Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Anti-sniffering attack method based on software defined network
ZHANG Chuanhao, GU Xuehui, MENG Caixia
Journal of Computer Applications    2018, 38 (11): 3258-3262.   DOI: 10.11772/j.issn.1001-9081.2018040836
Abstract665)      PDF (986KB)(391)       Save
In network sniffing attacks, attackers capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as usernames and passwords. In an ongoing attack, the attacker is usually in a silent state, traditional network protection methods such as firewalls, Intrusion Detection System (IDS), or Intrusion Prevention System (IPS) are difficult to detect and defend against it. A Dynamic Path Hopping (DPH) mechanism based on Software Defined Network (SDN) was proposed to solve this problem. In DPH, the paths of communication nodes were dynamically changed according to constraints of space and time, and the communication traffic was evenly distributed in multiple transmission paths, which increased the difficulty of obtaining complete data in the network sniffing attack. The experimental and performance simulation results show that under a certain network scale, DPH can effectively defend sniffer attacks without significantly reducing network transmission performance.
Reference | Related Articles | Metrics