CN113709160B - Software defined network topology defense method based on forwarding route integrity verification - Google Patents

Software defined network topology defense method based on forwarding route integrity verification Download PDF

Info

Publication number
CN113709160B
CN113709160B CN202111004361.XA CN202111004361A CN113709160B CN 113709160 B CN113709160 B CN 113709160B CN 202111004361 A CN202111004361 A CN 202111004361A CN 113709160 B CN113709160 B CN 113709160B
Authority
CN
China
Prior art keywords
switch
flow
last
current
host
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111004361.XA
Other languages
Chinese (zh)
Other versions
CN113709160A (en
Inventor
吴春明
孔德章
吴坚平
沈毅
程秋美
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University ZJU
Original Assignee
Zhejiang University ZJU
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University ZJU filed Critical Zhejiang University ZJU
Priority to CN202111004361.XA priority Critical patent/CN113709160B/en
Publication of CN113709160A publication Critical patent/CN113709160A/en
Application granted granted Critical
Publication of CN113709160B publication Critical patent/CN113709160B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks

Abstract

The invention discloses a software defined network topology defense method based on forwarding routing integrity verification. The invention firstly models the detection of topology attack as the problem of the route path integrity verification of each flow. The method comprises the steps of tracing the source of each new flow, and comparing whether the characteristics of the flow on each forwarding device of a forwarding path are tampered or not to judge whether the topology attack occurs or not. The verification of the whole path takes the certificate authentication of the source host as a starting point and the basis of the whole authentication chain, and the excellent defense effect is achieved. Furthermore, the present invention can incrementally verify each node on the routing path, achieving the time complexity of O (1). Compared with the existing topology defense method, the invention can realize better defense effect.

Description

Software defined network topology defense method based on forwarding route integrity verification
Technical Field
The invention belongs to the technical field of network security, and particularly relates to a software defined network topology defense method based on forwarding route integrity verification.
Background
Software-Defined networking (Software-Defined networking) plays an increasingly important role in many application scenarios, such as cloud environments, large data centers, and the like, as a novel Network architecture. The topology discovery function is the basis for the SDN to have global control capability. Based on the topology discovery function, the control plane of the SDN establishes a global view of the entire network topology in real time, and stores key attributes of the network, such as network devices, link traffic, addresses of each device, migration conditions, and the like, so as to master key information of the entire network. Many SDN applications are based on the knowledge of the SDN controller about the global network structure, such as traffic scheduling, traffic monitoring, and network abnormal behavior diagnosis based on the global network condition. Therefore, the importance of the topology discovery function also makes it one of the main targets of attack of attackers, and errors of the topology discovery function not only affect the control plane, but also affect immeasurably many applications of the application plane that depend on the network topology.
The existing topology defense mechanism mainly depends on the extraction of specific attack characteristics or the authentication of LLDP messages and the like. For example: and calculating a hash value of the LLDP message so as to judge whether the LLDP message is forged or falsified. In addition, the method for detecting the topology attack by using the attack characteristics is widely applied. However, such methods rely on specific attack messages generated by topology attacks that have been discovered, and the defense effect is limited to specific known attacks, and such attacks can be bypassed if an attacker modifies the attack messages, for example, the message protocol is changed or the transmission time interval is changed. In addition, the attacker can also use the existing behavior of the network host to mask the own attack characteristics. For example: an attacker can launch an attack during host migration, and usurp the identity of the migrated host before the host migration is completed. Since the victim host cannot respond to security checks during migration, such attacks can easily breach security defenses and are considered normal behavior.
Disclosure of Invention
The invention aims to provide a software-defined network topology defense method based on route path integrity verification aiming at the defects of the prior art.
The purpose of the invention is realized by the following technical scheme: a software defined network topology defense method based on forwarding route integrity verification specifically comprises the following steps:
(1) Acquiring network topology information in real time by using an LLDP message and a Packet-in message of a data plane, wherein the network topology information comprises an online state and an offline state of a switch, an online state and an offline state and migration state of a network host and a change of a network link; the collected information is used to construct a data plane topology view on the controller.
(2) Monitoring the flow triggering the table-miss event in real time, and extracting the quintuple information of the flow f for each monitored flow f<smac,dmac,sip,dip,protocol>And finding the current position switch in the routing path in the topological view current (ii) a Judging whether the source mac address of the f is sent by a host newly added into the network or not according to the source mac address of the f; if yes, performing identity authentication on the host h; and if not, performing integrity verification on the forwarding path and acquiring a verification result.
(3) Analyzing the verification result in the step (2), if the host authentication is carried out and the new host h passes the authentication, recording the mac address and the certificate information of h, and generating quintuple information of the flow f and the current forwarding equipment switch of the way f current The current forwarding equipment receives an input port of the flow f<switch current ,port in >And exit port of flow f < switch current ,port out Recorded in the controller topology view.
(4) Analyzing the verification result in the step (2), and if the path integrity verification is carried out and the verification is passed, recording quintuple information of the flow f and the current forwarding equipment switch of the f path current The input port of the current forwarding equipment receiving the flow f is less than switch current ,port in And exit port of flow f < switch current ,port out Recorded in the controller topology view.
Further, when the identity authentication is performed on the host h in the step (2):
and acquiring the mac address of the host h newly added into the network, acquiring a corresponding certificate pre-stored in the controller according to the mac address, and sending a random character string s to the host h. The host h signs the string s with the private key and returns the result to the controller. The controller decrypts the signature by using the public key in the pre-distributed certificate, and verifies that the host h has the private key corresponding to the declared mac address.
Further, if the identity authentication of the host h is not passed, a safety alarm is output.
Further, when the route integrity is verified in the step (2):
finding last-hop-forwarding device switch for flow f in topology view of controller last Query whether the quintuple is in switch last Leave a record in it if the last device switch was sent last In the method, the quintuple information of the monitored flow f is inquired, and the switch of the last hop of the quintuple is switched last Outlet port of<switch last ,port out >With current switch current Incoming port receiving flow f < switch current ,port in If there is a link between them, the integrity verification passes. Due to the last hop switch last The previous forwarding path has arrived at the last hop switch at flow f last Integrity verification is performed, so only switch needs to be verified last And switch current The integrity therebetween is sufficient.
Further, if the route integrity verification fails, a security alert is output.
Further, if the last device switch was sent last No quintuple information of the stream f is recorded and a security alarm is output.
Compared with the prior art, the invention has the beneficial effects that: the software defined network topology defense method based on the route path integrity verification provided by the invention converts the topology attack detection problem into the route integrity verification problem, avoids the defect that the existing defense is only effective aiming at specific attack characteristics, and realizes a wide defense range. Since any occurrence of a topology attack would generate illegal traffic, thereby generating an unauthenticated routing path or destroying the integrity of an existing routing path. By dividing the route path integrity verification into verification chains based on the path switches, the controller only needs to verify the previous-hop switch on each-hop switch, and the O (1) time complexity is realized. In addition, the host authentication based on the certificate authentication is used as the starting point of the verification chain, so that the safety and the reliability of the defense method are ensured. Compared with the existing method, the method realizes the detection of unknown attacks, and has the advantages of wider defense range and lower time consumption.
Drawings
Fig. 1 is a flowchart of the software-defined network topology defense method based on route path integrity verification according to the present invention.
Detailed Description
The invention discloses a software defined network topology defense method based on forwarding route integrity verification. And judging whether the topology attack occurs or not by tracing the source of each new stream and comparing whether the characteristics of the stream on each forwarding device of the forwarding path are tampered or not. The verification of the whole path takes the certificate authentication of the source host as a starting point and the basis of the whole authentication chain, and the excellent defense effect is achieved. Furthermore, the present invention can incrementally verify each node on the routing path, achieving the time complexity of O (1).
The present invention will be described in detail below with reference to the accompanying drawings in order to highlight the object and specific effects of the present invention.
As shown in fig. 1, the present invention specifically includes the following steps:
(1) Acquiring network topology information in real time by using an LLDP (Link Layer Discovery Protocol) message and a Packet-in message of a data plane, wherein the network topology information comprises an online (switch _ add) and an offline (switch _ leave) of a switch, an online (host _ add, host _ leave) and a migration (host _ migration) of a network host, and a change (Link _ add, link _ del) of a network Link; the collected information is used to construct a data plane topology view on the controller.
(2) Monitoring the flow triggering the table-miss event in real time, and extracting the quintuple information of the flow f for each monitored flow f<smac,dmac,sip,dip,protocol>And finding the current position switch in the routing path in the topological view current (ii) a Judging whether the source mac address of the f is sent out by a host newly added into the network or not according to the source mac address of the f; if yes, performing identity authentication on the host h; if not, the integrity of the forwarding path is verified, and a verification result is obtained.
And (2.1) when the host identity is authenticated, firstly acquiring the mac address of the host h newly added into the network, acquiring a corresponding certificate stored in the controller in advance according to the mac address, and sending a random character s to the host h. The host h signs the string s with the private key and returns the result sign(s) to the controller. The controller decrypts the signature by using the public key in the pre-distributed certificate, and verifies that the host h has the private key corresponding to the mac address declared by the host h. And (4) if the host h has the corresponding private key, performing the step (3), otherwise, directly outputting a security alarm.
(2.2) when the integrity of the route is verified, firstly, the last-hop switching device switch of the flow f is searched in the topology view of the controller last Then, it is queried whether the quintuple is on switch last A record is left in the record; and outputting an alarm if no record is recorded. If the device switch is sent in the last jump last In the method, the quintuple information of the monitored flow f is inquired, and the switch of the last hop of the quintuple is switched last Outlet port of<switch last ,port out >With current switch current Ingress port receiving flow f<switch current ,port in >If a link exists between the two, the integrity verification is passed. Due to last hop switch last The previous forwarding path has arrived at the last hop switch at flow f last Integrity verification is performed, so only switch needs to be verified last And switch current The integrity therebetween is sufficient. And (4) if the verification is passed, performing the step (3), otherwise, directly outputting a safety alarm.
(3) And analyzing a verification result obtained by host authentication or route integrity verification:
if the host authentication is carried out and the new host h passes the authentication, the mac address and the certificate information of h are recorded, and the quintuple information of the flow f and the current forwarding equipment switch of the f path generated by the mac address and the certificate information are recorded current The current forwarding equipment receives the input port of the flow f<switch current ,port in >And outlet port for flow f<switch current ,port out >Recorded in the controller topology view.
If the path integrity verification is carried out and the verification is passed, recording quintuple information of the flow f and the current forwarding equipment switch of the f path current The current forwarding equipment receives the input port of the flow f<switch current ,port in >And an outlet port for flow f<switch current ,port out >Recorded in the controller topology view.

Claims (5)

1. A software defined network topology defense method based on forwarding route integrity verification is characterized by comprising the following steps:
(1) Acquiring network topology information in real time by using an LLDP message and a Packet-in message of a data plane, wherein the network topology information comprises an online and an offline of a switch, an online and an offline of a network host and a migration of a network link; constructing a data plane topology view on the controller using the collected information;
(2) Monitoring the flow triggering the table-miss event in real time, extracting five-tuple information < smac, dmac, sip, dip, protocol > of the flow f for each monitored flow f, and finding the current position switch in the routing path of the flow f in a topological view current (ii) a Judging whether the source mac address of the f is sent out by a host newly added into the network or not according to the source mac address of the f; if yes, performing identity authentication on the host h; if not, carrying out integrity verification on the forwarding path and obtaining a verification result;
verifying the integrity of the route, including: finding last-hop-send device switch of flow f in topology view of controller last Query whether the quintuple is in switch last Leave a record in it if the last device switch was sent last In the method, the quintuple information of the monitored flow f is inquired, and the switch of the last hop of the quintuple is switched last Out port < switch last ,port out Greater than with the current switch current Incoming port receiving flow f < switch current ,port in If a link exists between the two paths, the integrity verification is passed; due to last hop switch last The previous forwarding path has arrived at the last hop switch at flow f last Integrity verification is performed, so only switch needs to be verified last And switch current The integrity of the two layers is enough;
(3) Analyzing the verification result in the step (2), if the host authentication is carried out and the new host h passes the authentication, recording the mac address and the certificate information of h, and generating quintuple information of the flow f and the current forwarding equipment switch through which the flow f passes current The input port of the current forwarding equipment receiving the flow f is less than switch current ,port in >. And exit port of flow f < switch current ,port out Record in controller topology view;
(4) Analyzing the verification result in the step (2), and if the verification of the path integrity is carried out and the verification is passed, recording quintuple information of the flow f and the current forwarding equipment switch of the path f current The input port of the current forwarding equipment receiving the flow f is less than switch current ,port in And exit port of flow f < switch current ,port out Recorded in the controller topology view.
2. The forwarding route integrity verification-based software-defined network topology defense method according to claim 1, wherein when the identity authentication of the host h is performed in step (2):
acquiring a mac address of a host h newly joining a network, acquiring a corresponding certificate pre-stored in a controller according to the mac address, and sending a random character string s to the host h; the host h signs the character string s by using a private key and returns the result to the controller; the controller decrypts the signature by using the public key in the pre-distributed certificate, and verifies that the host h has the private key corresponding to the declared mac address.
3. The forwarding routing integrity verification-based software-defined network topology defense method according to claim 2, wherein if the host h identity authentication fails, a security alarm is output.
4. The forwarding route integrity verification-based software-defined network topology defense method according to claim 1, wherein if the route integrity verification fails, a security alarm is output.
5. The forwarding-routing-integrity-verification-based software-defined network topology defense method according to claim 1, characterized in thatIf the last jump sends a device switch last And no quintuple information of the flow f is recorded, and a safety alarm is output.
CN202111004361.XA 2021-08-30 2021-08-30 Software defined network topology defense method based on forwarding route integrity verification Active CN113709160B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111004361.XA CN113709160B (en) 2021-08-30 2021-08-30 Software defined network topology defense method based on forwarding route integrity verification

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111004361.XA CN113709160B (en) 2021-08-30 2021-08-30 Software defined network topology defense method based on forwarding route integrity verification

Publications (2)

Publication Number Publication Date
CN113709160A CN113709160A (en) 2021-11-26
CN113709160B true CN113709160B (en) 2022-10-04

Family

ID=78656796

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111004361.XA Active CN113709160B (en) 2021-08-30 2021-08-30 Software defined network topology defense method based on forwarding route integrity verification

Country Status (1)

Country Link
CN (1) CN113709160B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115174467B (en) * 2022-06-28 2023-09-22 福州大学 Route jump defending construction method based on programmable data plane

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6044064A (en) * 1997-03-28 2000-03-28 Mci Communications Corporation Method and system therefor of confining path verification signals within a distributed restoration network
CN106612267B (en) * 2015-10-27 2020-01-21 ***通信集团公司 Verification method and verification device
CN107645445B (en) * 2017-09-15 2019-11-22 安徽大学 A kind of SDN network cross-domain communication method based on dummy node technology
CN112565230B (en) * 2020-11-30 2022-08-19 国网山东省电力公司电力科学研究院 Software-defined Internet of things network topology data transmission safety management method and system

Also Published As

Publication number Publication date
CN113709160A (en) 2021-11-26

Similar Documents

Publication Publication Date Title
CN110113328B (en) Software defined opportunistic network DDoS defense method based on block chain
Skowyra et al. Effective topology tampering attacks and defenses in software-defined networks
US20060034305A1 (en) Anomaly-based intrusion detection
US10680893B2 (en) Communication device, system, and method
CN112929200B (en) SDN multi-controller oriented anomaly detection method
CN108632267A (en) A kind of topology pollution attack defense method and system
CN113709160B (en) Software defined network topology defense method based on forwarding route integrity verification
Xiao et al. Discovery method for distributed denial-of-service attack behavior in SDNs using a feature-pattern graph model
Mohammed et al. Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication
KR102149531B1 (en) Method for connection fingerprint generation and traceback based on netflow
US20220038425A1 (en) Security guarantee method and apparatus for full life cycle of packet, and decentralized network trust system
CN108881315B (en) Method and system for detecting and recovering double LSA attack OSPF protocol based on NFV
TWI744545B (en) Decentralized network flow analysis approach and system for malicious behavior detection
CN110881016B (en) Network security threat assessment method and device
Li et al. Improved automated graph and FCM based DDoS attack detection mechanism in software defined networks
US11146472B1 (en) Artificial intelligence-based lateral movement identification tool
Wang et al. An efficient scheme for SDN state consistency verification in cloud computing environment
Jeong et al. Hybrid system to minimize damage by zero-day attack based on NIDPS and HoneyPot
Nanda et al. A highly scalable model for network attack identification and path prediction
El-Dalahmeh et al. Intrusion Detection System for SDN based VANETs Using A Deep Belief Network, Decision Tree, and ToN-IoT Dataset
Al Salti et al. LINK-GUARD: an effective and scalable security framework for link discovery in SDN networks
Lange et al. Using a deep understanding of network activities for security event management
Lent et al. Strengthening the security of cognitive packet networks
Meredith et al. Increasing Network Resilience to Persistent OSPF Attacks
Gu et al. IA-DD: An SDN Topological Poisoning Attack Defense Scheme Based on Blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant