期刊文献+
共找到466篇文章
< 1 2 24 >
每页显示 20 50 100
A Virtual Router Cluster System Based on the Separation of the Control Plane and the Data Plane
1
作者 Kentaro Ogawa 《信息通信技术》 2012年第2期48-53,共6页
This paper proposes a virtual router cluster system based on the separation of the control plane and the data plane from multiple perspectives,such as architecture,key technologies,scenarios and standardization.To som... This paper proposes a virtual router cluster system based on the separation of the control plane and the data plane from multiple perspectives,such as architecture,key technologies,scenarios and standardization.To some extent,the virtual cluster simplifies network topology and management,achieves automatic conFig.uration and saves the IP address.It is a kind of low-cost expansion method of aggregation equipment port density. 展开更多
关键词 摘要 编辑部 编辑工作 读者
在线阅读 下载PDF
HSDBA:a hierarchical and scalable dynamic bandwidth allocation for programmable data planes
2
作者 Dengyu RAN Xiao CHEN Lei SONG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2024年第10期1337-1352,共16页
Dynamic bandwidth allocation(DBA)is a fundamental challenge in the realm of networking.The rapid,accurate,and fair allocation of bandwidth is crucial for network service providers to fulfill service-level agreements,a... Dynamic bandwidth allocation(DBA)is a fundamental challenge in the realm of networking.The rapid,accurate,and fair allocation of bandwidth is crucial for network service providers to fulfill service-level agreements,alleviate link congestion,and devise strategies to counter network attacks.However,existing bandwidth allocation algorithms operate mainly on the control plane of the software-defined networking paradigm,which can lead to considerable probing overhead and convergence latency.Moreover,contemporary network architectures necessitate a hierarchical bandwidth allocation system that addresses latency requirements.We introduce a finegrained,hierarchical,and scalable DBA algorithm,i.e.,the HSDBA algorithm,implemented on the programmable data plane.This algorithm reduces network overhead and latency between the data plane and the controller,and it is proficient in dynamically adding and removing network configurations.We investigate the practicality of HSDBA using protocol-oblivious forwarding switches.Experimental results show that HSDBA achieves fair bandwidth allocation and isolation guarantee within approximately 25 packets.It boasts a convergence speed 0.5times higher than that of the most recent algorithm,namely,approximate hierarchical allocation of bandwidth(AHAB);meanwhile,it maintains a bandwidth enforcement accuracy of 98.1%. 展开更多
关键词 Dynamic bandwidth allocation Software-defined networking Programmable data plane Protocol-oblivious forwarding switch(POFSwitch)
原文传递
Plane wave fitting of the internal tidal sea-surface height signatures extracted from the TOPEX/Poseidon altimeter data along satellite tracks
3
作者 CHEN Haibo LV Xianqing WANG Bin 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2012年第4期31-45,共15页
The sea-surface height (SSH) signatures of internal tides extracted from the TOPEX/Poseidon (T/P) altimeter data along satellite tracks are fitted with superposition of several plane waves which have different wav... The sea-surface height (SSH) signatures of internal tides extracted from the TOPEX/Poseidon (T/P) altimeter data along satellite tracks are fitted with superposition of several plane waves which have different wavenumber vectors. The key problem of plane wave fitting with iterative method is how to determine the initial value of wavenumber of each plane wave. The previous solving method is to analyze the internal tidal SSH signatures along each track with wavenumber spectrum. But it is found that the problem cannot be solved completely with the wavenumber spectrum analysis method only. The method based on the combination of wavenumber spectrum analysis method and the exhaustive method is proposed to determine the initial values of wavenumbers for iteration. Numerical results indicate that the proposed method is not only reasonable and feasible but also better than the previous method. The proposed method is an improvement of the previous one, which is beneficial to improving the precision of plane wave fitting of the T/P internal tidal SSH signatures and deepening the understanding of the internal tides in ocean. 展开更多
关键词 plane wave fitting internal tides TOPEX/Poseidon altimeter data
在线阅读 下载PDF
P4LoF: Scheduling Loop-Free Multi-Flow Updates in Programmable Networks
4
作者 Jiqiang Xia Qi Zhan +2 位作者 Le Tian Yuxiang Hu Jianhua Peng 《Computers, Materials & Continua》 2026年第1期1236-1254,共19页
The rapid growth of distributed data-centric applications and AI workloads increases demand for low-latency,high-throughput communication,necessitating frequent and flexible updates to network routing configurations.H... The rapid growth of distributed data-centric applications and AI workloads increases demand for low-latency,high-throughput communication,necessitating frequent and flexible updates to network routing configurations.However,maintaining consistent forwarding states during these updates is challenging,particularly when rerouting multiple flows simultaneously.Existing approaches pay little attention to multi-flow update,where improper update sequences across data plane nodes may construct deadlock dependencies.Moreover,these methods typically involve excessive control-data plane interactions,incurring significant resource overhead and performance degradation.This paper presents P4LoF,an efficient loop-free update approach that enables the controller to reroute multiple flows through minimal interactions.P4LoF first utilizes a greedy-based algorithm to generate the shortest update dependency chain for the single-flow update.These chains are then dynamically merged into a dependency graph and resolved as a Shortest Common Super-sequence(SCS)problem to produce the update sequence of multi-flow update.To address deadlock dependencies in multi-flow updates,P4LoF builds a deadlock-fix forwarding model that leverages the flexible packet processing capabilities of the programmable data plane.Experimental results show that P4LoF reduces control-data plane interactions by at least 32.6%with modest overhead,while effectively guaranteeing loop-free consistency. 展开更多
关键词 Network management update consistency programmable data plane P4
在线阅读 下载PDF
Iteratively Weighted Least Square Inversion of 3D Seismic Data Regularization under Constraints of Local Plane Wave Model
5
作者 Liu Yujin Li Zhenchun 《石油地球物理勘探》 EI CSCD 北大核心 2012年第A02期41-47,共7页
关键词 石油 地球物理勘探 地质调查 油气资源
在线阅读 下载PDF
DPZTN:Data-Plane-Based Access Control Zero-Trust Network
6
作者 Jingfu Yan Huachun Zhou Weilin Wang 《Computer Systems Science & Engineering》 2025年第1期499-531,共33页
The 6G network architecture introduces the paradigm of Trust+Security,representing a shift in network protection strategies from external defense mechanisms to endogenous security enforcement.While ZTNs(zerotrust netw... The 6G network architecture introduces the paradigm of Trust+Security,representing a shift in network protection strategies from external defense mechanisms to endogenous security enforcement.While ZTNs(zerotrust networks)have demonstrated significant advancements in constructing trust-centric frameworks,most existing ZTN implementations lack comprehensive integration of security deployment and traffic monitoring capabilities.Furthermore,current ZTN designs generally do not facilitate dynamic assessment of user reputation.To address these limitations,this study proposes a DPZTN(Data-plane-based Zero Trust Network).DPZTN framework extends traditional ZTN models by incorporating security mechanisms directly into the data plane.Additionally,blockchain infrastructure is used to enable decentralized identity authentication and distributed access control.A pivotal element within the proposed framework is ZTNE(Zero-Trust Network Element),which executes access control policies and performs real-time user traffic inspection.To enable dynamic and fine-grained evaluation of user trustworthiness,this study introduces BBEA(Bayesian-based Behavior Evaluation Algorithm).BBEA provides a framework for continuous user behavior analysis,supporting adaptive privilege management and behavior-informed access control.Experimental results demonstrate that ZTNE combined with BBEA,can effectively respond to both individual and mixed attack types by promptly adjusting user behavior scores and dynamically modifying access privileges based on initial privilege levels.Under conditions supporting up to 10,000 concurrent users,the control system maintains approximately 65%CPU usage and less than 60%memory usage,with average user authentication latency around 1 s and access control latency close to 1 s. 展开更多
关键词 Zero trust network data plane bayesian-based behavior evaluation blockchain-based access control security functions
在线阅读 下载PDF
基于Point-to-Plane ICP的点云与影像数据自动配准 被引量:4
7
作者 张星 张双星 《计算机与数字工程》 2017年第12期2510-2514,2546,共6页
针对三维激光点云与二维影像数据的融合问题,采用了一种基于Point-to-Plane ICP的配准方法;该方法仅采用一块普通的平面黑白棋盘格作为标定板,能同时完成单目相机的标定与三维激光扫描仪和相机的联合标定,进而实现三维点云数据与二维影... 针对三维激光点云与二维影像数据的融合问题,采用了一种基于Point-to-Plane ICP的配准方法;该方法仅采用一块普通的平面黑白棋盘格作为标定板,能同时完成单目相机的标定与三维激光扫描仪和相机的联合标定,进而实现三维点云数据与二维影像数据的配准;与以往基于控制点或者边缘对应的配准方法不同,该方法使用RANSAC算法自动提取场景中的标定平面,通过优化点到平面的距离来求取两组数据的变换。实验结果表明,该配准方法减少了人工的干预,并获得了很高的精度。 展开更多
关键词 三维点云 二维影像 自动配准 Point-to-planeICP
在线阅读 下载PDF
Strong Earthquake Sequences in Greece during 2008-2014: Moment Tensor Inversions and Fault Plane Discrimination
8
作者 Alexandra Moshou 《Open Journal of Earthquake Research》 2020年第4期323-348,共26页
As is well known, Greece has a significant number of earthquakes each year. Ιn recent years, several earthquakes have occurred in Greece. For this scope, a methodology was used to determine the source parameters. Thi... As is well known, Greece has a significant number of earthquakes each year. Ιn recent years, several earthquakes have occurred in Greece. For this scope, a methodology was used to determine the source parameters. This methodology is based on minimizing the difference between the observed and the synthetic waveforms, using the method Source Parameters Calculation—SPCa <a href="#ref1" target="_blank">[1]</a>. The source parameters, using the proposed methodology, are calculated by comparing observed seismograms and synthetic by inverting data. The synthetics are calculated using the reflectivity method (Kennett, 1983) as implemented by Randall et al. (1994) for a given earth structure. This study includes inversion results for the strongest events that occurred in Greece from 2008 to 2014. For the same events calculated the main fault plane, using the method of Hypocenter Centroid-plot (HC-plot) <a href="#ref2" target="_blank">[2]</a> <a href="#ref3" target="_blank">[3]</a>. This methodology is a simple geometrical method based on the combination between the hypocentral position and the two possible fault planes. 展开更多
关键词 Synthetic Seismograms Moment Tensor Inversion Focal Mechanism Regional data Nodal planes
在线阅读 下载PDF
SpaceVPX背板交换网络双冗余互连可靠性分析
9
作者 吴侃侃 周军 +3 位作者 倪涛 李林伟 张小满 汪少林 《现代电子技术》 北大核心 2025年第8期45-50,共6页
SpaceVPX标准背板控制平面、数据平面双冗余交换网络互连拓扑是实现系统高可靠数据交换的关键。根据SpaceVPX插槽、背板配置规范及可靠性模型分类,建立了一种交换网络可靠性模型,分析了整机双冗余独立备份、交换机互连备份、功能节点交... SpaceVPX标准背板控制平面、数据平面双冗余交换网络互连拓扑是实现系统高可靠数据交换的关键。根据SpaceVPX插槽、背板配置规范及可靠性模型分类,建立了一种交换网络可靠性模型,分析了整机双冗余独立备份、交换机互连备份、功能节点交叉备份、功能节点交叉与交换机互连备份、全连接备份五种拓扑形式的系统可靠性概率。不同拓扑形式的可靠性概率仿真分析结果表明,功能节点交叉备份连接方式适用于控制平面和数据平面双冗余系统。 展开更多
关键词 SpaceVPX 交换网络可靠性模型 控制平面交换 数据平面交换 冗余备份 网络拓扑结构 可靠性概率
在线阅读 下载PDF
基于LMedS的WTLSD拟合平面算法研究
10
作者 任永强 臧昌禹 胡长路 《组合机床与自动化加工技术》 北大核心 2025年第4期83-86,共4页
针对实际点云数据中存在的噪点与缺陷对拟合平面时带来的影响,提出一种基于最小平方中值算法(least median of squares,LMedS)与距离加权总体最小二乘法(weighted total least squares based on distance,WTLSD)相结合的平面拟合算法。... 针对实际点云数据中存在的噪点与缺陷对拟合平面时带来的影响,提出一种基于最小平方中值算法(least median of squares,LMedS)与距离加权总体最小二乘法(weighted total least squares based on distance,WTLSD)相结合的平面拟合算法。通过最小平方中值算法初步去除点云中的噪点,并基于距离构建初始权重矩阵,利用距离加权总体最小二乘法对点云进行平面拟合,减少平面中凸起与凹陷等缺陷对平面拟合的影响,该算法与传统平面拟合算法相比具备消除异常点与平面缺陷的优点,具备更高的拟合精度;与随机采样一致性算法(random sample consensus,RANSAC)相比具有更高的拟合效率与相近的拟合精度。 展开更多
关键词 点云数据 噪点 平面拟合 最小平方中值算法(LMedS) 距离加权总体最小二乘法(WTLSD)
在线阅读 下载PDF
MSDP:A Secure and Adaptive SDP Framework
11
作者 Zhang Zheng Ren Quan +2 位作者 Chen Hongchang Lu Jie Hu Yuxiang 《China Communications》 2025年第8期183-205,共23页
Software-Defined Perimeter(SDP)provides a logical perimeter to restrict access to services.However,due to the security vulnerability of a single controller and the programmability lack of a gateway,existing SDP is fac... Software-Defined Perimeter(SDP)provides a logical perimeter to restrict access to services.However,due to the security vulnerability of a single controller and the programmability lack of a gateway,existing SDP is facing challenges.To solve the above problems,we propose a flexible and secure SDP mechanism named Mimic SDP(MSDP).MSDP consists of endogenous secure controllers and a dynamic gateway.The controllers avoid single point failure by heterogeneity and redundancy.And the dynamic gateway realizes flexible forwarding in programmable data plane by changing the processing of packet construction and deconstruction,thereby confusing the potential adversary.Besides,we propose a Markov model to evaluate the security of our SDP framework.We implement a prototype of MSDP and evaluate it in terms of functionality,performance,and scalability in different groups of systems and languages.Evaluation results demonstrate that MSDP can provide a secure connection of 93.38%with a cost of 6.34%under reasonable configuration. 展开更多
关键词 endogenous security evaluation programmable data plane SDP
在线阅读 下载PDF
HPMG: A High-Performance MTD Gateway Framework
12
作者 He Weizhen Chen Fucai +3 位作者 Cheng Guozhen Zhou Dacheng Shang Ke Yang Chunfang 《China Communications》 2025年第10期223-237,共15页
End-host address mutation is one of the key network moving target defense mechanisms to defend against reconnaissance.However,frequently changing host addresses increases the transmission de-lay of active sessions,whi... End-host address mutation is one of the key network moving target defense mechanisms to defend against reconnaissance.However,frequently changing host addresses increases the transmission de-lay of active sessions,which may cause serious ram-ifications.In this paper,by leveraging the advanced DPDK technology,we proposed a high-performance MTD gateway framework,called HPMG,which can not only prevent adversaries from reconnaissance ef-fectively,but also retain high-speed data packet pro-cessing capabilities.Firstly,every moving target host is assigned three different IP addresses,called real IP,virtual IP,and external IP,to realize multi-level net-work address architecture.To delay the scanning tech-niques of adversaries,HPMG mutates virtual IP and virtual MAC addresses,and replies with fake host re-sponses.Besides,to be transparent to the end-hosts,HPMG keeps real IP and real MAC unchanged.Fi-nally,we optimized the forwarding and processing performance of the HPMG based on the fast path framework of DPDK.Our theoretical analysis,imple-mentation,and evaluation show that HPMG can effec-tively defend against reconnaissance attacks and de-crease the processing delay caused by address muta-tion. 展开更多
关键词 cyber scanning data plane development kit IP hopping moving target defense network ad-dress mutation
在线阅读 下载PDF
基于地质不连续的高速铁路智能勘察关键理论与实施路径
13
作者 赵晓彦 龙睿馨 +2 位作者 陈明浩 张光明 张晓宇 《铁路技术创新》 2025年第3期21-29,共9页
地质不连续是地质灾害和工程病害孕育及发生的本质原因,直接影响铁路长期安全运营。为实现高速铁路广域高效地质灾害识别与智能勘察,提出地质不连续的概念,构建地质不连续的级别划分体系,总结减灾驱动的高速铁路选线理念;提出基于“模... 地质不连续是地质灾害和工程病害孕育及发生的本质原因,直接影响铁路长期安全运营。为实现高速铁路广域高效地质灾害识别与智能勘察,提出地质不连续的概念,构建地质不连续的级别划分体系,总结减灾驱动的高速铁路选线理念;提出基于“模数驱动、轴面协同”理论的智能勘察目标、程序、方法技术体系和实施路径;阐述适应长大铁路干线的广域高效勘察技术。基于地质不连续、模数驱动、轴面协同理念与天空地综合勘察关键技术,系统构建高速铁路智能勘察体系。理论成果为高速铁路工程地质勘察的智能化发展提供参考,是中国高速铁路建设创新发展的一部分。 展开更多
关键词 高速铁路 智能勘察 地质不连续 模数驱动 轴面协同
在线阅读 下载PDF
多模态网络环境下网络模态共存与优化部署方法 被引量:1
14
作者 凃化清 廖君虎 +4 位作者 朱俊 邹涛 李传煌 张汝云 邬江兴 《电子学报》 北大核心 2025年第5期1650-1660,共11页
为解决多模态网络数据平面资源分配和业务流量用网需求的适配问题,文章提出了一种多模态网络环境下网络模态共存与优化部署方法.该方法充分考虑多模态网元资源约束、链路资源约束、流量转发延迟等关键约束以保障用户服务质量,并通过联... 为解决多模态网络数据平面资源分配和业务流量用网需求的适配问题,文章提出了一种多模态网络环境下网络模态共存与优化部署方法.该方法充分考虑多模态网元资源约束、链路资源约束、流量转发延迟等关键约束以保障用户服务质量,并通过联合路由优化的方法确保每种网络模态的连通性.由于直接建模后的网络模态部署问题是非凸问题,难以直接求解,因此文章将原问题等价转换为0-1整数线性规划问题,并在此基础上设计基于随机舍入的网络模态部署与路由选择算法.理论分析表明,该算法具有Ο(logn)的近似比性能,其中n是网络中多模态网元的数量.仿真实验结果表明,所提方案可实现网络模态在数据平面的高效部署.在满足网络资源、流量转发延迟约束的前提下,通过3~6种不同数量网络模态分别在8000条流的情况下进行实验,结果表明,所提算法相较于对比算法可有效降低13%~22%的链路负载. 展开更多
关键词 多模态网络 网络模态部署 可编程数据平面
在线阅读 下载PDF
可编程数据平面下基于决策树的DDoS攻击检测 被引量:1
15
作者 刘清河 顾瑞春 白坚镜 《计算机应用与软件》 北大核心 2025年第7期358-365,382,共9页
在SDN环境下针对DDoS攻击的检测需要数据平面和控制平面之间频繁的交互,使其很难在准确性、资源利用率和响应延迟之间达到令人满意的平衡。为此,提出一种通过P4实现的DDoS攻击检测方案,该方案在可编程数据平面上利用决策树分类算法通过... 在SDN环境下针对DDoS攻击的检测需要数据平面和控制平面之间频繁的交互,使其很难在准确性、资源利用率和响应延迟之间达到令人满意的平衡。为此,提出一种通过P4实现的DDoS攻击检测方案,该方案在可编程数据平面上利用决策树分类算法通过源IP地址熵等特征对网络流进行攻击检测。使用InSDN数据集对提出的检测方案进行了实验评估,结果表明,该方案相较于软件定义网络中其他DDoS攻击检测方法的资源利用率明显下降,精确率、准确率和召回率均有大幅提升。 展开更多
关键词 软件定义网络 可编程数据平面 P4 决策树 分布式拒绝服务攻击
在线阅读 下载PDF
中厚板平面形状控制研究发展现状及展望
16
作者 李旭 董梓硕 +3 位作者 丁敬国 曹善鸿 曹剑钊 张殿华 《轧钢》 北大核心 2025年第5期15-29,51,共16页
中厚板在轧制过程中易出现多种平面形状缺陷,严重影响板材质量与成材率,进而制约产品性能与产线运行效率。作为保障成品外形质量的关键技术环节,平面形状控制长期以来受到轧钢领域的广泛关注。本文系统梳理了中厚板平面形状控制技术的... 中厚板在轧制过程中易出现多种平面形状缺陷,严重影响板材质量与成材率,进而制约产品性能与产线运行效率。作为保障成品外形质量的关键技术环节,平面形状控制长期以来受到轧钢领域的广泛关注。本文系统梳理了中厚板平面形状控制技术的发展脉络,涵盖了从基础理论、实验研究到工程应用的演进过程,并进行了简要阐述、对比和评论。在此基础上,进一步总结了近年来智能化装备与数据驱动控制技术在该领域的研究进展,并结合当前钢铁工业的智能化发展趋势,对平面形状控制的未来研究方向进行了探讨,旨在为技术优化与升级提供理论支持与思路借鉴。 展开更多
关键词 中厚板 平面形状控制 端部缺陷 镰刀弯 数据驱动
原文传递
基于仿生免疫的可编程数据平面入侵检测方法
17
作者 孙南 秦中元 +1 位作者 胡爱群 李涛 《信息网络安全》 北大核心 2025年第8期1263-1275,共13页
针对传统入侵检测系统易导致系统性能瓶颈的突出问题,受高等生物免疫系统的启发,文章突破传统入侵检测系统外壳式防御的架构基础,设计了一种适用于可编程数据平面的仿生免疫入侵检测方法。该方法利用仿生固有免疫系统进行流量过滤,初步... 针对传统入侵检测系统易导致系统性能瓶颈的突出问题,受高等生物免疫系统的启发,文章突破传统入侵检测系统外壳式防御的架构基础,设计了一种适用于可编程数据平面的仿生免疫入侵检测方法。该方法利用仿生固有免疫系统进行流量过滤,初步拦截部分入侵流量,对于仍然存疑的流量则启动仿生适应性免疫系统进行深度特征采集、识别与处理,实现了对入侵流量的高效检测。实验结果表明,该方法能够实现较高的检测准确率和较低的控制器负载。 展开更多
关键词 仿生免疫 可编程数据平面 入侵检测 P4语言
在线阅读 下载PDF
基于可编程数据平面的网络防御技术研究综述
18
作者 胡宇翔 潘璠 +6 位作者 崔鹏帅 田乐 常德显 崔子熙 夏计强 占奇 邬江兴 《计算机学报》 北大核心 2025年第8期1943-1975,共33页
可编程数据平面(Programmable Data Plane,PDP)允许用户自定义网络设备的数据包处理方式,支持定制化网络操作,利用PDP的特性实施网络防御,在实时性、灵活性、扩展性等方面取得了良好效果,近年来受到学术界和工业界的广泛关注。本文以基... 可编程数据平面(Programmable Data Plane,PDP)允许用户自定义网络设备的数据包处理方式,支持定制化网络操作,利用PDP的特性实施网络防御,在实时性、灵活性、扩展性等方面取得了良好效果,近年来受到学术界和工业界的广泛关注。本文以基于PDP的网络防御技术为主要研究内容,首先介绍了PDP的基本概念,并结合典型案例阐述其应用于网络防御的优势;随后根据实施网络防御的阶段,将基于PDP的网络防御技术分为防护技术、检测技术、响应技术3大类,对各类方案的现有研究进行深入分析、概括总结,归纳不同方法的优缺点;最后,本文对基于PDP的网络防御技术未来的研究方向进行展望。 展开更多
关键词 可编程数据平面 网络防御 防护技术 检测技术 响应技术
在线阅读 下载PDF
可编程数据平面DDoS检测与防御机制
19
作者 武文浩 张磊磊 +3 位作者 潘恒 李恩晗 周建二 李振宇 《软件学报》 北大核心 2025年第8期3831-3857,共27页
传统的分布式拒绝服务攻击(DDoS)检测与防御机制需要对网络流量进行镜像、采集以及远程集中式的攻击特征分析,这直接造成额外的性能开销,无法满足高性能网络的实时安全防护需求.随着可编程交换机等新型网络设备的发展,可编程数据平面能... 传统的分布式拒绝服务攻击(DDoS)检测与防御机制需要对网络流量进行镜像、采集以及远程集中式的攻击特征分析,这直接造成额外的性能开销,无法满足高性能网络的实时安全防护需求.随着可编程交换机等新型网络设备的发展,可编程数据平面能力得到增强,为直接在数据面进行高性能的DDoS攻击检测提供了实现基础.然而,当前已有的基于可编程数据面的DDoS攻击检测方法准确率低,同时受限于编程约束,难以在可编程交换机(如Intel Tofino)中进行直接部署.针对上述问题,提出了一种基于可编程交换机的DDoS攻击检测与防御机制.首先,使用基于源目地址熵值差的攻击检测机制判断DDoS攻击是否发生.在DDoS攻击发生时,设计了一种基于源目地址计数值差的攻击流量过滤机制,实现对DDoS攻击的实时防御.实验结果表明,该机制能够有效地检测并防御多种DDoS攻击.相较于现有工作,该机制在观察窗口级攻击检测中的准确率平均提升了17.75%,在数据包级攻击流量过滤中的准确率平均提升了3.7%. 展开更多
关键词 分布式拒绝服务攻击 可编程数据平面 异常检测 P4 网络安全
在线阅读 下载PDF
P4SinoCrypt:基于可编程数据平面的国密数据加密系统
20
作者 陈凯 张伟 《北京信息科技大学学报(自然科学版)》 2025年第2期58-65,共8页
针对现有终端信源加密方式以及专用加密网关方式存在的终端资源消耗大、加密网关部署不灵活等问题,设计了一套基于可编程数据平面的国密数据加密系统P4SinoCrypt,其核心是操作查找表(operation lookup table,OLT)。系统提前处理加密算... 针对现有终端信源加密方式以及专用加密网关方式存在的终端资源消耗大、加密网关部署不灵活等问题,设计了一套基于可编程数据平面的国密数据加密系统P4SinoCrypt,其核心是操作查找表(operation lookup table,OLT)。系统提前处理加密算法的密钥,将其制作成表放在可编程交换机中的匹配动作表(match-action table,MAT)中,当加密时通过该表进行直接查找,从而简化加密运算过程。在虚拟可编程软件交换机bmv2(behavioral model version2)及通用服务器上进行了实验。实验结果表明,在bmv2中,通过OLT技术优化后,SM4性能较服务器中提升明显,与高级加密标准(advanced encryption standard,AES)算法的差距大幅缩小,且P4SinoCrypt仅占用不到12%的可编程交换机内存。 展开更多
关键词 网络安全 数据加密 可编程数据平面 可编程交换机 SM4算法
在线阅读 下载PDF
上一页 1 2 24 下一页 到第
使用帮助 返回顶部