计算机应用 ›› 2018, Vol. 38 ›› Issue (11): 3258-3262.DOI: 10.11772/j.issn.1001-9081.2018040836

• 网络空间安全 • 上一篇    下一篇

基于软件定义网络的反嗅探攻击方法

张传浩, 谷学汇, 孟彩霞   

  1. 铁道警察学院 图像与网络侦查系, 郑州 450053
  • 收稿日期:2018-04-23 修回日期:2018-07-17 出版日期:2018-11-10 发布日期:2018-11-10
  • 通讯作者: 张传浩
  • 作者简介:张传浩(1979-),男,河南郑州人,讲师,博士,CCF会员,主要研究方向:网络信息安全、网络功能虚拟化;谷学汇(1984-),男,吉林长春人,讲师,博士,CCF会员,主要研究方向:计算机网络取证;孟彩霞(1982-),女,河南濮阳人,副教授,硕士,CCF会员,主要研究方向:网络安全与执法。
  • 基金资助:
    公安部技术研究计划项目(2017JSYJC08,2016JSYJB38);河南省科技厅基金资助项目(172102210441);铁道警察学院跨学科研究机构"公安视听技术应用研究中心"资助项目。

Anti-sniffering attack method based on software defined network

ZHANG Chuanhao, GU Xuehui, MENG Caixia   

  1. Department of Image and Network Investigation, Railway Police College, Zhengzhou Henan 450053, China
  • Received:2018-04-23 Revised:2018-07-17 Online:2018-11-10 Published:2018-11-10
  • Supported by:
    This work is partially supported by the Ministry of Public Security Technical Research Plan (2017JSYJC08, 2016JSYJB38), the Scientific and Technological Department Foundation of Henan Province (172102210441), the Interdisciplinary Research Institute of Railway Police College "Public Security Audio-Visual Technology Application Research Center".

摘要: 网络嗅探攻击中,攻击者从网络节点或链路捕获和分析网络通信数据、监视网络状态、窃取用户名和密码等敏感信息。在攻击发生时,攻击者通常处于静默状态,传统的网络防护手段如防火墙、入侵检测系统(IDS)或入侵防御系统(IPS)很难发现并有效抵御攻击。从网络结构入手,提出基于软件定义网络(SDN)的动态路径跳变(DPH)通信机制,依据空间和时间约束条件,动态改变通信节点之间的路径,宏观上将通信流量相对均匀地分布在多条传输链路中,增加网络嗅探攻击中获取完整数据的难度。实验仿真结果说明,在一定的网络规模下,动态路径跳变能够在不明显降低网络传输性能的条件下有效防御嗅探攻击。

关键词: 网络安全, 网络嗅探, 软件定义网络, 移动目标防御, 动态路径跳变

Abstract: In network sniffing attacks, attackers capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as usernames and passwords. In an ongoing attack, the attacker is usually in a silent state, traditional network protection methods such as firewalls, Intrusion Detection System (IDS), or Intrusion Prevention System (IPS) are difficult to detect and defend against it. A Dynamic Path Hopping (DPH) mechanism based on Software Defined Network (SDN) was proposed to solve this problem. In DPH, the paths of communication nodes were dynamically changed according to constraints of space and time, and the communication traffic was evenly distributed in multiple transmission paths, which increased the difficulty of obtaining complete data in the network sniffing attack. The experimental and performance simulation results show that under a certain network scale, DPH can effectively defend sniffer attacks without significantly reducing network transmission performance.

Key words: cyber security, network sniffing, Software Defined Network (SDN), Moving Target Defense (MTD), dynamic path hopping

中图分类号: