Network function heterogeneous redundancy deployment method based on immune algorithm

Aiming at the problem that the existing security defense methods cannot resist many unknown vulnerabilities and backdoors in the network function virtualization platform, a mimic defense architecture for network function virtualization using mimic defense ideas was proposed, a heterogeneous redundan...

Full description

Saved in:
Bibliographic Details
Main Authors: Qingqing ZHANG, Hongbo TANG, Wei YOU, Yingle LI
Format: Article
Language:English
Published: POSTS&TELECOM PRESS Co., LTD 2021-02-01
Series:网络与信息安全学报
Subjects:
Online Access:http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021005
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841529881770328064
author Qingqing ZHANG
Hongbo TANG
Wei YOU
Yingle LI
author_facet Qingqing ZHANG
Hongbo TANG
Wei YOU
Yingle LI
author_sort Qingqing ZHANG
collection DOAJ
description Aiming at the problem that the existing security defense methods cannot resist many unknown vulnerabilities and backdoors in the network function virtualization platform, a mimic defense architecture for network function virtualization using mimic defense ideas was proposed, a heterogeneous redundant deployment method based on an immune algorithm for the construction of heterogeneous pools was proposed.Firstly, the degree of heterogeneity between heterogeneous entities was quantitatively evaluated in combination with the entropy value method, then the network function heterogeneous redundant deployment problem was constructed into a minimax problem with the optimization goal of maximizing the degree of heterogeneity between heterogeneous entities, and finally the immune algorithm was used to quickly solve the optimal deployment solution of network functions.Simulation results show that the proposed method can quickly converge to an optimal deployment scheme and ensure that the overall distribution of heterogeneity between heterogeneous bodies is at a high level, effectively increasing the diversity between heterogeneous bodies and improving the attacker's difficulty.
format Article
id doaj-art-5c5e9a6fe8224fb283547fcc3f93ad47
institution Kabale University
issn 2096-109X
language English
publishDate 2021-02-01
publisher POSTS&TELECOM PRESS Co., LTD
record_format Article
series 网络与信息安全学报
spelling doaj-art-5c5e9a6fe8224fb283547fcc3f93ad472025-01-15T03:14:38ZengPOSTS&TELECOM PRESS Co., LTD网络与信息安全学报2096-109X2021-02-017465659562502Network function heterogeneous redundancy deployment method based on immune algorithmQingqing ZHANGHongbo TANGWei YOUYingle LIAiming at the problem that the existing security defense methods cannot resist many unknown vulnerabilities and backdoors in the network function virtualization platform, a mimic defense architecture for network function virtualization using mimic defense ideas was proposed, a heterogeneous redundant deployment method based on an immune algorithm for the construction of heterogeneous pools was proposed.Firstly, the degree of heterogeneity between heterogeneous entities was quantitatively evaluated in combination with the entropy value method, then the network function heterogeneous redundant deployment problem was constructed into a minimax problem with the optimization goal of maximizing the degree of heterogeneity between heterogeneous entities, and finally the immune algorithm was used to quickly solve the optimal deployment solution of network functions.Simulation results show that the proposed method can quickly converge to an optimal deployment scheme and ensure that the overall distribution of heterogeneity between heterogeneous bodies is at a high level, effectively increasing the diversity between heterogeneous bodies and improving the attacker's difficulty.http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021005network function virtualizationmimic defenseheterogeneous redundancyimmune algorithm
spellingShingle Qingqing ZHANG
Hongbo TANG
Wei YOU
Yingle LI
Network function heterogeneous redundancy deployment method based on immune algorithm
网络与信息安全学报
network function virtualization
mimic defense
heterogeneous redundancy
immune algorithm
title Network function heterogeneous redundancy deployment method based on immune algorithm
title_full Network function heterogeneous redundancy deployment method based on immune algorithm
title_fullStr Network function heterogeneous redundancy deployment method based on immune algorithm
title_full_unstemmed Network function heterogeneous redundancy deployment method based on immune algorithm
title_short Network function heterogeneous redundancy deployment method based on immune algorithm
title_sort network function heterogeneous redundancy deployment method based on immune algorithm
topic network function virtualization
mimic defense
heterogeneous redundancy
immune algorithm
url http://www.cjnis.com.cn/thesisDetails#10.11959/j.issn.2096-109x.2021005
work_keys_str_mv AT qingqingzhang networkfunctionheterogeneousredundancydeploymentmethodbasedonimmunealgorithm
AT hongbotang networkfunctionheterogeneousredundancydeploymentmethodbasedonimmunealgorithm
AT weiyou networkfunctionheterogeneousredundancydeploymentmethodbasedonimmunealgorithm
AT yingleli networkfunctionheterogeneousredundancydeploymentmethodbasedonimmunealgorithm