期刊文献+

基于风险感知的关键虚拟网络功能动态迁移方法 被引量:6

Dynamic migration method of key virtual network function based on risk awareness
下载PDF
导出
摘要 针对传统动态迁移方法在应对侧信道攻击问题时存在迁移节点多、迁移频率高、迁移后服务功能链路径过长的问题,提出了一种基于风险感知的关键虚拟网络功能动态迁移方法。所提方法仅对含隐私信息的关键虚拟网络功能进行迁移,以减少迁移节点数量;结合侧信道攻击检测系统,对遭受攻击的关键虚拟网络功能执行触发式迁移,同时依据侧信道信息泄露模型对关键虚拟网络功能进行定期式迁移;采用基于逼近理想解排序的多属性节点排序方法选择迁移目的服务器,以避免迁移后路径过长。实验结果表明,所提方法在达到相同的侧信道攻击防御性能的情况下,具有更低的节点迁移数量与迁移频率,同时有效避免了迁移后服务功能链路径过长问题。 Aiming at the problems that traditional dynamic migration methods have many migration nodes,high migration frequency,and long service function chain(SFC)link path after migration when dealing with side channel attack,a dynamic migration method of critical virtual network function(VNF)based on risk awareness was proposed.In order to reduce the number of migrated nodes,only the key VNF with private information was migrated.Combined with the side channel attack detection system,the triggering migration was performed on the critical VNF which were under attack,and the key VNF was also periodically migrated according to the side channel information leakage model.Finally,a multi-attribute node sorting method base on the technique for order preference by similarity to ideal solution was used to select the migration destination server to avoid the path being too long after migration.Experiments show that the proposed method has a lower number of migration nodes and migration frequency when achieving the same side channel attack defense performance,and effectively avoids the problem that the SFC path is too long after migration.
作者 丁绍虎 谢记超 张鹏 普黎明 谷允捷 DING Shaohu;XIE Jichao;ZHANG Peng;PU Liming;GU Yunjie(Institute of Information Technology,Information Engineering University,Zhengzhou 450002,China)
出处 《通信学报》 EI CSCD 北大核心 2020年第4期102-113,共12页 Journal on Communications
基金 国家自然科学基金资助项目(No.61802429,No.61872382,No.61521003) 国家重点研发计划基金资助项目(No.2017YFB0803201,No.2017YFB0803204)。
关键词 服务功能链 虚拟网络功能 侧信道攻击 动态迁移 多属性节点排序 service function chain virtual network function side-channel attack dynamic migration multi-attribute node sorting
  • 相关文献

参考文献6

二级参考文献42

  • 1KHAN A, ZUGENMAIER A, JURCA D, et al. Network virtualization:a hypervisor for the Internet?[J]. IEEE Communications Magazine,2012,50(1): 136-143.
  • 2WANG A, IYER M, DUTTA R, et al. Network virtualization: tech-nologies, perspectives, and frontiers [J]. Journal of Lightwave Tech-nology,2013,31 (4):523-537.
  • 3ANDERSON T, PETERSON L,SHENKER S’ et al. Overcoming theInternet impasse through virtualization[J]. Computer, 2005,38(4):34-41.
  • 4BARI M, BOUTABA R, ESTEVES R,et al. Data center networkvirtualization: a survey [J], IEEE Communications Surveys and Tuto-rials, 2013, 15(2): 909-928.
  • 5BERMAN M,CHASE J S,LANDWEBER L, et al. GENI: a federatedtestbed for innovative network experiments [J]. Computer Networks,2014,61:5-23.
  • 6NATARAJAN S, WOLF T. Security issues in network virtualizationfor the future Intemet[A]. Proceedings of the IEEE ICNC[C]. Maui,HI, 2012: 537-543.
  • 7FISCHER A, BOTERO J F, BECK M T, et al Virtual network embed-ding: a survey[J]. IEEE Communications Surveys & Tutorials, 2013,15(4): 1888-1906.
  • 8YU M L, YI Y’ REXFORD J, et al. Rethinking virtual network em-bedding: substrate support for path splitting and migration[J]. ACMSIGCOMM Computer Communication Review, 2008,38(2): 17-29.
  • 9HSU W H, SHIEH Y P. Virtual network mapping algorithm in thecloud infrastructure[J]. Journal of Network and Computer Applications,2013,36(6): 1724-1734.
  • 10FAJJARI I, AITSAADI N, PIORO M, et al. A new virtual networkstatic embedding strategy within the Cloud’s private backbone nel-work[J]+ Computer Networks, 2014, 62: 69-88.

共引文献56

同被引文献54

引证文献6

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部