Welcome to Francis Academic Press

International Journal of Frontiers in Engineering Technology, 2023, 5(9); doi: 10.25236/IJFET.2023.050906.

Design and Research of Security Software Based on Traffic Analysis

Author(s)

Zhong Manlin, Yin Hang, Zhou Jianhan, Lan Tianyu

Corresponding Author:
Zhong Manlin
Affiliation(s)

Liaoning University of Science and Technology, Anshan, China

Abstract

This project provides a security defense system and method against traffic attacks. The system includes: SDN switch, forwarding the ICMP request message and ICMP response message sent by the user terminal, monitoring the ICMP request message and ICMP response message, and forming ICMP information in case of abnormality; The SDN controller connected with the SDN switch receives the ICMP information reported from the SDN switch, senses the message forwarding path corresponding to the ICMP information, judges the location and type of the attacker, and sends a flow table to the SDN switch as the entrance routing function to implement the entrance filtering strategy to defend the attacker. This project adopts SDN architecture, which can accurately determine the location and type of attack of the attacker and execute the corresponding entrance filtering strategy, so as to effectively defend against ICMP Flood attacks.

Keywords

network security; Flow analysis; Trojan horse; Viruses; Security defense

Cite This Paper

Zhong Manlin, Yin Hang, Zhou Jianhan, Lan Tianyu. Design and Research of Security Software Based on Traffic Analysis. International Journal of Frontiers in Engineering Technology (2023), Vol. 5, Issue 9: 28-33. https://doi.org/10.25236/IJFET.2023.050906.

References

[1] Li Zhiming, Flow analysis system [J]. Computer Age, 2001 (12)

[2] Li Wenlin, Liu Chunwu. Design and Implementation of 10 Gigabit Network Traffic Analysis System [J] Information and Computer (Theoretical Edition), 2016 (16)

[3] Wang Qinggang, Gu Feng, Zhang Xuemei, Yu Rundong, Zhang Yi, Wang Yufan, Security early warning system based on campus network traffic analysis [J]. Network Security Technology and Application, 2022 (07)

[4] Zhou Xiaopeng. Network security based traffic analysis technology [J]. Information and Computer (Theoretical Edition), 2019 (12)

[5] Zhang Jian. Use traffic analysis to achieve fine network management [J]. China's Science and Technology Wealth, 2008 (07)

[6] Yao Weidong, New Value of Traffic Analysis: Neusoft NetFlow Technology [J]. Computer Security, 2006 (09)

[7] Liu Qing, Bandwidth management and control strategy based on traffic analysis [J]. Western Radio and Television, 2017 (12)

[8] Zhang Jingchun, Xie Xiaoning, Ma Yonghu. Development of traffic analysis system in the era of "Internet+" (Taking Zhicheng Network as an example) [J]. China New Communications, 2018 (15).