Skip to main content

An Attack Detection and Defense Method for SDWN Oriented Blockchain Network

  • Conference paper
  • First Online:

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1267))

Abstract

With the development of SDN, the problems of low efficiency of file transfer and limited network capacity in traditional network will be solved. However, due to the lack of protection mechanism in SDN application layer, data is easy to be lost and attacked. In this paper, the application layer and blockchain are combined to make full use of the unchangeable characteristics of blockchain data. A method of SDWN attack detection based on blockchain is proposed. The control layer controls the function of data distribution and access control. Then, the existing security problems are analyzed. Through the comparison between the methods in this paper and attack defense methods, several SDWN network security check methods are analyzed. It is found that this paper has better performance in the quality of experience (QoE) and network security performance, which will improve the controllability, flexibility and security of the network.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. https://www.anquanke.com/post/id/169720

  2. https://cloud.tencent.com/developer/news/492018

  3. Liang, W., Fan, Y., Li, C., Zhang, D., Gaudiot, J.-L.: Secure data storage and recovery in industrial blockchain network environments. IEEE Trans. Ind. Inform. 16(10), 6543–6552 (2020). https://doi.org/10.1109/tii.2020.2966069

  4. Liang, W., Xie, S., Long, J., et al.: A double PUF-based RFID identity authentication protocol in service-centric internet of things environments. Inf. Sci. 503, 129–147 (2019)

    Article  Google Scholar 

  5. Liang, W., Huang, W., Long, J., Zhang, K., Li, K., Zhang, D.: Deep reinforcement learning for resource protection and real-time detection in loT environment. IEEE Internet Things J. 1 (2020). https://doi.org/10.1109/jiot.2020.2974281

  6. McKeown, N.: Software-defined networking. INFOCOM Keynote Talk 17(2), 30–32 (2009)

    Google Scholar 

  7. Costanzo, S., et al.: Software defined wireless networks: unbridling SDNs. In: 2012 European Workshop on Software Defined Networking. IEEE (2012)

    Google Scholar 

  8. McKeown, N., et al.: OpenFlow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69–74 (2008)

    Google Scholar 

  9. Kreutz, D., Ramos, F.M.V., Verissimo, P.: Towards secure and dependable software-defined networks. In: Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (2013)

    Google Scholar 

  10. Monsanto, C., et al.: Composing software defined networks. In: 10th {USENIX} Symposium on Networked Systems Design and Implementation {NSDI} 2013 (2013)

    Google Scholar 

  11. Wu, J., et al.: Big data analysis-based secure cluster management for optimized control plane in software-defined networks. IEEE Trans. Netw. Serv. Manag. 15(1), 27–38 (2018)

    Article  Google Scholar 

  12. Bernardos, C.J., et al.: An architecture for software defined wireless networking. IEEE Wirel. Commun. 21(3), 52–61 (2014)

    Article  Google Scholar 

  13. Zhou, Q., et al.: Network virtualization and resource description in software-defined wireless networks. IEEE Commun. Mag. 53(11), 110–117 (2015)

    Article  Google Scholar 

  14. Liang, C., et al.: Enhancing QoE-aware wireless edge caching with software-defined wireless networks. IEEE Trans. Wirel. Commun. 16(10), 6912–6925 (2017)

    Article  Google Scholar 

  15. Yan, Z., Zhang, P., Vasilakos, A.V.: A security and trust framework for virtualized networks and software-defined networking. Secur. Commun. Netw. 9(16), 3059–3069 (2016)

    Article  Google Scholar 

  16. Shu, Z., et al.: Security in software-defined networking: threats and countermeasures. Mob. Netw. Appl. 21(5), 764–776 (2016)

    Article  Google Scholar 

  17. Graubner, P., et al.: Dynamic role assignment in software-defined wireless networks. In: 2017 IEEE Symposium on Computers and Communications (ISCC). IEEE (2017)

    Google Scholar 

  18. Moura, H., et al.: Ethanol: a software-defined wireless networking architecture for IEEE 802.11 networks. Comput. Commun. 149, 176–188 (2020)

    Article  Google Scholar 

  19. Mao, B., et al.: A novel non-supervised deep-learning-based network traffic control method for software defined wireless networks. IEEE Wirel. Commun. 25(4), 74–81 (2018)

    Article  Google Scholar 

  20. Liang, W., Li, K., Long, J., Kui, X., Zomaya, Y.: An industrial network intrusion detection algorithm based on multifeature data clustering optimization model. IEEE Trans. Industr. Inf. 16(3), 2063–2071 (2019). https://doi.org/10.1109/TII.2019.2946791

    Article  Google Scholar 

  21. He, D., Chan, S., Guizani, M.: Securing software defined wireless networks. IEEE Commun. Mag. 54(1), 20–25 (2016)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Lijun Xiao .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Xiao, L., Gao, Y., Liu, B., Fang, T. (2020). An Attack Detection and Defense Method for SDWN Oriented Blockchain Network. In: Zheng, Z., Dai, HN., Fu, X., Chen, B. (eds) Blockchain and Trustworthy Systems. BlockSys 2020. Communications in Computer and Information Science, vol 1267. Springer, Singapore. https://doi.org/10.1007/978-981-15-9213-3_19

Download citation

  • DOI: https://doi.org/10.1007/978-981-15-9213-3_19

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-15-9212-6

  • Online ISBN: 978-981-15-9213-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics