Font Size: a A A

Research And Implementation Of Key Technologies For Service Chain Deployment Under Mimic Defense

Posted on:2021-04-20Degree:MasterType:Thesis
Country:ChinaCandidate:Y F RenFull Text:PDF
GTID:2428330623459089Subject:Engineering
Abstract/Summary:PDF Full Text Request
In recent years,Internet technology has developed rapidly.However,while Internet technology is developing rapidly,network security issues have become more and more serious.Service chain deployment has become a widely used application in the world.All aspects are linked.With the continuous changes of cyber attacks,service chain deployment has gradually exposed many security problems.However,traditional defense methods have been unable to effectively deal with new types of attacks,and the security of service chain deployment is not guaranteed.Due to the static and lag of traditional defense methods,it is impossible to effectively defend against new types of attacks when deploying service chains.In recent years,the rapidly developing mimic defense technology can effectively compensate for the static and lagging defects of traditional defense methods.The mimic defense technology is combined with the service chain deployment process to design a service chain deployment mimic defense architecture with endogenous security features—service chain deployment mimic defense system to improve the security of service chain deployment.The architecture utilizes dynamic heterogeneity.The dynamic,heterogeneous,and redundant nature of the redundancy model makes the service chain deployment process unpredictable and random,greatly increasing the cost and cost of attackers' attacks,and effectively improving the service chain deployment safety.Compared with other mimic defense systems,the service chain deployment mimic defense system has fewer heterogeneous elements to choose from,and the heterogeneous executor pool cannot be designed to maximize the degree of heterogeneity.Some elements are the same or similar.If the traditional random schedule algorithm is used directly,it is easy to select a set of executors with less heterogeneity,which makes the whole system less secure and reliable.In this paper,we propose a heterogeneous schedule algorithm for how to guarantee the heterogeneity of the set of executors.The schedule algorithm compares the selected executors from the pool of heterogeneous executors,and selects them twice before and after.Executions in the set of executors are compared,and when the degree of heterogeneity of the set of executors reaches a certain standard,this is the result of the current schedule.The experimental results show that the schedule algorithm can ensure that the heterogeneity of each selected set of executors is at a high level as much as possible,which improves the security of the system,and the schedule algorithm is also applicable to other mimic defense systems.In the service chain deployment mimic defense system,the output of the executor that the verdict needs to decide is actually a flow table.However,the flow table formed after service orchestration has a larger result than that of other mimic defense systems.As the service chain requests issued by users continue to increase and become more and more complicated,the flow table that the judgment needs to judge will also as a result,it increases and becomes larger,which causes a large overhead on the transmission link of the verifier and the executor.In addition,as the attacker continues to attack,the number of abnormal executors in the heterogeneous executor pool will continuously increase.If the abnormal executor is not processed correspondingly,the security of the system will be seriously affected.Aiming at this problem,this paper proposes an MD5 encryption judgment algorithm for abnormal executor feedback,which performs MD5 encryption on the execute result of each executor in the heterogeneous executor set,and feeds the executor of the abnormality to the scheduler.The abnormal executor is cleaned or offline processed by the scheduler.The experimental results show that the judgment algorithm effectively improves the decision efficiency of the decider.In addition,the decision algorithm also improves the security of the system to some extent.
Keywords/Search Tags:service chain deployment, mimic defense, heterogeneous schedule, MD5 judgment
PDF Full Text Request
Related items