计算机科学 ›› 2017, Vol. 44 ›› Issue (8): 90-94.doi: 10.11896/j.issn.1002-137X.2017.08.017

• 网络与通信 • 上一篇    下一篇

一种虚拟化深度包检测部署机制

汪学舜,余少华,戴锦友   

  1. 武汉邮电科学研究院 武汉430074,武汉邮电科学研究院 武汉430074,武汉邮电科学研究院 武汉430074
  • 出版日期:2018-11-13 发布日期:2018-11-13
  • 基金资助:
    本文受863项目:未来一体化标识网络关键技术和示范(2015AA015702)资助

Virtualization Deep Packet Inspection Deployment Method

WANG Xue-shun, YU Shao-hua and DAI Jin-you   

  • Online:2018-11-13 Published:2018-11-13

摘要: 网络功能虚拟化转变了网络架构和网络业务的部署。在网络功能虚拟化架构中,实现虚拟化深度包检测只需在传输路径上进行一次扫描,但高效部署深度包检测功能引擎成为难题。将深度包检测功能部署问题形式化为线性规划问题以满足约束条件,并提出一种基于代价最小的贪婪算法和优化的贪婪算法来解决深度包检测功能部署问题。该算法对部署代价和网络资源代价进行折衷,实现了最小化的部署代价。实验结果表明,所提算法能够实现深度包检测功能部署并取得近似最优解。

关键词: 深度包检测,部署,网络功能虚拟化,最小代价优化

Abstract: Network function virtualization (NFV) changes the network architecture and the deployment of network services.Traffic is scanned only once in the virtual network architecture for the virtualization deep packet inspection (DPI),but DPI deployment is a difficult problem.In this paper,DPI engine deployment was formulated as linear programming problem (ILP) to satisfy some constraints.A greedy algorithm based on cost minimization and an optimal greedy algorithm were proposed to solve the function depoyment problem of deep paclet inspection.The proposed algorithm compromises the DPI deployment cost and network resource cost,and minimizes the cost of deployment.Simulation results show that the proposed scheme can achieve the approximate optimal solution of DPI deployment.

Key words: Deep packet inspection,Deployment,Network function virtualization,Cost minimization

[1] AQAZI Z,TU C C,CHIANG L,et al.SIMPLE-fying middlebox policy enforcement using SDN[J].ACM Sigcomm Computer Communication Review,2013,43(4):27-38.
[2] BREMLER-BARR A,HARCHOL Y,HAY D,et al.Deep Pac-ket Inspection as a Service [C]∥The 10th International Confe-rence on Emerging Networking Experiments and Technologies.Sydney,Australia,2014:271-282.
[3] COTRONEO D,DE SIMONE L,IANNILLO A K,et al.Net-work Function Virtualization:Challenges and Directions for Reliability Assurance[C]∥IEEE International Symposium on Software Reliability Engineering Workshops,2014.Naples,Italy,2014:37-42.
[4] ETSI.Network functions virtualization introductory white paper.http://portal.etsi.org/NFV/ NFV_White_Paper.pdf.
[5] JIANG W J,LAN T,HA S,et al.Joint VM placement and routing for data center traffic engineering[J].Infocom Proceedings IEEE,2012,131(5):2876-2880.
[6] RAJAGOPALAN S,DAN W,JAMJOOM H,et al.Split/merge:System support for elastic execution in virtual middleboxes[C]∥Usenix Conference on Networked Systems Design & Implementation,2013.Lombard,Italy,2013:227-240.
[7] GEMBER A,PRABHU P,GHADIYALI Z,et al.Toward software-defined middlebox networking[C]∥11th ACM Workshop on Hot Topics in Networks,2012.New York,USA,2012:7-12.
[8] SHERRY J,HASAN S,SCOTT C,et al.Making middleboxes someone else’s problem:network processing as a cloud service[J].ACM Sigcomm Computer Communication Review,2012,42(4):13-24.
[9] LU G H,MIAO R,XIONG Y Q,et al.Using CPU as a traffic coprocessing unit in commodity switches[C]∥First Workshop on Hot Topics in Software Defined Networks,2012.Levin,New Zealand,2012:31-36.
[10] GRINGOLI F,ESTE A,SALGARELLI L.MTCLASS:Traffic classification on high-speed links with commodity hardware[C]∥IEEE International Conference on Communications,2012.Ottawa,Canada,2012:1177-1182.
[11] MEHRAGHDAM S,KELLER M,KARL H.Specifying andplacing chains of virtual network functions[C]∥IEEE 3rd International Conference on Cloud Networking,2014.Luxembourg,2014:7-13.
[12] BOUET M,LEGUAY J,CONAN V.Cost-Based Placement ofVirtualized Deep Packet Inspection Functions in SDN[C]∥IEEE Military Communications Conference,2013.San Diego,Canada,2013:992-997.
[13] CHAUDET C,FLEURY E,RIVANO H,et al.Optimal positioning of active and passive monitoring devices[J].IEEE Review,2005,51(10):71-82.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!