WO2012077603A1 - コンピュータシステム、コントローラ、及びネットワーク監視方法 - Google Patents
コンピュータシステム、コントローラ、及びネットワーク監視方法 Download PDFInfo
- Publication number
- WO2012077603A1 WO2012077603A1 PCT/JP2011/077933 JP2011077933W WO2012077603A1 WO 2012077603 A1 WO2012077603 A1 WO 2012077603A1 JP 2011077933 W JP2011077933 W JP 2011077933W WO 2012077603 A1 WO2012077603 A1 WO 2012077603A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- address
- controller
- packet
- switch
- received packet
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1466—Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
- H04L12/44—Star or tree networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/64—Hybrid switching systems
- H04L12/6418—Hybrid transport
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/35—Switches specially adapted for specific applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L49/00—Packet switching elements
- H04L49/70—Virtual switches
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/102—Entity profiles
Definitions
- the present invention relates to a computer system, a controller, a monitoring method, and a network monitoring program, and more particularly to a computer system using an open flow technology and a network monitoring method for blocking an address spoofing packet.
- a MAC (Media Access Control) address is used to uniquely identify network devices (including computers and virtual machines) that constitute the network.
- the MAC address can be easily spoofed.
- Gratuitous ARP Address Resolution Protocol
- IP Internet Protocol
- Non-Patent Document 1 gratuitous ARP is an ARP request packet in which its IP (Internet Protocol) address is set as a target IP address, and has two effects. One is an effect of checking whether other than oneself uses the same IP address.
- the switch configuring the layer 2 network follows the movement of the computer or virtual computer by updating its own ARP table or MAC table with reference to the source MAC address of the Gratuitous ARP packet. And the packet transfer path can be changed.
- the ARP table or the MAC table of the switch constituting the layer 2 network can be rewritten. This can easily disrupt TCP / IP communications of legitimate users.
- packets to be delivered to legitimate users can be intercepted because they are sent to an unauthorized person.
- Japanese Patent Application Laid-Open No. 2005-210451 discloses a technique for monitoring and preventing such unauthorized access and interference using an ARP packet (see Patent Document 1).
- the system described in Patent Document 1 includes a monitoring host that monitors an ARP request packet, and a database in which IP addresses and physical addresses of legitimate hosts in the network are registered in advance.
- the monitoring host detects an ARP request packet of an IP address or physical address not registered in the database, it sends an ARP request packet to the request destination node of the ARP packet using itself as the request source and sends the ARP table of that node. Update.
- a reply packet for unauthorized access is transferred to the monitoring server rather than an unauthorized third party.
- a computer system includes an open flow controller 100 (hereinafter referred to as an OFC 100), a plurality of open switches 102-1 to 102-n (hereinafter referred to as OFS 102-1 to 102-n). And a host group 300 having a plurality of host computers 103-1 to 103-i (hereinafter referred to as hosts 103-1 to 103-i).
- an OFC 100 an open flow controller 100
- OFS 102-1 to 102-n hereinafter referred to as OFS 102-1 to 102-n
- a host group 300 having a plurality of host computers 103-1 to 103-i (hereinafter referred to as hosts 103-1 to 103-i).
- hosts 103-1 to 103-i are two or more natural numbers.
- the OFS 102-1 to 102-n will be collectively referred to as the OFS 102 if they are collectively referred to without distinction, and will be referred to as the host 103 if the hosts 103-1 to 103-i are collectively referred to differently.
- the OFC 100 performs setting of a communication path between the hosts 103 and setting of a transfer operation (relaying operation) to the OFS 102 on the path.
- the OFC 100 sets, in the flow table held by the OFS 102, a flow entry in which a rule specifying a flow (packet data) is associated with an action defining an operation on the flow.
- the OFS 102 on the communication path determines the transfer destination of the received packet data according to the flow entry set by the OFC 100, and performs transfer processing.
- the host 103 can transmit and receive packet data to and from another host 103 using the communication path set by the OFC 100. That is, in the computer system using the open flow, since the OFC 100 for setting the communication path and the OFS 102 for performing the transfer process are separated, it is possible to control and manage the communication of the entire system in a unified manner.
- OFS 102-1 when transmitting a packet from host 103-1 to host 103-i, OFS 102-1 transmits destination information (header information: for example, destination MAC address or the like) in the packet received from host 103-1.
- the destination IP address is referred to, and an entry matching the header information is searched from the flow table held in the OFS 102-1.
- the contents of the entry set in the flow table are defined, for example, in Non-Patent Document 2.
- the OFS 102-1 transfers the packet data (hereinafter referred to as a first packet) or header information of the first packet to the OFC 100 when the entry for the received packet data is not described in the flow table.
- the OFC 100 having received the first packet from the OFS 102-1 determines the path 400 based on the information of the source host and the destination host included in the packet.
- the OFC 100 instructs all the OFS 102 on the path 400 to set a flow entry that defines the transfer destination of the packet (issues a flow table update instruction).
- the OFS 102 on the path 400 updates the flow table managed by itself according to the flow table update instruction. Thereafter, the OFS 102 starts packet transfer in accordance with the updated flow table, whereby the packet reaches the destination host 103-i via the route 400 determined by the OFC 100.
- Patent document 1 JP-A-2005-210451
- Another object according to the present invention is to block communication interference to a network in an open flow protocol environment.
- Another object according to the present invention is to improve the security strength against unauthorized access and interference using a false address.
- a computer system comprises a controller, a switch for performing a relay operation defined by the flow entry for a received packet conforming to the flow entry set by the controller, and a host terminal connected to the switch.
- the switch notifies the controller of the source address information of the received packet which does not conform to the flow entry set in the switch.
- the controller determines that the source address of the received packet is spoofed when the address information of the valid host terminal and the source address information do not match.
- the controller comprises a flow control unit and an address misrepresentation detection unit.
- the flow control unit sets a flow entry in the switch.
- the switch performs the relay operation defined in the flow entry for the received packet conforming to the set flow entry, and notifies the flow control unit of source address information of the received packet not conforming to the flow entry set in itself.
- the address misrepresentation detection unit determines that the transmission source address of the received packet is spoofed when the transmission source address information notified to the flow control unit does not match the address information of the valid host terminal.
- the functions of the controller according to the present invention are preferably realized by a program stored in a storage device and executed by a computer.
- a network monitoring method is a network monitoring method executed in a computer system including a switch that performs a relay operation defined in the flow entry for a received packet that conforms to the flow entry set by the controller.
- the network monitoring method according to the present invention comprises the steps of: the switch notifying the controller of source address information of received packets that do not conform to the flow entry set for the controller; Determining that the source address of the received packet is spoofed if the address information does not match.
- FIG. 1 is a diagram showing an example of the configuration of a computer system using an open flow protocol.
- FIG. 2 is a diagram showing the configuration of the computer system according to the first embodiment of the present invention.
- FIG. 3 is a diagram showing an example of the structure of virtual server data used in address misrepresentation verification according to the first embodiment.
- FIG. 4 is a diagram showing an example of the structure of virtual machine data (VM data) used in address misrepresentation verification in the first and second embodiments.
- FIG. 5A is a diagram showing an example of the structure of verification information used in address misrepresentation verification according to the first embodiment.
- FIG. 5B is a diagram showing another example of the structure of verification information used in address misrepresentation verification in the first embodiment.
- FIG. 6 is a diagram showing an example of a structure of transmission source information acquired by the OpenFlow controller from the host OS in address misrepresentation verification in the first and second embodiments.
- FIG. 7 is a sequence diagram showing an example of the network monitoring operation in the first embodiment.
- FIG. 8 is a diagram showing a specific example for explaining the configuration and operation of the computer system in the first embodiment.
- FIG. 9 is a diagram showing the configuration of the computer system according to the second embodiment of the present invention.
- FIG. 10 is a diagram showing an example of the structure of virtual server data used in address misrepresentation verification according to the second embodiment.
- FIG. 11 is a sequence diagram showing an example of the network monitoring operation in the second embodiment.
- FIG. 12 is a diagram showing a specific example for explaining the configuration and operation of the computer system in the second embodiment.
- FIG. 13 is a diagram showing the configuration of the computer system according to the third embodiment of the present invention.
- FIG. 14 is a diagram showing an example of the structure of device data used in address misrepresentation verification according to the third embodiment.
- FIG. 15 is a sequence diagram showing an example of the network monitoring operation in the third embodiment.
- FIG. 16 is a diagram showing a specific example for explaining the configuration and operation of the computer system in the third embodiment.
- First embodiment (configuration of computer system) Similar to the system shown in FIG. 1, the computer system according to the present invention performs communication path construction and packet data transfer control using the open flow technology.
- presence or absence of address misrepresentation of an ARP request packet or an IP packet is determined based on the first packet transmitted from the open flow virtual switch 33 operating on the virtual server 3 to the open flow controller 2. Monitor.
- FIG. 2 is a diagram showing the configuration of the computer system according to the first embodiment of the present invention. The configuration of the computer system according to the first embodiment of the present invention will be described with reference to FIG.
- the computer system in the first embodiment includes an input device 1, an open flow controller 2 (OpenFlow controller: hereinafter referred to as OFC 2), a virtual server 3, an open flow switch (open flow switch: below) , OFS 4), and an output device 5.
- OFC 2 OpenFlow controller: hereinafter referred to as OFC 2
- OFS 4 open flow switch: below
- OFS 4 open flow switch
- the input device 1 includes a storage device in which virtual server data 11 and virtual machine data 12 (VM data 12) used for verification of access misrepresentation are recorded.
- the virtual server data 11 is data necessary for the OFC 2 to access the virtual server 3.
- FIG. 3 is a diagram showing an example of the structure of virtual server data 11 used in address misrepresentation verification according to the first embodiment.
- the virtual server data 11 is an open flow virtual switch 33 to which an IP address 111 assigned to a valid virtual server 3 permitted to be connected to the system and a physical network interface of the virtual server 3 are connected.
- the IP address 111, the DPID 112, and the login information 113 are associated with each virtual server 3 and recorded as virtual server data 11 in the input device 1.
- the DPID 112 is a number assigned to each of the OFS 4 and the open flow virtual switch 33 (hereinafter referred to as the OFVS 33) in order to uniquely identify them.
- the login information 113 also includes ID and password information for accessing (logging in) the virtual server 3.
- FIG. 4 is a diagram showing an example of the structure of VM data 12 used in address misrepresentation verification according to the first embodiment.
- the VM data 12 is information for specifying a virtual machine 31 existing on the network managed by the open flow controller 2.
- the VM data 12 includes a VM name 120 for uniquely identifying a virtual machine 31 and interface information 121 for uniquely identifying a network interface that the virtual machine 31 has.
- the VM name 120 and the interface information 121 are associated with each virtual machine 31 and recorded as VM data 12 in the input device 1.
- UUID Universal Unique Identifier
- the interface information 121 also includes the MAC address 122 and the IP address 123 assigned to the physical network interface of the virtual machine 31.
- the virtual server data 11 and the VM data 12 recorded in the input device 1 may be set or updated in advance by the user, or may be set or updated by data acquired by the OFC 2.
- the OFC 2 controls the construction of a communication path related to packet transfer in the system and the packet transfer processing by the open flow technology.
- the OFC 2 sets the multi-layer and per-flow path information in the OFS 4 and OF VS 33 on the communication path according to the routing policy (flow entry: flow + action), and performs path control and node control.
- the technology to be performed is shown (for details, refer to Non-Patent Document 1).
- the routing control function is separated from the routers and switches, and centralized control by the controller enables optimal routing and traffic management.
- the OFS 4 and OFVS 33 to which the open flow technology is applied treat the communication as a flow of END 2 END, not a packet or frame unit like a conventional router or switch.
- the OFC 2 is preferably implemented by a computer including a CPU and a storage device.
- each function of the address misrepresentation detection unit 21 and the flow control unit 22 shown in FIG. 2 is realized by the CPU (not shown) executing a program stored in the storage device.
- the address misrepresentation detection unit 21 converts each of the virtual server data 11 and the VM data 12 supplied from the input device 1 into a format that is easy to search, and makes the address misrepresentation verification database 20 as the virtual server database 23 and the VM database 24. Record.
- the flow control unit 22 sets or deletes a flow entry (rule + action) with respect to a switch (here, OFS 4 or OFVS 33) according to the open flow protocol.
- a switch here, OFS 4 or OFVS 33
- an action for example, relay or discard of packet data
- combinations of addresses and identifiers of layer 1 to layer 4 of the Open Systems Interconnection (OSI) reference model, which are included in header information in TCP / IP packet data, are defined.
- OSI Open Systems Interconnection
- a combination of a physical port of layer 1, a MAC address of layer 2, an IP address of layer 3, a port number of layer 4 and a VLAN tag (VLAN id) is set as a rule.
- the VLAN tag may be assigned a priority (VLAN Priority).
- an identifier such as a port number or the like set in the rule by the flow control unit 22 or an address may be set in a predetermined range.
- the address or the address of the transmission source be distinguished and set as a rule.
- the range of the MAC destination address, the range of the destination port number for identifying the application of the connection destination, and the range of the transmission source port number for identifying the application of the connection source are set as rules.
- an identifier specifying a data transfer protocol may be set as a rule.
- the action set in the flow entry defines, for example, a method of processing TCP / IP packet data. For example, information indicating whether or not to relay reception packet data, and in the case of relaying, the transmission destination is set. Also, as an action, information may be set to instruct copying or discarding of packet data.
- the flow control unit 22 When the flow control unit 22 receives the notification of the first packet from the OFS 4 or OF VS 33, the flow control unit 22 inquires the address spoofing detection unit 21 whether the packet can be transferred or not, and sets the flow entry or discards the first packet according to the inquiry result.
- the flow control unit 22 first acquires the verification information 6 shown in FIG. 5A or 5B from the OFS 4 or OF VS 33 by notification of the first packet (hereinafter referred to as Packet IN).
- the verification information 6 includes the source address information 60 of the first packet, the identifier of the notification source switch (for example, DPID 63), and the port name of the notification source switch (reception port number 64).
- transmission source address information 60 includes transmission source MAC address 61 and target IP address 62.
- the transmission source address information 60 includes the transmission source MAC address 61 and the transmission source IP address 65.
- the flow control unit 22 transmits the verification information 6 to the address misrepresentation detection unit 21 and inquires whether the packet can be transferred or not. As a result of the inquiry, if it is determined that packet transfer is possible, the flow control unit 22 calculates a communication path from the header information of the first packet. Then, the flow control unit 22 sets a flow entry for transferring a packet matching the header information to the communication path in the OFS 4 or OF VS 33 on the communication path. On the other hand, if it is determined in the address misrepresentation detection unit 21 that packet transfer is not possible, the first packet to be inquired is discarded. At this time, the flow control unit 22 preferably sets a flow entry for discarding a packet that matches the header information of the first packet in the switch that is the notification source of the first packet.
- the flow control unit 22 analyzes the first packet notified from the OFS 4 or OF VS 33, and inquires of the above-mentioned address misrepresentation detection unit 21 only when the packet is an ARP packet, and sends an inquiry to PacketIN other than ARP packet. You may omit the inquiry. In this case, the OFC 2 monitors only the ARP, but the number of inquiries to the address misrepresentation detection unit 21 and the load for the address misrepresentation detection process are reduced.
- the address misrepresentation detection unit 21 performs address misrepresentation verification using the verification information 6 transmitted from the flow control unit 22 and the information recorded in the verification database 20.
- the address misrepresentation detection unit 21 acquires verification information 6 from the flow control unit 22 together with an event that occurs asynchronously.
- the address misrepresentation detection unit 21 searches the VM database 24 using the received source address information 60 (combination of MAC address and IP address) as a search key, and the VM name 120 corresponding to the interface information 121 matching the search key. (UUID of virtual machine 31) is obtained (MAC address / IP address verification).
- the address misrepresentation detection unit 21 specifies the virtual machine 31 corresponding to the received source address information 60.
- the address spoofing detection unit 21 can not specify the virtual machine 31 corresponding to the received source address information 60 as a result of the search of the VM database 24, that is, the source MAC address 61 or the target IP address 62 (sender IP address 65 If there is no interface information (MAC address 122, IP address 123) that matches the combination in the VM database 24, it is determined that there is an address misrepresentation.
- the address misrepresentation detection unit 21 that is determined to have the address misrepresentation instructs the flow control unit 22 to discard without permitting transfer of the packet that matches the header information of the first packet determined to be the address misrepresentation.
- the address misrepresentation detection unit 21 searches the virtual server database 23 using the received DPID 63 of the notification source switch as a search key, and the IP address 111 and login information 113 corresponding to the DPID 112 matching the search key (for example, password information Get). Thus, the address misrepresentation detection unit 21 can specify the host OS 32 corresponding to the received DPID 63 and obtain information for accessing (logging in) the host OS 32.
- the address misrepresentation detection unit 21 accesses the host OS 32 in the virtual server 3 using the IP address 111 and the login information 113 obtained from the virtual server database 23, and matches the VM name 120 obtained from the VM database 24.
- the information on the virtual machine 31 (hereinafter referred to as transmission source information 7) is acquired.
- the address misrepresentation detection unit 21 acquires the transmission source information 7 illustrated in FIG.
- the transmission source information 7 includes a VM name 71 (for example, UUID) identifying the virtual machine 31 identified by the address misrepresentation detection unit 21 and a MAC address 72 of an interface used by the virtual machine 31. It includes a list and a list of port names 73 (port numbers) of the OFVS 33 to which the interface is connected.
- VM name 71 for example, UUID
- MAC address 72 of an interface used by the virtual machine 31. It includes a list and a list of port names 73 (port numbers) of the OFVS 33 to which the interface is connected.
- the address misrepresentation detection unit 21 verifies whether the MAC address matching the transmission source MAC address 61 received from the flow control unit 22 is in the MAC address 72 of the virtual machine 31 acquired from the virtual server 3 (MAC address verification) .
- the address misrepresentation detection unit 21 determines the transferability of the packet matching the notified first packet header information according to the result of the MAC address verification, and instructs the flow control unit 22. For example, when the MAC address that matches the transmission source MAC address 61 is not included in the transmission source information 7, the address misrepresentation detection unit 21 determines that the notified first packet is an unauthorized access whose address is spoofed.
- the address misrepresentation detection unit 21 instructs the discarding of the packet without permitting the transfer of the packet that matches the header information of the first packet.
- the address misrepresentation detection unit 21 determines that there is no address misrepresentation, and a flow entry for transferring a packet that matches header information of the notified first packet.
- the flow control unit 22 is instructed to set.
- the address misrepresentation detection unit 21 determines that the address is false and the flow control unit It instructs the discarding without permitting the transfer of the packet matching the header information of the first packet determined to be an address misrepresentation.
- the output device 5 is exemplified by a monitor or a printer, and visibly outputs information (for example, a VM name or MAC address of a misrepresented VM, or an IP address) specifying a virtual machine spoofed by a MAC address or an IP address.
- information for example, a VM name or MAC address of a misrepresented VM, or an IP address
- the output device 5 preferably outputs the port name 73 so as to be visible. This makes it possible to identify from which port of which switch an unauthorized packet spoofing an IP address or MAC address has entered.
- the virtual server 3 is a computer device (physical server) including a CPU and a RAM (not shown), and realizes at least one virtual machine 31 and OFVS 33 by executing a program stored in a storage device (not shown).
- the virtual machine 31 and the OFVS 33 are realized by, for example, a guest operation system (GOS, not shown) emulated on the host operation system 32 (host OS 32) or software operating on the GOS.
- the virtual machine 31 is managed by a virtual machine monitor (VMM) operating on the host OS 32.
- VMM virtual machine monitor
- the virtual machine 31 functions as a host terminal that communicates with another host terminal (for example, the virtual machine 31 in another virtual server 3 and a network device not shown) via the OFVS 33.
- the OFVS 33 operates according to the open flow protocol, and determines the processing method (action) of the packet received from the virtual machine 31 according to the flow entry set (updated) by the OFC 2.
- the action on the received packet is, for example, forwarding to the OFS 4 or discarding.
- the OFVS 33 is a switch that receives the packet transmitted from the virtual machine 31 first. That is, the OFVS 33 corresponds to the entrance to the system with respect to the virtual machine 31 which is the host terminal.
- the present invention is not limited to this, and in general, a plurality of virtual servers 3 are provided.
- a plurality of virtual machines 31 and OFVS 33 may be provided in the virtual server 3.
- the plurality of virtual servers 3 (between the OFVSs 33) provided in the system are connected via the OFS 4 operating according to the open flow protocol.
- the OFS 4 determines the processing method (action) of the received packet in accordance with the flow entry set (updated) by the OFC 2. As an action for the received packet, for example, there is forwarding or discarding to another OFS 4 or OFVS 33.
- the setting of the flow entry for OFVS 33 and OFS 4 is performed by the Flow-mod request from OFC 2 as described above.
- the OFVS 33 or OFS 4 receives a packet having header information that does not conform (or match) the flow entry rule set in itself, the OFVS 33 or OFS notifies the packet as a first packet to the OFC 2 (Packet IN).
- the OFVS 33 or OFS 4 transmits the port number at which the packet is received or an identifier (for example, DPID) identifying itself to the OFC 2 together with the first packet or the header information of the first packet.
- the OFVS 33 and the OFS 4 transmit the verification information 6 to the OFC 2.
- the unauthorized access spoofing of the MAC address or the IP address of the transmission source is verified in the OFC 2, and if false evidence is detected, the transfer of the packet is not permitted.
- By setting (or discarding) flow entries in the switch it is possible to prevent unauthorized access.
- FIG. 7 is a sequence diagram showing an example of the network monitoring operation in the first embodiment. Here, a network monitoring operation when packet transfer is performed from the virtual machine 31 into the system will be described.
- virtual server data 11 and VM data 12 are recorded in advance from the input device 1 in the address misrepresentation verification database 20 of the OFC 2 (steps S1 to S4).
- the virtual server data 11 given from the input device 1 is supplied to the address misrepresentation detection unit 21 and stored in the virtual server database 23 (steps S1 and S2).
- the virtual server database 23 is updated with the latest virtual server data 11.
- the VM data 12 given from the input device 1 is supplied to the address misrepresentation detection unit 21 and stored in the VM database 24 (steps S3 and S4).
- the VM database 24 is updated with the latest VM data 12.
- the virtual server database 23 and the VM database 24 can always be searched by the address misrepresentation detection unit 21. Further, the update of the virtual server database 23 and the VM database 24 may be performed during the operation of the system, and the update order is not limited to the order shown in FIG.
- the virtual machine 31 transmits a gratuitous ARP packet or an IP packet (step S5).
- the packet from the virtual machine 31 is transferred to the outside of the virtual server 3 via the OFVS 33. That is, the OFVS 33 is an entrance to the network for the packet.
- the OFVS 33 determines whether the header information of the Gratuitous ARP packet or IP packet received from the virtual port to which the virtual machine 31 is connected matches (matches) the rule of the flow entry set in itself, and matches If there is a rule, the received packet is processed (for example, transferred to the OFS 4 or discarded) according to the action corresponding to the rule (not shown). On the other hand, when the matching (matching) flow entry (inside rule) is not set in the header information of the received packet, the OFVS 33 notifies the flow control unit 22 of the OFC 2 of the received packet as a first packet (step S6). .
- the physical network interface to which the virtual machine 31 is connected is The assigned MAC address or IP address is new. For this reason, the Gratuitous ARP packet and the IP packet that are first transmitted after the virtual machine 31 is activated (moved) are determined as the first packet in the OFVS 33 and PacketIN is performed by the flow control unit 22.
- the OFVS 33 transmits the first packet or the header information of the first packet to the flow control unit 22 together with the DPID 63 of the OFVS 33 by PacketIN.
- the flow control unit 22 that has performed the Packet-IN extracts the verification information 6 from the information transmitted from the OFVS 33 together with the asynchronous event, and outputs the verification information 6 to the address fraud detection unit 21 (step S7).
- the address misrepresentation detection unit 21 extracts the transmission source address information 60 from the verification information 6 received together with the asynchronous event, and verifies the transmission source address of the first packet using the VM database 24 (step S8: MAC address ⁇ IP Address verification).
- the address misrepresentation detection unit 21 determines that the interface information 121 (MAC address 122, IP address 123) matching the transmission source address information 60 (transmission source MAC address 61, target IP address 62, or transmission source IP address 65) is , Verify whether they exist in the VM database 24 (MAC address / IP address verification).
- the address misrepresentation detection unit 21 determines that either or both of the MAC address and the IP address are misrepresented, It instructs the flow control unit 22 to discard the packet (step S13).
- the address misrepresentation detection unit 21 obtains the VM name 120 (UUID) corresponding to the interface information 121.
- the address misrepresentation detection unit 21 searches the IP address 111 and the login information 113 from the virtual server database 23 using the DPID 63 of the OFVS 33 received with the asynchronous event as a search key (step S9).
- the address misrepresentation detection unit 21 determines that either or both of the MAC address and the IP address are misrepresented, and instructs the flow control unit 22 to discard the packet. (Step S13).
- the address misrepresentation detection unit 21 uses the acquired login information 113 for the host OS 32 specified by the acquired IP address 111. log in. Subsequently, the address misrepresentation detection unit 21 acquires information of the virtual machine 31 corresponding to the VM name 120 (UUID) acquired in step S8 as transmission source information 7 (step S10). Here, when the transmission source information 7 corresponding to the specified VM name 120 is not obtained, the address misrepresentation detection unit 21 determines that either or both of the MAC address and the IP address of the first packet are misrepresented. And instructs the flow control unit 22 to discard the packet (step S13).
- the address misrepresentation detection unit 21 first searches the transmission source information 7 for the MAC address that matches the transmission source MAC address 61 of the first packet. (Step S11: MAC address verification).
- Step S11 MAC address verification
- the address misrepresentation detection unit 21 determines that the MAC address of the first packet is misrepresented, and the flow control unit 22 It instructs to discard the packet (step S13).
- the address misrepresentation detection unit 21 determines that the port name 73 associated with the MAC address 72 is It is verified whether it matches the reception port number 64 of the first packet (step S12: reception port verification).
- the address misrepresentation detection unit 21 selects either the MAC address or IP address of the first packet, or It is determined that both are misrepresented, and the flow control unit 22 is instructed to discard the packet (step S13).
- the address misrepresentation detection unit 21 determines that there is no address misrepresentation regarding the first packet, and the flow control unit 22 instructs the setting of a flow entry for transferring the packet (step S13).
- step S13 the flow control unit 22 instructed to discard the packet discards the first packet subjected to the PacketIN, and uses a part or all of the header information of the packet as a rule and a flow entry in which the packet discard is an action.
- the OFVS 33 is set (step S14). For example, the flow control unit 22 sets a flow entry having an action of discarding a received packet matching the rule as a rule of the notification source of the first packet, with the reception port number of the first packet and the transmission source MAC address as a rule. Do.
- the OFVS 33 receives a packet determined to be spoofed in the OFC 2 thereafter, it is discarded without notifying the OFC 2 and it is possible to block the intrusion of illegal packets into the network at the entrance of the network. Become.
- step S13 the flow control unit 22 instructed to transfer the packet sets, as a rule, part or all of the header information of the packet-in-first packet as a rule, and transfers the packet as an action.
- the switch (OFVS 33 or OFS 4) on the communication path is set (step S14).
- the address forgery detection unit 21 determined to be an address forgery in steps S8, S9, S10, and S11 outputs, to the output device 5, the transmission source address information 60 received from the flow control unit 22 together with the asynchronous event in step S7. (Step S15).
- the output device 5 visibly outputs the transmission source address information 60 (the transmission source MAC address 61 and the target IP address 62 or the transmission source IP address 65) as a fraudulent address.
- the address misrepresentation detection unit 21 may output the reception port number 64 to the output device 5 when determining that the address misrepresentation is made. In this case, the output device 5 outputs the reception port number 64 in a visible manner.
- FIG. 8 is a diagram showing a specific example for explaining the configuration and operation of the computer system in the first embodiment.
- IP address 111 "192.168.10.10”
- DPID 112 "vSwitchA (DPID 01)", "vSwitchB (DPID 02)" as virtual server data 11.
- Login information 113 “ Password-1 ”is registered.
- VM names 120 “VM-B (UUID-B)”
- interface information 121 “IF-c: MAC-c, IP-c” are registered as VM data 12. .
- the virtual server 3 includes two virtual machines 31: “VM-A” and “VM-B” and two OFVSs 33: “vSwitchA” and “vSwitchB”.
- the virtual machine 31 "VM-A” has two interfaces "IF-a” and "IF-b", and the virtual machine 31 "VM-B” has one interface "IF-c”.
- the OFVS 33 “vSwitch A” is connected to the port “Port-A”
- the OFVS 33 “vSwitch B” is connected to two ports “Port-B” and “Port-C”.
- the flow control unit 22 notifies the address misrepresentation detection unit 21 of the verification information 6 together with the asynchronous event according to PacketIN.
- the verification information 6 the source MAC address 61: “MAC-c”, the target IP address 62: “IP-c”, the DPID 63: “DPID 02”, the receiving port number 64: “Port-C” are notified. Be done.
- the address misrepresentation detection unit 21 performs MAC address / IP address verification using the notified source MAC address 61 “MAC-c” and the target IP address 62 “IP-c”. Since the VM database 24 includes the source MAC address 61 “MAC-c” and the interface information 121 “MAC-c” and “IP-c” that match the target IP address 62 “IP-c”, the MAC In address / IP address verification, it is determined that there is no fraudulent address. Also, the address misrepresentation detection unit 21 extracts the VM name “VM-B (UUID-B)” corresponding to the interface information 121.
- the IP address misrepresentation detection unit 21 corresponds to the DPID 112 that matches the DPID 63 “DPID 02” received by Packet IN: IP address 111: “192.168.10.10” and login information 113 “Password-1” is acquired, and the host OS 32 is accessed (logged in) using these.
- the address misrepresentation detection unit 21 acquires information on the virtual machine 31 of the VM name “VM-B (UUID-B)” extracted from the VM database 24 from the host OS 32 of the access destination as the transmission source information 7.
- the address misrepresentation detection unit 21 uses VM name 71: “VM-B (UUID-B)”, interface name: “IF-c”, MAC address 72: “MAC-c”, port name 73: “Port- Get C ′ ′.
- the address misrepresentation detection unit 21 performs MAC address verification.
- MAC-c MAC address
- the address misrepresentation detection unit 21 matches the port name “Port-C” corresponding to the MAC address 72 “MAC-c” with the reception port number “Port-C” corresponding to the transmission source MAC address 61. In the reception port verification, it is determined that there is no fraudulent address.
- the address misrepresentation detecting unit 21 determines that no spoofing is present as a result of all address spoofing verifications, and therefore determines that the Gratuitous ARP packet notified as the first packet uses a valid source MAC address and a target IP address. And instructs the flow control unit 22 to transfer the packet.
- the flow control unit 22 transfers, for example, the source MAC address “MAC-c” and the target IP address “IP-c” to the rule “OFS4” in response to the packet transfer instruction from the address misrepresentation detection unit 21.
- the OFVS 33 “vSwitchA” receives an ARP packet that conforms to the set rule, it transfers the packet to the OFS 4.
- the flow control unit 22 responds to the packet discarding instruction from the address misrepresentation detection unit 21.
- the target IP address uses“ IP-c ”as a rule, and sets a flow entry that defines“ discard packet ”as an action in OFVS 33“ vSwitch A ”.
- the OFVS 33 “vSwitch A” discards the packet when it receives an ARP packet that conforms to the set rule.
- the verification information 6 supplied to the address misrepresentation detection unit 21 together with the asynchronous event is visibly output by the output device 5.
- the system according to the present invention detects and visually recognizes Gratuitous ARP packets spoofing the source MAC address or target IP address and IP packets spoofing the source MAC address or source IP address. It can be output. Also, by the verification information 6 acquired from the OFVS 33 by Packet IN, it is possible to specify the MAC address or IP address of the transmission source of the detected address misrepresentation packet. In addition, since the DPID and the receiving port number of the OFVS 33 that has been packetized can also be specified, it is possible to specify the physical position at which unauthorized access is attempted.
- the source MAC address and the target IP address (or the destination IP address (or the OFVS 33 in the above example) before the address spoofed packet enters the layer 2 network (in the above example)
- the validity of the combination of the transmission source IP address can be verified, and the packet determined to be an address misrepresentation can be discarded at the switch. Therefore, it becomes possible to block unauthorized ARP packets and IP packets before they enter the network.
- the ARP packet or IP packet transmitted by the unauthorized outsider is verified by the combination of the transmission source MAC address, the transmission source IP address, and the reception port of the switch and is not allowed to flow into the network. Control. Therefore, according to the present invention, it is possible to block unauthorized outsiders from illegally using an unused IP address and blocking access to the network.
- extra traffic in the network can be reduced because extra traffic spoofing the MAC address or IP address can be blocked before it flows through the layer 2 network, especially broadcast traffic.
- Second Embodiment (Configuration of Computer System)
- the form provided with the OFVS 33 using the open flow protocol has been described.
- the present invention is not limited thereto.
- the switch connecting the servers is the open flow protocol
- the invention is applicable when operating according to In the computer system according to the second embodiment, the ARP request packet or IP packet is transmitted based on the first packet transmitted from the OpenFlow switch 4 connecting the virtual server 3 'to another host terminal to the Openflow controller 2. Monitor the presence or absence of address misrepresentation.
- configurations and operations different from those of the first embodiment will be described in detail, and descriptions of the same configurations and operations will be omitted.
- FIG. 9 is a diagram showing the configuration of the computer system according to the second embodiment of the present invention.
- the virtual server 3 'in the second embodiment includes a layer 2 virtual switch 34 not conforming to the open flow protocol in place of the open flow virtual switch 33 in the first embodiment. . Therefore, the Gratuitous ARP packet transmitted from the virtual machine 31 is packetized from the OFS 4 to the flow control unit 22. That is, the OFS 4 in the second embodiment corresponds to the entrance to the present system with respect to the virtual machine 31 which is the host terminal.
- the input device 1 in the second embodiment inputs virtual server data 11 ′ shown in FIG. 10 to the OFC 2.
- the configuration other than these configurations is the same as that of the first embodiment.
- FIG. 10 is a view showing an example of the structure of virtual server data 11 'used in address misrepresentation verification in the second embodiment.
- the virtual server data 11 ′ includes the IP address 111 assigned to the virtual server 3 ′, the DPID 112 of the OFS 4 to which the physical network interface of the virtual server 3 ′ is connected, and the virtual server 3 ′. It includes login information 113 for access and a port name 114 to which the OFS 4 connects.
- the IP address 111, the DP ID 112, the login information 113, and the port name 114 are associated with each virtual server 3 'and recorded as virtual server data 11' in the input device 1.
- step S21 to S24 when the computer system is started, virtual server data 11 'and VM data 12 are recorded in advance from the input device 1 in the address misrepresentation verification database 20 of the OFC 2 (steps S21 to S24).
- the detailed operation is the same as steps S1 to S4 shown in FIG.
- the virtual machine 31 transmits a gratuitous ARP packet or an IP packet (step S25). At this time, the packet from the virtual machine 31 is transferred to the OFS 4 outside the virtual server 3 ′ via the virtual switch 34.
- the OFS 4 determines whether the header information of the Gratuitous ARP packet or IP packet received from the port connecting to the virtual server 3 'matches (matches) the flow entry rule set in itself. If there is a matching rule, the received packet is processed (for example, forwarded to another OFS 4 or discarded) according to the action corresponding to the rule (not shown). On the other hand, when a matching (matching) flow entry (inside rule) is not set in the header information of the received packet, the OFS 4 notifies the flow control unit 22 of the OFC 2 of the received packet as a first packet (step S26). . Here, the OFS 4 transmits the first packet or the header information of the first packet to the flow control unit 22 together with the DPID 63 of the OFS 4 by Packet IN.
- the flow control unit 22 that has performed PacketIN extracts the verification information 6 from the information transmitted from the OFS 4 together with the asynchronous event, and outputs the verification information 6 to the address misrepresentation detection unit 21 (step S27).
- the address misrepresentation detection unit 21 verifies the transmission source address of the first packet using the virtual server DB 23 as in step S8 shown in FIG. 7 (step S28: MAC address / IP address verification). Here, if there is no DPID 112 that matches the DPID 63, the address misrepresentation detection unit 21 determines that either or both of the MAC address and the IP address of the first packet are misrepresented, and the flow control unit 22 It instructs to discard (step S33).
- the address misrepresentation detection unit 21 obtains the VM name 120 (UUID) corresponding to the interface information 121.
- the address misrepresentation detection unit 21 searches the IP address 111, the login information 113, and the port name 114 from the virtual server database 23 using the DPID 63 of the OFS 4 received with the asynchronous event as a search key. (Step S29).
- the address misrepresentation detection unit 21 determines that either or both of the MAC address and the IP address are misrepresented, and instructs the flow control unit 22 to discard the packet. (Step S33).
- the address misrepresentation detection unit 21 receives the port name 114 acquired from the virtual server database 23 and the flow control unit 22.
- the reception port number 64 is compared (step S30: reception port verification). If the port name 114 and the reception port number 64 do not match in step S30, the address spoofing detection unit 21 determines that the reception port name is spoofed, and instructs the flow control unit 22 to discard the packet (step S33). ).
- the address misrepresentation detection unit 21 logs in to the host OS 32 identified by the IP address 111 acquired in step S29 using the acquired login information 113. Do. Subsequently, the address misrepresentation detection unit 21 acquires information of the virtual machine 31 corresponding to the VM name 120 (UUID) acquired in step S28 as transmission source information 7 (step S31). Here, when the transmission source information 7 corresponding to the specified VM name 120 is not obtained, the address misrepresentation detection unit 21 determines that either or both of the MAC address and the IP address of the first packet are misrepresented. And instructs the flow control unit 22 to discard the packet (step S33). The port name 73 may not be included in the transmission source information 7 acquired in the second embodiment.
- the address misrepresentation detection unit 21 searches the transmission source information 7 for a MAC address that matches the transmission source MAC address 61 of the first packet (see FIG. Step S32: MAC address verification).
- the address misrepresentation detection unit 21 determines that the MAC address of the first packet is misrepresented, and the flow control unit 22 It instructs to discard the packet (step S33).
- the address misrepresentation detection unit 21 determines that there is no address misrepresentation regarding the first packet, and the flow control unit 22 In response, the controller instructs the setting of a flow entry for transferring the packet (step S33).
- step S33 the flow control unit 22 instructed to discard the packet discards the first packet that has been packeted in, uses a part or all of the header information of the packet as a rule, and uses the packet discard as the action. It sets to OFS4 (step S34).
- the OFS 4 receives a packet whose presence or absence is determined to be false, the OFS 4 is discarded without notifying the OFC 2 and it is possible to block an intrusion of an illegal packet into the network at the entrance of the network.
- step S33 the flow control unit 22 instructed to transfer the packet sets, as a rule, part or all of the header information of the packet-in-first packet as a rule, and transfers the packet as an action.
- the OFS 4 on the communication path is set (step S34).
- the address misrepresentation detection unit 21 determined to be an address misrepresentation in steps S28, S29, S30, S31, and S32 sends source address information 60 received from the flow control unit 22 to the output device 5 together with the asynchronous event in step S27. It outputs (step S35).
- the output device 5 visibly outputs the transmission source address information 60 (the transmission source MAC address 61 and the target IP address 62 or the transmission source IP address 65) as a fraudulent address.
- the address misrepresentation detection unit 21 may output the reception port number 64 to the output device 5 when determining that the address misrepresentation is made. In this case, the output device 5 outputs the reception port number 64 in a visible manner.
- FIG. 12 is a diagram showing a specific example for explaining the configuration and operation of the computer system in the second embodiment.
- IP address 111 "192.168.10.10”
- DPID 112 "Switch A (DPID 01)”
- login information 113 "as virtual server data 11 '.
- Password-1 ", port name 114:" Port-X "is registered.
- the VM name 120 "VM-A (UUID-A)"
- the interface information 121 "IF-a: MAC-a, IP-a", IF-b: MAC-b, IP-b "are registered.
- the virtual server 3 also has two virtual machines 31:" VM-A "," VM-B "and one virtual switch 34:” vSwitch ".
- the virtual machine 31 “VM-A” has two interfaces “IF-a” and “IF-b”, and the virtual machine 31 “VM-B” has one interface “IF-c”.
- the virtual switch 34 "vSwitch” is connected to the ports "Port-A, Port-B, Port-C”.
- the OFS 4 "OpenFlow Switch A" is a port "Port-X. It is connected to the virtual switch 34 "vSwitch” through.
- the network monitoring operation in such a computer system will be described.
- the packet is transmitted from the virtual switch 34 "vSwitch A” to the OFS 4 "OpenFlow Switch A” via the port "Port-X”. To be transferred.
- the OFS 4 “OpenFlow Switch A” packetizes the received packet to the flow control unit 22 as a first packet.
- the flow control unit 22 notifies the address misrepresentation detection unit 21 of the verification information 6 together with the asynchronous event according to PacketIN.
- the verification information 6 the transmission source MAC address 61: “MAC-a”, target IP address 62: “IP-a”, DPID 63: “DPID 01”, reception port number 64: “Port-X” are notified. Be done.
- the address misrepresentation detection unit 21 performs MAC address / IP address verification using the notified source MAC address 61 “MAC-a” and the target IP address 62 “IP-a”. Since the VM database 24 includes the source MAC address 61 “MAC-a” and the interface information 121 “MAC-a” and “IP-a” that match the target IP address 62 “IP-a”, the MAC In address / IP address verification, it is determined that there is no fraudulent address. Also, the address misrepresentation detection unit 21 extracts the VM name “VM-A (UUID-A)” corresponding to the interface information 121.
- the address misrepresentation detection unit 21 performs reception port verification.
- the reception port number 64 received by PacketIN: “Port-X” matches the port name 114 “Port-X” registered in the virtual server database 23, it is determined that there is no spoofed address in the reception port verification. It is judged.
- the IP address misrepresentation detection unit 21 corresponds to the IP ID 111 corresponding to the DPID 112 that matches the DPID 63 “DPID 01” received by Packet IN: “192.168.10.10” and the login information 113. “Password-1” is acquired, and the host OS 32 is accessed (logged in) using these. Thereby, the address misrepresentation detection unit 21 acquires information on the virtual machine 31 of the VM name “VM-A (UUID-A)” extracted from the VM database 24 from the host OS 32 of the access destination as the transmission source information 7.
- VM-A UUID-A
- the address misrepresentation detection unit 21 is an interface name associated with the VM name 71: “VM-A (UUID-A)”: “IF-a”, MAC address 72: “MAC-a”, and an interface name. : “IF-b”, MAC address 72: "MAC-b” is acquired.
- the address misrepresentation detection unit 21 performs MAC address verification.
- MAC address 72 “MAC-a” that matches the transmission source MAC address 61 “MAC-a” received by Packet IN in the acquired transmission source information 7
- there is no false address in MAC address verification since there is a MAC address 72 “MAC-a” that matches the transmission source MAC address 61 “MAC-a” received by Packet IN in the acquired transmission source information 7, there is no false address in MAC address verification. It is determined that
- the address misrepresentation detecting unit 21 determines that no spoofing is present as a result of all address spoofing verifications, and therefore determines that the Gratuitous ARP packet notified as the first packet uses a valid source MAC address and a target IP address. And instructs the flow control unit 22 to transfer the packet.
- the flow control unit 22 sets the transmission source MAC address as “MAC-a” and the target IP address as “IP-a” as a rule, “other OFS 4 Set the flow entry with the action of “forward to” as the action in the OFS 4 “OpenFlow Switch A”.
- the OFS “OpenFlow Switch A” receives an ARP packet that conforms to the set rule, the OFS “OpenFlow Switch A” transfers the packet to the other OFS 4 specified.
- the flow control unit 22 responds to the packet discarding instruction from the address misrepresentation detection unit 21.
- the flow entry is defined in the OFS 4 "OpenFlow Switch A" in which the target IP address is "IP-a" and "Abandon packet” is defined as an action.
- the OFS 4 “OpenFlow Switch A” discards the packet when it receives an ARP packet that conforms to the set rule.
- the verification information 6 supplied to the address misrepresentation detection unit 21 together with the asynchronous event is visibly output by the output device 5.
- the switch serving as the entrance of the layer 2 network operates according to the open flow protocol, It is possible to block the address spoofing packet in the switch.
- the port number (reception port number) to which the virtual switch is connected is obtained from the host OS and spoofing verification is performed.
- the notification source of the first packet is the physical switch. Because of this, it is possible to verify the spoofing of the receiving port using the pre-registered port name.
- Third Embodiment (Configuration of Computer System)
- the system for monitoring communication between virtual servers has been described.
- the present invention is applicable not only to this but also to communication monitoring between network devices connected by an open flow switch.
- the computer system according to the third embodiment monitors the presence or absence of an address misrepresentation of an ARP request packet or an IP packet based on the first packet transmitted from the open flow switch 4 connected between the network devices 30 to the open flow controller 2. Do.
- configurations and operations different from those of the first embodiment will be described in detail, and descriptions of the same configurations and operations will be omitted.
- FIG. 13 is a diagram showing the configuration of the computer system according to the third embodiment of the present invention.
- the computer system in the third embodiment includes a network device 30 instead of the virtual server 3 in the first embodiment. That is, in the first and second embodiments, a virtual server has been described as an example of a host terminal that configures a network, but in the present embodiment, a computer system in which a network device is a host terminal will be described.
- the network device 30 refers to any one of terminals that perform TCP / IP communication, such as a computer and a network printer.
- Gratuitous ARP packets and IP packets transmitted from the network device 30 are packetized from the OFS 4 to the flow control unit 22.
- the OFS 4 is a switch that receives the packet transmitted from the network device 30 first. That is, the OFS 4 corresponds to the entrance to the system with respect to the network device 30 which is the host terminal. Further, the input device 1 'in the third embodiment inputs the device data 13 shown in FIG. 14 to the OFC 2'. Furthermore, the OFC 2 'in the third embodiment includes the device database 25 instead of the virtual server database 23 and the VM database 24 in the first embodiment. The configuration other than these configurations is the same as that of the first embodiment.
- FIG. 14 is a diagram showing an example of the structure of the device data 13 used in address misrepresentation verification in the third embodiment.
- the device data 13 is a MAC address 131 and an IP address 132 assigned to a valid network device 30 permitted to be connected to the system (in the case of referring to two collectively, the device address information 130).
- the MAC address 131, the IP address 132, the DP ID 133, and the port name 134 are associated with each network device 30, and recorded as the device data 13 in the input device 1 '.
- device data 13 is recorded in advance from the input device 1 'in the device database of the OFC 2' (steps S41 and S42). Specifically, the device data 13 supplied from the input device 1 'is supplied to the address misrepresentation detection unit 21 and stored in the device database 25 (steps S41 and S42). Thereby, the device database 25 is updated by the latest device data 13.
- the device database 25 can be constantly searched by the address misrepresentation detection unit 21. Also, the update of the device database 25 may be performed during the operation of the system.
- the network device transmits a gratuitous ARP packet or an IP packet (step S43). At this time, the packet from the network device 30 is transferred to the OFS 4.
- the OFS 4 determines whether the header information of the Gratuitous ARP packet or IP packet received from the port connected to the network device 30 matches (matches) the flow entry rule set in the device itself. If there is a matching rule, the received packet is processed (for example, forwarded to another OFS 4 or discarded) according to the action corresponding to the rule (not shown). On the other hand, when the matching (matching) flow entry (inside rule) is not set in the header information of the received packet, the OFS 4 notifies the received packet as the first packet to the flow control unit 22 of the OFC 2 (step S44). ). Here, the OFS 4 transmits the first packet or the header information of the first packet to the flow control unit 22 together with the DPID 63 of the OFS 4 by Packet IN.
- the flow control unit 22 that has performed the Packet-IN extracts the verification information 6 from the information transmitted from the OFS 4 together with the asynchronous event and outputs the verification information 6 to the address misrepresentation detection unit 21 (step S45).
- the address misrepresentation detection unit 21 extracts the transmission source address information 60 from the verification information 6 received together with the asynchronous event, and verifies the transmission source address of the first packet using the device database 25 (step S46: MAC address ⁇ IP Address verification).
- the address misrepresentation detection unit 21 corresponds to the device address information 130 (MAC address 131, IP address 132) matching the transmission source address information 60 (transmission source MAC address 61, target IP address 62 or transmission source IP address 65). Is verified in the device database 25 (MAC address / IP address verification).
- the address misrepresentation detection unit 21 determines that either or both of the MAC address and the IP address are misrepresented. And instructs the flow control unit 22 to discard the packet (step S48).
- Step S47 reception port verification
- the address misrepresentation detection unit 21 determines that the reception port name is spoofed, and instructs the flow control unit 22 to discard the packet (step S48). ).
- step S47 the address misrepresentation detection unit 21 determines that there is no address misrepresentation regarding the first packet, and the flow for transferring the packet to the flow control unit 22.
- the setting of the entry is instructed (step S48).
- the execution order of the MAC address / IP address verification in step S46 and the reception port verification in step S47 is not limited to the order shown in FIG. 15, and may be performed simultaneously or in reverse order. Also, at the time of MAC address / IP address verification or reception port verification, the match between the DPID 133 in the device database 25 and the DPID 63 notified by the Packet IN may be verified.
- step S48 the flow control unit 22 instructed to discard the packet discards the first packet that has been packeted in, uses a part or all of the header information of the packet as a rule, and takes a flow entry that takes packet discard as an action.
- the OFS 4 is set (step S49). As a result, when the OFS 4 receives a packet whose presence or absence has been determined once, it is discarded without notifying the OFC 2 ', and it becomes possible to block the intrusion of illegal packets into the network at the entrance of the network. .
- step S48 the flow control unit 22 instructed to transfer the packet sets a flow entry in which a part or all of the header information of the packet-in-first packet is set as a rule and the action is to transfer the packet.
- the OFS 4 on the communication path is set (step S49).
- the address forgery detection unit 21 that has determined that the address is false in steps S46 and S48 outputs the transmission source address information 60 received from the flow control unit 22 together with the asynchronous event in step S45 to the output device 5 (step S50). .
- the output device 5 visibly outputs the transmission source address information 60 (the transmission source MAC address 61 and the target IP address 62 or the transmission source IP address 65) as a fraudulent address.
- the address misrepresentation detection unit 21 may output the reception port number 64 to the output device 5 when determining that the address misrepresentation is made. In this case, the output device 5 outputs the reception port number 64 in a visible manner.
- FIG. 16 is a diagram showing a specific example for explaining the configuration and operation of the computer system in the third embodiment.
- device address information 130 MAC address 131: “MAC-d”, IP address 132: “IP-d”, DPID 133: “Switch A (DPID 01)” as device data 13 in the device database 25.
- Port name 134: “Port-X” is registered.
- the network device 30 has one interface “IF-d”, and the OFS 4 “OpenFlow Switch A” is connected to the network device 30 via the port “Port-X”.
- the network monitoring operation in such a computer system will be described.
- the packet is transferred to the OFS 4 “OpenFlow Switch A” via the port “Port-X”.
- the OFS 4 “OpenFlow Switch A” packetizes the received packet to the flow control unit 22 as a first packet.
- the flow control unit 22 notifies the address misrepresentation detection unit 21 of the verification information 6 together with the asynchronous event according to PacketIN.
- the verification information 6 the transmission source MAC address 61: “MAC-d”, target IP address 62: “IP-d”, DPID 63: “DPID 01”, reception port number 64: “Port-X” are notified. Be done.
- the address misrepresentation detection unit 21 performs MAC address / IP address verification using the notified source MAC address 61 “MAC-d” and the target IP address 62 “IP-d”. Since the device database 25 includes device address information 130 “MAC-d” and “IP-d” that match the source MAC address 61 “MAC-d” and the target IP address 62 “IP-d”, In MAC address / IP address verification, it is determined that there is no fraudulent address. Also, the address misrepresentation detection unit 21 extracts the port name 134 “Port-X” corresponding to the device address information 130.
- the address misrepresentation detection unit 21 performs reception port verification.
- the reception port number 64 received by Packet IN: “Port-X” matches the port name 134 “Port-X” extracted from the device database 25, it is determined that there is no spoof address in the reception port verification. .
- the match between the DPID 133 in the device database 25 and the DPID 133 received by PacketIN may be verified.
- the DPID 133 “DPID 01” matches the DPID 133 “DPID 01”, it is determined that there is no fraudulent address.
- the address misrepresentation detecting unit 21 determines that no spoofing is present as a result of all address spoofing verifications, and therefore determines that the Gratuitous ARP packet notified as the first packet uses a valid source MAC address and a target IP address. And instructs the flow control unit 22 to transfer the packet.
- the flow control unit 22 sets, for example, the transmission source MAC address as “MAC-d” and the target IP address as “IP-d” as the rule “other OFS 4 Set the flow entry that specifies “forward to” as an action in OFS 4 “OpenFlow Switch A”.
- the OFS 4 “OpenFlow Switch A” receives an ARP packet that conforms to the set rule, it transfers the packet to the other OFS 4 specified.
- the flow control unit 22 responds to the packet discarding instruction from the address misrepresentation detection unit 21.
- Set the flow entry in which the target IP address is “IP-a” as a rule and “discard packet” is defined as an action in the OFS 4 “OpenFlow Switch A”.
- the OFS 4 “OpenFlow Switch A” discards the packet when it receives an ARP packet that conforms to the set rule.
- the verification information 6 supplied to the address misrepresentation detection unit 21 together with the asynchronous event is visibly output by the output device 5.
- the computer system of the third embodiment it is possible to monitor an address misrepresentation packet between network devices using an open flow protocol and to block intrusion into the network.
- the port number (reception port number) to which the virtual switch is connected is acquired from the host OS and spoofing verification is performed.
- the notification source of the first packet is the physical switch. Because of this, it is possible to verify the spoofing of the receiving port using the pre-registered port name.
- the other effects of the computer system according to the third embodiment are similar to those of the first embodiment.
- the present invention can be applied to a computer system on which either the virtual server 3 or the 3 'network device 30 is mounted.
- the OFC 2 and 2 ′ acquire virtual machine information (transmission source information 7) triggered by Packet IN, but the present invention is not limited to this, and information on virtual machines in the system can be stored in a database You may hold as. Also, OFC 2 and 2 'temporarily hold the information (source information 7) of the virtual machine acquired using Packet IN as a trigger, and use them for address spoofing verification for the first packet notified from OFVS 33 and OFS 4 thereafter. It is also good.
- the OFS and OFVS used in the computer system according to the present invention may be in accordance with the conventional open flow protocol (for example, the protocol defined by OpenFlow Switch Specification version 1.0), and only the function of the OFC is as described in the above embodiment.
- the conventional open flow protocol for example, the protocol defined by OpenFlow Switch Specification version 1.0
- only the function of the OFC is as described in the above embodiment.
- network monitoring and prevention of unauthorized access can be realized. That is, according to the present invention, it is possible to realize the above-mentioned network monitoring and prevention of unauthorized access by changing only the function of the OFC in the existing open flow system. For this reason, it is possible to add the function such as network monitoring to the existing system at low cost and easily.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Small-Scale Networks (AREA)
Abstract
Description
(コンピュータシステムの構成)
本発明によるコンピュータシステムは、図1に示すシステムと同様にオープンフロー技術を利用して通信経路の構築及びパケットデータの転送制御を行う。第1の実施の形態におけるコンピュータシステムでは、仮想サーバ3上で動作するオープンフロー仮想スイッチ33からオープンフローコントローラ2に送信されるファーストパケットに基づいて、ARP要求パケットやIPパケットのアドレス詐称の有無を監視する。
次に、図7を参照して、第1の実施の形態におけるネットワーク監視動作の詳細を説明する。
(コンピュータシステムの構成)
第1の実施の形態では、オープンフロープロトコルを利用したOFVS33を備える形態について説明したが、これに限らず、仮想スイッチがオープンフロープロトコルを利用しない場合でも、サーバ間を接続するスイッチがオープンフロープロトコルに従って動作している場合、本発明が適用できる。第2の実施の形態におけるコンピュータシステムでは、仮想サーバ3’と他のホスト端末とを接続するオープンフロースイッチ4からオープンフローコントローラ2に送信されるファーストパケットに基づいて、ARP要求パケットやIPパケットのアドレス詐称の有無を監視する。以下では、第1の実施の形態と異なる構成及び動作について詳細に説明し、同様な構成及び動作の説明は省略する。
図11を参照して、第2の実施の形態におけるネットワーク監視動作の詳細を説明する。
(コンピュータシステムの構成)
第1及び第2の実施の形態では、仮想サーバ間の通信を監視するシステムについて説明したが、これに限らず、オープンフロースイッチで接続されたネットワーク機器間の通信監視にも本発明は適用できる。第3の実施の形態におけるコンピュータシステムでは、ネットワーク機器30間の接続するオープンフロースイッチ4からオープンフローコントローラ2に送信されるファーストパケットに基づいて、ARP要求パケットやIPパケットのアドレス詐称の有無を監視する。以下では、第1の実施の形態と異なる構成及び動作について詳細に説明し、同様な構成及び動作の説明は省略する。
図15を参照して、第3の実施の形態におけるネットワーク監視動作の詳細を説明する。
Claims (29)
- コントローラと、
前記コントローラによって設定されたフローエントリに適合する受信パケットに対し、前記フローエントリで規定された中継動作を行うスイッチと、
前記スイッチに接続されたホスト端末と
を具備し、
前記スイッチは、自身に設定されたフローエントリに適合しない受信パケットの送信元アドレス情報を、前記コントローラに通知し、
前記コントローラは、正当なホスト端末のアドレス情報と前記送信元アドレス情報とが一致しない場合、前記受信パケットの送信元アドレスが詐称されていると判定する
コンピュータシステム。 - 請求項1に記載のコンピュータシステムにおいて、
前記コントローラは、前記受信パケットの送信元アドレスが詐称されていると判定した場合、前記送信元アドレス情報に示されたアドレスを送信元とするパケットを破棄することを規定したフローエントリを前記スイッチに設定する
コンピュータシステム。 - 請求項1又は2に記載のコンピュータシステムにおいて、
前記送信元アドレス情報は前記受信パケットの送信元MAC(Media Access Control)アドレスを含み、
前記正当なホスト端末が利用するインタフェースに割り当てられたMACアドレスと、前記送信元MACアドレスが一致しない場合、前記コントローラは、前記受信パケットの送信元アドレスが詐称されていると判定する
コンピュータシステム。 - 請求項1から3のいずれか1項に記載のコンピュータシステムにおいて、
前記送信元アドレス情報は前記受信パケットの送信元IP(Internet Protocol)アドレスを含み、
前記正当なホスト端末のIPアドレスと前記送信元IPアドレスが一致しない場合、前記コントローラは、前記受信パケットの送信元アドレスが詐称されていると判定する
コンピュータシステム。 - 請求項1から4のいずれか1項に記載のコンピュータシステムにおいて、
前記スイッチは、自身に設定されたフローエントリに適合しない受信パケットの受信ポート名を、前記コントローラに通知し、
前記コントローラは、前記正当なホスト端末が利用するインタフェースに接続されたスイッチのポート名と、前記受信ポート名とが一致しない場合、前記受信パケットの送信元アドレスが詐称されていると判定する
コンピュータシステム。 - 請求項1から5のいずれか1項に記載のコンピュータシステムにおいて、
前記コントローラは、正当な仮想サーバのIPアドレスとDPID(Data Path ID)とが対応付けられて記録された仮想サーバデータベースを備え、
前記スイッチは、自身に設定されたフローエントリに適合しない受信パケットを、自身のDPIDとともに、前記コントローラに通知し、
前記コントローラは、前記スイッチから通知されたDPIDを検索鍵として前記仮想サーバデータベースからIPアドレスを取得し、前記IPアドレスを利用してアクセスした仮想サーバから、前記仮想サーバに搭載される仮想マシンが利用するインタフェースに割り当てられたMACアドレスを取得し、前記取得したMACアドレスと前記送信元MACアドレスが一致しない場合、前記受信パケットの送信元アドレスが詐称されていると判定する
コンピュータシステム。 - 請求項6に記載のコンピュータシステムにおいて、
前記コントローラは、正当な仮想マシンの仮想マシン名と前記正当な仮想マシンが利用するインタフェースに割り当てられたアドレスとが対応付けられたVMデータベースを保持し、
前記コントローラは、前記送信元アドレス情報を検索鍵として前記VMデータベースから仮想マシン名を抽出し、前記MACアドレスを取得する対象となる仮想マシンを特定する
コンピュータシステム。 - 請求項6又は7に記載のコンピュータシステムにおいて、
前記スイッチは、自身に設定されたフローエントリに適合しない受信パケットの受信ポート名を、前記コントローラに通知し、
前記コントローラは、前記スイッチから通知されたDPIDを検索鍵として前記仮想サーバデータベースからIPアドレスを取得し、前記IPアドレスを利用してアクセスした仮想サーバから、前記仮想マシンが利用するインタフェースが接続するスイッチのポート名を取得し、前記取得したポート名と前記受信ポート名が一致しない場合、前記受信パケットの送信元アドレスが詐称されていると判定する
コンピュータシステム。 - 請求項1から8のいずれか1項に記載のコンピュータシステムにおいて、
前記コントローラにおいて、前記受信パケットの送信元アドレスが詐称されていると判定された場合、前記送信元アドレス情報を視認可能に出力する出力装置を更に具備する
コンピュータシステム。 - 請求項9に記載のコンピュータシステムにおいて、
前記スイッチは、自身に設定されたフローエントリに適合しない受信パケットの受信ポート名を、前記コントローラに通知し、
前記コントローラにおいて、前記受信パケットの送信元アドレスが詐称されていると判定された場合、前記出力装置は、前記受信ポート名を視認可能に出力する
コンピュータシステム。 - フローエントリをスイッチに設定するフロー制御部と、
前記スイッチは、設定されたフローエントリに適合する受信パケットに対し、前記フローエントリで規定された中継動作を行い、自身に設定された前記フローエントリに適合しない受信パケットの送信元アドレス情報を前記フロー制御部に通知し、
前記フロー制御部に通知された送信元アドレス情報と、正当なホスト端末のアドレス情報とが一致しない場合、前記受信パケットの送信元アドレスが詐称されていると判定するアドレス詐称検出部と
を具備する
コントローラ。 - 請求項11に記載のコントローラにおいて、
前記アドレス詐称検出部が、前記受信パケットの送信元アドレスが詐称されていると判定した場合、前記フロー制御部は、前記送信元アドレス情報に示されたアドレスを送信元とするパケットを破棄することを規定したフローエントリを前記スイッチに設定する
コントローラ。 - 請求項11又は12に記載のコントローラにおいて、
前記送信元アドレス情報は前記受信パケットの送信元MAC(Media Access Control)アドレスを含み、
前記アドレス詐称検出部は、前記正当なホスト端末が利用するインタフェースに割り当てられたMACアドレスと、前記送信元MACアドレスが一致しない場合、前記受信パケットの送信元アドレスが詐称されていると判定する
コントローラ。 - 請求項11から13のいずれか1項に記載のコントローラにおいて、
前記送信元アドレス情報は前記受信パケットの送信元IP(Internet Protocol)アドレスを含み、
前記アドレス詐称検出部は、前記正当なホスト端末のIPアドレスと前記送信元IPアドレスが一致しない場合、前記受信パケットの送信元アドレスが詐称されていると判定する
コントローラ。 - 請求項11から14のいずれか1項に記載のコントローラにおいて、
前記スイッチは、自身に設定されたフローエントリに適合しない受信パケットの受信ポート名を、前記フロー制御部に通知し、
前記正当なホスト端末が利用するインタフェースに接続されたスイッチのポート名と、前記フロー制御部に通知された受信ポート名とが一致しない場合、前記アドレス詐称検出部は、前記受信パケットの送信元アドレスが詐称されていると判定する
コントローラ。 - 請求項11から15のいずれか1項に記載のコントローラにおいて、
正当な仮想サーバのIPアドレスとDPID(Data Path ID)とが対応付けられて記録された仮想サーバデータベースを更に具備し、
前記スイッチは、自身に設定されたフローエントリに適合しない受信パケットを、自身のDPIDとともに、前記フロー制御部に通知し、
前記アドレス詐称検出部は、前記フロー制御部に通知されたDPIDを検索鍵として前記仮想サーバデータベースからIPアドレスを取得し、前記IPアドレスを利用してアクセスした仮想サーバから、前記仮想サーバに搭載される仮想マシンが利用するインタフェースに割り当てられたMACアドレスを取得し、前記取得したMACアドレスと前記送信元MACアドレスが一致しない場合、前記受信パケットの送信元アドレスが詐称されていると判定する
コントローラ。 - 請求項16に記載のコントローラにおいて、
正当な仮想マシンの仮想マシン名と前記正当な仮想マシンが利用するインタフェースに割り当てられたアドレスとが対応付けられたVMデータベースを更に具備し、
前記アドレス詐称検出部は、前記送信元アドレス情報を検索鍵として前記VMデータベースから仮想マシン名を抽出することで、前記MACアドレスを取得する対象となる仮想マシンを特定する
コントローラ。 - 請求項16又は17に記載のコントローラにおいて、
前記スイッチは、自身に設定されたフローエントリに適合しない受信パケットの受信ポート名を、前記コントローラに通知し、
前記アドレス詐称検出部は、前記スイッチから通知されたDPIDを検索鍵として前記仮想サーバデータベースからIPアドレスを取得し、前記IPアドレスを利用してアクセスした仮想サーバから、前記仮想マシンが利用するインタフェースが接続するスイッチのポート名を取得し、前記取得したポート名と前記受信ポート名が一致しない場合、前記受信パケットの送信元アドレスが詐称されていると判定する
コントローラ。 - コンピュータによって実行されることで請求項11から18のいずれか1項に記載のコントローラを実現するネットワーク監視プログラム。
- コントローラによって設定されたフローエントリに適合する受信パケットに対し、前記フローエントリで規定された中継動作を行うスイッチを備えるコンピュータシステムにおいて実行されるネットワーク監視方法において、
前記スイッチが、自身に設定されたフローエントリに適合しない受信パケットの送信元アドレス情報を、前記コントローラに通知するステップと、
前記コントローラが、正当なホスト端末のアドレス情報と前記送信元アドレス情報とが一致しない場合、前記受信パケットの送信元アドレスが詐称されていると判定するステップと
を具備する
ネットワーク監視方法。 - 請求項20に記載のネットワーク監視方法において、
前記コントローラは、前記受信パケットの送信元アドレスが詐称されていると判定した場合、前記送信元アドレス情報に示されたアドレスを送信元とするパケットを破棄することを規定したフローエントリを前記スイッチに設定するステップを更に具備する
ネットワーク監視方法。 - 請求項20又は21に記載のネットワーク監視方法において、
前記送信元アドレス情報は前記受信パケットの送信元MAC(Media Access Control)アドレスを含み、
前記コントローラが、前記正当なホスト端末が利用するインタフェースに割り当てられたMACアドレスと、前記送信元MACアドレスが一致しない場合、前記受信パケットの送信元アドレスが詐称されていると判定するステップを備える
ネットワーク監視方法。 - 請求項20から21のいずれか1項に記載のネットワーク監視方法において、
前記送信元アドレス情報は前記受信パケットの送信元IP(Internet Protocol)アドレスを含み、
前記コントローラが、前記正当なホスト端末のIPアドレスと前記送信元IPアドレスが一致しない場合、前記受信パケットの送信元アドレスが詐称されていると判定するステップを備える
ネットワーク監視方法。 - 請求項20から23のいずれか1項に記載のネットワーク監視方法において、
前記スイッチが、自身に設定されたフローエントリに適合しない受信パケットの受信ポート名を、前記コントローラに通知するステップと、
前記コントローラが、前記正当なホスト端末が利用するインタフェースに接続されたスイッチのポート名と、前記受信ポート名とが一致しない場合、前記受信パケットの送信元アドレスが詐称されていると判定するステップと
を更に具備する
ネットワーク監視方法。 - 請求項20から24のいずれか1項に記載のネットワーク監視方法において、
前記コントローラは、正当な仮想サーバのIPアドレスとDPID(Data Path ID)とが対応付けられて記録された仮想サーバデータベースを備え、
前記スイッチが、自身に設定されたフローエントリに適合しない受信パケットを、自身のDPIDとともに、前記コントローラに通知するステップと、
前記コントローラが、前記スイッチから通知されたDPIDを検索鍵として前記仮想サーバデータベースからIPアドレスを取得するステップと、
前記コントローラが、前記IPアドレスを利用してアクセスした仮想サーバから、前記仮想サーバに搭載される仮想マシンが利用するインタフェースに割り当てられたMACアドレスを取得するステップと、
前記コントローラが、前記取得したMACアドレスと前記送信元MACアドレスが一致しない場合、前記受信パケットの送信元アドレスが詐称されていると判定するステップと
を具備する
ネットワーク監視方法。 - 請求項25に記載のネットワーク監視方法において、
前記コントローラは、正当な仮想マシンの仮想マシン名と前記正当な仮想マシンが利用するインタフェースに割り当てられたアドレスとが対応付けられたVMデータベースを保持し、
前記コントローラが、前記送信元アドレス情報を検索鍵として前記VMデータベースから仮想マシン名を抽出するステップと、
前記コントローラが、前記MACアドレスを取得する対象となる仮想マシンを特定するステップと
を更に具備する
ネットワーク監視方法。 - 請求項25又は26に記載のネットワーク監視方法において、
前記スイッチが、自身に設定されたフローエントリに適合しない受信パケットの受信ポート名を、前記コントローラに通知するステップと、
前記コントローラが、前記スイッチから通知されたDPIDを検索鍵として前記仮想サーバデータベースからIPアドレスを取得するステップと、
前記コントローラが、前記IPアドレスを利用してアクセスした仮想サーバから、前記仮想マシンが利用するインタフェースが接続するスイッチのポート名を取得するステップと、
前記コントローラが、前記取得したポート名と前記受信ポート名が一致しない場合、前記受信パケットの送信元アドレスが詐称されていると判定するステップと
を具備する
ネットワーク監視方法。 - 請求項20から27のいずれか1項に記載のネットワーク監視方法において、
前記コントローラにおいて、前記受信パケットの送信元アドレスが詐称されていると判定された場合、前記送信元アドレス情報を視認可能に出力するステップを更に具備する
ネットワーク監視方法。 - 請求項28に記載のネットワーク監視方法において、
前記スイッチが、自身に設定されたフローエントリに適合しない受信パケットの受信ポート名を、前記コントローラに通知するステップと、
前記コントローラにおいて、前記受信パケットの送信元アドレスが詐称されていると判定された場合、前記受信ポート名を視認可能に出力するステップとを更に具備する
ネットワーク監視方法。
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP11847623.3A EP2651081A1 (en) | 2010-12-09 | 2011-12-02 | Computer system, controller, and network monitoring method |
US13/991,409 US9118716B2 (en) | 2010-12-09 | 2011-12-02 | Computer system, controller and network monitoring method |
JP2012547830A JP5532458B2 (ja) | 2010-12-09 | 2011-12-02 | コンピュータシステム、コントローラ、及びネットワーク監視方法 |
CN201180058912.9A CN103250392B (zh) | 2010-12-09 | 2011-12-02 | 计算机系统、控制器和网络监视方法 |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
JP2010-275002 | 2010-12-09 | ||
JP2010275002 | 2010-12-09 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2012077603A1 true WO2012077603A1 (ja) | 2012-06-14 |
Family
ID=46207091
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/JP2011/077933 WO2012077603A1 (ja) | 2010-12-09 | 2011-12-02 | コンピュータシステム、コントローラ、及びネットワーク監視方法 |
Country Status (5)
Country | Link |
---|---|
US (1) | US9118716B2 (ja) |
EP (1) | EP2651081A1 (ja) |
JP (2) | JP5532458B2 (ja) |
CN (1) | CN103250392B (ja) |
WO (1) | WO2012077603A1 (ja) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012160926A (ja) * | 2011-02-01 | 2012-08-23 | Nec Corp | 有害サイトフィルタリングシステム及びフィルタリング方法 |
JP2014032592A (ja) * | 2012-08-06 | 2014-02-20 | Nippon Telegr & Teleph Corp <Ntt> | 仮想マシンのマイグレーションシステムおよびその方法 |
WO2014034119A1 (en) * | 2012-08-30 | 2014-03-06 | Nec Corporation | Access control system, access control method, and program |
CN103905383A (zh) * | 2012-12-26 | 2014-07-02 | 华为技术有限公司 | 一种数据报文转发方法、装置和系统 |
CN104348819A (zh) * | 2013-08-07 | 2015-02-11 | 上海宽带技术及应用工程研究中心 | 一种软件定义网络中的防火墙系统及其实现方法 |
WO2015155997A1 (ja) * | 2014-04-11 | 2015-10-15 | 日本電気株式会社 | 設定装置、制御装置、設定方法及びネットワークスイッチ |
JP2016537898A (ja) * | 2013-11-22 | 2016-12-01 | 華為技術有限公司Huawei Technologies Co.,Ltd. | 悪意ある攻撃の検出方法および装置 |
JP2018527813A (ja) * | 2015-08-07 | 2018-09-20 | ニュー エイチ3シー テクノロジーズ カンパニー,リミティド | クラウドプラットフォームのセキュリティの実現 |
CN109413675A (zh) * | 2018-12-05 | 2019-03-01 | 斑马网络技术有限公司 | 车联网流量控制方法、装置及车载终端 |
US10555217B2 (en) | 2013-10-11 | 2020-02-04 | Nec Corporation | Terminal device, terminal-device control method, and terminal-device control program |
US11438374B2 (en) * | 2015-08-18 | 2022-09-06 | Acronis International Gmbh | Agentless security of virtual machines for outbound transmissions using a network interface controller |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8924787B2 (en) * | 2012-01-24 | 2014-12-30 | Nec Laboratories America, Inc. | Network debugging |
US20140282542A1 (en) * | 2013-03-14 | 2014-09-18 | Infinio Systems Inc. | Hypervisor Storage Intercept Method |
US9426060B2 (en) * | 2013-08-07 | 2016-08-23 | International Business Machines Corporation | Software defined network (SDN) switch clusters having layer-3 distributed router functionality |
US9634948B2 (en) * | 2013-11-07 | 2017-04-25 | International Business Machines Corporation | Management of addresses in virtual machines |
US20150169345A1 (en) * | 2013-12-18 | 2015-06-18 | International Business Machines Corporation | Software-defined networking (sdn) for management of traffic between virtual processors |
US9300580B2 (en) | 2013-12-19 | 2016-03-29 | International Business Machines Corporation | Virtual machine network controller |
CN104767720A (zh) * | 2014-01-08 | 2015-07-08 | 中兴通讯股份有限公司 | 一种软件定义网络中OpenFlow消息跟踪和过滤的方法 |
US9350608B2 (en) * | 2014-01-10 | 2016-05-24 | Arista Networks, Inc. | Method and system for using virtual tunnel end-point registration and virtual network identifiers to manage virtual extensible local area network access |
WO2015120128A1 (en) * | 2014-02-05 | 2015-08-13 | Verve Wireless, Inc. | Methods and apparatus for identification and ranking of synthetic locations for mobile applications |
US9680708B2 (en) | 2014-03-14 | 2017-06-13 | Veritas Technologies | Method and apparatus for cloud resource delivery |
US20150341377A1 (en) * | 2014-03-14 | 2015-11-26 | Avni Networks Inc. | Method and apparatus to provide real-time cloud security |
WO2016003389A1 (en) * | 2014-06-30 | 2016-01-07 | Hewlett-Packard Development Company, L.P. | Inject probe transmission to determine network address conflict |
DE102016221233B3 (de) * | 2016-10-27 | 2017-09-14 | Volkswagen Aktiengesellschaft | Verfahren zum Verwalten einer ersten Kommunikationsverbindung, System umfassend einen ersten Kommunikationspartner und einen zweiten Kommunikationspartner sowie Fahrzeug |
WO2018168262A1 (ja) * | 2017-03-13 | 2018-09-20 | 日本電気株式会社 | ネットワーク装置、監視制御装置、ネットワークシステム及びそれらの制御方法 |
CN110945837B (zh) * | 2017-06-01 | 2022-11-01 | 瑞典爱立信有限公司 | 优化sdn中的服务节点监视 |
WO2019111466A1 (ja) * | 2017-12-08 | 2019-06-13 | 日本電気株式会社 | 情報処理装置、仮想化インフラストラクチャ管理装置、仮想ネットワーク機能の管理方法及びプログラム |
CN108600158B (zh) * | 2018-03-08 | 2020-05-22 | 清华大学 | 一种基于软件定义网络的源地址验证系统 |
US11303548B2 (en) | 2020-07-31 | 2022-04-12 | Bank Of America Corporation | Network directionality mapping system |
CN113904984B (zh) * | 2021-10-21 | 2022-12-16 | 杭州志卓科技股份有限公司 | 一种适用于sap与b2b系统的数据传输方法 |
CN114666300B (zh) * | 2022-05-20 | 2022-09-02 | 杭州海康威视数字技术股份有限公司 | 基于多任务的双向连接阻断方法、装置及电子设备 |
US11983164B1 (en) | 2022-11-17 | 2024-05-14 | Bank Of America Corporation | System and method for data community detection via data network telemetry |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005210451A (ja) | 2004-01-23 | 2005-08-04 | Fuji Electric Holdings Co Ltd | 不正アクセス防止装置及びプログラム |
JP2010275002A (ja) | 2009-05-29 | 2010-12-09 | Yoshino Kogyosho Co Ltd | 閉鎖弁付きエアゾール容器 |
Family Cites Families (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7234163B1 (en) * | 2002-09-16 | 2007-06-19 | Cisco Technology, Inc. | Method and apparatus for preventing spoofing of network addresses |
US7516487B1 (en) * | 2003-05-21 | 2009-04-07 | Foundry Networks, Inc. | System and method for source IP anti-spoofing security |
US7523485B1 (en) * | 2003-05-21 | 2009-04-21 | Foundry Networks, Inc. | System and method for source IP anti-spoofing security |
CN101883090A (zh) | 2010-04-29 | 2010-11-10 | 北京星网锐捷网络技术有限公司 | 一种客户端的接入方法、设备及系统 |
KR101270041B1 (ko) * | 2011-10-28 | 2013-05-31 | 삼성에스디에스 주식회사 | Arp 스푸핑 공격 탐지 시스템 및 방법 |
-
2011
- 2011-12-02 WO PCT/JP2011/077933 patent/WO2012077603A1/ja active Application Filing
- 2011-12-02 EP EP11847623.3A patent/EP2651081A1/en not_active Withdrawn
- 2011-12-02 US US13/991,409 patent/US9118716B2/en not_active Expired - Fee Related
- 2011-12-02 CN CN201180058912.9A patent/CN103250392B/zh active Active
- 2011-12-02 JP JP2012547830A patent/JP5532458B2/ja not_active Expired - Fee Related
-
2014
- 2014-04-16 JP JP2014084197A patent/JP5790827B2/ja not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2005210451A (ja) | 2004-01-23 | 2005-08-04 | Fuji Electric Holdings Co Ltd | 不正アクセス防止装置及びプログラム |
JP2010275002A (ja) | 2009-05-29 | 2010-12-09 | Yoshino Kogyosho Co Ltd | 閉鎖弁付きエアゾール容器 |
Non-Patent Citations (1)
Title |
---|
CASADO ET AL.: "Ethane: Taking Control of the Enterprise", SIGCOMM '07 PROCEEDINGS OF THE 2007 CONFERENCE ON APPLICATIONS, TECHNOLOGIES, ARCHITECTURES, AND PROTOCOLS FOR COMPUTER COMMUNICATIONS(ACM SIGCOMM COMPUTER COMMUNICATION REVIEW), vol. 37, no. 4, October 2007 (2007-10-01), XP002531272 * |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2012160926A (ja) * | 2011-02-01 | 2012-08-23 | Nec Corp | 有害サイトフィルタリングシステム及びフィルタリング方法 |
JP2014032592A (ja) * | 2012-08-06 | 2014-02-20 | Nippon Telegr & Teleph Corp <Ntt> | 仮想マシンのマイグレーションシステムおよびその方法 |
WO2014034119A1 (en) * | 2012-08-30 | 2014-03-06 | Nec Corporation | Access control system, access control method, and program |
JP2015530763A (ja) * | 2012-08-30 | 2015-10-15 | 日本電気株式会社 | アクセス制御システム、アクセス制御方法及びプログラム |
CN103905383A (zh) * | 2012-12-26 | 2014-07-02 | 华为技术有限公司 | 一种数据报文转发方法、装置和系统 |
CN104348819A (zh) * | 2013-08-07 | 2015-02-11 | 上海宽带技术及应用工程研究中心 | 一种软件定义网络中的防火墙系统及其实现方法 |
US10555217B2 (en) | 2013-10-11 | 2020-02-04 | Nec Corporation | Terminal device, terminal-device control method, and terminal-device control program |
US10313375B2 (en) | 2013-11-22 | 2019-06-04 | Huawei Technologies Co., Ltd | Method and apparatus for malicious attack detection in an SDN network |
JP2016537898A (ja) * | 2013-11-22 | 2016-12-01 | 華為技術有限公司Huawei Technologies Co.,Ltd. | 悪意ある攻撃の検出方法および装置 |
US11637845B2 (en) | 2013-11-22 | 2023-04-25 | Huawei Technologies Co., Ltd. | Method and apparatus for malicious attack detection in a software defined network (SDN) |
WO2015155997A1 (ja) * | 2014-04-11 | 2015-10-15 | 日本電気株式会社 | 設定装置、制御装置、設定方法及びネットワークスイッチ |
US10887280B2 (en) | 2015-08-07 | 2021-01-05 | New H3C Technologies Co., Ltd | Cloud platform security achievement |
JP2018527813A (ja) * | 2015-08-07 | 2018-09-20 | ニュー エイチ3シー テクノロジーズ カンパニー,リミティド | クラウドプラットフォームのセキュリティの実現 |
US11438374B2 (en) * | 2015-08-18 | 2022-09-06 | Acronis International Gmbh | Agentless security of virtual machines for outbound transmissions using a network interface controller |
CN109413675A (zh) * | 2018-12-05 | 2019-03-01 | 斑马网络技术有限公司 | 车联网流量控制方法、装置及车载终端 |
Also Published As
Publication number | Publication date |
---|---|
JP5790827B2 (ja) | 2015-10-07 |
CN103250392B (zh) | 2016-12-14 |
JP5532458B2 (ja) | 2014-06-25 |
JP2014147120A (ja) | 2014-08-14 |
CN103250392A (zh) | 2013-08-14 |
US9118716B2 (en) | 2015-08-25 |
JPWO2012077603A1 (ja) | 2014-05-19 |
EP2651081A1 (en) | 2013-10-16 |
US20130254891A1 (en) | 2013-09-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP5790827B2 (ja) | 制御装置、制御方法、及び通信システム | |
US7360242B2 (en) | Personal firewall with location detection | |
US7908350B2 (en) | Methods for operating virtual networks, data network system, computer program and computer program product | |
JP3996288B2 (ja) | 通信ネットワークシステムの管理方法および情報中継装置 | |
US10491561B2 (en) | Equipment for offering domain-name resolution services | |
US20110032939A1 (en) | Network system, packet forwarding apparatus, and method of forwarding packets | |
US8015402B2 (en) | Address-authentification-information issuing apparatus, address-authentification-information adding apparatus, false-address checking apparatus, and network system | |
JP5062967B2 (ja) | ネットワークアクセス制御方法、およびシステム | |
WO2005036831A1 (ja) | フレーム中継装置 | |
CN107547510B (zh) | 一种邻居发现协议安全表项处理方法和装置 | |
WO2012141086A1 (ja) | コンピュータシステム、コントローラ、及びネットワークアクセスポリシ制御方法 | |
US10397111B2 (en) | Communication device, communication system, and communication method | |
JP2020017809A (ja) | 通信装置及び通信システム | |
JP6737610B2 (ja) | 通信装置 | |
US7835341B2 (en) | Packet communication apparatus | |
JP4648182B2 (ja) | パケット中継システム | |
WO2015174100A1 (ja) | パケット転送装置、パケット転送システム及びパケット転送方法 | |
CN102045307B (zh) | 一种网络设备管理的方法及相应的网络系统 | |
JP3739772B2 (ja) | ネットワークシステム | |
JP6472762B2 (ja) | パケットフィルタリング装置 | |
JP2017135622A (ja) | パケットフィルタリング装置 | |
WO2018173099A1 (ja) | ゲートウェイ及び中継方法 | |
WO2021123491A1 (en) | Protection against malicious data traffic | |
JP2016187113A (ja) | 不正接続防止装置と不正接続防止方法とシステム並びにプログラム |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 11847623 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2012547830 Country of ref document: JP Kind code of ref document: A |
|
REEP | Request for entry into the european phase |
Ref document number: 2011847623 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 2011847623 Country of ref document: EP |
|
WWE | Wipo information: entry into national phase |
Ref document number: 13991409 Country of ref document: US |
|
NENP | Non-entry into the national phase |
Ref country code: DE |