Visible to the public A Method for Constructing Heterogeneous Entities Pool in NFV Security Architecture Based on Mimic Defense

TitleA Method for Constructing Heterogeneous Entities Pool in NFV Security Architecture Based on Mimic Defense
Publication TypeConference Paper
Year of Publication2020
AuthorsZhang, Qingqing, Tang, Hongbo, You, Wei, Li, Yingle
Conference Name2020 IEEE 6th International Conference on Computer and Communications (ICCC)
Date Publisheddec
KeywordsComputer architecture, Conferences, genetic algorithm, genetic algorithms, heterogeneous entities pool, mimic defense, network function virtualization, Network Security Architecture, pubcrawl, resilience, Resiliency, Resource management, security, simulation
AbstractThe characteristics of resource sharing and centralized deployment of network function virtualization (NFV) make the physical boundary under the traditional closed management mode disappear, bringing many new security threats to the network. To improve the security of the NFV network, this paper proposes a network function virtualization security architecture based on mimic defense. At the same time, to ensure the differences between heterogeneous entities, a genetic algorithm-based heterogeneous entities pool construction method is proposed. Simulation results show that this method can effectively guarantee the difference between heterogeneous entities and increase the difficulty of attackers.
DOI10.1109/ICCC51575.2020.9345155
Citation Keyzhang_method_2020