Computer Science ›› 2026, Vol. 53 ›› Issue (1): 371-381.doi: 10.11896/jsjkx.250300076

• Information Security • Previous Articles     Next Articles

Attack Graph-assisted Deep Reinforcement Learning-based Service Function Chain AttackRecovery Method

ZHOU Deqiang1, JI Xinsheng1,2, YOU Wei1, QIU Hang1 , YANG Jie1   

  1. 1 Institute of Information Technology, Information Engineering University, Zhengzhou 450002, China;
    2 Purple Mountain Laboratories, Nanjing 210000, China
  • Received:2025-03-14 Revised:2025-05-22 Published:2026-01-08
  • About author:ZHOU Deqiang,born in 1998,postgra-duate.His main research interests include 5G/6G network,network slicing and cyberspace security.
    JI Xinsheng,born in 1968,Ph.D,professor.His main research interests include next-generation mobile communication,network architecture and cyberspace security.
  • Supported by:
    National Key Research and Development Program of China(2022YFB2902204), Key Research and Development Project of Henan Province(231111211000) and Top Talent Training Project of Henan Province(244500510012).

Abstract: SFC can provide customized services for the six scenarios of 6G with the advantages of on-demand orchestration,flexible networking,and other benefits,and 6G networks also put forward higher requirements for SFC.Resilience is receiving attention for the first time in 6G networks,requiring SFC to ensure stable and continuous service provision of fundamental function,with resilience recovery being a key stage.Existing recovery methods are often based on backup mechanisms leading to resource wastage,while ignoring the impact of network attack characteristics on recovery leading to difficulty in guaranteeing the recovery effect.Considering the characteristics of network attacks,this paper uses SFC attack graph to determine the customized attack recovery scheme for SFC,including the VNF recovery range and the demand of attack recovery level.To solve the placement scheme that conforms to the customized attack recovery scheme,a deep reinforcement learning-based SFC attack recovery method(DRL-SFCAR) is proposed.Extensive simulation results show that DRL-SFCAR performs better in terms of delay and recovery cost than the three comparison methods while ensuring recovery success rate.DRL-SFCAR can meet the attack recovery level requirement and minimize the long-term recovery cost,which achieves the customized recovery for SFC in network attack scenarios.

Key words: Service function chain, Resilience recovery, Attack graph, Deep reinforcing learning, Cost

CLC Number: 

  • TN915
[1]NA M,LEE J,CHOI G,et al.Operator’s Perspective on 6G:6G Services,Vision,and Spectrum[J].IEEE Communications Ma-gazine,2024,62(8):178-184.
[2]ITU.Framework and overall objectives of the future development of IMT for 2030 and beyond[EB/OL].https://www.itu.int/md/R19-WP5D/new/en.
[3]HERRERA J G,BOTERO J F.Resource allocation in NFV:A comprehensive survey[J].IEEE Transactions on Network and Service Management,2016,13(3):518-532.
[4]HALEPLIDIS E,PENTIKOUSIS K,DENAZIS S,et al.Soft-ware-defined networking(SDN):Layers and architecture terminology[R].2015.
[5]QUINN P,NADEAU T.Problem statement for service function chaining[R].2015.
[6]MOGYOROSI F,BABARCZI P,ZERWAS J,et al.Resilientcontrol plane design for virtualized 6g core networks[J].IEEE Transactions on Network and Service Management,2022,19(3):2453-2467.
[7]SARKAR S,VITTAL S.Locomotive 5g core for 6g ready resilient and highly available network slices and sfcs[C]//2022 18th International Conference on Network and Service Management(CNSM).IEEE,2022:367-373.
[8]HE G,LIAO X,LIU C.A security survey of NFV:from causes to practices[C]//2023 3rd International Conference on Consu-mer Electronics and Computer Engineering(ICCECE).IEEE,2023:624-628.
[9]MALEH Y,QASMAOUI Y,El GHOLAMI K,et al.A compre-hensive survey on SDN security:threats,mitigations,and future directions[J].Journal of Reliable Intelligent Environments,2023,9(2):201-239.
[10]PATTARANTAKUL M,VORAKULPIPAT C,TAKAHASHI T.Service Function Chaining security survey:Addressing security challenges and threats[J].Computer Networks,2023,221:109484.
[11]WANG M,CHENG B,WANG S,et al.Availability-and traffic-aware placement of parallelized SFC in data center networks[J].IEEE Transactions on Network and Service Management,2021,18(1):182-194.
[12]QU L,ASSI C,SHABAN K,et al.A reliability-aware network service chain provisioning with delay guarantees in NFV-enabled enterprise datacenter networks[J].IEEE Transactions on Network and Service Management,2017,14(3):554-568.
[13]ZHAO J H,MA J,LI Q W,et al.Service Function Chain Deployment Method Based on VNF Divided Backup Mechanisms[J].Computer Science,2025,52(7):287-294.
[14]ALOMARI Z,ZHANI M F,ALOQAILY M,et al.On ensuring full yet cost-efficient survivability of service function chains in NFV environments[J].Journal of Network and Systems Management,2023,31(3):45.
[15]PENG C,ZHENG D,PHILIP S,et al.Latency-bounded off-site virtual node protection in NFV[J].IEEE Transactions on Network and Service Management,2021,18(3):2545-2556.
[16]TANG H B,QIU H,YOU W,et al.A Reliability-guaranteeMethod for Service Function Chain Deployment Based on Joint Backup[J].Journal of Electronics & Information Technology,2019,41(12):3006-3013.
[17]HU Y,GUO Y.Survivable service function chain mapping inNFV-enabled 5G networks[C]//2021 IEEE 7th International Conference on Network Softwarization(NetSoft).IEEE,2021:375-380.
[18]SOUALAH O,MECHTRI M,GHRIBI C,et al.A link failure recovery algorithm for virtual network function chaining[C]//2017 IFIP/IEEE Symposium on Integrated Network and Service Management(IM).IEEE,2017:213-221.
[19]CAO H,JINDAL A,HU H,et al.Secure and intelligent service function chain for sustainable services in healthcare cyber physical systems[J].IEEE Transactions on Network Science and Engineering,2022,10(5):2674-2684.
[20]ZHOU D Q,JI X S,YOU W,et al.DDQN-SFCAG:A service function chain recovery method against network attacks in 6G networks[J].Computer Networks,2024,254:110748.
[21]HUANG Z,HUANG H.Proactive failure recovery for stateful NFV[C]//2020 IEEE 26th International Conference on Parallel and Distributed Systems(ICPADS).IEEE,2020:536-543.
[22]ZHANG P,SHU S,ZHOU M C.Adaptive and dynamic adjustment of fault detection cycles in cloud computing[J].IEEE Transactions on Industrial Informatics,2019,17(1):20-30.
[23]DONG S,XIA Y,PENG T.Network abnormal traffic detection model based on semi-supervised deep reinforcement learning[J].IEEE Transactions on Network and Service Management,2021,18(4):4197-4212.
[24]DONG S,XIA Y,WANG T.Network abnormal traffic detection framework based on deep reinforcement learning[J].IEEE Wireless Communications,2024,31(3):9.
[25]FEI X,LIU F,XU H,et al.Adaptive VNF scaling and flow routing with proactive demand prediction[C]//IEEE INFOCOM 2018-IEEE Conference on Computer Communications.IEEE,2018:486-494.
[26]ERAMO V,MIUCCI E,AMMAR M,et al.An approach forservice function chain routing and virtual function network instance migration in network function virtualization architectures[J].IEEE/ACM Transactions on Networking,2017,25(4):2008-2025.
[27]KIKUCHI H,TAKAHASHI K.Zipf distribution model forquantifying risk of re-identification from trajectory data[J].Journal of Information Processing,2016,24(5):816-823.
[1] FAN Xinggang, JIANG Xinyang, GU Wenting, XU Juntao, YANG Youdong, LI Qiang. Effective Task Offloading Strategy Based on Heterogeneous Nodes [J]. Computer Science, 2025, 52(8): 354-362.
[2] LIU Mengzhen, ZHOU Qinglei, HAN Lin, NIE Kai, LI Haoran, CHEN Mengyao, LIU Haohao. Research on Automatic Vectorization Benefit Evaluation Model Based on Particle SwarmAlgorithm [J]. Computer Science, 2025, 52(7): 248-254.
[3] ZHAO Jihong, MA Jian, LI Qianwen, NING Lijuan. Service Function Chain Deployment Method Based on VNF Divided Backup Mechanisms [J]. Computer Science, 2025, 52(7): 287-294.
[4] JIANG Jun, ZHAI Yanhe, ZENG Zhiheng, GU Yichao, HUANG Liangming. Loop-invariant Code Motion Algorithm Based on Loop Cost Analysis [J]. Computer Science, 2025, 52(6): 44-51.
[5] ZHANG Mengxi, HAN Jianjun, XIAO Yan. Dynamic Conflict-Prediction Based Algorithm for Multi-agent Path Finding [J]. Computer Science, 2025, 52(4): 21-32.
[6] CHEN Guangyuan, WANG Zhaohui, CHENG Ze. Multi-view Stereo Reconstruction with Context-guided Cost Volume and Depth Refinemen [J]. Computer Science, 2025, 52(3): 231-238.
[7] XU Jia, ZHANG Yiming, CHEN Wenbin, YU Xinshi. Electric Taxi Charging Pile Rental Model and Cost Optimization [J]. Computer Science, 2025, 52(3): 366-376.
[8] WAN Desheng, CHEN Hao, CHENG Wenhui, GAO Yunlong. Joint Scheduling Algorithm of Battery Charging Power and User Allocation for Time-varyingElectricity Prices [J]. Computer Science, 2025, 52(2): 242-252.
[9] PENG Jiao, CHANG Yongjuan, YAN Tao, YOU Zhangzheng, SONG Meina, ZHU Yifan, ZHANG Pengfei, HE Yue, ZHANG Bo, OU Zhonghong. Decentralized Federated Learning Algorithm Sensitive to Delay [J]. Computer Science, 2025, 52(12): 314-320.
[10] SU Xinzhong, XU Youyun. Lightweight Secure Authentication and Key Update Scheme for 5G Urban Transportation [J]. Computer Science, 2025, 52(12): 331-338.
[11] HAN Lin, WU Ruofeng, LIU Haohao, NIE Kai, LI Haoran, CHEN Mengyao. Speculative Control Flow Vectorization Method for SIMD [J]. Computer Science, 2025, 52(11A): 241100012-7.
[12] ZHU Ziyi, ZHANG Jianhui, ZENG Junjieand ZHANG Hongyuan. Security-aware Service Function Chain Deployment Method Based on Deep ReinforcementLearning [J]. Computer Science, 2025, 52(10): 404-411.
[13] LIANG Jingyu, MA Bowen, HUANG Jiwei. Reliability-aware VNF Instance Placement in Edge Computing [J]. Computer Science, 2024, 51(6A): 230500064-6.
[14] XU Yicheng, DAI Chaofan, MA Wubin, WU Yahui, ZHOU Haohao, LU Chenyang. Particle Swarm Optimization-based Federated Learning Method for Heterogeneous Data [J]. Computer Science, 2024, 51(6): 391-398.
[15] WANG Zhen, NIE Kai, HAN Lin. Auto-vectorization Cost Model Based on Instruction MKS [J]. Computer Science, 2024, 51(4): 78-85.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!