
CLC number: TP393
On-line Access: 2026-01-09
Received: 2025-04-17
Revision Accepted: 2025-10-15
Crosschecked: 2026-01-11
Cited: 0
Clicked: 646
Citations: Bibtex RefMan EndNote GB/T7714
Deqiang ZHOU, Xinsheng JI, Wei YOU, Hang QIU, Jie YANG, Yu ZHAO, Mingyan XU. Dynamic trust-based service function chain deployment method for disrupting attack chains[J]. Frontiers of Information Technology & Electronic Engineering,in press.https://doi.org/10.1631/FITEE.2500218 @article{title="Dynamic trust-based service function chain deployment method for disrupting attack chains", %0 Journal Article TY - JOUR
面向破坏攻击路径的服务功能链动态信任部署方法1信息工程大学信息技术研究所,中国郑州市,450002 2紫金山实验室,中国南京市,211111 摘要:通过组合虚拟网络功能(VNF)并基于其安全属性分配资源来增强服务功能链(SFC)的安全能力,可有效应对云环境中的漏洞威胁,这是在部署阶段保障SFC安全的重要手段。然而,现有研究在基于信任度部署SFC时,未考虑多步攻击路径中漏洞间的关联性。这导致现有安全编排方法忽略网络实体间的信任度差异,仅聚焦优化局部信任度。这些步骤通过有效切断攻击路径来保障SFC安全。本文提出一种创新的分层信任模型,用于评估网络实体由漏洞关联性造成的差异化信任度。基于信任度评估,在SFC组合阶段全面考虑VNF组合的虚拟信任度,在SFC部署阶段全面考虑物理节点(PN)选择的物理信任度,最大限度破坏SFC中的攻击路径。为此,将安全感知且成本优化的SFC组合与部署(SCSCP)问题建模为整数线性规划(ILP)问题,该问题具有NP难特性。为解决SCSCP问题,本文提出联合信任与成本全局优化(JTCGO)算法,通过动态更新信任度参数,全局求解包含VNF组合方案与PN选取方案的SFC部署解。仿真结果表明,所提算法既能为请求提供最优SFC部署方案,又能以可控成本保障SFC信任度,从而在复杂安全环境中有效抵御网络攻击。 关键词组: Darkslateblue:Affiliate; Royal Blue:Author; Turquoise:Article
Reference[1]Afrasiabi SN, Ebrahimzadeh A, Promwongsa N, et al., 2024. Cost-efficient cluster migration of VNFs for service function chain embedding. IEEE Trans Netw Serv Manag, 21(1):979-993. ![]() [2]Alomari Z, Zhani MF, Aloqaily M, et al., 2023. On ensuring full yet cost-efficient survivability of service function chains in NFV environments. J Netw Syst Manag, 31(3):45. ![]() [3]Bagheri A, Shameli-Sendi A, 2023. Automating the translation of cloud users’ high-level security needs to an optimal placement model in the cloud infrastructure. IEEE Trans Serv Comput, 16(6):4580-4590. ![]() [4]Cao HT, Jindal A, Hu H, et al., 2022. Secure and intelligent service function chain for sustainable services in healthcare cyber physical systems. IEEE Trans Netw Sci Eng, 10(5):2674-2684. ![]() [5]Cao HT, Yang LX, Garg S, et al., 2024. Softwarized resource allocation of tailored services with zero security trust in 6G networks. IEEE Wirel Commun, 31(2):58-65. ![]() [6]Eramo V, Miucci E, Ammar M, et al., 2017. An approach for service function chain routing and virtual function network instance migration in network function virtualization architectures. IEEE/ACM Trans Netw, 25(4):2008-2025. ![]() [7]Gherari M, Dieye M, Elbiaze H, et al., 2024. 3C resource allocation for next-generation applications in an in-network computing-enabled edge-cloud continuum. Proc IEEE Global Communications Conf, p.614-619. ![]() [8]Hasneen J, Sadique KM, 2022. A survey on 5G architecture and security scopes in SDN and NFV. In: Iyer B, Ghosh D, Balas VE (Eds.). Applied Information Processing Systems. Advances in Intelligent Systems and Computing, Springer, Singapore, p. 447-460. ![]() [9]Herrera JG, Botero JF, 2016. Resource allocation in NFV: a comprehensive survey. IEEE Trans Netw Serv Manag, 13(3):518-532. ![]() [10]Hong J, Park S, Yoo JH, et al., 2020. A machine learning based SLA-aware VNF anomaly detection method in virtual networks. Proc Int Conf on Information and Communication Technology Convergence, p.1051-1056. ![]() [11]Hu Y, Guo YA, 2021. Survivable service function chain mapping in NFV-enabled 5G networks. Proc 7th Int Conf on Network Softwarization, p.375-380. ![]() [12]Ji JZ, Wu TX, Yang CC, 2024. Neural population dynamics optimization algorithm: a novel brain-inspired meta-heuristic method. Knowl-Based Syst, 300:112194. ![]() [13]Jorquera Valero JM, Sánchez Sánchez PM, Gil Pérez M, et al., 2023. Cutting-edge assets for trust in 5G and beyond: requirements, state of the art, trends, and challenges. ACM Comput Surv, 55(11):1-36. ![]() [14]Kikuchi H, Takahashi K, 2016. Zipf distribution model for quantifying risk of re-identification from trajectory data. J Inform Process, 24(5):816-823. ![]() [15]Kopec CD, Erlich JC, Brunton BW, et al., 2015. Cortical and subcortical contributions to short-term memory for orienting movements. Neuron, 88(2):367-377. ![]() [16]Niu M, Han QM, Cheng B, et al., 2022. HARS: a high-available and resource-saving service function chain placement approach in data center networks. IEEE Trans Netw Serv Manag, 19(2):829-847. ![]() [17]Pattaranantakul M, Vorakulpipat C, Takahashi T, 2023. Service function chaining security survey: addressing security challenges and threats. Comput Netw, 221:109484. ![]() [18]Peng CZ, Zheng DY, Philip S, et al., 2021. Latency-bounded off-site virtual node protection in NFV. IEEE Trans Netw Serv Manag, 18(3):2545-2556. ![]() [19]Peretz R, Shenzis S, Hay D, 2020. Moving target defense for virtual network functions. Proc IEEE/IFIP Network Operations and Management Symp, p.1-9. ![]() [20]Semedo JD, Zandvakili A, Machens CK, et al., 2019. Cortical areas interact through a communication subspace. Neuron, 102(1):249-259. ![]() [21]Shahjalal M, Farhana N, Roy P, et al., 2022. A binary gray wolf optimization algorithm for deployment of virtual network functions in 5G hybrid cloud. Comput Commun, 193:63-74. ![]() [22]Tang L, Xue CC, Zhao YC, et al., 2024. Anomaly detection of service function chain based on distributed knowledge distillation framework in cloud-edge Industrial Internet of Things scenarios. IEEE Int Things J, 11(6):10843-10855. ![]() [23]Torkzaban N, Baras JS, 2020. Trust-aware service function chain embedding: a path-based approach. Proc IEEE Conf on Network Function Virtualization and Software Defined Networks, p.31-36. ![]() [24]Torkzaban N, Papagianni C, Baras JS, 2019. Trust-aware service chain embedding. Proc 6th Int Conf on Software Defined Systems, p.242-247. ![]() [25]Valente A, Ostojic S, Pillow JW, 2022. Probing the relationship between latent linear dynamical systems and low-rank recurrent neural network models. Neur Comput, 34(9):1871-1892. ![]() [26]Varadharajan V, Karmakar KK, Tupakula U, et al., 2022. Toward a trust aware network slice-based service provision in virtualized infrastructures. IEEE Trans Netw Serv Manag, 19(2):1065-1082. ![]() [27]Vyas S, Golub MD, Sussillo D, et al., 2020. Computation through neural population dynamics. Annu Rev Neurosci, 43(1):249-275. ![]() [28]Wang M, Cheng B, Wang SG, et al., 2021. Availability-and traffic-aware placement of parallelized SFC in data center networks. IEEE Trans Netw Serv Manag, 18(1):182-194. ![]() [29]Wang WL, Liang CC, Chen QB, et al., 2022. Distributed online anomaly detection for virtualized network slicing environment. IEEE Trans Veh Technol, 71(11):12235-12249. ![]() [30]Wang WL, Liang CC, Tang L, et al., 2023. Federated multi-discriminator BiWGan-GP based collaborative anomaly detection for virtualized network slicing. IEEE Trans Mob Comput, 22(11):6445-6459. ![]() [31]Wang WL, Zhou HC, Li M, et al., 2024. An autonomous deployment mechanism for AI security services. IEEE Access, 12:4048-4062. ![]() [32]Yu XH, Jiang JH, Shuai CY, 2013. Approach to attack path generation based on vulnerability correlation. IEEE Conf Anthol. ![]() [33]Zhang PY, Wang C, Jiang CX, et al., 2021. Security-aware virtual network embedding algorithm based on reinforcement learning. IEEE Trans Netw Sci Eng, 8(2):1095-1105. ![]() [34]Zhang QQ, Tang HB, You W, et al., 2021. Network function heterogeneous redundancy deployment method based on immune algorithm. Chin J Netw Inform Secur, 7(1):46-56 (in Chinese). ![]() [35]Zhang T, Xu CQ, Zhang BC, et al., 2023. Towards attack-resistant service function chain migration: a model-based adaptive proximal policy optimization approach. IEEE Trans Depend Secur Comput, 20(6):4913-4927. ![]() [36]Zhang Y, Jiang CX, Zhang PY, 2023. Security-aware resource allocation scheme based on DRI in cloud-edge-terminal cooperative vehicular network. IEEE Int Things J, 11(1):95-104. ![]() [37]Zheng DY, Liu XR, Tang WY, et al., 2023. Cost optimization in security-aware service function chain deployment with diverse vendors. Proc IEEE Global Communications Conf, p.2093-2098. ![]() [38]Zheng DY, Xing HL, Feng L, et al., 2024. Provably efficient security-aware service function tree composing and embedding in multi-vendor networks. Comput Netw, 254:110843. ![]() [39]Zhou DQ, Ji XS, You W, et al., 2024. DDQN-SFCAG: a service function chain recovery method against network attacks in 6G networks. Comput Netw, 254:110748. ![]() Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou
310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE | ||||||||||||||

ORCID:
Open peer comments: Debate/Discuss/Question/Opinion
<1>