Abstract:
A malicious attack detection method includes receiving, by a controller, a packet-in message sent by a switch, sending, by the controller, an abnormal flow entry to the switch, receiving, by the controller, a triggering count sent by the switch, where the triggering count is a quantity of times that the abnormal flow entry is triggered, and determining, according to the triggering count, whether a malicious attack is initiated.
Abstract:
A preset flow table matching policy in a switching device is set, a flow table for processing data by a switching device that the data needs to pass through during forwarding and an action that needs to be executed in the flow table are generated according to the matching policy and capability information of the switching device, and the flow table is sent to the switching device that the data needs to pass through during forwarding such that the control device may generate, according to different flow table information of the switching device and with reference to different data forwarding policies, a corresponding flow table to be executed by the switching device, which manages switching devices of different types, and enables a switching device that has multiple flow tables to flexibly implement a data forwarding function in use of a preset policy.
Abstract:
A topological learning method and apparatus for an OPENFLOW network cross a conventional Internet Protocol (IP) network. The method includes obtaining, by a controller, M OPENFLOW switch (OFS) ports connected to a same conventional IP network, determining whether there is a logical switch corresponding to the conventional IP network, if the controller determines that there is no logical switch corresponding to the conventional IP network, creating and storing the information about the logical switch, where the information about the logical switch includes related information of the M OFS ports, and related information of each OFS port includes link information in a direction from the port to the logical switch and/or link information in a direction from the logical switch to the port, and managing, by the controller, the logical switch as a common OPENFLOW switch of an OPENFLOW network.
Abstract:
A malicious attack detection method includes: receiving, by a controller, a Packet-in message sent by a switch, where the Packet-in message includes a source host identifier and a destination host identifier of a data packet for which the switch does not find a flow entry; when determining that a host indicated by the destination host identifier does not exist in an SDN network, sending, by the controller, an abnormal flow entry to the switch; receiving, by the controller, a triggering count sent by the switch, where the triggering count is a quantity of times that the abnormal flow entry is triggered; and determining, according to the triggering count, whether a malicious attack is initiated. According to the method, a malicious attack from a host can be detected, a data processing volume of a controller can be reduced, and performance of the controller can be improved.
Abstract:
A method for establishing an in-band connection in an OpenFlow network and switch where the method includes receiving, from a first port, a SYN packet passing through a first path, recording the first port as a first transmit port between a target controller and a source switch, according to the SYN packet passing through the first path, in an in-band connection list, and forwarding the SYN packet passing through the first path, receiving a SYN response packet from a second port, determining the first transmit port between the target controller and the source switch, and forwarding the SYN response packet from the first transmit port between the target controller and the source switch which enable controllers and switches provided by more manufacturers are compatible.
Abstract:
An action recognition method based on a surface electromyography signal includes obtaining surface electromyography signals of multiple channels, determining a valid surface electromyography signal according to the surface electromyography signals of the multiple channels, determining a frequency of the valid surface electromyography signal, and determining, according to the frequency of the valid surface electromyography signal, a body action corresponding to the surface electromyography signals of the multiple channels. A frequency of a surface electromyography signal is irrelevant to a feature such as signal strength, therefore, the method can significantly improve accuracy of action recognition based on a surface electromyography signal. Moreover, with a frequency being used as a recognition feature, a user does not need to conduct an action with a large range, which brings better user experience.
Abstract:
A preset flow table matching policy in a switching device is set, a flow table for processing data by a switching device that the data needs to pass through during forwarding and an action that needs to be executed in the flow table are generated according to the matching policy and capability information of the switching device, and the flow table is sent to the switching device that the data needs to pass through during forwarding such that the control device may generate, according to different flow table information of the switching device and with reference to different data forwarding policies, a corresponding flow table to be executed by the switching device, which manages switching devices of different types, and enables a switching device that has multiple flow tables to flexibly implement a data forwarding function in use of a preset policy.
Abstract:
A method for establishing an in-band connection in an OpenFlow network and switch where the method includes receiving, from a first port, a SYN packet passing through a first path, recording the first port as a first transmit port between a target controller and a source switch, according to the SYN packet passing through the first path, in an in-band connection list, and forwarding the SYN packet passing through the first path, receiving a SYN response packet from a second port, determining the first transmit port between the target controller and the source switch, and forwarding the SYN response packet from the first transmit port between the target controller and the source switch which enable controllers and switches provided by more manufacturers are compatible.
Abstract:
A malicious attack detection method includes receiving, by a controller, a packet-in message sent by a switch, sending, by the controller, an abnormal flow entry to the switch, receiving, by the controller, a triggering count sent by the switch, where the triggering count is a quantity of times that the abnormal flow entry is triggered, and determining, according to the triggering count, whether a malicious attack is initiated.
Abstract:
A load balancing implementation method, device, and system, where the method includes determining, by a switch according to a meter entry of each output port, a write value corresponding to a real-time flow rate of each output port when a flow entry used to forward traffic does not exist, sending the write value to a controller such that the controller creates a forwarding flow entry used to forward the traffic according to the write value, receiving, by the switch, the forwarding flow entry, and forwarding the traffic through the target output port. Therefore, the controller can obtain a rate range of a real-time flow rate of an output port of the switch and allocate a forwarding path according to the obtained rate range of the real-time flow rate, and implement a better load balancing.