首页 | 官方网站   微博 | 高级检索  
     

基于熵权VIKOR的安全虚拟网络映射算法
引用本文:孟相如,徐江,康巧燕,韩晓阳. 基于熵权VIKOR的安全虚拟网络映射算法[J]. 信息网络安全, 2020, 0(5): 21-28
作者姓名:孟相如  徐江  康巧燕  韩晓阳
作者单位:空军工程大学信息与导航学院
基金项目:国家自然科学基金[61873077]。
摘    要:近年来,虚拟网络映射技术作为网络虚拟化的关键技术,成为学术界与工业界研究的重点之一。针对安全虚拟网络映射中因节点安全感知不全面、匹配不合理导致的映射性能较低问题,文章提出了一种基于熵权折衷排序法(VIKOR)的安全虚拟网络映射算法。该算法首先将安全虚拟网络映射问题构建为混合整数线性规划模型,设计了节点安全优先度指标,实现了虚拟网络节点与底层网络节点安全联合感知;其次在映射过程中综合考虑节点资源属性、拓扑属性和安全属性,采用熵权VIKOR进行节点排序;最后按照节点排序结果依次进行映射,其中链路映射采用k最短路径算法。仿真结果表明,在满足节点各项约束的前提下,文章算法提高了虚拟网络映射成功率和收益开销比。

关 键 词:虚拟网络  网络安全  折衷排序法  映射算法

Secure Virtual Network Embedding Algorithm Based on Entropy Weight VIKOR
MENG Xiangru,XU Jiang,KANG Qiaoyan,HAN Xiaoyang. Secure Virtual Network Embedding Algorithm Based on Entropy Weight VIKOR[J]. Netinfo Security, 2020, 0(5): 21-28
Authors:MENG Xiangru  XU Jiang  KANG Qiaoyan  HAN Xiaoyang
Affiliation:(Information and Navigation College,Air Force Engineering University,Xi’an 710077,China)
Abstract:In recent years,as the key technology of network virtualization,virtual network embedding technology has become one of the focuses of academic and industrial research.In order to solve the problem of low embedding performance caused by incomplete security awareness and unreasonable matching of nodes,this paper proposes a secure virtual network embedding algorithm based on entropy weight VIKOR.Firstly,a mixed integer linear programming model for secure virtual network embedding problems is designed,and the node security priority indicators are designed to realize the joint security awareness of virtual nodes and physical nodes.Secondly,the node resource attributes,topological attributes and security attributes are considered in the embedding process,and the entropy weight VIKIOR method is used to rank the nodes.Finally,the nodes are sequentially embedded according to the results of node ranking,and the k-shortest path algorithm is used for link embedding.The simulation results show that the algorithm can improve the acceptance ratio of virtual network embedding and the revenue to cost ratio while satisfying the node security constraints.
Keywords:virtual network  network security  VIKOR  embedding algorithm
本文献已被 维普 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号