Author
Listed:
- Yichuan Wang
(School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China
Shaanxi Key Laboratory for Network Computing and Security Technology, Xi’an 710048, China)
- Junxia Ding
(School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China)
- Tong Zhang
(School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China)
- Yeqiu Xiao
(School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China)
- Xinhong Hei
(School of Computer Science and Engineering, Xi’an University of Technology, Xi’an 710048, China
Shaanxi Key Laboratory for Network Computing and Security Technology, Xi’an 710048, China)
Abstract
In recent years, various network attacks have emerged. These attacks are often recorded in the form of Pcap data, which contains many attack details and characteristics that cannot be analyzed through traditional methods alone. Therefore, restoring the network attack scenario through scene reconstruction to achieve data regeneration has become an important entry point for detecting and defending against network attacks. However, current network attack scenarios mainly reproduce the attacker’s attack steps by building a sequence collection of attack scenarios, constructing an attack behavior diagram, or simply replaying the captured network traffic. These methods still have shortcomings in terms of traffic regeneration. To address this limitation, this paper proposes an SDN-based network attack scenario recovery method. By parsing Pcap data and utilizing network topology reconstruction, probability, and packet sequence models, network traffic data can be regenerated. The experimental results show that the proposed method is closer to the real network, with a higher similarity between the reconstructed and actual attack scenarios. Additionally, this method allows for adjusting the intensity of the network attack and the generated topology nodes, which helps network defenders better understand the attackers’ posture and analyze and formulate corresponding security strategies.
Suggested Citation
Yichuan Wang & Junxia Ding & Tong Zhang & Yeqiu Xiao & Xinhong Hei, 2023.
"From Replay to Regeneration: Recovery of UDP Flood Network Attack Scenario Based on SDN,"
Mathematics, MDPI, vol. 11(8), pages 1-22, April.
Handle:
RePEc:gam:jmathe:v:11:y:2023:i:8:p:1897-:d:1125492
Download full text from publisher
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jmathe:v:11:y:2023:i:8:p:1897-:d:1125492. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.