Patents by Inventor Qingxiang Gong

Qingxiang Gong has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10536480
    Abstract: The present disclosure provides a method and a device for simulating and detecting DDoS Attacks in software defined networking. The method comprises: adding zombie hosts in a preset linear increasing mode and an incremental mode, and launching stealthy DDoS Attacks on a data plane to a preset target switch in a software defined networking through all zombie hosts; synchronously updating a pre-built attack flow monitoring table on a controller of the networking according to updating of flow tables on all switches; periodically detecting the monitoring table to determine whether the monitoring table includes a monitoring table entry having existence duration over a preset duration threshold; and determining that a network flow corresponding to the monitoring table entry is a stealthy attack flow on the data plane of the networking when the monitoring table includes the monitoring table entry having the existence duration over the preset duration threshold.
    Type: Grant
    Filed: March 15, 2018
    Date of Patent: January 14, 2020
    Assignee: SHENZHEN UNIVERSITY
    Inventors: Qiao Yan, Qingxiang Gong, Jianyong Chen
  • Publication number: 20180324212
    Abstract: The present disclosure provides a method and a device for simulating and detecting DDoS Attacks in software defined networking. The method comprises: adding zombie hosts in a preset linear increasing mode and an incremental mode, and launching stealthy DDoS Attacks on a data plane to a preset target switch in a software defined networking through all zombie hosts; synchronously updating a pre-built attack flow monitoring table on a controller of the networking according to updating of flow tables on all switches; periodically detecting the monitoring table to determine whether the monitoring table includes a monitoring table entry having existence duration over a preset duration threshold; and determining that a network flow corresponding to the monitoring table entry is a stealthy attack flow on the data plane of the networking when the monitoring table includes the monitoring table entry having the existence duration over the preset duration threshold.
    Type: Application
    Filed: March 15, 2018
    Publication date: November 8, 2018
    Inventors: Qiao Yan, Qingxiang Gong, Jianyong Chen