Computer Science ›› 2017, Vol. 44 ›› Issue (8): 90-94.doi: 10.11896/j.issn.1002-137X.2017.08.017

Previous Articles     Next Articles

Virtualization Deep Packet Inspection Deployment Method

WANG Xue-shun, YU Shao-hua and DAI Jin-you   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Network function virtualization (NFV) changes the network architecture and the deployment of network services.Traffic is scanned only once in the virtual network architecture for the virtualization deep packet inspection (DPI),but DPI deployment is a difficult problem.In this paper,DPI engine deployment was formulated as linear programming problem (ILP) to satisfy some constraints.A greedy algorithm based on cost minimization and an optimal greedy algorithm were proposed to solve the function depoyment problem of deep paclet inspection.The proposed algorithm compromises the DPI deployment cost and network resource cost,and minimizes the cost of deployment.Simulation results show that the proposed scheme can achieve the approximate optimal solution of DPI deployment.

Key words: Deep packet inspection,Deployment,Network function virtualization,Cost minimization

[1] AQAZI Z,TU C C,CHIANG L,et al.SIMPLE-fying middlebox policy enforcement using SDN[J].ACM Sigcomm Computer Communication Review,2013,43(4):27-38.
[2] BREMLER-BARR A,HARCHOL Y,HAY D,et al.Deep Pac-ket Inspection as a Service [C]∥The 10th International Confe-rence on Emerging Networking Experiments and Technologies.Sydney,Australia,2014:271-282.
[3] COTRONEO D,DE SIMONE L,IANNILLO A K,et al.Net-work Function Virtualization:Challenges and Directions for Reliability Assurance[C]∥IEEE International Symposium on Software Reliability Engineering Workshops,2014.Naples,Italy,2014:37-42.
[4] ETSI.Network functions virtualization introductory white paper.http://portal.etsi.org/NFV/ NFV_White_Paper.pdf.
[5] JIANG W J,LAN T,HA S,et al.Joint VM placement and routing for data center traffic engineering[J].Infocom Proceedings IEEE,2012,131(5):2876-2880.
[6] RAJAGOPALAN S,DAN W,JAMJOOM H,et al.Split/merge:System support for elastic execution in virtual middleboxes[C]∥Usenix Conference on Networked Systems Design & Implementation,2013.Lombard,Italy,2013:227-240.
[7] GEMBER A,PRABHU P,GHADIYALI Z,et al.Toward software-defined middlebox networking[C]∥11th ACM Workshop on Hot Topics in Networks,2012.New York,USA,2012:7-12.
[8] SHERRY J,HASAN S,SCOTT C,et al.Making middleboxes someone else’s problem:network processing as a cloud service[J].ACM Sigcomm Computer Communication Review,2012,42(4):13-24.
[9] LU G H,MIAO R,XIONG Y Q,et al.Using CPU as a traffic coprocessing unit in commodity switches[C]∥First Workshop on Hot Topics in Software Defined Networks,2012.Levin,New Zealand,2012:31-36.
[10] GRINGOLI F,ESTE A,SALGARELLI L.MTCLASS:Traffic classification on high-speed links with commodity hardware[C]∥IEEE International Conference on Communications,2012.Ottawa,Canada,2012:1177-1182.
[11] MEHRAGHDAM S,KELLER M,KARL H.Specifying andplacing chains of virtual network functions[C]∥IEEE 3rd International Conference on Cloud Networking,2014.Luxembourg,2014:7-13.
[12] BOUET M,LEGUAY J,CONAN V.Cost-Based Placement ofVirtualized Deep Packet Inspection Functions in SDN[C]∥IEEE Military Communications Conference,2013.San Diego,Canada,2013:992-997.
[13] CHAUDET C,FLEURY E,RIVANO H,et al.Optimal positioning of active and passive monitoring devices[J].IEEE Review,2005,51(10):71-82.

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!