电信科学 ›› 2022, Vol. 38 ›› Issue (4): 101-112.doi: 10.11959/j.issn.1000-0801.2022070

• 研究与开发 • 上一篇    下一篇

基于拟态防御架构的服务功能链执行体动态调度方法

李传煌, 唐晶晶, 陈泱婷, 雷睿, 陈超, 王伟明   

  1. 浙江工商大学信息与电子工程学院(萨塞克斯人工智能学院),浙江 杭州 310018
  • 修回日期:2022-04-06 出版日期:2022-04-20 发布日期:2022-04-01
  • 作者简介:李传煌(1980− ),男,博士,浙江工商大学教授、硕士生导师,主要研究方向为软件定义网络、开放可编程网络、边缘计算、人工智能应用等
    唐晶晶(1998− ),女,浙江工商大学硕士生,主要研究方向为软件定义网络、人工智能应用
    陈泱婷(1998− ),女,浙江工商大学硕士生,主要研究方向为软件定义网络、人工智能应用
    雷睿(1996− ),男,浙江工商大学硕士生,主要研究方向为软件定义网络、人工智能应用
    陈超(1986− ),男,博士,浙江工商大学副教授、硕士生导师,主要研究方向为下一代无线通信网络技术、网络编码、机器/深度学习等
    王伟明(1964− ),男,博士,浙江工商大学教授、硕士生导师,主要研究方向为新一代网络架构、开放可编程网络
  • 基金资助:
    国家自然科学基金资助项目(61871468);国家自然科学基金资助项目(62111540270);浙江省新型网络标准与应用技术重点实验室资助项目(2013E10012)

Dynamic scheduling method of service function chain executors based on the mimic defense architecture

Chuanhuang LI, Jingjing TANG, Yangting CHEN, Rui LEI, Chao CHEN, Weiming WANG   

  1. School of Information and Electronic Engineering (Sussex Artificial Intelligence Institute), Zhejiang Gongshang University, Hangzhou 310018, China
  • Revised:2022-04-06 Online:2022-04-20 Published:2022-04-01
  • Supported by:
    The National Natural Science Foundation of China(61871468);The National Natural Science Foundation of China(62111540270);Zhejiang Key Laboratory of Network Standards and Applied Technology(2013E10012)

摘要:

面对静态、滞后的传统防御技术无法有效应对新型网络攻击的问题,根据拟态安全防御理论,提出了一种建立在数据转发层面的拟态服务功能链(mimic service function chain,MSFC)防御架构,基于该架构进一步提出了一种基于判决反馈的执行体动态调度方法。该方法以判决器反馈的异常执行体信息、执行体的异构度以及系统的实际负载量作为调度影响因素,使调度方法可以根据网络实际变化进行自适应调整。此外,该调度方法利用判决反馈对调度时间进行调整,以达到系统花费与安全性的最佳平衡,降低了系统的资源开销。仿真结果表明,该调度方法可以在平衡系统花费与安全性的基础上,选出更符合当前网络需求的高异构度执行体集合,从而提升系统的安全性及可靠性。

关键词: 服务功能链, 拟态防御, 动态调度, 执行体, 异构度

Abstract:

Faced with the problem that static and lagging traditional defense technologies cannot effectively deal with new network attacks, according to the theory of mimetic security defense, a defense architecture of mimic service function chain (MSFC) based on the data forwarding level was proposed, and an execution dynamic scheduling method based on the decision feedback was further proposed.The method took the abnormal executor information fed back by the decision maker, the heterogeneity of executors and the actual load of the system as the scheduling influencing factors, so that the scheduling method can be adjusted adaptively according to the actual changes of the network.In addition, the scheduling method used decision feedback to adjust the scheduling time, so as to achieve the best balance between system cost and security, and reduce the resource overhead of the system.Simulation results showed that the scheduling method can select a set of highly heterogeneous actuators that better meet the current network requirements on the basis of balancing the system cost and security, so as to improve the security and reliability of the system.

Key words: service function chain, mimic defense, dynamic scheduling, executor, heterogeneous degree

中图分类号: 

No Suggested Reading articles found!