Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
5G network slicing function migration strategy based on security threat prediction
HE Zanyuan, WANG Kai, NIU Ben, YOU Wei, TANG Hongbo
Journal of Computer Applications    2019, 39 (2): 446-452.   DOI: 10.11772/j.issn.1001-9081.2018061399
Abstract527)      PDF (1142KB)(334)       Save
With the development of virtualization technology, co-resident attack becomes a common means to steal sensitive information from users. Aiming at the hysteresis of existing virtual machine dynamic migration method reacting to co-resident attacks, a virtual network function migration strategy based on security threat prediction in the context of 5G network slicing was proposed. Firstly, network slicing operation security was modeled based on Hidden Markov Model (HMM), and the network security threats were predicted by multi-source heterogeneous data. Then according to the security prediction results, the migration cost was minimized by adopting the corresponding virtual network function migration strategy. Simulation experimental results show that the proposed strategy can effectively predict the security threats and effectively reduce the migration overhead and information leakage time by using HMM, which has a better defense effect against co-resident attack.
Reference | Related Articles | Metrics
Energy-efficient micro base station deployment method in heterogeneous network with quality of service constraints
ZHANG Yangyang, TANG Hongbo, YOU Wei, WANG Xiaolei, ZHAO Yu
Journal of Computer Applications    2017, 37 (8): 2133-2138.   DOI: 10.11772/j.issn.1001-9081.2017.08.2133
Abstract409)      PDF (967KB)(473)       Save
Aiming at the problem of high energy consumption caused by the increase of base station density in heterogeneous dense network, an energy-efficient method for micro base station deployment in heterogeneous networks was proposed. Firstly, the feasibility of micro base station positions was considered to mitigate the effects of environmental conditions. Then the optimization target value was weighed under different user distribution probability to enhance adaptability for different user distribution scenarios. Finally, an energy-efficient deployment algorithm for micro base stations was proposed by jointly optimizing the number, deployment position and power configuration of micro base stations. Simulation results show that the proposed method improves energy efficiency by up to 26% compared with the scheme which only optimizes the number and location of micro base stations. The experimental results demonstrate that the combined optimization method can improve the energy efficiency of the system compared with the deployment method without considering the power factor, and verifies the influence of the micro base station power on the energy efficiency of heterogeneous network.
Reference | Related Articles | Metrics
Cache pollution attack defense scheme based on cache diversification in content centric networking
ZHENG Linhao, TANG Hongbo, GE Guodong
Journal of Computer Applications    2015, 35 (6): 1688-1692.   DOI: 10.11772/j.issn.1001-9081.2015.06.1688
Abstract476)      PDF (775KB)(424)       Save

In order to deal with the cache pollution attacks in Content Centric Networking (CCN), a defense scheme based on cache diversification was proposed. To reduce the attack scope, the in-network content services were divided into three categories and different cache strategies were used for different services. For private and real-time services, contents were directly delivered without being cached; for streaming media services, contents were pushed to be cached in the edge of network according to probablity; for document services, the priority was caching contents in the upstream, then pushing them to the downstream. Then different defense methods were configured on different nodes. For the edge nodes, attacks were detected by observing the request probability variation of different contents; for the upstream nodes, contents with low request rate were ruled out from the cache space by setting filter rules. The simulation results show that the network average hit ratio under service diversification mechanism is 17.3% higher than that under CCN with traditional caching strategies.The proposed scheme can effectively improve the defense capability of the network for the cache pollution attack.

Reference | Related Articles | Metrics
Influence optimization model based on community structure
GUO Jinshi TANG Hongbo WU Kai YANG Sen
Journal of Computer Applications    2013, 33 (09): 2436-2439.   DOI: 10.11772/j.issn.1001-9081.2013.09.2436
Abstract687)      PDF (782KB)(648)       Save
The relatively large time cost of the existing influence algorithms does not fit the social networks of which the scale keeps expanding. An influence optimization model was proposed based on the network community structure for solving problem of large time cost. Firstly evaluate nodes influence in each community and dig core members, and then find a small subset of nodes in the set composed of the core nodes and linking community nodes to get the maximization diffusion with minimization cost. The experimental results demonstrate that our model achieves the subset with more abroad influence diffusion and reduces running time compared with traditional methods. Its influence coverage is up to 90%.
Related Articles | Metrics