Unlock instant, AI-driven research and patent intelligence for your innovation.

Pseudo-defense framework and a method for SDN/NFV service deployment

A framework and virtual service technology, applied in the field of service deployment and mimic security defense, can solve problems such as slow service deployment process, slow processing of messages by SDN controller and NFV orchestrator, and traffic failure to pass correct service functions, etc., to increase attacks Difficulty and cost, effect of increasing mining difficulty

Active Publication Date: 2019-03-19
ZHEJIANG GONGSHANG UNIVERSITY
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (1) The attacker tampers with the service orchestration result, causing the service path to change, or selecting the wrong service function, resulting in the formation of a service function chain inconsistent with the user's requirements, or even disguising the attacker's own server as a service function to join the service function chain , resulting in deployment failure and business traffic being intercepted
[0007] (2) The attacker may directly attack the forwarding rule generation process of the SDN controller, thereby tampering with the forwarding rules, causing network layer traffic to fail to pass through correct service functions, and even affecting the normal operation of the entire network
[0008] (3) Hackers directly conduct DDOS or other resource consumption attacks on the service deployment system, causing the SDN controller and NFV orchestrator to process messages very slowly, causing the service deployment process to become very slow or even fail directly
[0009] (4) When the forwarding rules of the SDN controller are delivered to the network layer switch, the attacker may intercept, tamper or forge the forwarding rules during the delivery process.
[0010] (5) The VNF instantiation process of the server may be attacked by an attacker, that is, the attacker directly attacks the underlying server or instance service function

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Pseudo-defense framework and a method for SDN/NFV service deployment
  • Pseudo-defense framework and a method for SDN/NFV service deployment
  • Pseudo-defense framework and a method for SDN/NFV service deployment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] The present invention will be described in detail below with reference to the accompanying drawings.

[0036] A mimetic defense framework and method for SDN / NFV service deployment proposed by the present invention, such as figure 1 As shown, the method utilizes a dynamic heterogeneous redundant architecture to implement the service deployment process, thereby increasing the attack difficulty and improving the security of service deployment. The traditional service deployment architecture is mainly divided into three parts: user service request layer, control layer, and network layer. This method mainly designs the key part of the control layer by mimicking, and adds an executive pool, a judge and a network layer to the control layer. scheduler. Compared with traditional service deployment methods, this architecture can more effectively defend against external attacks.

[0037] further, as figure 2 As shown, the mimetic defense framework of the SDN / NFV service deploy...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a pseudo-defense framework and a method for SDN / NFV service deployment. The framework comprises a user service request layer, a control layer and a network layer. The method mainly carries out pseudo-design on the key part of the control layer, and adds an executor pool, a decider and a scheduler in the control layer. Compared with the traditional service deployment method,this method is more effective against external attacks. The method utilizes the dynamic heterogeneous redundancy architecture to implement the service deployment process, thereby increasing the attack difficulty and improving the security of the service deployment.

Description

technical field [0001] The invention relates to the field of service deployment and mimic security defense, in particular to a mimic defense framework and method for SDN / NFV service deployment. Background technique [0002] A Service Function Chain (SFC) is a collection of ordered service functions. For traditional service function chain deployment, first obtain specific service function requirements according to business requests issued by users, generate an initial service function logic chain, and then manually deploy specific physical devices into the network. In the traditional network architecture, network address translation (NAT), firewall (FW), and intrusion detection (IDS) are all implemented using professional physical devices, but they are expensive, difficult to upgrade, and placed in a fixed location. Therefore, network administrators need to carry out complex and rigorous design of how the physical network is deployed. When the network topology changes, it i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F8/60G06F21/55
CPCG06F8/60G06F21/55
Inventor 汤中运李传煌王伟明任云方
Owner ZHEJIANG GONGSHANG UNIVERSITY