Netinfo Security ›› 2026, Vol. 26 ›› Issue (1): 115-124.doi: 10.3969/j.issn.1671-1122.2026.01.010
Previous Articles Next Articles
LI Dong1,2, GAO Yuan1, YU Junqing1,2(
), ZENG Muhong1, CHEN Junxin1
Received:2025-06-05
Online:2026-01-10
Published:2026-02-13
CLC Number:
LI Dong, GAO Yuan, YU Junqing, ZENG Muhong, CHEN Junxin. Polymorphic Network Control and Security Monitor Based on P4[J]. Netinfo Security, 2026, 26(1): 115-124.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2026.01.010
| 符号及名称 | 说明 |
|---|---|
| 流量集合P | 多模态网络中所有模态数据包的集合 |
| 拓扑视图g | 控制平面获取的拓扑整体视图 |
| 路由策略 | 流表模块根据模态标识计算的最佳路径 |
| 消息队列Q | 生产者C ,消费者F |
| 网络状态S | 进行多模态安全测量的网络状态 |
| 测量指标V | 经过网络测量得到的网络指标 |
| 解析模块I | 输入数据包 |
| 控制模块C | |
| 流表模块F | 输入模态标识 流表项 |
| 测量模块T | 输入网络状态 |
| 安全模块S | 输入 |
| [1] | BOSSHART P, DALY D, GIBB G, et al. P4: Programming Protocol-Independent Packet Processors[J]. ACM SIGCOMM Computer Communication Review, 2014, 44(3): 87-95. |
| [2] |
HU Yuxiang, YI Peng, SUN Penghao, et al. Research on a Fully-Definable Multimodal Intelligent Network Architecture[J]. Journal on Communications, 2019, 40(8): 1-12.
doi: 10.11959/j.issn.1000-436x.2019192 |
|
胡宇翔, 伊鹏, 孙鹏浩, 等. 全维可定义的多模态智慧网络体系研究[J]. 通信学报, 2019, 40(8): 1-12.
doi: 10.11959/j.issn.1000-436x.2019192 |
|
| [3] | LI Hui, WU Jiangxing, XING Kaixuan, et al. An Analytical Prototype System for Multimodal Network Identifier and Domain Name Generation and Management with Multi-Party Co-Governance[J]. Science China (Information Sciences), 2019, 49(9): 1186-1204. |
| 李挥, 邬江兴, 邢凯轩, 等. 多边共管的多模态网络标识域名生成管理解析原型系统[J]. 中国科学:信息科学, 2019, 49(9): 1186-1204. | |
| [4] | ZHANG Hongke, QUAN Wei, CHAO H C, et al. Smart Identifier Network: A Collaborative Architecture for the Future Internet[J]. IEEE Network, 2016, 30(3): 46-51. |
| [5] | WU Jiangxing. Reflections on the Development of New-Type Network Technologies[J]. Science China (Information Sciences), 2018, 48(8): 1102-1111. |
| 邬江兴. 新型网络技术发展思考[J]. 中国科学:信息科学, 2018, 48(8): 1102-1111. | |
| [6] | LI Dan, HU Yuxiang, WU Jiangxing. Research on the Innovation and Development Strategy of New-Type Network Technologies[J]. Engineering Sciences, 2021, 23(2): 15-21. |
|
李丹, 胡宇翔, 邬江兴. 新型网络技术创新发展战略研究[J]. 中国工程科学, 2021, 23(2): 15-21.
doi: 10.15302/J-SSCAE-2021.02.003 |
|
| [7] |
YU K, EUM S, KURITA T, et al. Information-Centric Networking: Research and Standardization Status[J]. IEEE Access, 2019, 7: 126164-126176.
doi: 10.1109/ACCESS.2019.2938586 |
| [8] | JACOBSON V, SMETTERS D K, THORNTON J D, et al. Networking Named Content[C]// ACM.The 5th International Conference on Emerging Networking Experiments and Technologies (CoNEXT 2009). New York: ACM, 2009: 1-12. |
| [9] |
ZHANG Lixia, AFANASYEV A, BURKE J, et al. Named Data Networking[J]. ACM SIGCOMM Computer Communication Review, 2014, 44(3): 66-73.
doi: 10.1145/2656877.2656887 URL |
| [10] | YUAN Haowei, SONG Tian, CROWLEY P. Scalable NDN Forwarding:Concepts, Issues and Principles[C]// IEEE. The 21st International Conference on Computer Communications and Networks (ICCCN 2012). New York: IEEE, 2012: 1-9. |
| [11] | REFAEI T, MA J, HA S, et al. Integrating IP and NDN through an Extensible IP-NDN Gateway[C]// ACM.The 4th International Conference on Information-Centric Networking (ICN 2017). New York: ACM, 2017: 224-225. |
| [12] | GUO Xingchang. Research and Implementation of IP and NDN Coexistence and Interworking Mechanisms in Multimodal Networks[D]. Beijing: Beijing Jiaotong University, 2021. |
| 国兴昌. 多模态网络中NDN与IP共存互通机制研究与实现[D]. 北京: 北京交通大学, 2021. | |
| [13] | LIU Ying, REN Gang, WU Jianping, et al. Building an IPv6 Address Generation and Traceback System with NIDTGA in Address Driven Network[J]. Science China Information Sciences, 2015, 45: 1-14. |
| [14] | DONG Fang, CHENG Chengqi, GUO Shide. Design and Research on GeoIP[C]// IEEE. The 14th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2010). New York: IEEE, 2010: 13-17. |
| [15] |
HOU Saifeng, TIAN Le, HU Yuxiang, et al. Geographic Routing and Addressing Scheme for Multi-Source Data Retrieval[J]. Journal of Beijing University of Posts and Telecommunications, 2021, 44(2): 1-7.
doi: 10.13190/j.jbupt.2020-227 |
|
侯赛凤, 田乐, 胡宇翔, 等. 面向多源信息采集的地理位置路由寻址机制[J]. 北京邮电大学学报, 2021, 44(2): 1-7.
doi: 10.13190/j.jbupt.2020-227 |
|
| [16] | LUO Wanming, LIU Shihao, JIA Yihao, et al. Flexible IP: An Adaptable IP Address Structure and Its Efficient Addressing Scheme[J]. Computer Networks, 2022, 203: 87-96. |
| [17] | WU Yunbing, ZENG Weisen, GAO Hang, et al. Multimodal Sarcasm Explanation Survey Based on Dual-Stream Residual Fusion[J]. Journal of Chinese Computer Systems. 2024, 45(11): 2628-2635. |
| 吴运兵, 曾炜森, 高航, 等. 基于双流残差融合的多模态讽刺解释研究[J]. 小型微型计算机系统, 2024, 45 (11): 2628-2635. | |
| [18] |
CAO Xiaoli, LI Yitao, XIONG Xingzhong, et al. Dynamic Routings in Satellite Networks: An Overview[J]. Sensors, 2022, 22(12): 4552-4566.
doi: 10.3390/s22124552 URL |
| [19] | MEDVED J, VARGA R, TKACIK A, et al. OpenDaylight: Towards a Model-Driven SDN Controller Architecture[C]// IEEE. IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks 2014. New York: IEEE, 2014: 1-6. |
| [20] | BERDE P, GEROLA M, HART J, et al. ONOS:Towards an Open, Distributed SDN OS[C]// ACM. HotSDN ’14:The Third Workshop on Hot Topics in Software Defined Networking. New York: ACM, 2014: 1-6. |
| [21] |
BHARDWAJ S, PANDA S N. Performance Evaluation Using RYU SDN Controller in Software-Defined Networking Environment[J]. Wireless Personal Communications, 2022, 122: 701-723.
doi: 10.1007/s11277-021-08920-3 |
| [22] | REN Hui, LI Xiaoming, GENG Junjie, et al. A SDN-Based Dynamic Traffic Scheduling Algorithm[C]// IEEE. 2016 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC). New York: IEEE, 2016: 514-518. |
| [23] |
BEGAM G S, SANGEETHA M, SHANKER N R. Load Balancing in DCN Servers through SDN Machine Learning Algorithm[J]. Arabian Journal for Science and Engineering, 2022, 47: 1423-1434.
doi: 10.1007/s13369-021-05911-1 |
| [24] |
BAGAA M, DUTRA D, TALEB T, et al. On SDN-Driven Network Optimization and QoS Aware Routing Using Multiple Paths[J]. IEEE Transactions on Wireless Communications, 2020, 19(7): 4700-4714.
doi: 10.1109/TWC.7693 URL |
| [25] | FOSIC I, ZAGAR D, GRGIC K, et al. Anomaly Detection in NetFlow Network Traffic Using Supervised Machine Learning Algorithms[J]. Journal of Industrial Information Integration, 2023, 33: 466-482. |
| [26] |
GIOTIS K, ARGYROPOULOS C, ANDROULIDAKIS G, et al. Combining OpenFlow and SFlow for an Effective and Scalable Anomaly Detection and Mitigation Mechanism on SDN Environments[J]. Computer Networks, 2014, 62: 122-136.
doi: 10.1016/j.bjp.2013.10.014 URL |
| [27] | TAN Lizhuang, SU Wei, ZHANG Zhenyi, et al. In-Band Network Telemetry: A Survey[J]. Computer Networks, 2021, 186: 63-77. |
| [28] | JOSHI R, QU Ting, CHAN M C, et al. BurstRadar: Practical Real-Time Microburst Monitoring for Datacenter Networks[C]// ACM. APSys’18: The 9th Asia-Pacific Workshop on Systems. New York: ACM, 2018: 1-8. |
| [29] |
ILHA A S, LAPOLLI A C, MARQUES J A, et al. Euclid: A Fully In-Network, P4-Based Approach for Real-Time DDoS Attack Detection and Mitigation[J]. IEEE Transactions on Network and Service Management, 2020, 18(3): 3121-3139.
doi: 10.1109/TNSM.2020.3048265 URL |
| [30] | NAM S, LIM J, YOO J, et al. Network Anomaly Detection Based on In-band Network Telemetry with RNN[C]// IEEE. 2020 IEEE International Conference on Consumer Electronics-Asia (ICCE-Asia). New York: IEEE, 2020: 1-4. |
| [31] | SCANO D, PAOLUCCI F, KONDEPU K, et al. Extending P4 In-Band Telemetry to User Equipment for Latency- and Localization-Aware Autonomous Networking with AI Forecasting[J]. Journal of Optical Communications and Networking, 2021, 13(9): 103-114. |
| [32] | TULI S, CASALE G, JENNINGS N R. TranAD: Deep Transformer Networks for Anomaly Detection in Multivariate Time Series Data[J]. VLDB Endowment, 2022, 15(6): 1201-1214. |
| [33] | XU Jiehui, WU Haixu, WANG Jianmin, et al. Anomaly Transformer: Time Series Anomaly Detection with Association Discrepancy[EB/OL]. (2022-04-15)[2025-03-21]. https://ise.thss.tsinghua.edu.cn/-mlong/doc/anomaly-transformer-iclr22.pdf. |
| [34] | SHARAFALDIN I, LASHKARI A H, HAKAK S, et al. Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy[C]// IEEE.The 53rd IEEE International Carnahan Conference on Security Technology (ICCST). New York: IEEE, 2019: 1-8. |
| [35] | SHARAFALDIN I, LASHKARI A H, GHORBANI A A. Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization[C]// ACM. The 4th International Conference on Information Systems Security and Privacy (ICISSP). New York: ACM, 2023: 108-116. |
| [1] | CHEN Hongsong, LIU Xinrui, TAO Zimei, WANG Zhiheng. A Survey of Anomaly Detection Model for Time Series Data Based on Deep Learning [J]. Netinfo Security, 2025, 25(3): 364-391. |
| [2] | LAN Jiachen, CHEN Xiarun, ZHOU Yangkai, WEN Weiping. A Survey of Routing Technologies and Protocols in Polymorphic Networks [J]. Netinfo Security, 2025, 25(10): 1506-1522. |
| [3] | ZHANG Hao, XIE Dazhi, HU Yunsheng, YE Junwei. A Review of Network Anomaly Detection Based on Semi-Supervised Learning [J]. Netinfo Security, 2024, 24(4): 491-508. |
| [4] | WANG Jian, CHEN Lin, WANG Kailun, LIU Jiqiang. Application Layer DDoS Detection Method Based on Spatio-Temporal Graph Neural Network [J]. Netinfo Security, 2024, 24(4): 509-519. |
| [5] | JIANG Rong, LIU Haitian, LIU Cong. Unsupervised Network Intrusion Detection Method Based on Ensemble Learning [J]. Netinfo Security, 2024, 24(3): 411-426. |
| [6] | CHEN Baogang, ZHANG Yi, YAN Song. Research on Multi-Factor Continuous Trustworthy Identity Authentication for Users in Civil Aviation Air Traffic Control Operational Information Systems [J]. Netinfo Security, 2024, 24(11): 1632-1642. |
| [7] | HU Wentao, XU Jingkai, DING Weijie. Unsupervised Network Traffic Anomaly Detection Based on Abductive Learning [J]. Netinfo Security, 2024, 24(11): 1675-1684. |
| [8] | SONG Yuhan, ZHU Yuefei, WEI Fushan. An Anomaly Detection Scheme for Blockchain Transactions Based on AdaBoost Model [J]. Netinfo Security, 2024, 24(1): 24-35. |
| [9] | QIN Zhongyuan, MA Nan, YU Yacong, CHEN Liquan. Network Anomaly Detection Based on Dual Graph Convolutional Network and Autoencoders [J]. Netinfo Security, 2023, 23(9): 1-11. |
| [10] | JIANG Yingzhao, CHEN Lei, YAN Qiao. Distributed Denial of Service Attack Detection Algorithm Based on Two-Channel Feature Fusion [J]. Netinfo Security, 2023, 23(7): 86-97. |
| [11] | WU Shenglin, LIU Wanggen, YAN Ming, WU Jie. A Real-Time Anomaly Detection System for Container Clouds Based on Unsupervised System Call Rule Generation [J]. Netinfo Security, 2023, 23(12): 91-102. |
| [12] | LIAO Liyun, ZHANG Bolei, WU Lifa. IoT Anomaly Detection Model Based on Cost-Sensitive Learning [J]. Netinfo Security, 2023, 23(11): 94-103. |
| [13] | ZHANG Yuchen, LI Lianghui, MA Chenyang, ZHOU Hongwei. A Log Anomaly Detection Method with Variables [J]. Netinfo Security, 2023, 23(10): 16-20. |
| [14] | GU Zhaojun, LIU Tingting, GAO Bing, SUI He. Anomaly Detection of Imbalanced Data in Industrial Control System Based on GAN-Cross [J]. Netinfo Security, 2022, 22(8): 81-89. |
| [15] | ZHOU Jingyi, LI Hongjiao. False Data Injection Attack Detection Method against PMU Measurements [J]. Netinfo Security, 2022, 22(5): 75-83. |
| Viewed | ||||||
|
Full text |
|
|||||
|
Abstract |
|
|||||