期刊文献+

基于聚类的安全分级虚拟网络映射方法

Safe hierarchical virtual network mapping method based on clustering
下载PDF
导出
摘要 基于5G网络环境,提出了一种基于K-means聚类的安全分级虚拟网络映射方法,特别涉及一种对节点安全分级的思想,结合K-menas聚类算法,解决当下虚拟网络映射存在的低安全性、低映射效率等关键问题,与传统方法相比,所提方法提高了虚拟节点映射的效率,增强了网络韧性。 Based on the 5G network environment,a security hierarchical virtual network mapping method based on K-means clustering was proposed.In particular,the idea of node security classification and the combination of K-menas clustering algorithm was involved to solve the key problems of low security and low mapping efficiency existing in current virtual network mapping.Compared with traditional methods,this research method improves the efficiency of virtual node mapping and enhances the network resilience.
作者 陆勰 徐雷 张曼君 LU Xie;XU Lei;ZHANG Manjun(Research Institute of China United Network Communications Group Co.,Ltd.,Beijing 100048,China)
出处 《电信科学》 2021年第9期112-117,共6页 Telecommunications Science
关键词 聚类 安全分级 虚拟节点 映射 K-MEANS clustering security classification virtual node mapping K-means
  • 相关文献

参考文献10

二级参考文献112

  • 1马炫.求解k条最优路径问题的遗传算法[J].计算机工程与应用,2006,42(12):100-101. 被引量:29
  • 2林洁,杨立才,吴晓晴,叶杨.求解动态路径诱导K路最短问题的人工免疫优化方法[J].山东大学学报(工学版),2007,37(2):103-108. 被引量:6
  • 3ANDERSON T, PETERSON L, SHENKER S, et al. Overcoming the Internet impasse through virtualization[J]. Computer, 2005, 38(4): 34-41.
  • 4TURNER J, TAYLOR D. Diversifying the Internet[A]. Proceedings of the IEEE Global Telecommunications Conference[C]. St Louis, MO, 2005. 755-760.
  • 5BAVIER A, FEAMSTER N, HUANG M, et al. In VINI veritas: realistic and controlled network experimentation[A]. Proceedings of the ACM SIGCOMM[C]. Pisa, Italy, 2006.3-14.
  • 6FEAMSTER N, GAO L, REXFORD J. How to lease the Internet in your spare time[J]. ACM SIGCOMM Computer Communication Review, 2007, 37(1): 61-64.
  • 7CHOWDHURY N, BOUTABA R. A survey of network virtualization[J]. Computer Networks, 2010, 54(5): 862-876.
  • 8CHOWDHURY N, BOUTABA R. Network virtualization: state of the art and research challenges[J]. IEEE Communications Magazine, 2009, 47(7): 20-26.
  • 9GUPTA A, KLEINBERG J, KUMAR A, et al. Provisioning a virtual private network: a network design problem for multicommodity flow[A]. Proceedings of the 33th Annual ACM Symposium on Theory of Computing[C]. Heraklion, Crete, Greece, 2001. 389-398.
  • 10HAQUE A, HOP. A study on the design of survivable optical virtual private networks (O-VPN) [J]. IEEE Transactions on Reliability, 2006, 55(3): 516-524.

共引文献162

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部