信息网络安全 ›› 2025, Vol. 25 ›› Issue (2): 295-305.doi: 10.3969/j.issn.1671-1122.2025.02.010

• 理论研究 • 上一篇    下一篇

基于探测间隔变化的OpenFlow交换机超时嗅探方法

杨致远1,2,3,4, 崔允贺1,2,3,4(), 陈意1,2,3,4, 郭春1,2,3,4   

  1. 1.贵州大学计算机科学与技术学院,贵阳 550025
    2.公共大数据国家重点实验室,贵阳 550025
    3.文本计算与认知智能教育部工程研究中心,贵阳 550025
    4.贵州省软件工程与信息安全特色重点实验室,贵阳 550025
  • 收稿日期:2024-11-05 出版日期:2025-02-10 发布日期:2025-03-07
  • 通讯作者: 崔允贺 E-mail:yhcui@gzu.edu.cn
  • 作者简介:杨致远(2000—),男,甘肃,硕士研究生,主要研究方向为软件定义网络、网络与信息安全|崔允贺(1987—),男,山东,副教授,博士,CCF高级会员,主要研究方向为软件定义网络、边缘计算和云计算|陈意(1991—),男,贵州,副教授,博士,主要研究方向为多媒体安全及人工智能安全|郭春(1986—),男,贵州,教授,博士,CCF高级会员,主要研究方向为恶意软件分析、入侵检测和数据挖掘
  • 基金资助:
    贵州省科技重大专项(黔科合重大专项字[2024]003);贵州省高等学校大数据安全与网络安全创新团队资助项目(黔教技[2023]052号)

OpenFlow Switch Timeout Sniffing Method Based on Detection Interval Changes

YANG Zhiyuan1,2,3,4, CUI Yunhe1,2,3,4(), CHEN Yi1,2,3,4, GUO Chun1,2,3,4   

  1. 1. College of Computer Science and Technology, Guizhou University, Guiyang 550025, China
    2. State Key Laboratory of Public Big Data, Guiyang 550025, China
    3. Engineering Research Center of Text Computing & Cognitive Intelligence, Ministry of Education, Guiyang 550025, China
    4. Key Laboratory of Software Engineering and Information Security in Guizhou Province, Guiyang 550025, China
  • Received:2024-11-05 Online:2025-02-10 Published:2025-03-07

摘要:

软件定义网络(SDN)通过分离控制平面和数据平面实现了网络的集中化、可编程化和灵活化。但这种架构也使SDN面临新的攻击威胁,针对SDN交换机的超时嗅探是其面临的主要安全威胁之一。现有的超时嗅探方法忽略了超时的最大值、探测包的生成时间以及超时之间的关系对于探测超时的影响,导致出现探测失败、超时类型识别错误和超时值探测精度低的问题。为解决上述问题,文章提出一种基于探测间隔变化的OpenFlow交换机流表项超时机制嗅探方法—TIMIC。该方法先通过调整探测包的发送间隔获得超时值,再通过该超时值判断具体的超时机制及更精确的超时值。实验结果表明,TIMIC在不同的超时机制下都能成功探测超时类型和超时值,且探测出的超时值能够保持较小的探测误差。在通用的超时设置下,TIMIC发送的超时探测包更少,探测成本更低。

关键词: 软件定义网络, 超时机制嗅探, 探测间隔

Abstract:

Software-defined Networking achieves centralization, programmability, and flexibility by separating the control plane and data plane. However, the network architecture faces new attack threats. Timeout sniffing against SDN switches is one of the main security threats. The existing timeout sniffing methods ignore the impact of the maximum timeout value, the generation time of sniffing packets, and the relationship between timeouts on sniffing timeouts, resulting in problems such as sniffing failed, timeout type recognition error, and low timeout sniffing accuracy. In order to solve the above problems, this paper proposed a OpenFlow switch timeout flow entry timeout mechanism sniffing method based on the detection interval change-TIMIC. The method first obtained a timeout value by adjusting the sending interval of the sniffing packet and then determined the specific timeout mechanism and more accurate timeout value through the timeout value. The experimental results show that TIMIC can successfully detect timeout types and values under different timeout mechanisms, and the detected timeout values can maintain a small sniffing error. Under the universal timeout setting, TIMIC sends fewer timeout sniffing packets and has lower sniffing costs.

Key words: software-defined networking, timeout mechanism sniffing, sniffing interval

中图分类号: