Chinese Journal of Network and Information Security ›› 2018, Vol. 4 ›› Issue (11): 49-57.doi: 10.11959/j.issn.2096-109x.2018088

• Papers • Previous Articles     Next Articles

Research on backup and remapping of network slice based on security classification

Zhiyong SUN,Xinsheng JI,Wei YOU,Quan YUAN   

  1. National Digital Switching System Engineering &Technological Research Center,Zhengzhou 450002,China
  • Revised:2018-10-15 Online:2018-11-01 Published:2019-01-03
  • Supported by:
    The Foundation for Innovative Research Groups of the National Natural Science Foundation of China(61521003);The National Key R&D Program of China(2016YFB0801605)


In the future virtual environment of 5G core network,the general X86 servers make the attackers exploit vulnerabilities more easily,the substrate network is infected with and spreads the virus more easily,and the problem of single physical node failed will affect the service performance of the network slice seriously.Based on the existing node backup and remapping solutions,considering the impact of security constraints among nodes on network security performance,a security parameter evaluation model of virtual nodes and physical nodes were proposed in the network slicing,and the security constraint relationship was established between the virtual nodes and the physical nodes.Then backup virtual nodes were selected based on the security parameters evaluation model,and backup mapping methods were designed.Finally,the node remapping mechanism was designed with satisfying the requirement of network delay.Experiments show that the proposed method can significantly improve network intrusion tolerance with satisfying the requirements of network slicing service performance.

Key words: network slice, service function chain mapping, backup,remapping, reliability

CLC Number: 

No Suggested Reading articles found!