CN114423035A - Service function chain abnormity detection method under network slice scene - Google Patents

Service function chain abnormity detection method under network slice scene Download PDF

Info

Publication number
CN114423035A
CN114423035A CN202210031530.7A CN202210031530A CN114423035A CN 114423035 A CN114423035 A CN 114423035A CN 202210031530 A CN202210031530 A CN 202210031530A CN 114423035 A CN114423035 A CN 114423035A
Authority
CN
China
Prior art keywords
data
vnf
network
generator
discriminator
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210031530.7A
Other languages
Chinese (zh)
Other versions
CN114423035B (en
Inventor
唐伦
王恺
张月
周鑫隆
陈前斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yuwei Technology Co ltd
Shenzhen Hongyue Information Technology Co ltd
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN202210031530.7A priority Critical patent/CN114423035B/en
Publication of CN114423035A publication Critical patent/CN114423035A/en
Application granted granted Critical
Publication of CN114423035B publication Critical patent/CN114423035B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/08Testing, supervising or monitoring using real traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0893Assignment of logical groups to network elements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/14Network analysis or design
    • H04L41/145Network analysis or design involving simulating, designing, planning or modelling of a network

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a service function chain abnormity detection method in a network slicing scene, and belongs to the technical field of mobile communication. The method comprises the following steps: constructing a distributed anomaly detection framework; in order to mine deep-level features of data which are easy to learn by a network, feature extraction is carried out on the data in each VNF, and a relation between time sequence data is captured by adopting a sliding window; due to the fact that the VNF data has the class imbalance problem, a generation countermeasure network (GAN) is adopted to learn normal data characteristics, and a Time Convolution Network (TCN) and an Automatic Encoder (AE) are combined to improve the learning capacity of the GAN on the data characteristics; and judging the state of the VNF by adopting an abnormality score function, and further completing the abnormality detection of the SFC. The technical scheme of the invention can provide higher detection accuracy and stability, quickly cope with data abnormity generated by network attack, improve the robustness of the whole virtual network and enhance the network security.

Description

Service function chain abnormity detection method under network slice scene
Technical Field
The invention belongs to the technical field of mobile communication, and relates to a service function chain abnormity detection method in a network slice scene.
Background
Network slicing is a key technology in 5G networks, and is capable of providing diverse and customizable network services. Compared with the traditional network, a Software Defined Network (SDN) and Network Function Virtualization (NFV) technology is introduced into the 5G network, so that network functions are decoupled from dedicated hardware devices, network management is more complicated on the premise of flexibly deploying the network, and network fault points and fault types are increased, so that a greater challenge is faced in the management of network faults.
In order to effectively utilize network resources, improve the operation efficiency of a network, and reduce capital expenditure (CAPEX) and operation expenditure (OPEX), it is particularly important to sense and judge an abnormality in advance of a network slice state. Since whether the customized network service can normally operate depends on the state of a Service Function Chain (SFC) in a network slice in a dynamic network environment, abnormality detection of the SFC can be completed by detecting the states of a plurality of Virtual Network Functions (VNFs) included in the SFC.
In the prior art, the abnormal detection of the VNF in the SFC adopts modes of VNF state prediction or clustering and the like, and a centralized machine learning is adopted to train the network, and the problems of normal data and abnormal imbalance in the network are not considered in the training process.
Disclosure of Invention
In view of this, the present invention provides a method for detecting an anomaly of a service function chain in a network slice scene, which solves the problem of data normal and anomaly imbalance in training, and can enhance the security of a virtual network and effectively improve the accuracy and stability of anomaly detection.
In order to achieve the purpose, the invention provides the following technical scheme:
a method for detecting service function chain abnormity in a network slice scene comprises the following steps:
s1: in a network slice scene, in order to enable a plurality of virtual network functions VNF contained in a service function chain SFC to independently perform anomaly detection, a distributed anomaly detection framework is constructed;
s2: in order to mine deep-level features of data which are easy to learn by a network, feature extraction is carried out on the data in each VNF, and a relation between time sequence data is captured by adopting a sliding window;
s3: because the VNF data has the problem of class imbalance, the generation of an antagonistic network GAN is adopted to learn normal data characteristics, and the learning capability of the GAN on the data characteristics is improved by combining a time convolution network TCN and an automatic encoder AE;
s4: and judging the state of the VNF by adopting an abnormality score function, and further completing the abnormality detection of the SFC.
Optionally, in S1, the network slice scene includes: the network function virtualization management system comprises an infrastructure layer, a virtual network function layer, a service operation support system, a network function virtualization management and orchestration NFV MANO and a Software Defined Network (SDN) controller; the SFC is formed by connecting virtual links by VNFs of a specific set and is deployed at a virtual network function layer;
the distributed anomaly detection architecture is used for independently detecting the anomaly of each VNF and providing an independent detection module for each VNF.
Optionally, in S2, the transforming, by the sliding-window-based feature extractor, the original time-series data in the VNF into a feature sequence specifically includes:
extracting two derivative characteristics of norm and Manhattan distance of data by using a first layer sliding window, and capturing features in a data time window and between time windows;
and (3) mining the deep features of the data by extracting eight statistical features of the average value MEA, the minimum value MIN, the maximum value MAX, the first quartile Q1, the second quartile Q2, the third quartile Q3, the standard deviation STD and the peak-to-peak amplitude P2P by using a second layer sliding window to obtain a feature sequence of the original data.
Optionally, in S3, using GAN to learn data features, and training only using normal data to solve the problem of data class imbalance, a distributed GAN model is proposed, where the model deploys a generator in the element manager EM of each VNF, the generator is composed of a triple-layer codec built by TCN and AE, and deploys a discriminator in the virtualized network function manager VNFM) of the NFV MANO, and a distributed GAN model of multiple generators and a single discriminator is built to learn the normal data features of VNFs in a single SFC, which specifically includes:
in each VNF, normal data in the VNF are input into a feature extractor to obtain a feature sequence of the VNF;
inputting the characteristic sequence into a generator in the EM, respectively obtaining potential representation, reconstruction characteristics and reconstruction potential characteristics of data through a three-layer codec, and sending the generated data to a discriminator for discrimination;
after the discriminator receives the data sent by the generator, calculating by using a discriminator loss function to obtain a discriminator updating gradient and a feedback error, wherein the gradient is used for updating the network parameters of the discriminator, and the feedback error is required to be sent to the corresponding EM to be used for updating the network parameters of the generator;
after the generator receives the feedback error sent by the discriminator, the generator loss function and the feedback error are used for calculating to obtain a generator updating gradient so as to complete the parameter updating of a coder and a decoder in the generator;
the discriminator and the generator are continuously executed interactively, and a plurality of global iterations are carried out, so that the generator of each VNF can well learn and reconstruct normal data characteristics.
Optionally, in S4, the state of each VNF is evaluated through an abnormality scoring function, which is an abnormality scoring function a (X)i) From apparent loss LaAnd potential loss LlCollectively represent:
A(Xi)=λ×La+(1-λ)×Ll
wherein, XiIs time series data of ith VNF, and lambda is LaOccupied weight, LaFor measuring the difference between reconstructed features and feature sequences, LlFor measuring the difference between the reconstructed potential representation and the potential representation;
when inputting XiFor each distributed VNF, the producer calculates an anomaly score A (X) for iti) When A (X)i) If the input data is larger than the judgment threshold value, judging that the input data existsAnd (4) abnormity, namely abnormity exists in the ith VNF, and the abnormity detection of the SFC is completed.
The invention has the beneficial effects that: according to the invention, a distributed GAN anomaly detection model is constructed, each VNF in the SFC can independently perform anomaly detection, the detection accuracy and stability are improved, the robustness of the whole virtual network is improved, and the network security is further enhanced.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. The objectives and other advantages of the invention may be realized and attained by the means of the instrumentalities and combinations particularly pointed out hereinafter.
Drawings
For purposes of promoting a better understanding of the objects, aspects and advantages of the invention, reference will now be made to the following detailed description taken in conjunction with the accompanying drawings in which:
FIG. 1 is an overall process of the present invention;
FIG. 2 illustrates the single training iteration steps of the present invention.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention in a schematic way, and the features in the following embodiments and examples may be combined with each other without conflict.
Wherein the showings are for the purpose of illustrating the invention only and not for the purpose of limiting the same, and in which there is shown by way of illustration only and not in the drawings in which there is no intention to limit the invention thereto; to better illustrate the embodiments of the present invention, some parts of the drawings may be omitted, enlarged or reduced, and do not represent the size of an actual product; it will be understood by those skilled in the art that certain well-known structures in the drawings and descriptions thereof may be omitted.
The same or similar reference numerals in the drawings of the embodiments of the present invention correspond to the same or similar components; in the description of the present invention, it should be understood that if there is an orientation or positional relationship indicated by terms such as "upper", "lower", "left", "right", "front", "rear", etc., based on the orientation or positional relationship shown in the drawings, it is only for convenience of description and simplification of description, but it is not an indication or suggestion that the referred device or element must have a specific orientation, be constructed in a specific orientation, and be operated, and therefore, the terms describing the positional relationship in the drawings are only used for illustrative purposes, and are not to be construed as limiting the present invention, and the specific meaning of the terms may be understood by those skilled in the art according to specific situations.
Referring to fig. 1, fig. 1 is an overall flow of the distributed GAN anomaly detection method according to the present invention. The SFC comprises k VNFs, time sequence data in the SFC is X, and EM on the ith VNFiGiven a time series data
Figure BDA0003466659860000041
Wherein
Figure BDA0003466659860000042
XiDenotes EMiDuring a period of time t, data of n attributes are contained. GiIs EMiGenerator of (1), GiComprises a three-layer codec composed of TCNs: encoder for encoding a video signal
Figure BDA0003466659860000043
Decoder
Figure BDA0003466659860000044
Encoder for encoding a video signal
Figure BDA0003466659860000045
FiAnd
Figure BDA0003466659860000046
respectively represent XiAnd reconstructed signature sequence of (a), ziAnd
Figure BDA0003466659860000047
respectively represent FiIs potentially represented by
Figure BDA0003466659860000048
To reconstruct the potential representation.
Figure BDA0003466659860000049
Respectively representing for updating
Figure BDA00034666598600000410
Figure BDA00034666598600000411
The error term of (2).
In the training stage, only normal data are used for training based on the distributed GAN anomaly detection method. First, feature extraction is performed on the original time series in each EM using a feature extractor, and derived features and statistical features in the data are calculated. The signature sequence is then input into a generator module to reconstruct the data. Then, the characteristic sequence and the reconstruction sequence generated in each EM are input into a discriminator module, the discriminator is used for discriminating the characteristic sequence and the reconstruction sequence, and the parameters are fed back for optimization and adjustment of a generator module, so that the generator module in each EM can well reconstruct the normal data.
In the test phase, only the generator module of each EM is used for anomaly detection. Inputting the test data into a generator module of a certain EM, if the test data are normal data, the generator module can reconstruct the normal data well, namely obtaining a lower abnormal score; on the contrary, when the generator model reconstructs the data, a larger deviation is generated, and a higher abnormal score is obtained, that is, the data in the EM is abnormal.
The sliding window-based feature extractor in the method comprises two steps: calculating derivative characteristics and calculating statistical characteristics.
The derivative property is first calculated through a first layer sliding window. Norms are used to capture features between data within the same time window, denoted by NR. The norm difference is used to measure the difference between two time windows, denoted by MD. For EMiGiven time series data
Figure BDA00034666598600000412
The total length of the time sequence is t, and the window size is Sw(Sw>1) The moving step length is SsThe sliding window(s) divides the time series data to obtain c time windows.
Figure BDA00034666598600000413
Represents EMiThe mth time window of (1), comprising a time interval of [ mSs-1,mSs+Sw-2](m ≧ 1) raw time series data, the norm within the time window can be expressed as:
Figure BDA00034666598600000414
wherein the content of the first and second substances,
Figure BDA0003466659860000051
to represent
Figure BDA0003466659860000052
Time series data of the j-th attribute of (1).
The norm difference can be expressed as:
Figure BDA0003466659860000053
after the norm and the norm difference are obtained, the sequences are combined to obtain the sequence
Figure BDA0003466659860000054
Wherein
Figure BDA0003466659860000055
Is IiThe (m) th data of (2),
Figure BDA0003466659860000056
statistical features are then calculated through a second layer sliding window. For each derived feature, 8 statistical features were chosen to describe it: mean (MEA), Minimum (MIN), Maximum (MAX), first quartile (Q1), second quartile (Q2), third quartile (Q3), standard deviation (STD), and peak-to-peak amplitude (P2P) to measure the concentration trend and dispersion of the data. The signature sequence F can be obtainedi
Figure BDA0003466659860000057
Wherein the content of the first and second substances,
Figure BDA0003466659860000058
Figure BDA0003466659860000059
is FiD is the number of rows of the time series after the features are extracted, and n is the number of attributes of the time series.
Referring to fig. 2, fig. 2 is a single training iteration step of the distributed GAN anomaly detection method according to the present invention.
At the discriminator side, at each global iteration, from k distributed EM' siIn collecting the generated data stream
Figure BDA00034666598600000510
And true normal data stream { (F)1,z1),…,(Fk,zk) Then through the received data stream and the loss function JdisCompleting the parameter w to the discriminator DdAnd (6) updating. Finally for each EMiCoding and decoding inCalculating error terms
Figure BDA00034666598600000511
Figure BDA00034666598600000512
The specific process is as follows:
the discriminator gradient is first calculated. Discriminator D for each set of received data streams (F)i,zi)、
Figure BDA00034666598600000513
Calculating a loss function, loss function JdisThe expression of (a) is:
Figure BDA00034666598600000514
where D (-) is the probability from a true normal data set. Data flow (F)i,zi)、
Figure BDA00034666598600000515
Loss function J ofdisTo wdThe gradient Δ w can be deriveddiFor k EM siK gradients, { Δ w, can be obtainedd1,…,DwdkUsing the mean value of k gradients Δ wdParameter w to discriminator DdAnd (6) updating.
An error term is then calculated. To update distributed EMiGenerator modules deployed in the system, need to be respectively paired
Figure BDA00034666598600000516
Is updated. The MANO respectively calculates according to the received data stream
Figure BDA00034666598600000517
Error term of
Figure BDA00034666598600000518
Figure BDA00034666598600000519
And sends it to the corresponding EMiThereby completing the parameter update.
Figure BDA0003466659860000061
Error term of
Figure BDA0003466659860000062
Each one of which is
Figure BDA0003466659860000063
Is defined as:
Figure BDA0003466659860000064
wherein z isiIs composed of
Figure BDA0003466659860000065
Is ziThe jth data of (1).
Figure BDA0003466659860000066
Error term of
Figure BDA0003466659860000067
Each one of which is
Figure BDA0003466659860000068
Is defined as:
Figure BDA0003466659860000069
wherein the content of the first and second substances,
Figure BDA00034666598600000610
is composed of
Figure BDA00034666598600000611
Figure BDA00034666598600000612
Is composed of
Figure BDA00034666598600000613
The jth data of (1).
Figure BDA00034666598600000614
Error term of
Figure BDA00034666598600000615
Each one of which is
Figure BDA00034666598600000616
Is defined as:
Figure BDA00034666598600000617
wherein the content of the first and second substances,
Figure BDA00034666598600000618
is composed of
Figure BDA00034666598600000619
Figure BDA00034666598600000620
Is composed of
Figure BDA00034666598600000621
The jth data of (1).
At the generator side, a distributed generator GiIn each global iteration of (a), a respective set of data streams (F) is generatedi,zi)、
Figure BDA00034666598600000622
To discriminator D in the MANO. Then using the error term from discriminator D
Figure BDA00034666598600000623
Are respectively paired
Figure BDA00034666598600000624
Figure BDA00034666598600000625
Parameter (d) of
Figure BDA00034666598600000626
Updating is carried out, and the specific process is as follows:
a data stream is first generated. At each distributed EMiIn (1), the method uses a sample containing only normal time-series data XiF is obtained by a feature extractori,FiThrough an encoder
Figure BDA00034666598600000627
Z can be extractediThen passes through a decoder
Figure BDA00034666598600000628
To obtain
Figure BDA00034666598600000629
Through an encoder
Figure BDA00034666598600000630
Extract to
Figure BDA00034666598600000631
Through the above steps, an original feature stream (F) can be constructedi,zi) And reconstructing the feature stream
Figure BDA00034666598600000632
It is sent to the MANO for authentication.
Then to generator GiAnd updating the parameters. In distributed EMiIn (1), using discrimination loss LfApparent loss LaAnd potential loss LlThree parts constituting GiLoss function J ofgen
Identification of loss LfThe measurable discriminator D is generated by misjudging the reconstructed data as the real dataIs lost. Identification of loss LfThe expression of (A) is:
Figure BDA00034666598600000633
where s (-) is a binary cross entropy loss function and D (-) is the probability that the data is predicted to be true data. To trick the discriminator D, let GiThe generated reconstructed data is closer to the real data, and let a be 1.
Apparent loss LaThe difference between the reconstructed signature sequence and the signature sequence can be measured by continuously reducing LaThe reconstructed signature sequence can be made closer to the signature sequence. Apparent loss LaThe expression of (a) is:
Figure BDA0003466659860000071
potential loss LlDifferences between the potential representation of the reconstructed feature data and the potential representation of the feature sequence can be measured to help learn the reconstructed feature sequence and the potential representation of the feature sequence. Potential loss LlThe expression of (a) is:
Figure BDA0003466659860000072
thus, generator GiLoss function J ofgenCan be expressed as:
Jgen=ωf×Lfa×Lal×Ll
wherein, ω isf、ωa、ωlFor adjustment in the loss function JgenMiddle Lf、La、LlThe weight of (c).
Distributed EMiReceiving error terms from MANO
Figure BDA0003466659860000073
Then, passing through the meterCalculating a loss function JgenTo it generator GiThree sub-networks in
Figure BDA0003466659860000074
Parameter (d) of
Figure BDA0003466659860000075
And (6) updating.
Figure BDA0003466659860000076
The parameter update of (2) can be expressed as:
Figure BDA0003466659860000077
wherein the content of the first and second substances,
Figure BDA0003466659860000078
is that
Figure BDA0003466659860000079
The ith parameter of (1).
Figure BDA00034666598600000710
The parameter update of (2) can be expressed as:
Figure BDA00034666598600000711
wherein the content of the first and second substances,
Figure BDA00034666598600000712
is that
Figure BDA00034666598600000713
The ith parameter of (1).
Figure BDA00034666598600000714
The parameter update of (2) can be expressed as:
Figure BDA0003466659860000081
wherein the content of the first and second substances,
Figure BDA0003466659860000082
is that
Figure BDA0003466659860000083
The ith parameter of (1).
Is calculated to obtain
Figure BDA0003466659860000084
Thereafter, the parameters are updated using an Adam optimizer.
Finally, the state of each VNF is judged through an abnormal scoring function, namely an abnormal scoring function A (X)i) From apparent loss LaAnd potential loss LlCollectively represent:
A(Xi)=λ×La+(1-λ)×Ll
wherein, XiIs time series data of ith VNF, and lambda is LaOccupied weight, LaFor measuring the difference between reconstructed features and feature sequences, LlFor measuring the difference between the reconstructed potential representation and the potential representation.
When inputting XiFor each distributed VNF, the producer calculates an anomaly score A (X) for iti) When A (X)i) And when the input data is larger than the judgment threshold, judging that the input data is abnormal, namely the ith VNF is abnormal, and finishing the abnormal detection of the SFC.
Finally, the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions, and all that should be covered by the claims of the present invention.

Claims (5)

1. A method for detecting service function chain abnormity in a network slice scene is characterized in that: the method comprises the following steps:
s1: in a network slice scene, in order to enable a plurality of virtual network functions VNF contained in a service function chain SFC to independently perform anomaly detection, a distributed anomaly detection framework is constructed;
s2: in order to mine deep-level features of data which are easy to learn by a network, feature extraction is carried out on the data in each VNF, and a relation between time sequence data is captured by adopting a sliding window;
s3: because the VNF data has the problem of class imbalance, the generation of an antagonistic network GAN is adopted to learn normal data characteristics, and the learning capability of the GAN on the data characteristics is improved by combining a time convolution network TCN and an automatic encoder AE;
s4: and judging the state of the VNF by adopting an abnormality score function, and further completing the abnormality detection of the SFC.
2. The method according to claim 1, wherein the method for detecting the service function chain abnormality in the network slice scenario comprises: in S1, the network slice scene includes: the network function virtualization management system comprises an infrastructure layer, a virtual network function layer, a service operation support system, a network function virtualization management and orchestration NFV MANO and a Software Defined Network (SDN) controller; the SFC is formed by connecting a specific set of VNFs by virtual links and is deployed at a virtual network function layer;
the distributed anomaly detection architecture is used for independently detecting the anomaly of each VNF and providing an independent detection module for each VNF.
3. The method according to claim 2, wherein the method for detecting the service function chain abnormality in the network slice scenario comprises: the S2 is a sliding window-based feature extractor, and is configured to convert the original time-series data in the VNF into a feature sequence, specifically including:
extracting two derivative characteristics of norm and Manhattan distance of data by using a first layer sliding window, and capturing features in a data time window and between time windows;
and (3) mining the deep features of the data by extracting eight statistical features of the average value MEA, the minimum value MIN, the maximum value MAX, the first quartile Q1, the second quartile Q2, the third quartile Q3, the standard deviation STD and the peak-to-peak amplitude P2P by using a second layer sliding window to obtain a feature sequence of the original data.
4. The method according to claim 3, wherein the method for detecting the abnormal service function chain in the network slice scene comprises: in S3, using GAN to learn data characteristics, training only using normal data to solve the problem of data class imbalance, and proposing a distributed GAN model, where a generator is deployed in the element manager EM of each VNF, the generator is composed of a triple-layer codec built by TCN and AE, and a discriminator is deployed in the virtualized network function manager VNFM) of the NFV MANO, and a distributed GAN model of multiple generators and a single discriminator is constructed to learn normal data characteristics of VNFs in a single SFC, specifically including:
in each VNF, normal data in the VNF are input into a feature extractor to obtain a feature sequence of the VNF;
inputting the characteristic sequence into a generator in the EM, respectively obtaining potential representation, reconstruction characteristics and reconstruction potential characteristics of data through a three-layer codec, and sending the generated data to a discriminator for discrimination;
after the discriminator receives the data sent by the generator, calculating by using a discriminator loss function to obtain a discriminator updating gradient and a feedback error, wherein the gradient is used for updating the network parameters of the discriminator, and the feedback error is required to be sent to the corresponding EM to update the network parameters of the generator;
after the generator receives the feedback error sent by the discriminator, calculating by using a generator loss function and the feedback error to obtain a generator updating gradient so as to complete parameter updating of a coder and a decoder in the generator;
the discriminator and the generator are continuously executed interactively, and multiple global iterations are carried out, so that the generator of each VNF can well learn and reconstruct normal data characteristics.
5. The method according to claim 4, wherein the method for detecting the service function chain abnormality in the network slice scenario comprises: in S4, the state of each VNF is evaluated by an abnormality score function, which is an abnormality score function a (X)i) From apparent loss LaAnd potential loss LlCollectively represent:
A(Xi)=λ×La+(1-λ)×Ll
wherein, XiIs time series data of ith VNF, and lambda is LaOccupied weight, LaFor measuring the difference between reconstructed features and feature sequences, LlFor measuring the difference between the reconstructed potential representation and the potential representation;
when inputting XiFor each distributed VNF, the producer calculates an anomaly score A (X) for iti) When A (X)i) And when the input data is larger than the judgment threshold, judging that the input data is abnormal, namely the ith VNF is abnormal, and finishing the abnormal detection of the SFC.
CN202210031530.7A 2022-01-12 2022-01-12 Service function chain abnormality detection method in network slice scene Active CN114423035B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210031530.7A CN114423035B (en) 2022-01-12 2022-01-12 Service function chain abnormality detection method in network slice scene

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210031530.7A CN114423035B (en) 2022-01-12 2022-01-12 Service function chain abnormality detection method in network slice scene

Publications (2)

Publication Number Publication Date
CN114423035A true CN114423035A (en) 2022-04-29
CN114423035B CN114423035B (en) 2023-09-19

Family

ID=81272537

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210031530.7A Active CN114423035B (en) 2022-01-12 2022-01-12 Service function chain abnormality detection method in network slice scene

Country Status (1)

Country Link
CN (1) CN114423035B (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160212017A1 (en) * 2015-01-20 2016-07-21 Huawei Technologies Co., Ltd. Systems and Methods for SDT to Interwork with NFV and SDN
EP3304833A1 (en) * 2015-09-15 2018-04-11 Huawei Technologies Co., Ltd. Software defined topology (sdt) for user plane
CN110598851A (en) * 2019-08-29 2019-12-20 北京航空航天大学合肥创新研究院 Time series data abnormity detection method fusing LSTM and GAN
CN111279648A (en) * 2017-08-29 2020-06-12 苹果公司 Apparatus, method and computer program for base station transceiver, user equipment and entity of mobile communication system
CN111368888A (en) * 2020-02-25 2020-07-03 重庆邮电大学 Service function chain fault diagnosis method based on deep dynamic Bayesian network
CN111371742A (en) * 2020-02-21 2020-07-03 重庆邮电大学 SVDD (singular value decomposition and direct data decomposition) -based network slice physical node anomaly detection method
CN111526070A (en) * 2020-04-29 2020-08-11 重庆邮电大学 Service function chain fault detection method based on prediction
CN111543029A (en) * 2018-02-01 2020-08-14 英特尔公司 Distributed autonomous identity for network function virtualization
CN112202783A (en) * 2020-09-30 2021-01-08 国家计算机网络与信息安全管理中心 5G network anomaly detection method and system based on adaptive deep learning
CN112597831A (en) * 2021-02-22 2021-04-02 杭州安脉盛智能技术有限公司 Signal abnormity detection method based on variational self-encoder and countermeasure network
CN112887145A (en) * 2021-01-27 2021-06-01 重庆邮电大学 Distributed network slice fault detection method
CN113077005A (en) * 2021-04-13 2021-07-06 西安交通大学 System and method for detecting abnormity based on LSTM self-encoder and normal signal data
CN113076738A (en) * 2021-04-09 2021-07-06 北京智谱华章科技有限公司 GNN encoder and abnormal point detection method based on graph context learning
CN113157771A (en) * 2021-04-27 2021-07-23 广东海聊科技有限公司 Data anomaly detection method and power grid data anomaly detection method
CN113475157A (en) * 2018-12-22 2021-10-01 诺基亚通信公司 Connection behavior identification for wireless networks
CN113485302A (en) * 2021-07-20 2021-10-08 山东大学 Vehicle operation process fault diagnosis method and system based on multivariate time sequence data

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016118646A1 (en) * 2015-01-20 2016-07-28 Huawei Technologies Co., Ltd Systems and methods for sdt to interwork with nfv and sdn
US20160212017A1 (en) * 2015-01-20 2016-07-21 Huawei Technologies Co., Ltd. Systems and Methods for SDT to Interwork with NFV and SDN
EP3304833A1 (en) * 2015-09-15 2018-04-11 Huawei Technologies Co., Ltd. Software defined topology (sdt) for user plane
CN111279648A (en) * 2017-08-29 2020-06-12 苹果公司 Apparatus, method and computer program for base station transceiver, user equipment and entity of mobile communication system
CN111543029A (en) * 2018-02-01 2020-08-14 英特尔公司 Distributed autonomous identity for network function virtualization
CN113475157A (en) * 2018-12-22 2021-10-01 诺基亚通信公司 Connection behavior identification for wireless networks
CN110598851A (en) * 2019-08-29 2019-12-20 北京航空航天大学合肥创新研究院 Time series data abnormity detection method fusing LSTM and GAN
CN111371742A (en) * 2020-02-21 2020-07-03 重庆邮电大学 SVDD (singular value decomposition and direct data decomposition) -based network slice physical node anomaly detection method
CN111368888A (en) * 2020-02-25 2020-07-03 重庆邮电大学 Service function chain fault diagnosis method based on deep dynamic Bayesian network
CN111526070A (en) * 2020-04-29 2020-08-11 重庆邮电大学 Service function chain fault detection method based on prediction
CN112202783A (en) * 2020-09-30 2021-01-08 国家计算机网络与信息安全管理中心 5G network anomaly detection method and system based on adaptive deep learning
CN112887145A (en) * 2021-01-27 2021-06-01 重庆邮电大学 Distributed network slice fault detection method
CN112597831A (en) * 2021-02-22 2021-04-02 杭州安脉盛智能技术有限公司 Signal abnormity detection method based on variational self-encoder and countermeasure network
CN113076738A (en) * 2021-04-09 2021-07-06 北京智谱华章科技有限公司 GNN encoder and abnormal point detection method based on graph context learning
CN113077005A (en) * 2021-04-13 2021-07-06 西安交通大学 System and method for detecting abnormity based on LSTM self-encoder and normal signal data
CN113157771A (en) * 2021-04-27 2021-07-23 广东海聊科技有限公司 Data anomaly detection method and power grid data anomaly detection method
CN113485302A (en) * 2021-07-20 2021-10-08 山东大学 Vehicle operation process fault diagnosis method and system based on multivariate time sequence data

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
"\"SG13-LS139Att1_PLEN-208\"", 3GPP INBOX\\LSS_FROM_EXTERNAL_BODIES *
SIYU LIN: "Advanced_Dynamic_Channel_Access_Strategy_in_Spectrum_Sharing_5G_Systems", 《IEEE XPLORE》 *
李含青: "基于迭代攻击检测的联合压缩频谱感知算法", 《中国优秀硕士学位论文全文数据库(电子期刊)信息科技辑》 *

Also Published As

Publication number Publication date
CN114423035B (en) 2023-09-19

Similar Documents

Publication Publication Date Title
CN111047082B (en) Early warning method and device of equipment, storage medium and electronic device
US10223582B2 (en) Gait recognition method based on deep learning
CN108809948B (en) Abnormal network connection detection method based on deep learning
CN111858526B (en) Failure time space prediction method and system based on information system log
CN109255440B (en) Method for predictive maintenance of power production equipment based on Recurrent Neural Networks (RNN)
CN112966714B (en) Edge time sequence data anomaly detection and network programmable control method
CN105893208A (en) Cloud computing platform system fault prediction method based on hidden semi-Markov models
CN112101431A (en) Electronic equipment fault diagnosis system
CN109728939A (en) A kind of network flow detection method and device
CN105574328B (en) A kind of integrated approach of on-board diagnostics model
CN110138786A (en) Web method for detecting abnormality and system based on SMOTETomek and LightGBM
CN117113262B (en) Network traffic identification method and system
CN111368863A (en) Intelligent health state assessment method for key mechanism of shore bridge
CN113918367A (en) Large-scale system log anomaly detection method based on attention mechanism
CN109062811B (en) Test case generation method based on neural style migration
CN109594967A (en) A kind of lock of tool drilling detection method for early warning based on well logging big data
CN114266197A (en) Method for diagnosing equipment fault of hydropower station
Tang et al. Prediction of bearing performance degradation with bottleneck feature based on LSTM network
CN114423035A (en) Service function chain abnormity detection method under network slice scene
CN112613494A (en) Power line monitoring abnormity identification method and system based on deep countermeasure network
CN112039907A (en) Automatic testing method and system based on Internet of things terminal evaluation platform
CN115659135A (en) Anomaly detection method for multi-source heterogeneous industrial sensor data
CN115047313B (en) ZPW-2000R orbit circuit fault diagnosis method and device based on OC-SVM and DNN
CN110874506A (en) Low-temperature equipment fault prediction method
CN105606353A (en) Mechanical fault diagnosis method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20230824

Address after: 601, 6th Floor, Building 19, 18th Courtyard, Kechuang 13th Street, Beijing Economic and Technological Development Zone, Daxing District, Beijing, 100176

Applicant after: Beijing Yuwei Technology Co.,Ltd.

Address before: 518000 1104, Building A, Zhiyun Industrial Park, No. 13, Huaxing Road, Henglang Community, Longhua District, Shenzhen, Guangdong Province

Applicant before: Shenzhen Hongyue Information Technology Co.,Ltd.

Effective date of registration: 20230824

Address after: 518000 1104, Building A, Zhiyun Industrial Park, No. 13, Huaxing Road, Henglang Community, Longhua District, Shenzhen, Guangdong Province

Applicant after: Shenzhen Hongyue Information Technology Co.,Ltd.

Address before: 400065 Chongqing Nan'an District huangjuezhen pass Chongwen Road No. 2

Applicant before: CHONGQING University OF POSTS AND TELECOMMUNICATIONS

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant