A Parallel Processing and Synthesis Structure for Improving Access Security and Efficiency in SDN Environment

After studying the routing and forwarding process of network stream and the implementation of SDN, we propose a retractable management model for flow table. A structure with parallel tables and synthesis processing is proposed according to the feature of SDN and traditional network. The parallel tab...

Full description

Saved in:
Bibliographic Details
Published inChinese Journal of Electronics Vol. 25; no. 5; pp. 817 - 823
Main Authors Zhang, Peng, Chen, Xiangning, Ge, Yun, Jin, Lin
Format Journal Article
LanguageEnglish
Published Published by the IET on behalf of the CIE 01.09.2016
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:After studying the routing and forwarding process of network stream and the implementation of SDN, we propose a retractable management model for flow table. A structure with parallel tables and synthesis processing is proposed according to the feature of SDN and traditional network. The parallel tables share the same storage resources. Thanks to the separation of data plane and control plane, control plane owns more computing resources than traditional device. It evaluates the role of nodes and the action of network flows, makes adjustment according to the historical and current information and streamlines flow tables by consolidating and simplifying old flow entries. Through simulation, it is proved that the realized method can defend offensive traffic while ensuring the safety of accessing and forwarding, especially existing blocking attack.
Bibliography:Access network Software-defined networking Flow table Parallel Synthesis Security and efficiency
10-1284/TN
After studying the routing and forwarding process of network stream and the implementation of SDN,we propose a retractable management model for flow table.A structure with parallel tables and synthesis processing is proposed according to the feature of SDN and traditional network. The parallel tables share the same storage resources. Thanks to the separation of data plane and control plane, control plane owns more computing resources than traditional device. It evaluates the role of nodes and the action of network flows, makes adjustment according to the historical and current information and streamlines flow tables by consolidating and simplifying old flow entries.Through simulation, it is proved that the realized method can defend offensive traffic while ensuring the safety of accessing and forwarding, especially existing blocking attack.
ISSN:1022-4653
2075-5597
DOI:10.1049/cje.2016.06.004