CN112866277A - Scheduling method of mimicry service function chain - Google Patents
Scheduling method of mimicry service function chain Download PDFInfo
- Publication number
- CN112866277A CN112866277A CN202110144910.7A CN202110144910A CN112866277A CN 112866277 A CN112866277 A CN 112866277A CN 202110144910 A CN202110144910 A CN 202110144910A CN 112866277 A CN112866277 A CN 112866277A
- Authority
- CN
- China
- Prior art keywords
- sfo
- execution
- scheduling
- elements
- abnormal
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1408—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention provides a scheduling method of a mimicry service function chain, in particular to a scheduling method which ensures the system isomerism and selects an executive body to meet the network requirement. And the scheduling method adjusts the scheduling time to achieve the optimal balance of system expense and safety. Compared with the traditional scheduling method, the scheduling method takes the abnormal executive information, the heterogeneous degree of the executive and the actual load of the system as the scheduling influence factors, so that the scheduling method can be adaptively adjusted according to the network change, and the safety of the system is improved.
Description
Technical Field
The invention relates to the field of mimicry security defense and service functions, in particular to a scheduling method of a mimicry service function chain.
Background
With the advent and deployment of Software Defined Networking (SDN) technology and Network Function Virtualization (NFV) technology, the deployment of service Function chains has been renewed. Service function chain deployment is carried out based on an SDN/NFV technology, the NFV technology can virtualize common physical equipment, and resource pools can be constructed for various network service functions. SDN technology can dynamically and centrally schedule paths of traffic by separating control and forwarding of network devices, thereby providing customized and flexible interfacing. SFCs are built based on SDN and NFV technologies, SFs being key components of SFCs, and all data flows in the SFC domain must go through a specific SF to complete a specific service function. If the SF is controlled by an attacker, it may result in a crash of the entire SFC domain.
The Mimicry Security Defense (MSD) is a dynamic and random selection of a plurality of hardware variants and software variants that perform corresponding functions under active and passive triggering conditions. Therefore, the system has the characteristics of dynamic property, randomness, redundancy, heterogeneity, non-persistence and the like, no matter an internal attacker or an external attacker can not accurately acquire the operating environment and state information of internal elements of the system, a stable attack chain can not be established according to backdoors and vulnerabilities, and therefore the purpose of improving the safety of the system is achieved.
Attackers can be classified into static attackers (static attackers) and adaptive attackers (adaptive attackers) according to the network attack mode. The probability of success of the static attackers in each attack on any target is the same, and the adaptive attackers have memory capacity and can quickly attack the same or similar targets. Therefore, the method comprises the following steps:
1) the less heterogeneous the mimicry system, the higher the probability that the system will be successfully attacked by an attacker. The greater the heterogeneity of the mimicry system, the lower the probability of successful attack by an attacker, and the higher the security.
2) The probability of an actor being attacked necessarily increases as the time it is exposed to the network increases. Furthermore, as long as an executable is infected, an attacker can maintain continuous control over the executable.
The basic scheduling process of the system is a process of selecting an offline execution entity with a large degree of heterogeneity from a heterogeneous execution entity pool every T _ s by taking a set time interval T _ s as a measure, and offline a previous online execution entity. The timed replacement of online executors can reduce the exposure time of each executor while maintaining system heterogeneity. Therefore, the uncertainty of the system structure information is inevitably improved, and the risk of vulnerability discovery is reduced. Because the system is in a continuously updated state and keeps high heterogeneity all the time, the early effort of adaptive attackers can be eliminated, and some potential bugs and state jumps of backdoors can also be eliminated. And after the infected abnormal execution body is found, the system can directly take the abnormal execution body off line through scheduling, and the purpose of effectively blocking the attacker from continuously controlling the abnormal execution body is achieved.
Disclosure of Invention
The invention aims to provide a scheduling method of a mimicry service function chain aiming at the defects of the prior art, and the method can be used for carrying out self-adaptive adjustment according to network change, thereby improving the safety of a system.
The technical scheme adopted by the invention for solving the technical problems is as follows: a scheduling method of a mimicry service function chain comprises the following steps:
(1) selecting an SF execution body set meeting requirements from a heterogeneous SF execution body pool according to the reliability of a mimicry Service Function (SF) execution body; the heterogeneous SF execution pool has l SF execution entities for executing different types of service functions, which specifically includes the following steps:
SF={S1,S2,…,Si,…,Sl}
wherein S isiDenotes a set of SF executors that perform the service function of the ith class.
(2) Time interval T passing scheduling cyclesEntering the next scheduling cycle, assuming that the ith service function is needed, setting a set U to represent a set SiA set of all elements of the SF execution block set SFo which do not belong to the previous scheduling cycle;
(3) to pairCalculate the ith executive SF in UiZeta degree of trustworthinessiThe concrete formula is as follows:
wherein σiRepresents SFiBase degree of selection, Δ dlRepresents the system load, Δ daAn increment, ξ, representing the total number of anomalous executables relative to the value corresponding to the previous scheduling cyclelAn increase threshold, ξ, representing the system loadaA growth threshold, gamma, representing the number of abnormally executed bodiesiRepresents SFiThe degree of isomerism with all elements in the set SFo,represents SFiThe confidence level of the device itself is determined,indicating updated SF according to network traffic changesiThe execution speed influence value of (1);
(4) the scheduler selects a new SF execution body set from the set U according to the credibility value calculated in the step (3);
(5) traversing all SF executives in the new SF executant set obtained in the step (4), combining all sets which meet the ith service function and comprise a plurality of SF executants, and calculating the overall isomerism rho of each combination;
(6) and (5) selecting the combination with the maximum integral isomerism in the step (5) as a new online SF executive body set.
Further, in the step (1) and the step (4), after the executables in the heterogeneous SF executable pool are sorted according to the reliability, the executables with 15% of the reliability are selected to form an SF executable set.
Further, SFiBase degree of selection σ ofiThe calculation formula is as follows:
wherein, taubelThe confidence level is represented to affect the weight,represents SFiConfidence of itself, τisoRepresenting the influence weight, τ, of the degree of isomerismvIndicating that the SF execution speed affects the weight,indicating updated SF according to network traffic changesiIs the execution speed influence value ofoRepresenting the isomerous discount factor. n denotes the total number of elements in the set SFo, SFoiAnd SFojRespectively representing the ith and jth elements in the SFo execution volume set. Alpha (SFo)i,SFoj) Represents SFoiAnd SFojThe degree of isomerism of (a).
Further, SFiDegree of isomerism γ with all elements of the set SFoiThe calculation formula is as follows:
wherein, deltaoRepresenting a heterogeneous discount factor, SFojRepresents the jth element in the SFo execution volume set, and n represents the total number of elements in the set SFo.
Further, the overall isomerization p of the combination is calculated as follows:
wherein, deltaoRepresenting a heterogeneous discount factor, SFoiAnd SFojRespectively represent the ith and jth elements in the SFo execution body set, and n represents the total number of elements in the set SFo.
Further, the degree of isomerism α (SF)i,SFj) The calculation formula is as follows
Wherein lgNumber of heterogeneous factor types, delta, of the g-th heterogeneous element of SF executantgRepresents the weight, delta, of the g-th heterogeneous elementgkWeight, SF, of a class k heterogeneous factor representing a class g heterogeneous elementiAnd SFjRepresenting the ith and jth elements in the SF execution block set. e represents the number of heterogeneous element types that make up the elements in the SF executable set.
Further, the time interval T of the scheduling periodsThe real-time dynamic adjustment specifically comprises the following steps: let r beiTo representTotal number of abnormal SF executors, TsHas a maximum value of ximaxAnd tau represents the number of times that the number of abnormal execution bodies is zero, accumulation is started from the condition that the number of the abnormal execution bodies is zero at the first time, the tau is set to zero immediately once the abnormal execution bodies are not zero, and the tau is restarted when the number of the abnormal execution bodies is zero. The time interval scheduling time update function of the scheduling period is as follows:
where δ is a constant greater than zero, depending on the particular network conditions,indicates the time interval from the (i-1) th scheduling to the ith scheduling, ξnIndicating the existence of abnormal SF execution body threshold value, if the number of the abnormal SF execution bodies is more than xinThe current system is considered to need to improve the system security by reducing the scheduling time to reduce the number of abnormal execution bodies. If the number of abnormal SF executors is less than or equal to xinThen it is assumed to rely only on internal adjustment of the scheduling algorithm itselfThe number of abnormal executives can be reduced.
The invention has the beneficial effects that: compared with the traditional scheduling method, the method takes the abnormal executive information, the heterogeneous degree of the executive and the actual load capacity of the system as the scheduling influence factors, so that the scheduling method can be adaptively adjusted according to the network change, and the safety of the system is improved.
Drawings
Fig. 1 is a flowchart of a scheduling method in a scheduling period.
Detailed Description
In order to make the scheduling method of the present application clearer, the following will clearly and completely describe the technical solution of the present application with reference to the accompanying drawings and the specific embodiments of the present application:
as shown in fig. 1, the present invention provides a scheduling method of a mimicry service function chain, which includes the following steps:
(1) sorting executives in a heterogeneous SF executable pool according to the reliability of a mimicry Service Function (SF) executable, and selecting the executives with the top 15% of the reliability from the heterogeneous SF executable pool as an SF executable set meeting the requirement; the heterogeneous SF execution pool has l SF execution entities for executing different types of service functions, which specifically includes the following steps:
SF={S1,S2,…,Si,…,Sl}
wherein S isiDenotes a set of SF executors that perform the service function of the ith class.
(2) Time interval T passing scheduling cyclesEntering the next scheduling cycle, assuming that the ith service function is needed, setting a set U to represent a set SiA set of all elements of the SF execution block set SFo which do not belong to the previous scheduling cycle;
time interval T of the scheduling periodsThe real-time dynamic adjustment specifically comprises the following steps: let r beiTo representAbnormal SF execution block populationNumber, TsHas a maximum value of ximaxAnd tau represents the number of times that the number of abnormal execution bodies is zero, accumulation is started from the condition that the number of the abnormal execution bodies is zero at the first time, the tau is set to zero immediately once the abnormal execution bodies are not zero, and the tau is restarted when the number of the abnormal execution bodies is zero. The time interval scheduling time update function of the scheduling period is as follows:
where δ is a constant greater than zero, depending on the particular network conditions,indicates the time interval from the (i-1) th scheduling to the ith scheduling, ξnIndicating the existence of abnormal SF execution body threshold value, if the number of the abnormal SF execution bodies is more than xinThe current system is considered to need to improve the system security by reducing the scheduling time to reduce the number of abnormal execution bodies. If the number of abnormal SF executors is less than or equal to xinIt is considered that the number of abnormally executed bodies can be reduced only by internal adjustment of the scheduling algorithm itself.
(3) To pairCalculate the ith executive SF in UiZeta degree of trustworthinessiThe concrete formula is as follows:
wherein σiRepresents SFiBase degree of selection, Δ dlRepresents the system load, Δ daAn increment, ξ, representing the total number of anomalous executables relative to the value corresponding to the previous scheduling cyclelAn increase threshold, ξ, representing the system loadaA growth threshold, gamma, representing the number of abnormally executed bodiesiRepresents SFiAnd setTogether with the degree of isomerism of all the elements in the SFo,represents SFiThe confidence level of the device itself is determined,indicating updated SF according to network traffic changesiThe execution speed influence value of (1);
SFibase degree of selection σ ofiThe calculation formula is as follows:
wherein, taubelThe confidence level is represented to affect the weight,represents SFiConfidence of itself, τisoRepresenting the influence weight, τ, of the degree of isomerismvIndicating that the SF execution speed affects the weight,indicating updated SF according to network traffic changesiIs the execution speed influence value ofoRepresenting the isomerous discount factor. n denotes the total number of elements in the set SFo, SFoiAnd SFojRespectively representing the ith and jth elements in the SFo execution volume set. Alpha (SFo)i,SFoj) Represents SFoiAnd SFojThe degree of isomerism of (a).
Degree of isomerism alpha (SF)i,SFj) The calculation formula is as follows
Wherein lgNumber of heterogeneous factor types, delta, of the g-th heterogeneous element of SF executantgRepresents the weight, delta, of the g-th heterogeneous elementgkIs shown asWeight of k-th heterogeneous factor of g-type heterogeneous elements, SFiAnd SFjRepresenting the ith and jth elements in the SF execution block set. e represents the number of heterogeneous element types, such as various hardware, operating systems, software, etc., that make up the elements in the SF execution set.
SFiDegree of isomerism γ with all elements of the set SFoiThe calculation formula is as follows:
wherein, deltaoRepresenting a heterogeneous discount factor, SFojRepresents the jth element in the SFo execution volume set, and n represents the total number of elements in the set SFo.
The overall isomerization p of the combination is calculated as follows:
wherein, deltaoA discount factor for the degree of isomerism is indicated,andrespectively represent the ith and jth elements in the SFo execution body set, and n represents the total number of elements in the set SFo.
(4) The scheduler sorts the executives in the set U according to the credibility value calculated in the step (3), and selects the executives with the 15% of the top credibility from the set U as a new SF executor set;
(5) traversing all SF executives in the new SF executant set obtained in the step (4), combining all sets which meet the ith service function and comprise a plurality of SF executants, and calculating the overall isomerism rho of each combination;
(6) and (5) selecting the combination with the maximum integral isomerism in the step (5) as a new online SF executive body set. The invention takes the abnormal executive body information, the isomerism degree of the executive body and the actual load capacity of the system as the scheduling influence factors, so that the scheduling method can carry out self-adaptive adjustment according to the network change, thereby improving the safety of the system, and the specific explanation is as follows:
suppose the system spends W resources per schedulesIf the scheduling time interval is Ts. The total scheduling cost of the system versus the system runtime t is then as follows:
assume that the attack strengths of the attackers are as follows:
ATT={att1,att2,…,atti},i→+∞
the period from the (i-1) th scheduling to the ith scheduling is called the ith scheduling period. Then, attiRepresenting the actual attack strength of the attacker in the ith scheduling period. Considering that the probability of system crash in each scheduling period must be taken into account along with the scheduling time TsWill become larger and the magnitude of the increase will become slower with increasing time, so the present application describes the scheduling time interval T in the ith scheduling period using the following functionsActual attack Strength att of the AttackeriAnd the system crash probability:
wherein λ is a constant greater than zero, determined by the specific network conditions. Setting scheduling timeSetting h e N*(positive integer). If atti> 1, then from the very beginning of the systemWithin the time, if the scheduling time is set asThe probability of crash of the system is then as follows:
Because h is more than 1, the syndrome can be proved by combining with the popularization form of the Cauchi inequality
And due to atti> 1, and therefore have
From a combination of the above analyses, when atti> 1, must have
If 0 < atti< 1, then from the very beginning of the systemWithin the time, if the scheduling time is set asThe probability of crash of the system is then as follows:
it is apparent that when 0 < attiLess than 1, there must be
It can be seen that when the system running time is t, the average collapse probability of the system between the beginning and the latest ending scheduling period is as follows:
therefore, it can be found that for the same period of system running time T, if T is usedsSet to a larger value, the average crash probability of the system is higher but the overall scheduling cost is lower; if it is set to a smaller value, the average probability of crash of the system is lower but the overall scheduling cost is higher. Since the attack strength of the attacker isWill vary, so if setting T is usedsThe constant value method cannot guarantee that the average crash probability and the total scheduling cost of the system are always at a better balance point. The method dynamically adjusts T according to the number of abnormal SF executorssThe method can ensure that the system spends less scheduling cost as much as possible while keeping certain safety.
The following set is set:
So={so1,so2,…,son}
wherein, soiThe set of on-line SF executors representing the ith scheduling cycle. The safety of the system in each scheduling period and the isomerous degree alpha (so) between the SF execution body sets of the two scheduling periods before and after the system in each scheduling periodi,soi-1) And the overall isomerism beta (so) of the selected set of SF executorsi) And (4) positively correlating. Therefore, if only the above two factors are considered in scheduling, the security of the system will be expressed as follows:
ρ1=δ1(α(soi,soi-1)+β(soi))
wherein, delta1Is a constant determined by the specific network conditions. The scheduling scheme provided by the application adds SF executive confidence B on the basis of the factorseValue of system load LoAnd (4) properly adjusting the scheduling selection strategy. The safety is expressed as follows:
ρ2=δ2τ(ρ1+Be+Lo)
wherein, delta2Is a constant, determined by the specific network conditions, and τ represents the abnormal SF executable growth value. Therefore, the scheduling scheme can remarkably improve the safety of the system.
The above-described embodiments are intended to illustrate rather than to limit the invention, and any modifications and variations of the present invention are within the spirit of the invention and the scope of the appended claims.
Claims (7)
1. A scheduling method of a mimicry service function chain is characterized by comprising the following steps:
(1) selecting an SF execution body set meeting the requirement from a heterogeneous SF execution body pool according to the reliability of the mimicry service function execution body; the heterogeneous SF execution pool has l SF execution entities for executing different types of service functions, which specifically includes the following steps:
SF={S1,S2,…,Si,…,Sl}
wherein S isiDenotes a set of SF executors that perform the service function of the ith class.
(2) Time interval T passing scheduling cyclesEntering the next scheduling cycle, assuming that the ith service function is needed, setting a set U to represent a set SiA set of all elements of the SF execution block set SFo which do not belong to the previous scheduling cycle;
(3) to pairCalculate the ith executive SF in UiZeta degree of trustworthinessiThe concrete formula is as follows:
wherein σiRepresents SFiBase degree of selection, Δ dlRepresents the system load, Δ daAn increment, ξ, representing the total number of anomalous executables relative to the value corresponding to the previous scheduling cyclelAn increase threshold, ξ, representing the system loadaA growth threshold, gamma, representing the number of abnormally executed bodiesiRepresents SFiThe degree of isomerism with all elements in the set SFo,represents SFiThe confidence level of the device itself is determined,express an inUpdated SF according to network traffic changesiThe execution speed influence value of (1);
(4) the scheduler selects a new SF execution body set from the set U according to the credibility value calculated in the step (3);
(5) traversing all SF executives in the new SF executant set obtained in the step (4), combining all sets which meet the ith service function and comprise a plurality of SF executants, and calculating the overall isomerism rho of each combination;
(6) and (5) selecting the combination with the maximum integral isomerism in the step (5) as a new online SF executive body set.
2. The method of claim 1, wherein in steps (1) and (4), after the executables in the heterogeneous SF executable pool are sorted according to the reliability, the executables with the top 15% reliability are selected to form an SF executable set.
3. The method of claim 1, wherein SF is used to schedule service function chainsiBase degree of selection σ ofiThe calculation formula is as follows:
wherein, taubelThe confidence level is represented to affect the weight,represents SFiConfidence of itself, τisoThe influence weight of the degree of isomerism is represented,vindicating that the SF execution speed affects the weight,indicating updated SF according to network traffic changesiIs the execution speed influence value ofoRepresenting the isomerous discount factor. n denotes the total number of elements in the set SFo, SFoiAnd SFojRespectively representing the ith and jth elements in the SFo execution volume set. Alpha (SFo)i,SFoj) Represents SFoiAnd SFojThe degree of isomerism of (a).
4. The method of claim 1, wherein SF is used to schedule service function chainsiDegree of isomerism γ with all elements of the set SFoiThe calculation formula is as follows:
wherein, deltaoRepresenting a heterogeneous discount factor, SFojRepresents the jth element in the SFo execution volume set, and n represents the total number of elements in the set SFo.
5. The method according to claim 1, wherein the overall isomerous degree p of the combination is calculated as follows:
wherein, deltaoRepresenting a heterogeneous discount factor, SFoiAnd SFojRespectively represent the ith and jth elements in the SFo execution body set, and n represents the total number of elements in the set SFo.
6. The method of any of claims 3-5, wherein the degree of heterogeneity α (SF)i,SFj) The calculation formula is as follows
Wherein lgG-th type of hetero representation of SF implementationNumber of isomeric factors, delta, of constitutional elementsgRepresents the weight, delta, of the g-th heterogeneous elementgkWeight, SF, of a class k heterogeneous factor representing a class g heterogeneous elementiAnd SFjThe ith and jth elements in the SF execution body set are represented, and e represents the number of heterogeneous element types forming the elements in the SF execution body set.
7. The method of claim 1, wherein the scheduling period is a time interval TsThe real-time dynamic adjustment specifically comprises the following steps: let r beiTo representTotal number of abnormal SF executors, TsHas a maximum value of ximaxAnd representing the number of times that the number of abnormal execution bodies is zero, starting accumulation from the condition that the number of the abnormal execution bodies is zero at the first time, setting the tau to be zero immediately once the abnormal execution bodies are not zero, and restarting accumulation when the number of the abnormal execution bodies is zero. The time interval scheduling time update function of the scheduling period is as follows:
where δ is a constant greater than zero, depending on the particular network conditions,indicates the time interval from the (i-1) th scheduling to the ith scheduling, ξnIndicating the existence of abnormal SF execution body threshold value, if the number of the abnormal SF execution bodies is more than xinThe current system is considered to need to improve the system security by reducing the scheduling time to reduce the number of abnormal execution bodies. If the number of abnormal SF executors is less than or equal to xinIt is considered that the number of abnormally executed bodies can be reduced only by internal adjustment of the scheduling algorithm itself.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110144910.7A CN112866277B (en) | 2021-02-02 | 2021-02-02 | Scheduling method of mimicry service function chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110144910.7A CN112866277B (en) | 2021-02-02 | 2021-02-02 | Scheduling method of mimicry service function chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112866277A true CN112866277A (en) | 2021-05-28 |
CN112866277B CN112866277B (en) | 2022-06-17 |
Family
ID=75986390
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110144910.7A Active CN112866277B (en) | 2021-02-02 | 2021-02-02 | Scheduling method of mimicry service function chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112866277B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114257519A (en) * | 2021-11-02 | 2022-03-29 | 中国人民解放军战略支援部队信息工程大学 | Method and device for evaluating isomerism of multifunctional equivalent execution system |
CN114884751A (en) * | 2022-07-07 | 2022-08-09 | 国网江苏省电力有限公司信息通信分公司 | Scheduling opportunity and scheduling quantity dynamic adjustment method of endogenous security system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180225139A1 (en) * | 2015-08-03 | 2018-08-09 | Nokia Solutions And Networks Oy | Load and software configuration control among composite service function chains |
CN109525418A (en) * | 2018-10-11 | 2019-03-26 | 浙江工商大学 | A kind of dispatching method that mimicry defends lower service arrangement execution body set isomery degree to guarantee |
-
2021
- 2021-02-02 CN CN202110144910.7A patent/CN112866277B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180225139A1 (en) * | 2015-08-03 | 2018-08-09 | Nokia Solutions And Networks Oy | Load and software configuration control among composite service function chains |
CN109525418A (en) * | 2018-10-11 | 2019-03-26 | 浙江工商大学 | A kind of dispatching method that mimicry defends lower service arrangement execution body set isomery degree to guarantee |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114257519A (en) * | 2021-11-02 | 2022-03-29 | 中国人民解放军战略支援部队信息工程大学 | Method and device for evaluating isomerism of multifunctional equivalent execution system |
CN114884751A (en) * | 2022-07-07 | 2022-08-09 | 国网江苏省电力有限公司信息通信分公司 | Scheduling opportunity and scheduling quantity dynamic adjustment method of endogenous security system |
CN114884751B (en) * | 2022-07-07 | 2022-10-18 | 国网江苏省电力有限公司信息通信分公司 | Scheduling opportunity and scheduling quantity dynamic adjustment method of endogenous security system |
Also Published As
Publication number | Publication date |
---|---|
CN112866277B (en) | 2022-06-17 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112866277B (en) | Scheduling method of mimicry service function chain | |
US20190363988A1 (en) | System and/or method for predictive resource management in file transfer servers | |
CN107347066B (en) | A kind of function equivalence body isomery degree maximizes dispatching method and device | |
CN110611672B (en) | Network space safety protection method, server equipment, node equipment and system | |
CN112527544B (en) | Server, and method and device for triggering fusing | |
CN108965066B (en) | Method and device for detecting transmission path | |
Jamali et al. | PSO-SFDD: Defense against SYN flooding DoS attacks by employing PSO algorithm | |
CN111866101A (en) | Access request processing method and device, storage medium and electronic equipment | |
CN113014605B (en) | Quantitative control method for denial of service attack and disturbance | |
Zhang et al. | Scheduling algorithm based on heterogeneity and confidence for mimic defense | |
CN113326133A (en) | Task scheduling method and device for distributed load balancing | |
CN117076042A (en) | Workload scheduling method, apparatus, device, storage medium and program product | |
WO2021018058A1 (en) | System overload control method and device | |
CN113904937A (en) | Service function chain migration method and device, electronic equipment and storage medium | |
Carroll et al. | Optimal scheduling of multiple sensors which transmit measurements over a dynamic lossy network | |
CN113672911A (en) | Method and system for unloading body area network tasks based on block chains | |
CN110034946A (en) | Adaptive service degradation method and apparatus | |
CN110380987A (en) | The method and device of the request serviced is called in a kind of processing | |
CN114884751B (en) | Scheduling opportunity and scheduling quantity dynamic adjustment method of endogenous security system | |
LU502527B1 (en) | An Ethereum Based method to defend against Byzantine attacks in the industrial Internet | |
CN116132080B (en) | Alliance chain DDoS defense method based on moving target defense technology | |
CN116185666A (en) | Message delivery current limiting method and device and electronic equipment | |
CN110650187A (en) | Node type determination method for edge node and target network | |
WO2022112897A1 (en) | Method and system for workload management of nfv-mano functional entities | |
Konorski | Double-blind reputation vs. intelligent Fake VIP attacks in cloud-assisted interactions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |