Toggle navigation
Home
About
About Journal
Historical Evolution
Indexed In
Awards
Reference Index
Editorial Board
Journal Online
Archive
Project Articles
Most Download Articles
Most Read Articles
Instruction
Contribution Column
Author Guidelines
Template
FAQ
Copyright Agreement
Expenses
Academic Integrity
Contact
Contact Us
Location Map
Subscription
Advertisement
中文
Journals
Publication Years
Keywords
Search within results
(((ZHANG Chuanhao[Author]) AND 1[Journal]) AND year[Order])
AND
OR
NOT
Title
Author
Institution
Keyword
Abstract
PACS
DOI
Please wait a minute...
For Selected:
Download Citations
EndNote
Ris
BibTeX
Toggle Thumbnails
Select
Service function chain construction method based on node utility maximization
ZHANG Chuanhao, ZHOU Qiao
Journal of Computer Applications 2018, 38 (
2
): 503-508. DOI:
10.11772/j.issn.1001-9081.2017081971
Abstract
(
347
)
PDF
(945KB)(
347
)
Knowledge map
Save
Networks heavily rely on middlebox to provide critical service functions, with the development of Software Defined Network (SDN) and Network Function Virtualization (NFV) technology, how to use the new technology to deploy middleboxs and guide flow through a specific sequence of middleboxs to complete the service function chain is still a problem to be solved. A construction method based on the optimal node utility maximization, namely NUM (Node Utility Maximization), was proposed for the service function chain construction problem, which took into account the deployment and steering of the virtual middleboxs in the meantime. Firstly, a service function chain collaborative construction mechanism was designed based on SDN+NFV technology. Secondly, the node selection model and the utility maximization model were introduced in this mechanism, according to the solution of middleware box deployment and traffic guidance problem. Finally, the model was solved by applying Tabu search-combined simulated annealing algorithm. The simulation results show that the proposed method NUM is superior to the traditional algorithm in terms of construction time, success rate and network congestion rate, and the utility of the nodes is improved by about 20% by using the proposed service function chain construction method.
Reference
|
Related Articles
|
Metrics
Select
Anti-sniffering attack method based on software defined network
ZHANG Chuanhao, GU Xuehui, MENG Caixia
Journal of Computer Applications 2018, 38 (
11
): 3258-3262. DOI:
10.11772/j.issn.1001-9081.2018040836
Abstract
(
665
)
PDF
(986KB)(
390
)
Knowledge map
Save
In network sniffing attacks, attackers capture and analyze network communication data from network nodes or links, monitor network status and steal sensitive data such as usernames and passwords. In an ongoing attack, the attacker is usually in a silent state, traditional network protection methods such as firewalls, Intrusion Detection System (IDS), or Intrusion Prevention System (IPS) are difficult to detect and defend against it. A Dynamic Path Hopping (DPH) mechanism based on Software Defined Network (SDN) was proposed to solve this problem. In DPH, the paths of communication nodes were dynamically changed according to constraints of space and time, and the communication traffic was evenly distributed in multiple transmission paths, which increased the difficulty of obtaining complete data in the network sniffing attack. The experimental and performance simulation results show that under a certain network scale, DPH can effectively defend sniffer attacks without significantly reducing network transmission performance.
Reference
|
Related Articles
|
Metrics