Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Correct link judgment method and device for service chain security deployment under mimicry defense, equipment and medium

A service chain and the correct technology are applied in the field of service deployment and mimic security defense to achieve the effect of increasing workload and protecting purity

Pending Publication Date: 2020-05-15
ZHEJIANG GONGSHANG UNIVERSITY
View PDF2 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the embodiment of the present application provides a correct link judgment method, device, equipment and medium for the safe deployment of service chains under mimic defense, which solves the problem of judging output results under the multi-executive joint working mode

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Correct link judgment method and device for service chain security deployment under mimicry defense, equipment and medium
  • Correct link judgment method and device for service chain security deployment under mimicry defense, equipment and medium
  • Correct link judgment method and device for service chain security deployment under mimicry defense, equipment and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] figure 1 It is a flow chart of a method for judging the correct link for secure deployment of service chains under mimic defense provided in Embodiment 1 of the present application, which is applied to the server side, and the method includes:

[0052] Step S100, the decider is acquiring the data of all service chain deployment executors, and the content of each set of data includes service functions and service paths;

[0053] Specifically, use the set V to represent the output results of M execution bodies in all service chain deployment execution bodies:

[0054] V=(V 1 , V 2 ,...,V i ,...,V M )

[0055] The output of each executive body is described by a four-tuple, namely:

[0056] V i =(I i ,E i , SF i , SFP i )

[0057] V=(V 1 , V 2 ,...,V i ,...,V M )V i =(I i ,E i , SF i , SFP i ) among them, I i ,E i Respectively represent the source address and destination address of the service chain request business traffic in the output result of the...

Embodiment 2

[0090] image 3 It is a schematic structural diagram of a device for judging the correct link for secure deployment of service chains under mimic defense provided in the second embodiment of this application. The correct link judging method has corresponding functional modules and beneficial effects for executing the method. Such as image 3 As shown, the device includes:

[0091] The receiving module 100 is used to obtain the data of all service chain deployment executives, and the content of each set of data includes service functions and service paths;

[0092] The judgment module 200 is used to extract and compare all service functions and service paths respectively. If the service functions and service paths of the two sets of data are the same, it is determined that the two sets of data are consistent, and the consistent data is classified into one category. Count the amount of data for each category, record the category with the largest amount of data as correct data...

Embodiment 3

[0096] Figure 4 It is a schematic structural diagram of a device provided by Embodiment 3 of the present invention. Figure 4 A block diagram of an exemplary device 1 suitable for implementing embodiments of the invention is shown. Figure 4 The displayed device is only an example, and should not limit the functions and scope of use of the embodiments of the present application.

[0097] Such as Figure 4 As shown, device 1 takes the form of a general-purpose computing device. The components of the device 1 may include, but are not limited to: one or more processors or processing units 2, a memory 3, and a bus 4 connecting different system components (including the memory 3 and the processing unit 2).

[0098] Bus 4 represents one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processor, or a local bus using any of a variety of bus structures. These architectures include, by way of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a correct link judgment method and device for service chain security deployment under mimicry defense, equipment and a medium. The method comprises the steps of obtaining the data of all service chain deployment executors, and enabling the content of each group of data to comprise a service function and a service path; respectively extracting and comparing all service functions, respectively extracting and comparing service paths, judging that the two groups of data are consistent if the service functions of the two groups of data are the same and the service paths arethe same, classifying the consistent data into one class, counting the data volume of each class, recording the class with the maximum data volume as correct data, and recording the rest as abnormal data; and feeding back the executive body which outputs the abnormal data, and cleaning or offline. According to the correct link judgment method and device for service chain security deployment undermimicry defense, the equipment and the medium, which are provided by the invention, the security of a mimicry service chain deployment system is enhanced.

Description

technical field [0001] The embodiments of the present application relate to the fields of service deployment and mimic security defense, and specifically relate to a correct link judgment method, device, equipment and medium for secure deployment of service chains under mimic defense. Background technique [0002] With the emergence and application of Software Defined Network (Software Defined Network, SDN) technology and Network Function Virtualization (Network Function Virtualization, NFV) technology, the deployment of service function chain has regained its vitality. Service function chain deployment based on SDN / NFV technology. NFV technology can virtualize common physical devices and build resource pools for various network service functions. SDN technology can dynamically and centrally schedule traffic paths by separating the control and forwarding of network devices, thereby providing customized and flexible docking. Users and operators can identify business requirem...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/1425H04L63/1441H04L63/1466H04L63/20
Inventor 汤中运李传煌王伟明雷睿叶晨轶陈泽斌
Owner ZHEJIANG GONGSHANG UNIVERSITY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products