OpenFlow switch at a predetermined period interval to determine whether a DDoS attack occurs; and an attack responding module configured to perceive a feature of the DDoS attack by using the incoming packets introduced into the OpenFlow switch after the determination of the occurrence of the DDoS attack and process the incoming packets in line with the perceived feature of the DDoS attack.

In the embodiment, the attack determination module includes: a packet capture unit configured to capture the incoming packets introduced into the OpenFlow switch when the occurrence of the DDoS attack is determined, wherein the captured packets are provided to the attack responding module.

In the embodiment, the attack determination module is configured to determine whether the DDoS attack occurs based on the number of packets or bytes processed every a predetermined period and a predetermined threshold.

In the embodiment, the attack responding module includes: a signature-based responding unit configured to determine whether the signature-based attack DDoS occurs by analyzing the overall traffics occurred in the OpenFlow switch and the traffics occurred in ICMP (Internet Control Message Protocol), TCP (Transmission Control Protocol), UDP (User Datagram Protocol), or HTTP (Hyper Text Transfer Protocol) and performs a disposal process for the incoming packets; and a behavior-based responding unit configured to determine whether a behavior-based attack occurs by analyzing the incoming packet when it is determined that the attack is not the signature-based attack and performs a disposal process for the incoming packets.

In the embodiment, the signature-based responding unit is configured to determine: that the signature-based attack is an ICMP attack when a ratio of ICMP traffics to the overall traffics is larger than a predetermined threshold of an ICMP traffic ratio; that the signature-based attack is a TCP attack when a ratio of TCP traffics to the overall traffics is larger than a predetermined threshold of a TCP traffic ratio; that the signature-based attack is a UDP attack when a ratio of UDP traffics to the overall traffics is larger than a predetermined threshold of a UDP traffic ratio; and that the signature-based attack is an HTTP attack when a ratio of HTTP traffics to the overall traffics is larger than a predetermined threshold of an HTTP traffic ratio.

In the embodiment, the signature-based attack responding unit is configured to perform a disposal process for the incoming packets related to the protocol under the signature-based attack.

In the embodiment, the OpenFlow switch further includes an information collection module configured to collect the feature of the DDoS attack and stores the collected feature in a database.

In the embodiment, the attack determination module is configured to determine that the DDoS attack occurs based on the feature of the DDoS attack stored in the database.

In the embodiment, the attack responding module is configured to perceive the DDoS attack based on the feature of theDDoS attack stored in the database.

In accordance with another aspect of the exemplary embodiment of the present invention, there is provided a method for processing a DDoS attack using an OpenFlow switch in an OpenFlow environment, which includes: collecting statistical information on packet processing with respect to incoming packets to be processed in the OpenFlow switch at a predetermined period interval; determining whether the DDoS attack occurs on a basis of the collected statistical information on packet processing; perceiving a feature of the DDoS attack using the incoming packets introduced into the OpenFlow switch when it is determined that the DDoS attack has happened; and processing the incoming packets in line with the feature of the DDoS attack.

In the embodiment, the determining whether the DDoS attack occurs comprises determining whether the DDoS attackoccurs based on the number of packets or bytes processed every a predetermined period and a predetermined threshold.

In the embodiment, the processing the incoming packets includes: determining whether a signature-based attack DDoSoccurs by analyzing the overall traffics occurred in the OpenFlow switch and the traffics occurred in ICMP (Internet Control Message Protocol), TCP (Transmission Control Protocol), UDP (User Datagram Protocol), or HTTP (Hyper Text Transfer Protocol); determining whether a behavior-based attack occurs by analyzing the incoming packet when it is determined that the signature-based attack has not happened; and processing the incoming packets related to the determined attack by discarding them.

In the embodiment, the determining that the signature-based attack occurs includes: determining that the signature-basedattack is an ICMP attack when a ratio of ICMP traffics to the overall traffics is larger than a first predetermined threshold; if the ratio of ICMP traffics is equal to or less than the first predetermined threshold, determining that the signature-basedattack is a TCP attack when a ratio of TCP traffics to the overall traffics is larger than a second predetermined threshold; if the ratio of TCP traffics is equal to or less than the second predetermined threshold, determining that the signature-basedattack is a UDP attack when a ratio of UDP traffics to the overall traffics is larger than a third predetermined threshold; and if the ratio of UDP traffics is equal to or less than the third predetermined threshold, determining that the signature-basedattack is an HTTP attack when a ratio of HTTP traffics to the overall traffics is larger than a four predetermined threshold.

In the embodiment, the method further includes: collecting the features of the perceived DDoS attack; and storing the collected features in a database.

In accordance with the embodiments of the present invention, the apparatus for determining whether the DDoS attackoccurs and responding to the DDoS attack is installed in the respective OpenFlow switches, thereby minimizing the load due to the massive messages sent to the controller at the time of the DDoS attack while rapidly returning the OpenFlow network to a stable state.

Also, in terms of time, overhead and accuracy, as compared to the conventional controller-based device for defending against the DDoS attack using the limited state information, the apparatus for determining whether the DDoS attack occurs and responding to the DDoS attack of the embodiment demonstrates the excellent defense performance against the DDoSattack, and, therefore, a customized network can be further stably provided to a service provider trying to create a new service through the use of the OpenFlow technology.

BRIEF DESCRIPTION OF THE DRAWINGS

The above and other objects and features of the present invention will become apparent from the following description of the embodiments given in conjunction with the accompanying drawings, in which:

FIG. 1 is a network diagram illustrating an OpenFlow technology to which an exemplary embodiment of the present invention is applied;

FIG. 2 shows a configuration of an OpenFlow switch in accordance with an exemplary embodiment of the present invention;

FIG. 3 is a block diagram of a DDoS attack processing apparatus in accordance with an exemplary embodiment of the present invention;

FIG. 4 illustrates a flow chart of a process for determining whether a DDoS attack occurs and responding to the DDoSattack performed by the DDoS attack processing apparatus shown in FIG. 1 in accordance with an exemplary embodiment of the present invention; and

FIG. 5 illustrates a flow chart of a process for responding to the DDoS attack in accordance with an exemplary embodiment of the present invention.

DETAILED DESCRIPTION

Before describing the exemplary embodiment, an OpenFlow technology to which the exemplary embodiment is applied will be described as follows.

FIG. 1 is a network diagram illustrating an OpenFlow technology to which an exemplary embodiment of the present invention is applied.

Referring to FIG. 1, a virtual network to which the embodiment is applied includes an OpenFlow controller 110 for controlling centrally the entire network, a plurality of OpenFlow switches 120 for processing incoming data packets that are introduced into the OpenFlow switches under a control scheme settled by the OpenFlow controller 110, an OpenFlow protocol 130 that is responsible for communication between the OpenFlow controller 110 and the OpenFlow switches 120, and a terminal 140 such as a personal computer for transmitting the data packets to the OpenFlow switches 120 and receiving the data packets through the OpenFlow switches 120. Also, each of the OpenFlow switches 120 may be constructed with a hardware part having a flow table for processing the data packets and a software part for providing a secure channel.

Following is a description on a process performed when a new flow is introduced into the virtual network optimized to serve a particular service.

First, when data packets of a new flow are introduced into the OpenFlow switches 120, the OpenFlow switches 120transmit signaling packets to inquire of the OpenFlow controller 110 how to process the flow since they have no processing information on the flow to which the packets belongs.

The OpenFlow controller 110 decides a processing method for the flow on a basis of status information of the OpenFlow switches 120 on the virtual network and transmits the processing method to all the OpenFlow switches 120 to which the packets belonging to the flow are delivered.

The OpenFlow switches 120, in response to the receipt of the processing method, processes the incoming packets in line with the processing method.

In the exemplary embodiment of the present invention, the OpenFlow switches 120 are designed to determine whether an exterior invasion, e.g., a DDoS attack, occurs and responds to the invasion.

The configuration and operation of the OpenFlow switch 120 will be discussed with reference to FIG. 2 to FIG. 5.

FIG. 2 shows a configuration of one OpenFlow switch 120 among others in accordance with an exemplary embodiment of the present invention. The OpenFlow switch 120 includes a secure channel 210, a flow table 215 and a DDoS attack processing apparatus 220.

The DDoS attack processing apparatus 220 collects statistical information on the packet processing from the hardware part of the OpenFlow switch 120 and determines whether the DDoS attack occurs on a basis of the collected statistical information on the packet processing.

When it is determined that the DDoS attack has happened, the DDoS attack processing apparatus 220 inspects the headers of the incoming packets or sampled packets introduced onto the hardware part so that it can respond to the DDoSattack. More specifically, the DDoS attack processing apparatus 220 determines whether the attack is a signature-basedDDoS attack or a behavior-based DDoS attack through the inspection of the headers and responds to the DDoS attack by processing the packets related to the DDoS attack, e.g., discarding the related packets in accordance with the determination.

The configuration and functionality of the DDoS attack processing apparatus 220 will be described with reference to FIG. 3.

FIG. 3 is a block diagram of a DDoS attack processing apparatus 220 in accordance with an exemplary embodiment of the present invention;

Referring to FIG. 3, the DDoS attack processing apparatus 220 includes a DDoS attack determination module 310, a DDoSattack responding module 320 and a DDoS attack information collection module 330.

The DDoS attack determination module 310, which is located on the hardware part of the OpenFlow switch 120, receives the statistical information on packet processing from the hardware part and determines whether the DDoS attack occurs on a basis of the received statistical information on packet processing and pre-stored feature information on the DDoS attack. Herein, the feature information on the DDoS attack may be information collected by the DDoS attack information collection module 330.

The DDoS attack determination module 310 may include a threshold-based DDoS attack determination unit 312 for determining whether the DDoS attack occurs on a basis of a predetermined threshold and a packet capture unit 314 for capturing the packets with the determination of the DDoS attack.

The threshold-based DDoS attack determination unit 312 determines that the DDoS attack had happened when there is a sudden increase in the number of packets and bytes at a specific period via the packet processing statistical information obtained every period. In other words, when the number of packets and bytes being processed at a current period is larger than a predetermined threshold in comparison with the number of packets and bytes processed at a previous period, the threshold-based DDoS attack determination unit 312 determines the occurrence of the DDoS attack, and the packet capture unit 314 captures the incoming packets introduced into the OpenFlow switch 120 to provide the captured packets to the DDoS attack responding module 320. In this regard, the predetermined threshold may be dynamically set in line with a network situation.

The DDoS attack responding module 320 analyzes the increase in a traffic ratio from the captured packets and perceives the signature-based DDoS attack with the analyzed traffic ratio, thereby responding to the signature-based DDoS attack.

Further, the DDoS attack responding module 320 analyzes the features of the captured packets if the attack is not the signature-based DDoS attack and perceives the behavior-based DDoS attack with the analyzed feature, thereby responding to the behavior-based DDoS attack.

The DDoS attack responding module 320 includes a signature-based DDoS attack responding unit 322 and a behavior-based DDoS attack responding unit 324.

The signature-based DDoS attack responding unit 322 may respond to a standardized type of DDoS attacks. That is, the signature-based DDoS attack responding unit 322 analyzes the increase in the traffic ratio from the captured packets to perceive the feature of the signature-based DDoS attack. Herein, the traffic may include ICMP (Internet Control Message Protocol) traffic, TCP (Transmission Control Protocol) traffic, UDP (User Datagram Protocol) traffic, HTTP (Hyper Text Transfer Protocol) traffic and the like, and the analysis of the traffic ratio increase may be made through the comparison between the predetermined threshold and the increased traffic ratio of the overall traffics in the OpenFlow switch.

The signature-based DDoS attack responding unit 322 performs a disposal process for the incoming packets when the feature of the signature-based DDoS attack is detected, thereby responding to the signature-based DDoS attack.

The behavior-based DDoS attack responding unit 324 responds to an unstandardized type of DDoS attacks. That is, the behavior-based DDoS attack responding unit 324 perceives the attack to be the unstandardized type of DDoS attacks, i.e., the behavior-based DDoS attack if the attack is not the signature-based DDoS attack, thereby responding to the behavior-based DDoS attack.

The behavior-based DDoS attack responding unit 324 responds to the behavior-based DDoS attack by discarding the incoming packets when the feature of the behavior-based DDoS attack is perceived.

Meanwhile, the feature of signature-based DDoS attack or the behavior-based DDoS attack may be provided to the information collection module 330.

The information collection module 330 includes an information collection unit 322 for collecting the feature of the DDoSattack obtained in the course of responding to the DDoS attack and an information database 334 that stores the collected features.

The feature information stored in the information collection unit 332 may be provided to the DDoS attack determination module 310 and the DDoS attack responding module 320. In response thereto, the DDoS attack determination module 310can update information necessary for determining whether the DDoS attack occurs, and the DDoS attack responding module 320 can update information necessary for responding to the DDoS attack.

A process in which the OpenFlow controller 110 determines whether the DDoS attack occurs and responds to the DDoSattack will be described with reference to FIG. 4.

FIG. 4 illustrates a flow chart of a process for determining and responding to the DDoS attack performed by the OpenFlow controller 110 in accordance with an exemplary embodiment of the present invention.

Referring to FIG. 4, the OpenFlow switch 120 processes the packets on the hardware part in operation 402 and transfers the statistical information on the packet processing, for example, the number of processed packets and bytes every predetermined period onto the software part in operation 404.

In response thereto, the DDoS attack determination module 310 residing on the software part determines whether theDDoS attack occurs on a basis of the transferred statistical information in operation 406. For example, the threshold-basedDDoS attack determination unit 312 may determine whether the DDoS attack occurs by comparing between the predetermined threshold and the number of the packets and bytes received at current as compared to the number of packets and bytes transferred at a current period. That is, it may be determined that the DDoS attack has begun in a case where the number of packets and bytes transferred at the current period is greater than the predetermined threshold.

As a result of the determination in operation 406, if it is determined that the DDoS attack has happened, the DDoS attackdetermination module 310 activates the DDoS attack responding module 320 in operation 408, and thus the DDoS attackresponding module 320 responds to the DDoS attack targeting the incoming packets introduced into the OpenFlow switch120 or the sampled packets while residing at the hardware part in operation 410.

Meanwhile, as the result of the determination in operation 406, if it is determined that none DDoS attack has happened, a process returns to the operation 402 to repeat the above operations. In other words, the OpenFlow switches 120processes the incoming packets based on the information in the flow table 215 and transfers the statistical information on the packets processed every period onto the software part.

A process of responding to the DDoS attack to be performed in operation 410 will be described with reference to FIG. 5.

FIG. 5 illustrates a flow chart of a process for responding to the DDoS attack in accordance with an exemplary embodiment of the present invention.

Referring to FIG. 5, the DDoS attack responding module 320 determines whether the attack is the signature-based attackthrough the use of the signature-based DDoS attack responding unit 322. More specifically, the signature-based DDoSattack responding unit 322 calculates a ratio of the ICMP traffics to the total traffics in the OpenFlow switch 120 in operation 502 and determines whether the calculated ratio of the ICMP traffics is larger than a predetermined threshold of the ICMP traffic ratio in operation 504.

As a result of the determination in operation 504, if the calculated ratio of the ICMP traffics is larger than the predetermined threshold of the ICMP traffic ratio, the signature-based DDoS attack responding unit 322 determines that the attack is the signature-based attack, discards the ICMP related packets of the incoming packets and provides the feature information of the ICMP DDoS attack to the DDoS attack information collection module 330 in operation 506. In response thereto, theDDoS attack information collection module 330 stores the feature information of the ICMP DDoS attack in the information database 334 in operation 508.

Meanwhile, as a result of the determination in operation 504, if the calculated ratio of the ICMP traffics is equal to or less than the predetermined threshold of the ICMP traffic ratio, the signature-based DDoS attack responding unit 322 calculates a ratio of the TCP traffics to the total traffics in operation 510 and determines whether the calculated ratio of the TCP traffics is larger than a predetermined threshold of the TCP traffic ratio in operation 512.

As a result of the determination in operation 512, if the calculated ratio of the TCP traffics is larger than the predetermined threshold of the TCP traffic ratio, the signature-based DDoS attack responding unit 322 determines that the attack is the TCP attack, that is, TCP flooding, discards the TCP related packets of the incoming packets and provides the feature information of the TCP DDoS attack to the DDoS attack information collection module 330 in operation 514. In response thereto, the DDoS attack information collection module 330 stores the feature information of the TCP DDoS attack in the information database 334 in operation 508.

Meanwhile, as a result of the determination in operation 512, if the calculated ratio of the TCP traffics is equal to or less than the predetermined threshold of the TCP traffic ratio, the signature-based DDoS attack responding unit 322 calculates a ratio of the UDP traffics to the total traffics in operation 516 and determines whether the calculated ratio of the UDP traffics is larger than a predetermined threshold of the UDP traffic ratio in operation 518.

As a result of the determination in operation 518, if the calculated ratio of the UDP traffics is larger than the predetermined threshold of the UDP traffic ratio, the signature-based DDoS attack responding unit 322 determines that the attack is the UDP attack, that is, UDP flooding, discards the UDP related packets of the incoming packets and provides the feature information of the UDP DDoS attack to the DDoS attack information collection module 330 in operation 520. In response thereto, the DDoS attack information collection module 330 stores the feature information of the UDP DDoS attack in the information database 334 in operation 508.

Meanwhile, as a result of the determination in operation 518, if the calculated ratio of the UDP traffics is equal to or less than the predetermined threshold of the UDP traffic ratio, the signature-based DDoS attack responding unit 322 calculates a ratio of the HTTP traffics to the total traffics in operation 522 and determines whether the calculated ratio of the HTTP traffics is larger than a predetermined threshold of the HTTP traffic ratio in operation 524.

As a result of the determination in operation 524, if the calculated ratio of the HTTP traffics is larger than the predetermined threshold of the HTTP traffic ratio, the signature-based DDoS attack responding unit 322 determines that the attack is the HTTP attack, that is, HTTP flooding, discards the HTTP related packets of the incoming packets and provides the feature information of the HTTP DDoS attack to the DDoS attack information collection module 330 in operation 526. In response thereto, the DDoS attack information collection module 330 stores the feature information on the HTTP DDoS attack in the information database 334 in operation 508.

Meanwhile, as a result of the determination in operation 524, if the calculated ratio of the HTTP traffics is equal to or less than the predetermined threshold of the HTTP traffic ratio, the signature-based DDoS attack responding unit 322determines that the attack is not the signature-based attack to trigger the operation of the information database 334 in operation 528.

In response thereto, the behavior-based DDoS attack responding unit 324 analyzes all the packets introduced into the OpenFlow switches 120 or sampled packets to determine whether the attack is the behavior-based attack in operation 530.

If, in the operation 530, the attack is the behavior-based attack, the behavior-based DDoS attack responding unit 324performs a disposal process for all the packets exploited in the behavior-based DDoS attack and provides the feature information on the behavior-based DDoS attack to the DDoS attack information collection module 330 in operation 532. In response thereto, the DDoS attack information collection module 330 stores the feature information on the behavior-basedDDoS attack in the information database 334 in operation 508.

The feature information of the DDoS attacks stored in the information database 334 may be provided to the DDoS attackdetermination module 310 and the DDoS attack responding module 320 so that they can utilize the feature information as a reference data to determine whether the DDoS attack occurs and responds to the DDoS attack.

As mentioned above, in accordance with the exemplary embodiments of the present invention, an apparatus for determining whether the DDoS attack occurs and responding to the DDoS attack is installed in the respective OpenFlow switches so that the switches itself determines whether the DDoS attack occurs and responds to the DDoS attack, thereby not only minimizing the load due to the massive messages sent to the OpenFlow controller 110 at the time of the DDoS attack but also rapidly responding to the DDoS attack.

While the invention has been shown and described with respect to the preferred embodiments, the present invention is not limited thereto. It will be understood by those skilled in the art that various changes and modifications may be made without departing from the scope of the invention as defined in the following claims.

SRC=https://www.google.com.hk/patents/US20140189867

DDoS ATTACK PROCESSING APPARATUS AND METHOD IN OPENFLOW SWITCH的更多相关文章

  1. Identifying a distributed denial of service (DDOS) attack within a network and defending against such an attack

    The invention provides methods, apparatus and systems for detecting distributed denial of service (D ...

  2. PatentTips - Apparatus and method for a generic, extensible and efficient data manager for virtual peripheral component interconnect devices (VPCIDs)

    BACKGROUND A single physical platform may be segregated into a plurality of virtual networks. Here, ...

  3. 8 Best DDoS Attack Tools (Free DDoS Tool Of The Year 2019)

    #1) HULK Description: HULK stands for HTTP Unbearable Load King. It is a DoS attack tool for the web ...

  4. Disk array controller and information processing apparatus

    A disk array controller has a function of relocating a plurality of data blocks stored in a disk arr ...

  5. OpenFlow Switch学习笔记(六)——Instructions和Actions

    本文主要重点讨论OpenFlow Switch规范的指令集,它们深刻影响着数据包在Switch中的处理行为,下面开始从以下几个部分谈起. 1.Instructions 每一个Flow Entry里都包 ...

  6. OpenFlow Switch学习笔记(五)——Group Table、Meter Table及Counters

    本文主要详述OpenFlow Switch的另外两个主要组件——Group Table和Meter Table,它们在整个OpenFlow Swtich Processing中也起到了重要作用. 1. ...

  7. OpenFlow Switch学习笔记(四)——Matching

    这次我们着重详述来自于网络中的数据包在OpenFlow Switch中与Flow Entries的具体匹配过程,以及当出现Table Miss时的处理方式,下面就将从这两方面说起. 1.Matchin ...

  8. OpenFlow Switch学习笔记(三)——Flow Tables

    这次我们主要讨论下OpenFlow Switch的核心组件之一——Flow Tables,以了解其内部的 matching 以及 action handling 机制.下文将会分为几个部分来逐步详述O ...

  9. OpenFlow Switch学习笔记(二)——OpenFlow Ports

    OpenFlow Ports是OpenFlow Switch与剩余网络之间传递Packet的网络接口.OpenFlow Switches之间通过OpenFlow Ports彼此相互逻辑连接.一个Ope ...

随机推荐

  1. WebSocket兼容到低版本浏览器

    就目前而言,WebSocket是最好的Web通信解决方案了.但是IE从10才开始兼容它,对于目前大量IE8存在的市场,原生的WebSocket显然不太实用,我们需要低版本兼容的解决方案.于是我模拟We ...

  2. 3. ZAB与Paxos算法的联系与区别。

    转自:https://blog.csdn.net/en_joker/article/details/78665809 ZAB协议并不是Paxos算法的一个典型实现,在讲解ZAB和Paxos之间的区别之 ...

  3. 应该知道的30个jQuery代码开发技巧

    1. 创建一个嵌套的过滤器 .filter(":not(:has(.selected))") //去掉所有不包含class为.selected的元素 2. 重用你的元素查询 var ...

  4. C++中引用传递与指针传递区别

    C++中引用传递与指针传递区别 在C++中,指针和引用经常用于函数的参数传递,然而,指针传递参数和引用传递参数是有本质上的不同的: 指针传递参数本质上是值传递的方式,它所传递的是一个地址值.值传递过程 ...

  5. Swiper+ ejs模板引擎+ iScroll插件知识总结

    一. Swiper swiper是一个应用于移动端的动画插件,原理类似于轮播图 官网 http://www.swiper.com.cn/# html结构 <div class="swi ...

  6. stm32的dma缓冲区长度,,存放数据数组会不会冲掉

  7. 2、Python基本数据类型

    1.算数运算: 2.比较运算: 3.赋值运算: 4.逻辑运算: 5.成员运算: 基本数据类型 1.数字 int(整型) 在32位机器上,整数的位数为32位,取值范围为-2**31-2**31-1,即- ...

  8. 【例题 6-2 UVA - 514】Rails

    [链接] 我是链接,点我呀:) [题意] 在这里输入题意 [题解] 栈模拟一下就好. 每个输出段后面都有一个空行. 包括最后一个. [代码] #include <bits/stdc++.h> ...

  9. Windows中DLL文件的意义及其作用

    Windows中DLL文件的意义及其作用 DLL是Dynamic Link Library的缩写,意为动态链接库.DLL文件即动态链接库文件,是一种可执行文件,它允许程序共享执行特殊任务所必需的代码和 ...

  10. MongoDB集群安装与配置2.4.3版本

    mongoDB安装http://www.mongodb.org/downloads拷文件到# cp mongodb-linux-i686-2.4.1.tgz /usr/local/进入目录:# cd ...