Towards cost optimization in security-aware service function chaining and embedding over multi-vendor edge networks

被引:0
作者
Wang, Chao [1 ]
Zheng, Danyang [1 ]
Liu, Xiaorong [1 ]
Tang, Wenyi [2 ]
Xu, Honghui [3 ]
Cao, Xiaojun [4 ]
机构
[1] Southwest Jiaotong Univ, Sch Comp & Artificial Intelligence, Chengdu, Peoples R China
[2] Sichuan Univ, Sch Cyber Sci & Engn, Chengdu, Peoples R China
[3] Kennesaw State Univ, Dept Informat Technol, Kennesaw, GA USA
[4] Georgia State Univ, Dept Comp Sci, Atlanta, GA USA
关键词
Security-aware service function chain; Security level estimation; Approximate algorithm; Cost optimization; PLACEMENT;
D O I
10.1016/j.comnet.2024.111002
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Frequent cyber-attacks compel service providers to employ security-aware service functions (S-SFs) while delivering network services. Typically, one S-SF can be implemented by diverse configurations, each requiring different implementation costs and providing various security levels. These multi-configured S-SFs could compose various security-aware service function chains (S-SFCs) to satisfy the security requirement of incoming network request. How to properly compose an S-SFC and effectively deploy it remains an open challenging problem. In this work, we discover the "reDundancy security A ccumulatio N "(DAN) phenomenon caused by the direct-summation-fashion when calculating the security level (SeL) of an S-SFC and propose novel methodology to estimate the SeL of one S-SFC for avoiding DAN. To begin, we introduce the concept security level indicator (SeLI) and our novel methodology. Next, we formulate the problem of security-aware SF selection, chaining, and deployment (Sec-SFCD) with the objective function of cost optimization and prove its NP-hardness. To solve this problem, we propose the security-cost-balance (SCB) factor technique, which measures the average cost of satisfying one unit of security requirement. Based on this technique, we further develop an efficient algorithm called SCB-based S-SFC deployment (SCB-SD) and improves it by proposing overflowing security level elimination (OSE) technique. Through our thorough analysis, we show the logarithm approximation of SCB-SD and SCB-SD with OSE technique (SSD-OSE). The extensive simulation results validate SSD-OSE' s logarithm-approximation and demonstrate that it significantly outperforms the benchmarks directly extended from the state-of-the-art by an average of 17.98 % and 67.47 %.
引用
收藏
页数:15
相关论文
共 47 条
  • [21] SNDlib 1.0-Survivable Network Design Library
    Orlowski, S.
    Wessaely, R.
    Pioro, M.
    Tomaszewski, A.
    [J]. NETWORKS, 2010, 55 (03) : 276 - 286
  • [22] Service Function Chaining security survey: Addressing security challenges and threats
    Pattaranantakul, Montida
    Vorakulpipat, Chalee
    Takahashi, Takeshi
    [J]. COMPUTER NETWORKS, 2023, 221
  • [23] Online Security-Aware and Reliability-Guaranteed AI Service Chains Provisioning in Edge Intelligence Cloud
    Qiu, Yu
    Liang, Junbin
    Leung, Victor C. M.
    Chen, Min
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (05) : 5933 - 5948
  • [24] New approach for threat classification and security risk estimations based on security event management
    Sancho, Jose Carlos
    Caro, Andres
    avila, Mar
    Bravo, Alberto
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2020, 113 : 488 - 505
  • [25] Efficient Provisioning of Security Service Function Chaining Using Network Security Defense Patterns
    Shameli-Sendi, Alireza
    Jarraya, Yosr
    Pourzandi, Makan
    Cheriet, Mohamed
    [J]. IEEE TRANSACTIONS ON SERVICES COMPUTING, 2019, 12 (04) : 534 - 549
  • [26] Online Service Function Chain Placement for Cost-Effectiveness and Network Congestion Control
    Shang, Xiaojun
    Liu, Zhenhua
    Yang, Yuanyuan
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2022, 71 (01) : 27 - 39
  • [27] Service Function Chain Survivability Provisioning in Fog Networks
    Siasi, Nazli
    Jasim, Mohammed A.
    Yayimli, Aysegul
    Ghani, Nasir
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (02): : 1117 - 1128
  • [28] Security-Aware and Time-Guaranteed Service Placement in Edge Clouds
    Sun, Huaiying
    Yu, Huiqun
    Fan, Guisheng
    Chen, Liqiong
    Liu, Zheng
    [J]. IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (01): : 711 - 725
  • [29] A Reliability-Aware, Delay Guaranteed, and Resource Efficient Placement of Service Function Chains in Softwarized 5G Networks
    Thiruvasagam, Prabhu Kaliyammal
    Kotagi, Vijeth J.
    Murthy, C. Siva Ram
    [J]. IEEE TRANSACTIONS ON CLOUD COMPUTING, 2022, 10 (03) : 1515 - 1531
  • [30] Bidirectional Service Function Chain Embedding for Interactive Applications in Mobile Edge networks
    Tian, Fengsen
    Zhang, Xinglin
    Liang, Junbin
    Yang, Zheng
    [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (05) : 3964 - 3980