[go: up one dir, main page]

CN111800291A - Service function chain deployment method and device - Google Patents

Service function chain deployment method and device Download PDF

Info

Publication number
CN111800291A
CN111800291A CN202010461022.3A CN202010461022A CN111800291A CN 111800291 A CN111800291 A CN 111800291A CN 202010461022 A CN202010461022 A CN 202010461022A CN 111800291 A CN111800291 A CN 111800291A
Authority
CN
China
Prior art keywords
combination
vnf
security value
service
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010461022.3A
Other languages
Chinese (zh)
Other versions
CN111800291B (en
Inventor
崔琪楣
范玮琪
陶小峰
张平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN202010461022.3A priority Critical patent/CN111800291B/en
Publication of CN111800291A publication Critical patent/CN111800291A/en
Application granted granted Critical
Publication of CN111800291B publication Critical patent/CN111800291B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/28Restricting access to network management systems or functions, e.g. using authorisation function to access network configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

本发明实施例提供了一种服务功能链部署方法及装置,上述方法包括:从业务请求所请求服务的每一服务类型该服务类型的各个预设虚拟化网络功能VNF中选择VNF,得到VNF数量分别为预设数量范围内各个数量的VNF集;得到各个第一组合,其中,每一第一组合中包含各个服务类型对应的一个VNF集;基于各个第二组合的调整后的安全值和部署消耗,在各个第二组合中选择用于部署待部署服务功能链的第二组合,第二组合为:第一组合的安全值大于期望安全值的第一组合;并将所选择的第二组合中VNF按照预设逻辑顺序部署所述待部署服务功能链。应用本发明实施例提供的方案进行服务功能链部署时,能够提高所部署的服务功能链的安全性。

Figure 202010461022

Embodiments of the present invention provide a method and device for deploying a service function chain. The above method includes: selecting a VNF from preset virtualized network function VNFs of each service type of the service type requested by a service request, and obtaining the number of VNFs Respectively, each number of VNF sets within the preset number range; obtain each first combination, wherein each first combination includes a VNF set corresponding to each service type; based on the adjusted security value and deployment of each second combination Consumption, select a second combination for deploying the service function chain to be deployed in each of the second combinations, the second combination is: the first combination whose security value is greater than the expected security value; The middle VNF deploys the to-be-deployed service function chain according to a preset logical sequence. When the solution provided by the embodiment of the present invention is applied to deploy the service function chain, the security of the deployed service function chain can be improved.

Figure 202010461022

Description

一种服务功能链部署方法及装置A service function chain deployment method and device

技术领域technical field

本发明涉及通信安全技术领域,特别是涉及一种服务功能链部署方法及装置。The present invention relates to the technical field of communication security, and in particular, to a method and device for deploying a service function chain.

背景技术Background technique

服务功能链为一组有序的VNF(Virtual Network Function,虚拟化网络功能)的集合,VNF用于提供服务。由于在业务请求中可能包括一系列所要请求服务的服务类型,当业务请求不同时,业务请求中包括的服务类型也不同,从而用于响应业务请求的服务功能链中VNF也不同。The service function chain is a set of ordered VNFs (Virtual Network Functions, virtualized network functions), and the VNFs are used to provide services. Since a service request may include a series of service types to be requested, when the service requests are different, the service types included in the service requests are also different, so the VNFs in the service function chain used to respond to the service requests are also different.

为了能够满足用户的不同业务请求,需要针对不同业务请求进行服务功能链的部署,从而基于所部署的服务功能链响应用户的业务请求。现有技术中,部署服务功能链时,一般基于业务请求所请求的每一服务的服务类型,在每一服务的服务类型的各个预设VNF中随机选择一个VNF,基于所选择的各个VNF部署服务功能链。In order to satisfy different service requests of users, it is necessary to deploy service function chains for different service requests, so as to respond to user service requests based on the deployed service function chains. In the prior art, when deploying a service function chain, generally based on the service type of each service requested by the business request, a VNF is randomly selected from each preset VNF of the service type of each service, and the deployment is based on the selected VNFs. Service function chain.

然而,由于是随机选择VNF,所选择的VNF的安全性可能较低,而安全性较低的VNF易受到网络攻击者的攻击,从而导致所部署的服务功能链的安全性较低。However, due to the random selection of VNFs, the selected VNFs may be less secure, and less secure VNFs are vulnerable to cyber attackers, resulting in less secure service function chains deployed.

发明内容SUMMARY OF THE INVENTION

本发明实施例的目的在于提供一种服务功能链部署方法及装置,提高所部署的服务功能链的安全性。具体技术方案如下:The purpose of the embodiments of the present invention is to provide a service function chain deployment method and device, so as to improve the security of the deployed service function chain. The specific technical solutions are as follows:

第一方面,本发明实施例提供了一种服务功能链部署方法,所述方法包括:In a first aspect, an embodiment of the present invention provides a service function chain deployment method, and the method includes:

根据待响应的业务请求,确定待部署服务功能链的期望安全值;Determine the expected security value of the service function chain to be deployed according to the business request to be responded;

针对所述待响应的业务请求所请求服务的每一服务类型,从该服务类型的各个预设虚拟化网络功能VNF中选择VNF,得到VNF数量分别为预设数量范围内各个数量的VNF集;For each service type of the service requested by the service request to be responded, select a VNF from each preset virtualized network function VNF of the service type, and obtain a VNF set whose number of VNFs is each within the preset number range;

对得到的各个VNF集进行组合,得到各个第一组合,其中,每一第一组合中包含各个服务类型对应的一个VNF集;Combining the obtained VNF sets to obtain each first combination, wherein each first combination includes a VNF set corresponding to each service type;

针对每一第一组合,根据该第一组合内各个VNF的安全值,计算该第一组合的安全值;For each first combination, calculate the security value of the first combination according to the security value of each VNF in the first combination;

针对每一第二组合,根据该第二组合的安全值,调整部署该第二组合中VNF的总资源消耗,作为部署消耗,并根据该第二组合内VNF的实际总占用资源,调整该第二组合的安全值,其中,第二组合为:第一组合的安全值大于所述期望安全值的第一组合;For each second combination, according to the security value of the second combination, adjust the total resource consumption of the VNFs in the second combination as deployment consumption, and adjust the total resource consumption of the VNFs in the second combination according to the actual total occupied resources of the second combination. Two combinations of safety values, wherein the second combination is: a first combination in which the safety value of the first combination is greater than the expected safety value;

基于各个第二组合的调整后的安全值和部署消耗,在各个第二组合中选择用于部署所述待部署服务功能链的第二组合,并将所选择的第二组合中VNF按照预设逻辑顺序部署所述待部署服务功能链。Based on the adjusted security value and deployment consumption of each second combination, a second combination for deploying the service function chain to be deployed is selected in each second combination, and the VNF in the selected second combination is set according to the preset The to-be-deployed service function chain is deployed in a logical sequence.

本发明的一个实施例中,上述期望安全值为针对服务功能链的安全值,In an embodiment of the present invention, the above-mentioned expected security value is a security value for the service function chain,

所述针对每一第一组合,根据该第一组合内各个VNF的安全值,计算该第一组合的安全值,包括:For each first combination, calculating the security value of the first combination according to the security value of each VNF in the first combination, including:

按照以下表达式计算各个第一组合的安全值θ:The safety value θ of each first combination is calculated according to the following expression:

Figure BDA0002510919460000021
Figure BDA0002510919460000021

其中,X表示第一组合中VNF所对应的服务类型的数量,x表示第一组合中VNF所对应服务类型的顺序号,Δx表示第x个服务类型的安全值,kx表示第x个服务类型的安全权重,nx表示第x个服务类型对应的VNF集的VNF数量。Among them, X represents the number of service types corresponding to the VNFs in the first combination, x represents the sequence number of the service types corresponding to the VNFs in the first combination, Δx represents the security value of the xth service type, and kx represents the xth The security weight of the service type, n x represents the number of VNFs in the VNF set corresponding to the xth service type.

本发明的一个实施例中,上述期望安全值为针对服务功能链中VNF的安全值,In an embodiment of the present invention, the above-mentioned expected security value is a security value for the VNF in the service function chain,

所述针对每一第一组合,根据该第一组合内各个VNF的安全值,计算该第一组合的安全值,包括:For each first combination, calculating the security value of the first combination according to the security value of each VNF in the first combination, including:

按照以下表达式计算各第一组合的安全值μ:The safety value μ of each first combination is calculated according to the following expression:

Figure BDA0002510919460000031
Figure BDA0002510919460000031

其中,X表示第一组合中VNF所对应的服务类型的数量,x表示第一组合中VNF所对应服务类型的顺序号,Δx表示第x个服务类型的安全值,kx表示第x个服务类型的安全权重,nx表示第x个服务类型对应的VNF集的VNF数量。Among them, X represents the number of service types corresponding to the VNFs in the first combination, x represents the sequence number of the service types corresponding to the VNFs in the first combination, Δx represents the security value of the xth service type, and kx represents the xth The security weight of the service type, n x represents the number of VNFs in the VNF set corresponding to the xth service type.

本发明的一个实施例中,上述根据待响应的业务请求,确定待部署服务功能链的期望安全值,包括:In an embodiment of the present invention, the above-mentioned determination of the expected security value of the service function chain to be deployed according to the service request to be responded includes:

当所述待响应的业务请求中携带所请求业务的期望业务安全值时,将所述期望业务安全值作为待部署服务功能链的期望安全值;When the service request to be responded carries the expected service security value of the requested service, the expected service security value is used as the expected security value of the service function chain to be deployed;

当所述待响应的业务请求中未携带所请求业务的期望业务安全值时,将预设期望安全值作为待部署服务功能链的期望安全值。When the service request to be responded does not carry the expected service security value of the requested service, the preset expected security value is used as the expected security value of the service function chain to be deployed.

本发明的一个实施例中,上述针对每一第二组合,根据该第二组合的安全值,调整部署该第二组合中VNF的总资源消耗,作为部署消耗,并根据该第二组合内VNF的实际总占用资源,调整该第二组合的安全值,包括:In an embodiment of the present invention, for each second combination, the total resource consumption of deploying VNFs in the second combination is adjusted according to the security value of the second combination as deployment consumption, and according to the VNFs in the second combination The actual total occupied resources, adjust the security value of the second combination, including:

针对每一第二组合,计算部署该第二组合中VNF的总资源消耗与该第二组合的安全值之和,将计算得到的值作为该第二组合的部署消耗,并计算该第二组合内VNF的实际总占用资源与该第二组合的安全值之和,将计算得到的值作为该第二组合调整后的安全值。For each second combination, calculate the sum of the total resource consumption of deploying VNFs in the second combination and the security value of the second combination, use the calculated value as the deployment consumption of the second combination, and calculate the second combination The sum of the actual total occupied resources of the inner VNF and the security value of the second combination is taken as the adjusted security value of the second combination.

本发明的一个实施例中,上述在各个第二组合中选择用于部署所述待部署服务功能链的第二组合,包括:In an embodiment of the present invention, the above-mentioned second combination selected for deploying the to-be-deployed service function chain from each second combination includes:

计算各个第二组合调整后的安全值和部署消耗间的比值,将比值最大的第二组合作为用于部署所述待部署服务功能链的第二组合。Calculate the ratio between the adjusted security value of each second combination and the deployment consumption, and use the second combination with the largest ratio as the second combination for deploying the service function chain to be deployed.

本发明的一个实施例中,在所述将所选择的第二组合中VNF按照预设逻辑顺序部署所述待部署服务功能链之后,还包括:In an embodiment of the present invention, after the VNF in the selected second combination deploys the to-be-deployed service function chain according to a preset logical sequence, the method further includes:

评估所选择的第二组合中VNF的工作性能值;Evaluate the performance values of the VNFs in the selected second combination;

基于所评估的VNF的工作性能值和VNF的安全值,在所选择的第二组合的VNF中选择用于工作的工作VNF;Selecting a working VNF for work among the selected VNFs of the second combination based on the assessed work performance value of the VNF and the security value of the VNF;

基于所确定的工作VNF响应所述待响应的业务请求。The service request to be responded is responded to based on the determined working VNF.

本发明的一个实施例中,上述方法还包括:In one embodiment of the present invention, the above-mentioned method further includes:

按照预设的周期,基于各个VNF的历史安全值,按照以下表达式确定各个VNF当前周期的安全值T:According to the preset period, based on the historical security value of each VNF, the security value T of the current period of each VNF is determined according to the following expression:

Figure BDA0002510919460000041
Figure BDA0002510919460000041

其中,T0为当前周期VNF的安全值评估结果,i为周期的顺序号,I为初始周期到当前周期的周期数量,Ti为第i个周期的VNF的安全值,α为VNF的安全值评估结果的安全权重,βi为第i个周期的VNF的安全值的安全权重,且

Figure BDA0002510919460000042
大于预设阈值。Among them, T 0 is the evaluation result of the security value of the VNF in the current cycle, i is the sequence number of the cycle, I is the number of cycles from the initial cycle to the current cycle, T i is the security value of the VNF in the ith cycle, and α is the security value of the VNF is the security weight of the value evaluation result, β i is the security weight of the security value of the VNF in the ith cycle, and
Figure BDA0002510919460000042
greater than the preset threshold.

第二方面,本发明实施例提供了一种服务功能链部署装置,所述装置包括:In a second aspect, an embodiment of the present invention provides an apparatus for deploying a service function chain, where the apparatus includes:

期望安全值确定模块,用于根据待响应的业务请求,确定待部署服务功能链的期望安全值;The expected security value determination module is used to determine the expected security value of the service function chain to be deployed according to the business request to be responded;

VNF集获得模块,用于针对所述待响应的业务请求所请求服务的每一服务类型,从该服务类型的各个预设虚拟化网络功能VNF中选择VNF,得到VNF数量分别为预设数量范围内各个数量的VNF集;The VNF set obtaining module is configured to, for each service type of the service requested by the service request to be responded, select a VNF from each preset virtualized network function VNF of the service type, and obtain the number of VNFs in the preset number range respectively Each number of VNF sets within;

第一组合获得模块,用于对得到的各个VNF集进行组合,得到各个第一组合,其中,每一第一组合中包含各个服务类型对应的一个VNF集;The first combination obtaining module is used to combine the obtained VNF sets to obtain each first combination, wherein each first combination includes a VNF set corresponding to each service type;

安全值计算模块,用于针对每一第一组合,根据该第一组合内各个VNF的安全值,计算该第一组合的安全值;a security value calculation module, configured to calculate the security value of the first combination according to the security value of each VNF in the first combination for each first combination;

数据计算模块,用于针对每一第二组合,根据该第二组合的安全值,调整部署该第二组合中VNF的总资源消耗,作为部署消耗,并根据该第二组合内VNF的实际总占用资源,调整该第二组合的安全值,其中,第二组合为:第一组合的安全值大于所述期望安全值的第一组合;The data calculation module is configured to, for each second combination, adjust the total resource consumption of deploying VNFs in the second combination according to the security value of the second combination, as the deployment consumption, and according to the actual total resource consumption of the VNFs in the second combination. Occupy resources, and adjust the security value of the second combination, where the second combination is: the security value of the first combination is greater than the expected security value of the first combination;

服务功能链部署模块,用于基于各个第二组合的调整后的安全值和部署消耗,在各个第二组合中选择用于部署所述待部署服务功能链的第二组合,并将所选择的第二组合中VNF按照预设逻辑顺序部署所述待部署服务功能链。The service function chain deployment module is configured to select a second combination for deploying the service function chain to be deployed in each second combination based on the adjusted security value and deployment consumption of each second combination, and assign the selected In the second combination, the VNF deploys the to-be-deployed service function chain according to a preset logical sequence.

本发明的一个实施例中,上述期望安全值为针对服务功能链的安全值,In an embodiment of the present invention, the above-mentioned expected security value is a security value for the service function chain,

所述安全值计算模块,具体用于按照以下表达式计算各个第一组合的安全值θ:The safety value calculation module is specifically configured to calculate the safety value θ of each first combination according to the following expression:

Figure BDA0002510919460000051
Figure BDA0002510919460000051

其中,X表示第一组合中VNF所对应的服务类型的数量,x表示第一组合中VNF所对应服务类型的顺序号,Δx表示第x个服务类型的安全值,kx表示第x个服务类型的安全权重,nx表示第x个服务类型对应的VNF集的VNF数量。Among them, X represents the number of service types corresponding to the VNFs in the first combination, x represents the sequence number of the service types corresponding to the VNFs in the first combination, Δx represents the security value of the xth service type, and kx represents the xth The security weight of the service type, n x represents the number of VNFs in the VNF set corresponding to the xth service type.

本发明的一个实施例中,上述期望安全值为针对服务功能链中VNF的安全值,In an embodiment of the present invention, the above-mentioned expected security value is a security value for the VNF in the service function chain,

所述安全值计算模块,具体用于按照以下表达式计算各第一组合的安全值μ:The safety value calculation module is specifically configured to calculate the safety value μ of each first combination according to the following expression:

Figure BDA0002510919460000052
Figure BDA0002510919460000052

其中,X表示第一组合中VNF所对应的服务类型的数量,x表示第一组合中VNF所对应服务类型的顺序号,Δx表示第x个服务类型的安全值,kx表示第x个服务类型的安全权重,nx表示第x个服务类型对应的VNF集的VNF数量。Among them, X represents the number of service types corresponding to the VNFs in the first combination, x represents the sequence number of the service types corresponding to the VNFs in the first combination, Δx represents the security value of the xth service type, and kx represents the xth The security weight of the service type, n x represents the number of VNFs in the VNF set corresponding to the xth service type.

本发明的一个实施例中,上述期望安全值确定模块,具体用于当所述待响应的业务请求中携带所请求业务的期望业务安全值时,将所述期望业务安全值作为待部署服务功能链的期望安全值;当所述待响应的业务请求中未携带所请求业务的期望业务安全值时,将预设期望安全值作为待部署服务功能链的期望安全值。In an embodiment of the present invention, the above-mentioned desired security value determination module is specifically configured to use the desired service security value as the service function to be deployed when the service request to be responded carries the desired service security value of the requested service The expected security value of the chain; when the service request to be responded does not carry the expected service security value of the requested service, the preset expected security value is used as the expected security value of the service function chain to be deployed.

本发明的一个实施例中,上述数据计算模块,具体用于针对每一第二组合,计算部署该第二组合中VNF的总资源消耗与该第二组合的安全值之和,将计算得到的值作为该第二组合的部署消耗,并计算该第二组合内VNF的实际总占用资源与该第二组合的安全值之和,将计算得到的值作为该第二组合调整后的安全值。In an embodiment of the present invention, the above-mentioned data calculation module is specifically configured to, for each second combination, calculate the sum of the total resource consumption of VNFs in the deployment of the second combination and the security value of the second combination, and calculate the calculated The value is taken as the deployment consumption of the second combination, and the sum of the actual total occupied resources of VNFs in the second combination and the security value of the second combination is calculated, and the calculated value is used as the adjusted security value of the second combination.

本发明的一个实施例中,上述服务功能链部署模块,具体用于计算各个第二组合调整后的安全值和部署消耗间的比值,将比值最大的第二组合作为用于部署所述待部署服务功能链的第二组合,并将所选择的第二组合中VNF按照预设逻辑顺序部署所述待部署服务功能链。In an embodiment of the present invention, the above-mentioned service function chain deployment module is specifically used to calculate the ratio between the adjusted security value of each second combination and the deployment consumption, and the second combination with the largest ratio is used for deploying the to-be-deployed The second combination of service function chains is deployed, and the VNFs in the selected second combination are deployed in the to-be-deployed service function chain according to a preset logical sequence.

本发明的一个实施例中,上述装置还包括:In an embodiment of the present invention, the above-mentioned device further includes:

工作性能值评估模块,用于在所述服务功能链部署模块之后,评估所选择的第二组合中VNF的工作性能值;a work performance value evaluation module, configured to evaluate the work performance value of the VNF in the selected second combination after the service function chain deployment module;

工作VNF选择模块,用于基于所评估的VNF的工作性能值和VNF的安全值,在所选择的第二组合的VNF中选择用于工作的工作VNF;a working VNF selection module for selecting a working VNF for working among the selected second combined VNFs based on the assessed working performance value of the VNF and the safety value of the VNF;

业务请求响应模块,用于基于所确定的工作VNF响应所述待响应的业务请求。A service request response module, configured to respond to the service request to be responded based on the determined working VNF.

本发明的一个实施例中,上述装置还包括:VNF安全值计算模块,In an embodiment of the present invention, the above-mentioned device further includes: a VNF security value calculation module,

所述VNF安全值计算模块,具体用于按照预设的周期,基于各个VNF的历史安全值,按照以下表达式确定各个VNF当前周期的安全值T:The VNF security value calculation module is specifically used to determine the security value T of each VNF in the current period according to the following expression based on the historical security value of each VNF according to a preset period:

Figure BDA0002510919460000061
Figure BDA0002510919460000061

其中,T0为当前周期VNF的安全值评估结果,i为周期的顺序号,I为初始周期到当前周期的周期数量,Ti为第i个周期的VNF的安全值,α为VNF的安全值评估结果的安全权重,βi为第i个周期的VNF的安全值的安全权重,且

Figure BDA0002510919460000062
大于预设阈值。Among them, T 0 is the evaluation result of the security value of the VNF in the current cycle, i is the sequence number of the cycle, I is the number of cycles from the initial cycle to the current cycle, T i is the security value of the VNF in the ith cycle, and α is the security value of the VNF is the security weight of the value evaluation result, β i is the security weight of the security value of the VNF in the ith cycle, and
Figure BDA0002510919460000062
greater than the preset threshold.

第三方面,本发明实施例提供了一种电子设备,包括处理器、通信接口、存储器和通信总线,其中,处理器,通信接口,存储器通过通信总线完成相互间的通信;In a third aspect, an embodiment of the present invention provides an electronic device, including a processor, a communication interface, a memory, and a communication bus, wherein the processor, the communication interface, and the memory communicate with each other through the communication bus;

存储器,用于存放计算机程序;memory for storing computer programs;

处理器,用于执行存储器上所存放的程序时,实现上述第一方面所述的方法步骤。The processor is configured to implement the method steps described in the first aspect above when executing the program stored in the memory.

由以上可见,应用本发明实施例提供的方案进行服务功能链构造时,由于是基于第一组合的安全值以及待部署服务功能链的期望安全值,在所确定的第二组合中选择用于部署待部署服务功能链的第二组合,又由于上述第一组合的安全值能够反映第一组合中VNF的安全性,上述期望安全值反映期望待部署服务功能链的安全性达到的程度,因此,基于所选择的用于部署待部署服务功能链的第二组合中各个VNF部署服务功能链,在满足所部署的服务功能链的安全性需求的基础上,提高了所部署的服务功能链的安全性。It can be seen from the above that when the solution provided by the embodiment of the present invention is applied to construct the service function chain, since it is based on the security value of the first combination and the expected security value of the service function chain to be deployed, the determined second combination is selected for the service function chain. Deploy the second combination of the service function chain to be deployed, and because the security value of the first combination can reflect the security of the VNF in the first combination, the above expected security value reflects the expected degree of security of the service function chain to be deployed. Therefore, , based on the selected second combination for deploying the service function chain to be deployed, each VNF deploys the service function chain, and on the basis of meeting the security requirements of the deployed service function chain, improves the deployed service function chain. safety.

另外,由于是从业务请求所请求服务的每一服务类型的各个VNF中选择VNF,得到VNF数量分别为预设数量范围内各个数量的VNF集,并对所得到的各个VNF集进行组合,相较于现有技术中仅选择一个VNF,选择预设数量范围内各个数量的VNF能够降低被网络攻击者攻击的概率,提高了所部署服务功能链的安全性。In addition, since the VNFs are selected from the VNFs of each service type requested by the business request, the VNF sets of which the number of VNFs are respectively within the preset number range are obtained, and the obtained VNF sets are combined. Compared with selecting only one VNF in the prior art, selecting each number of VNFs within a preset number range can reduce the probability of being attacked by a network attacker and improve the security of the deployed service function chain.

最后,由于是基于各个第二组合的调整后的安全值和部署消耗,选择用于部署待部署服务功能链的第二组合,又由于第二组合调整后的安全值较为准确反映第二组合中VNF的安全性,第二组合的部署消耗较为准确反映部署第二组合中VNF的总资源消耗,因此,基于各个第二组合的调整后的安全值和部署消耗,选择用于部署待部署服务功能链的第二组合在提高待部署服务功能链的安全性基础上,降低了部署待部署服务功能链的消耗,从而提高了资源利用率。Finally, because it is based on the adjusted security value and deployment consumption of each second combination, the second combination for deploying the service function chain to be deployed is selected, and because the adjusted security value of the second combination more accurately reflects the second combination For the security of the VNF, the deployment consumption of the second combination more accurately reflects the total resource consumption of the VNF in the deployment of the second combination. Therefore, based on the adjusted security value and deployment consumption of each second combination, the service function to be deployed is selected for deployment. On the basis of improving the security of the service function chain to be deployed, the second combination of the chain reduces the consumption of deploying the service function chain to be deployed, thereby improving resource utilization.

附图说明Description of drawings

为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to explain the embodiments of the present invention or the technical solutions in the prior art more clearly, the following briefly introduces the accompanying drawings that need to be used in the description of the embodiments or the prior art. Obviously, the accompanying drawings in the following description are only These are some embodiments of the present invention. For those of ordinary skill in the art, other drawings can also be obtained according to these drawings without creative efforts.

图1为本发明实施例提供的第一种服务功能链部署方法的流程示意图;1 is a schematic flowchart of a first service function chain deployment method provided by an embodiment of the present invention;

图2为本发明实施例提供的一种动态选择方法的流程示意图;2 is a schematic flowchart of a dynamic selection method according to an embodiment of the present invention;

图3a为本发明实施例提供的第二种服务功能链部署方法的流程示意图;3a is a schematic flowchart of a second service function chain deployment method provided by an embodiment of the present invention;

图3b为本发明实施例提供的一种服务功能链部署架构的框图;3b is a block diagram of a service function chain deployment architecture provided by an embodiment of the present invention;

图4为本发明实施例提供的一种服务功能链部署装置的结构示意图;4 is a schematic structural diagram of an apparatus for deploying a service function chain according to an embodiment of the present invention;

图5为本发明实施例提供的一种电子设备的结构示意图。FIG. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.

具体实施方式Detailed ways

下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

参见图1,图1为本发明实施例提供的第一种服务功能链部署方法的流程示意图,上述方法包括S101-S106。Referring to FIG. 1 , FIG. 1 is a schematic flowchart of a first method for deploying a service function chain according to an embodiment of the present invention. The foregoing method includes S101-S106.

S101:根据待响应的业务请求,确定待部署服务功能链的期望安全值。S101: Determine the expected security value of the service function chain to be deployed according to the service request to be responded.

上述待响应的业务请求用于请求获得业务。例如:上述业务可以是:视频下载业务、网页下载业务等。The above service request to be responded is used to request to obtain a service. For example, the above-mentioned services may be: a video download service, a web page download service, and the like.

服务功能链是由各个VNF按照预设的逻辑顺序组成的集合或者链,服务功能链可以在统一的网络基础设施上切出多个虚拟的端到端网络,每个服务功能链从无线接入网到承载网再到核心网在逻辑上隔离,因此上述服务功能链又可以称为网络切片。服务功能链适配各种类型的业务应用,它将使在通用网络基础架构上以最精细的粒度支持各种需求成为可能。The service function chain is a collection or chain composed of VNFs in a preset logical order. The service function chain can cut out multiple virtual end-to-end networks on a unified network infrastructure. The network to the bearer network and then to the core network is logically isolated, so the above service function chain can also be called network slicing. The service function chain is suitable for various types of business applications, and it will make it possible to support various requirements with the most granular granularity on the general network infrastructure.

服务功能链的期望安全值可以理解为;期望服务功能链的安全性所能达到的值。The expected security value of the service function chain can be understood as the value that the security of the expected service function chain can achieve.

由于用户通常期望服务提供的安全性能够有所保障,以此保证重要数据不被窃取,因此用户在发送业务请求时,通常会在业务请求中添加待部署服务功能链的期望业务安全值,上述期望业务安全值可以为安全分数等。Since users usually expect that the security provided by services can be guaranteed to ensure that important data is not stolen, when users send service requests, they usually add the expected service security value of the service function chain to be deployed in the service request. The expected business security value may be a security score or the like.

基于此,本发明的一个实施例中,当待响应的业务请求中携带所请求业务的期望业务安全值时,将期望业务安全值作为待部署服务功能链的期望安全值。Based on this, in an embodiment of the present invention, when the service request to be responded carries the expected service security value of the requested service, the expected service security value is used as the expected security value of the service function chain to be deployed.

具体的,当上述期望业务安全值为安全分数时,可以对上述期望业务安全值进行安全等级的划分,例如:安全等级可以划分为5级。其中,5表示最高、4表示较高、3表示中等、2表示普通、1表示较低。Specifically, when the above-mentioned expected service security value is a security score, the above-mentioned expected service security value may be divided into security levels, for example, the security level may be divided into 5 levels. Among them, 5 is the highest, 4 is high, 3 is medium, 2 is normal, and 1 is low.

当期望业务安全值超过预设安全值范围时,可以对期望业务安全值进行归一化处理,并按照预设区间分别对应1-5级。When the expected service security value exceeds the preset security value range, the expected service security value may be normalized, and correspond to levels 1-5 according to the preset interval.

这样,能够使得待部署服务功能链的期望安全值与用户的期望业务安全值一致,从而满足了用户对待部署服务功能链的安全性需求。In this way, the expected security value of the service function chain to be deployed can be made consistent with the expected service security value of the user, thereby meeting the security requirement of the user to be deployed service function chain.

本发明的一个实施例中,当待响应的业务请求中未携带所请求业务的期望业务安全值时,将预设期望安全值作为待部署服务功能链的期望安全值。In an embodiment of the present invention, when the service request to be responded does not carry the expected service security value of the requested service, the preset expected security value is used as the expected security value of the service function chain to be deployed.

上述预设期望安全值可以是由工作人员根据经验设定的。The above-mentioned preset expected safety value may be set by the staff according to experience.

这样,将预设期望安全值作为待部署服务功能链的期望安全值能够保证待部署服务功能链的安全性。In this way, using the preset expected security value as the expected security value of the service function chain to be deployed can ensure the security of the service function chain to be deployed.

S102:针对待响应的业务请求所请求服务的每一服务类型,从该服务类型的各个VNF中选择VNF,得到VNF数量分别为预设数量范围内各个数量的VNF集。S102: For each service type of the service requested by the service request to be responded, select a VNF from each VNF of the service type, and obtain a VNF set of which the number of VNFs is each within a preset number range.

上述预设数量范围可以由工作人员根据经验设定,例如:上述预设数量范围可以为[1,5]。The above-mentioned preset quantity range can be set by the staff according to experience, for example: the above-mentioned preset quantity range can be [1, 5].

上述预设数量范围还可以根据S101中所确定的期望安全值确定,例如:上述预设数量范围与期望安全值成正比,当期望安全值越高时,上述预设数量范围也越大,当期望安全值越低时,上述预设数量范围也越小。The above-mentioned preset quantity range can also be determined according to the expected safety value determined in S101. For example, the above-mentioned preset quantity range is proportional to the expected safety value. When the expected safety value is higher, the above-mentioned preset quantity range is also larger. When the expected safety value is lower, the above-mentioned preset quantity range is also smaller.

VNF数量分别为预设数量范围内各个数量的VNF集可以理解为:VNF集的各个VNF用于提供同一服务类型的服务、且VNF集的VNF的数量为预设数量范围内各个数量。例如:假设服务类型A中包括VNF1、VNF2、VNF3、……、VNFn,其中,VNF1、VNF2、VNF3、……、VNFn均用于提供服务类型A的服务,预设数量范围为[1,5],那么可以得到VNF数量为1的VNF集、VNF数量为2的VNF集、VNF数量为3的VNF集、VNF数量为4的VNF集、VNF数量为5的VNF集。The number of VNFs is each number within the preset number range. It can be understood that each VNF in the VNF set is used to provide services of the same service type, and the number of VNFs in the VNF set is each number within the preset number range. For example: Suppose service type A includes VNF 1 , VNF 2 , VNF 3 , ..., VNF n , wherein VNF 1 , VNF 2 , VNF 3 , ... , VNF n are all used to provide services of service type A, pre- Set the number range to [1,5], then you can get the VNF set with the number of VNFs 1, the VNF set with the number of VNFs 2, the VNF set with the number of VNFs 3, the VNF set with the number of VNFs 4, and the number of VNFs 5. VNF set.

具体的,在从每一服务类型的各个VNF中选择VNF时,可以采用随机选择方式,从异构功能执行池包括的各个功能等价VNF中选择VNF,从而得到VNF数量分别为预设数量范围内各个数量的VNF集。Specifically, when selecting VNFs from each VNF of each service type, a random selection method can be used to select VNFs from each functionally equivalent VNF included in the heterogeneous function execution pool, so that the number of VNFs is respectively the preset number range. Each number of VNF sets within.

上述异构功能执行池中包含各个服务类型的VNF,每种服务类型的各个VNF又可以称为功能等价的各个VNF。The foregoing heterogeneous function execution pool includes VNFs of various service types, and each VNF of each service type may also be referred to as each VNF of equivalent function.

本发明的一个实施例中,还可以采用动态选择算法,在待响应的业务请求所请求的每一服务类型的各个VNF中选择VNF,得到VNF数量分别为预设数量范围内各个数量的VNF集。In an embodiment of the present invention, a dynamic selection algorithm may also be used to select VNFs from the VNFs of each service type requested by the service request to be responded to, and obtain VNF sets of which the number of VNFs is each within the preset number range. .

参见图2,图2为本发明实施例提供的一种动态选择方法的流程示意图。在图2中包括异构功能执行池1、异构功能执行池2、VNF11、VNF12、……、VNF1n、VNF21、VNF22、……、VNF2n、VNF池、服务1、服务2、VNF1x、VNF1y、VNF2x、VNF2yReferring to FIG. 2, FIG. 2 is a schematic flowchart of a dynamic selection method provided by an embodiment of the present invention. 2 includes heterogeneous function execution pool 1, heterogeneous function execution pool 2, VNF 11 , VNF 12 , ..., VNF 1n , VNF 21 , VNF 22 , ..., VNF 2n , VNF pool, service 1, service 2. VNF 1x , VNF 1y , VNF 2x , VNF 2y .

其中,异构功能执行池1中包括VNF11、VNF12、……、VNF1n。VNF11、VNF12、……、VNF1n均用于提供服务1。Wherein, the heterogeneous function execution pool 1 includes VNF 11 , VNF 12 , ..., VNF 1n . VNF 11 , VNF 12 , . . . , VNF 1n are all used to provide service 1 .

异构功能执行池2中VNF21、VNF22、……、VNF2n。VNF21、VNF22、……、VNF2n均用于提供服务2。VNF 21 , VNF 22 , . . . , VNF 2n in the heterogeneous function execution pool 2 . VNF 21 , VNF 22 , . . . , VNF 2n are all used to provide service 2 .

VNF池中包括VNF1x、VNF1y、VNF2x、VNF2y,其中VNF1x、VNF1y为从异构功能执行池1中动态选择的两个VNF,VNF2x、VNF2y为从异构功能执行池2中动态选择的两个VNF。The VNF pool includes VNF 1x , VNF 1y , VNF 2x , and VNF 2y , wherein VNF 1x and VNF 1y are two VNFs dynamically selected from the heterogeneous function execution pool 1, and VNF 2x and VNF 2y are from the heterogeneous function execution pool Two VNFs dynamically selected in 2.

S103:对得到的各个VNF集进行组合,得到各个第一组合。S103: Combine each of the obtained VNF sets to obtain each of the first combinations.

其中,每一第一组合中包含各个服务类型对应的一个VNF集。例如:假设服务类型St1对应的VNF集包括:VNF集11、VNF集12,服务类型St2对应的VNF集包括:VNF集21、VNF集22。那么可以得到四组第一组合,分别为:(VNF集11,VNF集21),(VNF集11,VNF集22),(VNF集12,VNF集21),(VNF集12,VNF集22)。Wherein, each first combination includes a VNF set corresponding to each service type. For example, it is assumed that the VNF set corresponding to service type St 1 includes: VNF set 11 and VNF set 12 , and the VNF set corresponding to service type St 2 includes: VNF set 21 and VNF set 22 . Then four sets of first combinations can be obtained, namely: (VNF set 11 , VNF set 21 ), (VNF set 11 , VNF set 22 ), (VNF set 12 , VNF set 21 ), (VNF set 12 , VNF set 22 ).

具体的,可以采用预设组合方式,对得到的各个VNF集进行组合,获得各个第一组合。例如:上述预设组合方式可以包括:随机组合、定向组合等。Specifically, a preset combination mode may be used to combine each obtained VNF set to obtain each first combination. For example, the above-mentioned preset combination modes may include: random combination, directional combination, and the like.

S104:针对每一第一组合,根据该第一组合内各个VNF的安全值,计算该第一组合的安全值。S104: For each first combination, calculate the security value of the first combination according to the security value of each VNF in the first combination.

第一组合内各个VNF的安全值反映了各个VNF的安全性大小。因此,可以根据第二组合内各个VNF的安全值,计算第一组合的安全值。The security value of each VNF in the first combination reflects the security level of each VNF. Therefore, the security value of the first combination can be calculated according to the security value of each VNF in the second combination.

具体的,在计算各个第一组合的安全值时,可以计算第一组合内各个VNF的安全值之和,将计算得到的值作为第一组合的安全值。Specifically, when calculating the security value of each first combination, the sum of the security values of each VNF in the first combination may be calculated, and the calculated value may be used as the security value of the first combination.

由于第一组合的安全值用于与待部署服务功能链的期望安全值进行比较,因此,第一组合的安全值类型与待部署服务功能链的期望安全值的类型相关。基于此,本发明的一个实施例中,当期望安全值为针对服务功能链的安全值时,可以按照以下表达式计算各个第一组合的安全值θ:Since the security value of the first combination is used for comparison with the expected security value of the service function chain to be deployed, the security value type of the first combination is related to the type of the expected security value of the service function chain to be deployed. Based on this, in an embodiment of the present invention, when the expected security value is the security value for the service function chain, the security value θ of each first combination can be calculated according to the following expression:

Figure BDA0002510919460000111
Figure BDA0002510919460000111

其中,X表示第一组合中VNF所对应的服务类型的数量,x表示第一组合中VNF所对应服务类型的顺序号,Δx表示第x个服务类型的安全值,kx表示第x个服务类型的安全权重,nx表示第x个服务类型对应的VNF集的VNF数量。Among them, X represents the number of service types corresponding to the VNFs in the first combination, x represents the sequence number of the service types corresponding to the VNFs in the first combination, Δx represents the security value of the xth service type, and kx represents the xth The security weight of the service type, n x represents the number of VNFs in the VNF set corresponding to the xth service type.

其中,Δx可以为第x个服务类型包括各个VNF的安全值的乘积。Wherein, Δx may be the product of the xth service type including the security values of each VNF.

这样,根据服务类型的安全值,服务类型的安全权重以及服务类型包括的VNF数量能够较为准确计算第一组合中VNF的总安全值。In this way, according to the security value of the service type, the security weight of the service type, and the number of VNFs included in the service type, the total security value of the VNFs in the first combination can be calculated more accurately.

本发明的一个实施例中,当期望安全值为针对服务功能链中VNF的安全值时,可以按照以下表达式计算各第一组合的安全值μ:In an embodiment of the present invention, when the expected security value is the security value for the VNF in the service function chain, the security value μ of each first combination can be calculated according to the following expression:

Figure BDA0002510919460000121
Figure BDA0002510919460000121

其中,X表示第一组合中VNF所对应的服务类型的数量,x表示第一组合中VNF所对应服务类型的顺序号,Δx表示第x个服务类型的安全值,kx表示第x个服务类型的安全权重,nx表示第x个服务类型对应的VNF集的VNF数量。Among them, X represents the number of service types corresponding to the VNFs in the first combination, x represents the sequence number of the service types corresponding to the VNFs in the first combination, Δx represents the security value of the xth service type, and kx represents the xth The security weight of the service type, n x represents the number of VNFs in the VNF set corresponding to the xth service type.

这样,根据服务类型的安全值,服务类型的安全权重、服务类型的数量以及服务类型包括的VNF数量,能够较为准确计算第一组合中VNF的平均安全值。In this way, according to the security value of the service type, the security weight of the service type, the number of the service type, and the number of VNFs included in the service type, the average security value of the VNFs in the first combination can be calculated more accurately.

S105:针对每一第二组合,根据该第二组合的安全值,调整部署该第二组合中VNF的总资源消耗,作为部署消耗,并根据该第二组合内VNF的实际总占用资源,调整该第二组合的安全值。S105: For each second combination, according to the security value of the second combination, adjust the total resource consumption of the VNFs in the deployment of the second combination as deployment consumption, and adjust the actual total occupied resources of the VNFs in the second combination according to the second combination. The safe value of this second combination.

上述第二组合为:第一组合的安全值大于期望安全值的第一组合。The above-mentioned second combination is the first combination in which the safety value of the first combination is greater than the expected safety value.

由于期望安全值为期望待部署服务功能链的安全性能够达到的值,当第二组合的安全值大于期望安全值时,能够保证基于各个第二组合中的VNF所部署的服务功能链的安全性能够满足对服务功能链安全性的需求。Since the expected security value is a value that the security of the service function chain to be deployed is expected to reach, when the security value of the second combination is greater than the expected security value, the security of the service function chain deployed based on the VNFs in each second combination can be guaranteed The security can meet the demand for the security of the service function chain.

上述部署第二组合中VNF的总资源消耗可以理解为:部署第二组合的各个VNF所消耗的资源之和。上述部署第二组合的各个VNF所耗费的资源包括计算资源、存储资源、网络资源等。The above total resource consumption of the VNFs in the deployment of the second combination can be understood as: the sum of the resources consumed by the VNFs in the deployment of the second combination. The resources consumed by each VNF in the above-mentioned deployment of the second combination include computing resources, storage resources, network resources, and the like.

由于第二组合的部署消耗与第二组合的安全值相关,例如:当第二组合的安全值越高,第二组合的部署消耗越多;当第二组合的安全值越低,第二组合的部署消耗越少。因此,可以根据第二组合的安全值,调整部署第二组合中VNF的总资源消耗,作为部署消耗。Since the deployment consumption of the second combination is related to the security value of the second combination, for example: when the security value of the second combination is higher, the deployment consumption of the second combination is more; when the security value of the second combination is lower, the second combination deployment consumes less. Therefore, according to the security value of the second combination, the total resource consumption of deploying the VNFs in the second combination can be adjusted as deployment consumption.

具体的,在计算各个第二组合的部署消耗时,可以根据部署第二组合中VNF的总资源消耗、总资源消耗的权重以及第二组合的安全值确定第二组合的部署消耗。Specifically, when calculating the deployment consumption of each second combination, the deployment consumption of the second combination may be determined according to the total resource consumption of VNFs in the deployment of the second combination, the weight of the total resource consumption, and the security value of the second combination.

上述第二组合内VNF的实际总占用资源为:第二组合内各个VNF的实际占用资源之和。VNF的实际占用资源可以包括VNF的实际占用计算资源、实际占用存储资源、实际占用网络资源等。The actual total resources occupied by the VNFs in the second combination are: the sum of the resources actually occupied by the VNFs in the second combination. The actual occupied resources of the VNF may include the actual occupied computing resources of the VNF, the actual occupied storage resources, the actual occupied network resources, and the like.

由于第二组合的安全性与第二组合的VNF的实际总占用资源相关,例如:当第二组合的VNF的实际总占用资源越多时,第二组合的安全性也越高;当第二组合的VNF的实际总占用资源越少时,第二组合的安全性也越低。因此,可以根据各个第二组合内VNF的实际总占用资源,调整各个第二组合的安全值。Since the security of the second combination is related to the actual total resources occupied by the VNFs of the second combination, for example: when the actual total resources occupied by the VNFs of the second combination are more, the security of the second combination is also higher; The lower the actual total occupied resources of the VNFs, the lower the security of the second combination. Therefore, the security value of each second combination can be adjusted according to the actual total resources occupied by the VNFs in each second combination.

具体的,在调整各个第二组合的安全值时,可以根据第二组合内VNF的实际总占用资源以及实际总占用资源的权重确定安全值调整幅度,根据所确定的安全值调整幅度调整第二组合的安全值。Specifically, when adjusting the security value of each second combination, the security value adjustment range may be determined according to the actual total occupied resources of the VNFs in the second combination and the weight of the actual total occupied resources, and the second security value adjustment range may be adjusted according to the determined security value adjustment range. Combined safe value.

S106:基于各个第二组合的调整后的安全值和部署消耗,在各个第二组合中选择用于部署待部署服务功能链的第二组合,并将所选择的第二组合中VNF按照预设逻辑顺序部署待部署服务功能链。S106: Based on the adjusted security value and deployment consumption of each second combination, select a second combination for deploying the service function chain to be deployed in each second combination, and set the VNF in the selected second combination according to the preset Deploy the service function chain to be deployed in logical order.

由于第二组合的调整后的安全值能够更加准确反映第二组合的安全性,第二组合的部署消耗则反映部署第二组合的各个VNF时的总资源消耗,因此,基于基于所计算的各个第二组合的调整后的安全值和部署消耗,在各个第二组合中选择用于部署待部署服务功能链的第二组合,能够保证基于所选择的第二组合中各个VNF所部署的服务功能链的安全性基础上,节省部署VNF的资源消耗,从而提高资源利用率。Since the adjusted security value of the second combination can more accurately reflect the security of the second combination, the deployment consumption of the second combination reflects the total resource consumption when each VNF of the second combination is deployed. The adjusted security value and deployment consumption of the second combination, and selecting the second combination for deploying the service function chain to be deployed in each second combination can ensure that the service functions deployed by each VNF in the selected second combination can be guaranteed. Based on the security of the chain, it saves the resource consumption of deploying VNF, thereby improving resource utilization.

具体的,在选择用于部署待部署服务功能链的第二组合时,可以将第二组合的调整后的安全值位于预设安全值范围内、且第二组合的部署消耗位于预设部署消耗范围内的第二组合作为用于部署待部署服务功能链的第二组合。上述预设安全值范围、预设部署消耗范围可以由工作人员根据经验设定。Specifically, when selecting the second combination for deploying the service function chain to be deployed, the adjusted security value of the second combination may be within the preset security value range, and the deployment consumption of the second combination may be within the preset deployment consumption The second combination within the scope serves as the second combination for deploying the service function chain to be deployed. The above-mentioned preset safety value range and preset deployment consumption range can be set by the staff based on experience.

本发明的一个实施例中,可以计算各个第二组合调整后的安全值和部署消耗间的比值,将比值最大的第二组合作为用于部署待部署服务功能链的第二组合。In an embodiment of the present invention, the ratio between the adjusted security value of each second combination and the deployment consumption can be calculated, and the second combination with the largest ratio is used as the second combination for deploying the service function chain to be deployed.

这样,计算各个第二组合调整后的安全值和部署消耗间的比值,将比值最大的第二组合作为用于部署所述待部署服务功能链的第二组合,在提高了所选择第二组合的安全值基础上,降低了部署第二组合中VNF的消耗,提高了资源利用率。In this way, the ratio between the adjusted security value of each second combination and the deployment consumption is calculated, and the second combination with the largest ratio is used as the second combination for deploying the service function chain to be deployed. On the basis of the safety value of , the consumption of VNFs in the deployment of the second combination is reduced, and the resource utilization rate is improved.

由于服务功能链由一组有序VNF组成,因此,在确定用于部署待部署服务功能链的第二组合后,也就是确定部署待部署服务功能链的各个VNF后,还需要将所选择的VNF按照预设逻辑顺序进行连接,从而形成服务功能链。Since the service function chain consists of a set of ordered VNFs, after the second combination for deploying the service function chain to be deployed is determined, that is, after each VNF for deploying the service function chain to be deployed is determined, the selected VNFs are connected in a preset logical order to form a service function chain.

由以上可见,应用本实施例提供的方案进行服务功能链构造时,由于是基于第一组合的安全值以及待部署服务功能链的期望安全值,在所确定的第二组合中选择用于部署待部署服务功能链的第二组合,又由于上述第一组合的安全值能够反映第一组合中VNF的安全性,上述期望安全值反映期望待部署服务功能链的安全性达到的程度,因此,基于所选择的用于部署待部署服务功能链的第二组合中各个VNF部署服务功能链,在满足所部署的服务功能链的安全性需求的基础上,提高了所部署的服务功能链的安全性。It can be seen from the above that when the solution provided by this embodiment is applied to construct the service function chain, since it is based on the security value of the first combination and the expected security value of the service function chain to be deployed, the determined second combination is selected for deployment. The second combination of the service function chain to be deployed, and because the security value of the first combination can reflect the security of the VNF in the first combination, and the above expected security value reflects the expected degree of security of the service function chain to be deployed. Therefore, The service function chain is deployed based on each VNF in the second combination selected for deploying the service function chain to be deployed, and the security of the deployed service function chain is improved on the basis of meeting the security requirements of the deployed service function chain sex.

另外,由于是从业务请求所请求服务的每一服务类型的各个VNF中选择VNF,得到VNF数量分别为预设数量范围内各个数量的VNF集,并对所得到的各个VNF集进行组合,相较于现有技术中仅选择一个VNF,选择预设数量范围内各个数量的VNF能够降低被网络攻击者攻击的概率,提高了所部署服务功能链的安全性。In addition, since the VNFs are selected from the VNFs of each service type requested by the business request, the VNF sets of which the number of VNFs are respectively within the preset number range are obtained, and the obtained VNF sets are combined. Compared with selecting only one VNF in the prior art, selecting each number of VNFs within a preset number range can reduce the probability of being attacked by a network attacker and improve the security of the deployed service function chain.

最后,由于是基于各个第二组合的调整后的安全值和部署消耗,选择用于部署待部署服务功能链的第二组合,又由于第二组合调整后的安全值较为准确反映第二组合中VNF的安全性,第二组合的部署消耗较为准确反映部署第二组合中VNF的总资源消耗,因此,基于各个第二组合的调整后的安全值和部署消耗,选择用于部署待部署服务功能链的第二组合在提高待部署服务功能链的安全性基础上,降低了部署待部署服务功能链的消耗,从而提高了资源利用率。Finally, because it is based on the adjusted security value and deployment consumption of each second combination, the second combination for deploying the service function chain to be deployed is selected, and because the adjusted security value of the second combination more accurately reflects the second combination For the security of the VNF, the deployment consumption of the second combination more accurately reflects the total resource consumption of the VNF in the deployment of the second combination. Therefore, based on the adjusted security value and deployment consumption of each second combination, the service function to be deployed is selected for deployment. On the basis of improving the security of the service function chain to be deployed, the second combination of the chain reduces the consumption of deploying the service function chain to be deployed, thereby improving resource utilization.

本发明的一个实施例中,可以按照以下方式实现上述S105中针对每一第二组合,根据该第二组合的安全值,调整部署该第二组合中VNF的总资源消耗,作为部署消耗,并根据该第二组合内VNF的实际总占用资源,调整该第二组合的安全值。In an embodiment of the present invention, for each second combination in the above S105 can be implemented in the following manner, according to the security value of the second combination, adjust the total resource consumption of the VNF in the deployment of the second combination, as the deployment consumption, and The security value of the second combination is adjusted according to the actual total resources occupied by the VNFs in the second combination.

针对每一第二组合,计算部署该第二组合中VNF的总资源消耗与该第二组合的安全值之和,将计算得到的值作为该第二组合的部署消耗,并计算该第二组合内VNF的实际总占用资源与该第二组合的安全值之和,将计算得到的值作为该第二组合调整后的安全值。For each second combination, calculate the sum of the total resource consumption of deploying VNFs in the second combination and the security value of the second combination, use the calculated value as the deployment consumption of the second combination, and calculate the second combination The sum of the actual total occupied resources of the inner VNF and the security value of the second combination is taken as the adjusted security value of the second combination.

例如:假设第二组合内VNF的实际总占用资源为S1,第二组合的安全值为N1,可以计算得到第二组合内VNF的实际总占用资源与第二组合的安全值之和为:S1+N1。假设部署第二组合中VNF的总资源消耗为S2,第二组合的安全值为N2,可以计算得到部署第二组合中VNF的总资源消耗与各个第二组合的安全值之和为:S2+N2For example: assuming that the actual total resources occupied by VNFs in the second combination is S 1 and the security value of the second combination is N 1 , the sum of the actual total resources occupied by VNFs in the second combination and the security value of the second combination can be calculated as : S 1 +N 1 . Assuming that the total resource consumption of VNFs in the deployment of the second combination is S 2 and the security value of the second combination is N 2 , the sum of the total resource consumption of the VNFs in the deployment of the second combination and the security value of each second combination can be calculated as: S 2 +N 2 .

这样,计算第二组合内VNF的实际总占用资源与第二组合的安全值之和,能够较为准确获得第二组合调整后的安全值,并且计算部署第二组合中VNF的总资源消耗与第二组合的安全值之和,能够较为准确获得第二组合的部署消耗。In this way, by calculating the sum of the actual total resources occupied by VNFs in the second combination and the security value of the second combination, the adjusted security value of the second combination can be obtained more accurately. The sum of the security values of the two combinations can more accurately obtain the deployment consumption of the second combination.

本发明的一个实施例中,在上述实施例的基础上,还可以包括以下步骤B1-步骤B3。In an embodiment of the present invention, on the basis of the foregoing embodiment, the following steps B1 to B3 may be further included.

步骤B1:评估所选择的第二组合中VNF的工作性能值。Step B1: Evaluate the performance value of the VNF in the selected second combination.

上述VNF的工作性能值可以理解为:VNF在工作时性能参数的值。上述VNF的工作性能值反映VNF的工作状态。The working performance value of the above VNF can be understood as: the value of the performance parameter when the VNF is working. The working performance value of the VNF above reflects the working state of the VNF.

具体的,可以采用统计分析方法,根据所记录的第二组合中VNF的历史工作性能值,评估第二组合中VNF的工作性能值。Specifically, a statistical analysis method may be used to evaluate the work performance value of the VNF in the second combination according to the recorded historical work performance value of the VNF in the second combination.

上述第二组合中VNF的历史工作性能值可以理解为:第二组合中VNF之前工作时的性能值。The historical working performance value of the VNF in the second combination can be understood as: the performance value of the VNF in the second combination when it was working before.

上述统计分析方法包括取最大值、取平均数等。The above statistical analysis methods include taking the maximum value, taking the average and the like.

具体的,还可以记录第二组合中VNF在模拟工作环境下的模拟工作性能值,根据所记录的模拟工作性能值评估第二组合中VNF的工作性能值。Specifically, the simulated working performance value of the VNF in the second combination in the simulated working environment may also be recorded, and the working performance value of the VNF in the second combination may be evaluated according to the recorded simulated working performance value.

步骤B2:基于所评估的VNF的工作性能值和VNF的安全值,在所选择的第二组合的VNF中选择用于工作的工作VNF。Step B2: Based on the evaluated work performance value of the VNF and the security value of the VNF, a working VNF for work is selected among the selected second combined VNFs.

由于第二组合中属于同一服务的VNF的数量可能为多个,因此需要选择用于工作的工作VNF,从而基于所选择的工作VNF响应业务请求。Since the number of VNFs belonging to the same service in the second combination may be multiple, a working VNF for work needs to be selected, so as to respond to a service request based on the selected working VNF.

具体的,在所选择的第二组合的VNF中选择用于工作的工作VNF时,可以将VNF的工作性能值在预设性能值范围内、且VNF的安全值在预设VNF安全值范围内的VNF作为工作VNF。Specifically, when selecting a working VNF for working in the selected second combination of VNFs, the working performance value of the VNF may be within the preset performance value range, and the VNF security value may be within the preset VNF security value range. VNF as working VNF.

上述预设性能范围、预设VNF安全值范围可以由工作人员根据经验设定。The above-mentioned preset performance range and preset VNF security value range can be set by staff according to experience.

具体的,在所选择的第二组合的VNF中选择用于工作的工作VNF时,还可以根据VNF的工作性能值、VNF的安全值、VNF的工作性能值对应的权重以及VNF的安全值对应的权重,选择工作VNF。Specifically, when selecting a working VNF for working in the selected second combination of VNFs, the working performance value of the VNF, the security value of the VNF, the weight corresponding to the working performance value of the VNF, and the corresponding security value of the VNF may also be used. The weights to select the working VNF.

步骤B3:基于所确定的工作VNF响应待响应的业务请求。Step B3: Responding to the service request to be responded based on the determined working VNF.

具体的,工作VNF可以向用户提供服务,从而响应待响应的业务请求。Specifically, the working VNF can provide services to users, thereby responding to service requests to be responded.

这样,根据所评估的VNF的工作性能值和VNF的安全值,在所选择的第二组合的VNF中选择用于工作的工作VNF,能够使得所选择的工作VNF在提高工作效率的基础上,提高了待部署服务功能链的安全值。In this way, according to the evaluated working performance value of the VNF and the security value of the VNF, selecting a working VNF for working in the selected second combination of VNFs can make the selected working VNF on the basis of improving working efficiency, Improves the security value of the service function chain to be deployed.

本发明的一个实施例中,在上述实施例的基础上,还可以包括按照预设的周期,基于各个VNF的历史安全值,按照以下表达式确定各个VNF当前周期的安全值T:In an embodiment of the present invention, on the basis of the above-mentioned embodiment, it may further include determining the security value T of each VNF in the current period according to the following expression based on the historical security value of each VNF according to a preset period:

Figure BDA0002510919460000161
Figure BDA0002510919460000161

其中,T0为当前周期VNF的安全值评估结果,i为周期的顺序号,I为初始周期到当前周期的周期数量,Ti为第i个周期的VNF的安全值,α为VNF的安全值评估结果的安全权重,βi为第i个周期的VNF的安全值的安全权重,且

Figure BDA0002510919460000171
大于预设阈值,例如:上述预设阈值可以为0.5、0.4等。Among them, T 0 is the evaluation result of the security value of the VNF in the current cycle, i is the sequence number of the cycle, I is the number of cycles from the initial cycle to the current cycle, T i is the security value of the VNF in the ith cycle, and α is the security value of the VNF is the security weight of the value evaluation result, β i is the security weight of the security value of the VNF in the ith cycle, and
Figure BDA0002510919460000171
is greater than the preset threshold, for example, the preset threshold may be 0.5, 0.4, or the like.

具体的,可以根据VNF类型、与VNF相连的所有邻接链路的通信量需求和、VNF与其他VNF直接相连接的数量、VNF资源和安全需求、VNF中的数据完整性和机密性等评估指标,对每个VNF进行安全程度的分级,并用VNF的级数作为VNF的初始信任度。Specifically, it can be evaluated according to the VNF type, the traffic demand sum of all adjacent links connected to the VNF, the number of VNFs directly connected to other VNFs, the VNF resources and security requirements, and the data integrity and confidentiality in the VNF. , grading the security level of each VNF, and using the level of the VNF as the initial trust degree of the VNF.

这样,按照预设间隔周期,对VNF的安全值进行更新,能够使得各个VNF的安全值更加符合VNF的实际工作情况。In this way, the security value of the VNF is updated according to the preset interval, so that the security value of each VNF is more in line with the actual working condition of the VNF.

本发明的一个实施例中,在部署待部署服务功能链后,可以按照预设间隔时间,根据所部署的服务功能链的当前工作状态,评估服务功能链的实时安全值。In one embodiment of the present invention, after the service function chain to be deployed is deployed, the real-time security value of the service function chain can be evaluated according to the current working state of the deployed service function chain according to a preset interval.

可以按照以下表达式评估服务功能链的实时安全值θtThe real-time safety value θ t of the service function chain can be evaluated according to the following expression:

Figure BDA0002510919460000172
Figure BDA0002510919460000172

其中,θ0为当前周期服务功能链的安全值评估结果,i为周期的顺序号,I为初始周期到当前周期的周期数量,θi为第i个周期的服务功能链的安全值,

Figure BDA0002510919460000174
为服务功能链的安全值评估结果的安全权重,
Figure BDA0002510919460000173
为第i个周期的服务功能链的安全值的安全权重。Among them, θ 0 is the security value evaluation result of the service function chain in the current cycle, i is the sequence number of the cycle, I is the number of cycles from the initial cycle to the current cycle, θ i is the security value of the service function chain in the ith cycle,
Figure BDA0002510919460000174
The security weight of the result evaluation result for the security value of the service function chain,
Figure BDA0002510919460000173
is the security weight of the security value of the service function chain in the ith cycle.

以下通过具体实施例对本发明实施例提供的服务功能链部署方案进行具体说明。参见图3a、图3b,图3a为本发明实施例提供的第二种服务功能链部署方法的流程示意图,图3b为本发明实施例提供的一种服务功能链部署架构的框图。The service function chain deployment solution provided by the embodiment of the present invention will be specifically described below through specific embodiments. 3a and 3b, FIG. 3a is a schematic flowchart of a second service function chain deployment method provided by an embodiment of the present invention, and FIG. 3b is a block diagram of a service function chain deployment architecture provided by an embodiment of the present invention.

在图3a中,第一步:根据待响应的业务请求,确定服务功能链的部署请求。In Fig. 3a, the first step is to determine the deployment request of the service function chain according to the business request to be responded.

第二步:根据所确定的服务功能链的部署请求,采用动态选择算法在异构功能执行池中确定功能等价的VNF,每一功能等价的VNF形成一个VNF集。Step 2: According to the determined deployment request of the service function chain, the dynamic selection algorithm is used to determine the functionally equivalent VNFs in the heterogeneous function execution pool, and each functionally equivalent VNF forms a VNF set.

第三步:对得到的各个VNF集进行组合,得到各个第一组合,并对各第一组合的安全值进行评估。The third step: combine the obtained VNF sets to obtain each first combination, and evaluate the security value of each first combination.

第四步:基于第二组合的VNF的实际总占用资源以及部署第二组合中VNF的总资源消耗,选择用于部署服务功能链的第二组合。Step 4: Based on the actual total resources occupied by the VNFs of the second combination and the total resource consumption of the VNFs in the deployment of the second combination, the second combination for deploying the service function chain is selected.

第五步:基于所选择的第二组合以及网络基础设施部署服务功能链。Step 5: Deploy the service function chain based on the selected second combination and the network infrastructure.

在图3b中包括业务请求层、输入模块、异构功能执行池、动态选择器、VNF池、信任评估层、判决输出层、收益计算模块以及计时模块。其中,信任评估层中包括VNF安全等级值评估、服务功能链信任度评估以及网络资源信任度评估。In Figure 3b, it includes a service request layer, an input module, a heterogeneous function execution pool, a dynamic selector, a VNF pool, a trust evaluation layer, a decision output layer, a revenue calculation module, and a timing module. Among them, the trust evaluation layer includes VNF security level value evaluation, service function chain trust degree evaluation and network resource trust degree evaluation.

其中,业务请求层用于接收待响应的业务请求,并获得待部署服务功能链的期望安全值以及生成服务功能链部署请求。The service request layer is used to receive the service request to be responded, obtain the expected security value of the service function chain to be deployed, and generate a service function chain deployment request.

输入模块用于接收业务请求层发送的服务功能链部署请求。The input module is used to receive the service function chain deployment request sent by the business request layer.

异构功能执行池中包括多个功能等价的VNF。The heterogeneous function execution pool includes multiple VNFs with equivalent functions.

动态选择器用于根据待部署服务功能链的期望安全值,从异构功能执行池中选择VNF。The dynamic selector is used to select VNFs from the heterogeneous function execution pool according to the expected security value of the service function chain to be deployed.

VNF池包括动态选择器所选择的各个VNF。The VNF pool includes individual VNFs selected by dynamic selectors.

信任评估层用于对由VNF池中各VNF组成的各个组合的安全值进行评估。其中,信任评估层中包括VNF安全等级值评估、服务功能链信任度评估以及网络资源信任度评估。The trust evaluation layer is used to evaluate the security value of each combination composed of each VNF in the VNF pool. Among them, the trust evaluation layer includes VNF security level value evaluation, service function chain trust degree evaluation and network resource trust degree evaluation.

具体的,VNF安全等级值评估用于评估各个VNF的安全值。服务功能链信任度评估用于评估待部署服务功能链的安全值。网络资源信任度评估用于评估各个VNF实际占用资源以及部署各个VNF的消耗资源。Specifically, the VNF security level value evaluation is used to evaluate the security value of each VNF. The service function chain trust evaluation is used to evaluate the security value of the service function chain to be deployed. The network resource trust evaluation is used to evaluate the actual resources occupied by each VNF and the resource consumption of deploying each VNF.

判决输出层用于对待部署服务功能链的各个VNF进行工作性能的评估。The decision output layer is used to evaluate the work performance of each VNF to be deployed in the service function chain.

收益计算模块用于对待部署服务功能链的安全值以及部署消耗进行计算,确定组成待部署服务功能链的VNF。The revenue calculation module is used to calculate the security value and deployment consumption of the service function chain to be deployed, and determine the VNFs that constitute the service function chain to be deployed.

计时模块用于按照预设间隔时间,重新评估VNF的安全值以及服务功能链的安全值。The timing module is used to re-evaluate the security value of the VNF and the security value of the service function chain according to a preset interval.

与上述服务功能链部署方法相对应,本发明实施例还提供了一种服务功能链部署装置。Corresponding to the above service function chain deployment method, an embodiment of the present invention further provides a service function chain deployment apparatus.

参见图4,图4为本发明实施例提供的一种服务功能链部署装置的结构示意图,上述装置包括401-406。Referring to FIG. 4 , FIG. 4 is a schematic structural diagram of an apparatus for deploying a service function chain according to an embodiment of the present invention. The foregoing apparatus includes 401 to 406 .

期望安全值确定模块401,用于根据待响应的业务请求,确定待部署服务功能链的期望安全值;An expected security value determination module 401, configured to determine the expected security value of the service function chain to be deployed according to the service request to be responded;

VNF集获得模块402,用于针对所述待响应的业务请求所请求服务的每一服务类型,从该服务类型的各个预设虚拟化网络功能VNF中选择VNF,得到VNF数量分别为预设数量范围内各个数量的VNF集;The VNF set obtaining module 402 is configured to, for each service type of the service requested by the service request to be responded, select a VNF from each preset virtualized network function VNF of the service type, and obtain the number of VNFs as a preset number respectively The various number of VNF sets within the scope;

第一组合获得模块403,用于对得到的各个VNF集进行组合,得到各个第一组合,其中,每一第一组合中包含各个服务类型对应的一个VNF集;The first combination obtaining module 403 is configured to combine the obtained VNF sets to obtain each first combination, wherein each first combination includes a VNF set corresponding to each service type;

安全值计算模块404,用于针对每一第一组合,根据该第一组合内各个VNF的安全值,计算该第一组合的安全值;a security value calculation module 404, configured to, for each first combination, calculate the security value of the first combination according to the security value of each VNF in the first combination;

数据计算模块405,用于针对每一第二组合,根据该第二组合的安全值,调整部署该第二组合中VNF的总资源消耗,作为部署消耗,并根据该第二组合内VNF的实际总占用资源,调整该第二组合的安全值,其中,第二组合为:第一组合的安全值大于所述期望安全值的第一组合;The data calculation module 405 is configured to, for each second combination, adjust the total resource consumption of deploying VNFs in the second combination according to the security value of the second combination, as the deployment consumption, and according to the actual VNF in the second combination. total occupied resources, and adjust the security value of the second combination, where the second combination is: the security value of the first combination is greater than the expected security value of the first combination;

服务功能链部署模块406,用于基于各个第二组合的调整后的安全值和部署消耗,在各个第二组合中选择用于部署所述待部署服务功能链的第二组合,并将所选择的第二组合中VNF按照预设逻辑顺序部署所述待部署服务功能链。The service function chain deployment module 406 is configured to select a second combination for deploying the service function chain to be deployed in each second combination based on the adjusted security value and deployment consumption of each second combination, and assign the selected In the second combination of , the VNF deploys the to-be-deployed service function chain according to a preset logical sequence.

由以上可见,应用本实施例提供的方案进行服务功能链构造时,由于是基于第一组合的安全值以及待部署服务功能链的期望安全值,在所确定的第二组合中选择用于部署待部署服务功能链的第二组合,又由于上述第一组合的安全值能够反映第一组合中VNF的安全性,上述期望安全值反映期望待部署服务功能链的安全性达到的程度,因此,基于所选择的用于部署待部署服务功能链的第二组合中各个VNF部署服务功能链,在满足所部署的服务功能链的安全性需求的基础上,提高了所部署的服务功能链的安全性。It can be seen from the above that when the solution provided by this embodiment is applied to construct the service function chain, since it is based on the security value of the first combination and the expected security value of the service function chain to be deployed, the determined second combination is selected for deployment. The second combination of the service function chain to be deployed, and because the security value of the first combination can reflect the security of the VNF in the first combination, and the above expected security value reflects the expected degree of security of the service function chain to be deployed. Therefore, The service function chain is deployed based on each VNF in the second combination selected for deploying the service function chain to be deployed, and the security of the deployed service function chain is improved on the basis of meeting the security requirements of the deployed service function chain sex.

另外,由于是从业务请求所请求服务的每一服务类型的各个VNF中选择VNF,得到VNF数量分别为预设数量范围内各个数量的VNF集,并对所得到的各个VNF集进行组合,相较于现有技术中仅选择一个VNF,选择预设数量范围内各个数量的VNF能够降低被网络攻击者攻击的概率,提高了所部署服务功能链的安全性。In addition, since the VNFs are selected from the VNFs of each service type requested by the business request, the VNF sets of which the number of VNFs are respectively within the preset number range are obtained, and the obtained VNF sets are combined. Compared with selecting only one VNF in the prior art, selecting each number of VNFs within a preset number range can reduce the probability of being attacked by a network attacker and improve the security of the deployed service function chain.

最后,由于是基于各个第二组合的调整后的安全值和部署消耗,选择用于部署待部署服务功能链的第二组合,又由于第二组合调整后的安全值较为准确反映第二组合中VNF的安全性,第二组合的部署消耗较为准确反映部署第二组合中VNF的总资源消耗,因此,基于各个第二组合的调整后的安全值和部署消耗,选择用于部署待部署服务功能链的第二组合在提高待部署服务功能链的安全性基础上,降低了部署待部署服务功能链的消耗,从而提高了资源利用率。Finally, because it is based on the adjusted security value and deployment consumption of each second combination, the second combination for deploying the service function chain to be deployed is selected, and because the adjusted security value of the second combination more accurately reflects the second combination For the security of the VNF, the deployment consumption of the second combination more accurately reflects the total resource consumption of the VNF in the deployment of the second combination. Therefore, based on the adjusted security value and deployment consumption of each second combination, the service function to be deployed is selected for deployment. On the basis of improving the security of the service function chain to be deployed, the second combination of the chain reduces the consumption of deploying the service function chain to be deployed, thereby improving resource utilization.

本发明的一个实施例中,所述期望安全值为针对服务功能链的安全值,In an embodiment of the present invention, the expected security value is a security value for the service function chain,

所述安全值计算模块,具体用于按照以下表达式计算各个第一组合的安全值θ:The safety value calculation module is specifically configured to calculate the safety value θ of each first combination according to the following expression:

Figure BDA0002510919460000201
Figure BDA0002510919460000201

其中,X表示第一组合中VNF所对应的服务类型的数量,x表示第一组合中VNF所对应服务类型的顺序号,Δx表示第x个服务类型的安全值,kx表示第x个服务类型的安全权重,nx表示第x个服务类型对应的VNF集的VNF数量。Among them, X represents the number of service types corresponding to the VNFs in the first combination, x represents the sequence number of the service types corresponding to the VNFs in the first combination, Δx represents the security value of the xth service type, and kx represents the xth The security weight of the service type, n x represents the number of VNFs in the VNF set corresponding to the xth service type.

这样,根据服务类型的安全值,服务类型的安全权重以及服务类型包括的VNF数量能够较为准确计算第一组合中VNF的总安全值。In this way, according to the security value of the service type, the security weight of the service type, and the number of VNFs included in the service type, the total security value of the VNFs in the first combination can be calculated more accurately.

本发明的一个实施例中,所述期望安全值为针对服务功能链中VNF的安全值,In an embodiment of the present invention, the expected security value is a security value for the VNF in the service function chain,

所述安全值计算模块,具体用于按照以下表达式计算各第一组合的安全值μ:The safety value calculation module is specifically configured to calculate the safety value μ of each first combination according to the following expression:

Figure BDA0002510919460000211
Figure BDA0002510919460000211

其中,X表示第一组合中VNF所对应的服务类型的数量,x表示第一组合中VNF所对应服务类型的顺序号,Δx表示第x个服务类型的安全值,kx表示第x个服务类型的安全权重,nx表示第x个服务类型对应的VNF集的VNF数量。Among them, X represents the number of service types corresponding to the VNFs in the first combination, x represents the sequence number of the service types corresponding to the VNFs in the first combination, Δx represents the security value of the xth service type, and kx represents the xth The security weight of the service type, n x represents the number of VNFs in the VNF set corresponding to the xth service type.

这样,根据这样,根据服务类型的安全值,服务类型的安全权重、服务类型的数量以及服务类型包括的VNF数量,能够较为准确计算第一组合中VNF的平均安全值。In this way, according to the security value of the service type, the security weight of the service type, the number of service types, and the number of VNFs included in the service type, the average security value of the VNFs in the first combination can be more accurately calculated.

本发明的一个实施例中,所述期望安全值确定模块,具体用于当所述待响应的业务请求中携带所请求业务的期望业务安全值时,将所述期望业务安全值作为待部署服务功能链的期望安全值;当所述待响应的业务请求中未携带所请求业务的期望业务安全值时,将预设期望安全值作为待部署服务功能链的期望安全值。In an embodiment of the present invention, the expected security value determination module is specifically configured to use the expected service security value as the service to be deployed when the service request to be responded carries the expected service security value of the requested service The expected security value of the function chain; when the service request to be responded does not carry the expected service security value of the requested service, the preset expected security value is used as the expected security value of the service function chain to be deployed.

这样,能够使得待部署服务功能链的期望安全值与用户的期望业务安全值一致,从而满足了用户对待部署服务功能链的安全性需求;将预设期望安全值作为待部署服务功能链的期望安全值能够保证待部署服务功能链的安全性。In this way, the expected security value of the service function chain to be deployed can be made consistent with the expected business security value of the user, thereby meeting the security requirements of the user to be deployed in the service function chain; the preset expected security value is used as the expectation of the service function chain to be deployed. The security value can ensure the security of the service function chain to be deployed.

本发明的一个实施例中,所述数据计算模块,具体用于针对每一第二组合,计算部署该第二组合中VNF的总资源消耗与该第二组合的安全值之和,将计算得到的值作为该第二组合的部署消耗,并计算该第二组合内VNF的实际总占用资源与该第二组合的安全值之和,将计算得到的值作为该第二组合调整后的安全值。In an embodiment of the present invention, the data calculation module is specifically configured to, for each second combination, calculate the sum of the total resource consumption of VNFs in the deployment of the second combination and the security value of the second combination, and calculate the The value of the second combination is used as the deployment consumption of the second combination, and the sum of the actual total occupied resources of VNFs in the second combination and the security value of the second combination is calculated, and the calculated value is used as the adjusted security value of the second combination. .

这样,计算第二组合内VNF的实际总占用资源与第二组合的安全值之和,能够较为准确获得第二组合调整后的安全值,并且计算部署第二组合中VNF的总资源消耗与第二组合的安全值之和,能够较为准确获得第二组合的部署消耗。In this way, by calculating the sum of the actual total resources occupied by VNFs in the second combination and the security value of the second combination, the adjusted security value of the second combination can be obtained more accurately. The sum of the security values of the two combinations can more accurately obtain the deployment consumption of the second combination.

本发明的一个实施例中,所述服务功能链部署模块具体用于计算各个第二组合调整后的安全值和部署消耗间的比值,将比值最大的第二组合作为用于部署所述待部署服务功能链的第二组合,并将所选择的第二组合中VNF按照预设逻辑顺序部署所述待部署服务功能链。In an embodiment of the present invention, the service function chain deployment module is specifically configured to calculate the ratio between the adjusted security value of each second combination and the deployment consumption, and use the second combination with the largest ratio as the one for deploying the to-be-deployed The second combination of service function chains is deployed, and the VNFs in the selected second combination are deployed in the to-be-deployed service function chain according to a preset logical sequence.

这样,计算各个第二组合调整后的安全值和部署消耗间的比值,将比值最大的第二组合作为用于部署所述待部署服务功能链的第二组合,在提高了所选择第二组合的安全值基础上,降低了部署第二组合中VNF的消耗,提高了资源利用率。In this way, the ratio between the adjusted security value of each second combination and the deployment consumption is calculated, and the second combination with the largest ratio is used as the second combination for deploying the service function chain to be deployed. On the basis of the safety value of , the consumption of VNFs in the deployment of the second combination is reduced, and the resource utilization rate is improved.

本发明的一个实施例中,所述装置还包括:In an embodiment of the present invention, the device further includes:

工作性能值评估模块,用于在所述服务功能链部署模块之后,评估所选择的第二组合中VNF的工作性能值;a work performance value evaluation module, configured to evaluate the work performance value of the VNF in the selected second combination after the service function chain deployment module;

工作VNF选择模块,用于基于所评估的VNF的工作性能值和VNF的安全值,在所选择的第二组合的VNF中选择用于工作的工作VNF;a working VNF selection module for selecting a working VNF for working among the selected second combined VNFs based on the assessed working performance value of the VNF and the safety value of the VNF;

业务请求响应模块,用于基于所确定的工作VNF响应所述待响应的业务请求。A service request response module, configured to respond to the service request to be responded based on the determined working VNF.

这样,根据所评估的VNF的工作性能值和VNF的安全值,在所选择的第二组合的VNF中选择用于工作的工作VNF,能够使得所选择的工作VNF在提高工作效率的基础上,提高了待部署服务功能链的安全值。In this way, according to the evaluated working performance value of the VNF and the security value of the VNF, selecting a working VNF for working in the selected second combination of VNFs can make the selected working VNF on the basis of improving working efficiency, Improves the security value of the service function chain to be deployed.

本发明的一个实施例中,所述装置还包括:VNF安全值计算模块,In an embodiment of the present invention, the device further includes: a VNF security value calculation module,

所述VNF安全值计算模块,具体用于按照预设的周期,基于各个VNF的历史安全值,按照以下表达式确定各个VNF当前周期的安全值T:The VNF security value calculation module is specifically used to determine the security value T of each VNF in the current period according to the following expression based on the historical security value of each VNF according to a preset period:

Figure BDA0002510919460000221
Figure BDA0002510919460000221

其中,T0为当前周期VNF的安全值评估结果,i为周期的顺序号,I为初始周期到当前周期的周期数量,Ti为第i个周期的VNF的安全值,α为VNF的安全值评估结果的安全权重,βi为第i个周期的VNF的安全值的安全权重,且

Figure BDA0002510919460000231
大于预设阈值。Among them, T 0 is the evaluation result of the security value of the VNF in the current cycle, i is the sequence number of the cycle, I is the number of cycles from the initial cycle to the current cycle, T i is the security value of the VNF in the ith cycle, and α is the security value of the VNF is the security weight of the value evaluation result, β i is the security weight of the security value of the VNF in the ith cycle, and
Figure BDA0002510919460000231
greater than the preset threshold.

这样,按照预设间隔周期,对VNF的安全值进行更新,能够使得各个VNF的安全值更加符合VNF的实际工作情况。In this way, the security value of the VNF is updated according to the preset interval, so that the security value of each VNF is more in line with the actual working condition of the VNF.

与上述服务功能链部署方法相对应,本发明实施例还提供了一种电子设备。Corresponding to the foregoing service function chain deployment method, an embodiment of the present invention further provides an electronic device.

参见图5,图5为本发明实施例提供的一种电子设备的结构示意图,包括处理器501、通信接口502、存储器503和通信总线504,其中,处理器501,通信接口502,存储器503通过通信总线504完成相互间的通信,Referring to FIG. 5, FIG. 5 is a schematic structural diagram of an electronic device provided by an embodiment of the present invention, including a processor 501, a communication interface 502, a memory 503, and a communication bus 504, wherein the processor 501, the communication interface 502, and the memory 503 pass through The communication bus 504 completes the communication with each other,

存储器503,用于存放计算机程序;a memory 503 for storing computer programs;

处理器501,用于执行存储器503上所存放的程序时,实现本发明实施例提供的服务功能链部署方法。The processor 501 is configured to implement the service function chain deployment method provided by the embodiment of the present invention when executing the program stored in the memory 503 .

上述电子设备提到的通信总线可以是外设部件互连标准(Peripheral ComponentInterconnect,PCI)总线或扩展工业标准结构(Extended Industry StandardArchitecture,EISA)总线等。该通信总线可以分为地址总线、数据总线、控制总线等。为便于表示,图中仅用一条粗线表示,但并不表示仅有一根总线或一种类型的总线。The communication bus mentioned in the above electronic device may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus or an Extended Industry Standard Architecture (Extended Industry Standard Architecture, EISA) bus or the like. The communication bus can be divided into an address bus, a data bus, a control bus, and the like. For ease of presentation, only one thick line is used in the figure, but it does not mean that there is only one bus or one type of bus.

通信接口用于上述电子设备与其他设备之间的通信。The communication interface is used for communication between the above electronic device and other devices.

存储器可以包括随机存取存储器(Random Access Memory,RAM),也可以包括非易失性存储器(Non-Volatile Memory,NVM),例如至少一个磁盘存储器。可选的,存储器还可以是至少一个位于远离前述处理器的存储装置。The memory may include random access memory (Random Access Memory, RAM), and may also include non-volatile memory (Non-Volatile Memory, NVM), such as at least one disk memory. Optionally, the memory may also be at least one storage device located away from the aforementioned processor.

上述的处理器可以是通用处理器,包括中央处理器(Central Processing Unit,CPU)、网络处理器(Network Processor,NP)等;还可以是数字信号处理器(Digital SignalProcessing,DSP)、专用集成电路(Application Specific Integrated Circuit,ASIC)、现场可编程门阵列(Field-Programmable Gate Array,FPGA)或者其他可编程逻辑器件、分立门或者晶体管逻辑器件、分立硬件组件。The above-mentioned processor may be a general-purpose processor, including a central processing unit (Central Processing Unit, CPU), a network processor (Network Processor, NP), etc.; may also be a digital signal processor (Digital Signal Processing, DSP), an application-specific integrated circuit (Application Specific Integrated Circuit, ASIC), Field-Programmable Gate Array (Field-Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components.

在本发明提供的又一实施例中,还提供了一种计算机可读存储介质,该计算机可读存储介质内存储有计算机程序,所述计算机程序被处理器执行时实现本发明实施例提供的服务功能链部署方法。In another embodiment provided by the present invention, a computer-readable storage medium is also provided, where a computer program is stored in the computer-readable storage medium, and when the computer program is executed by a processor, the computer program provided by the embodiment of the present invention is implemented. Service function chain deployment method.

在本发明提供的又一实施例中,还提供了一种包含指令的计算机程序产品,当其在计算机上运行时,使得计算机执行时实现本发明实施例提供的服务功能链部署方法。In yet another embodiment provided by the present invention, a computer program product including instructions is also provided, which, when executed on a computer, enables the computer to implement the service function chain deployment method provided by the embodiment of the present invention.

由以上可见,应用本实施例提供的方案进行服务功能链构造时,由于是基于第一组合的安全值以及待部署服务功能链的期望安全值,在所确定的第二组合中选择用于部署待部署服务功能链的第二组合,又由于上述第一组合的安全值能够反映第一组合中VNF的安全性,上述期望安全值反映期望待部署服务功能链的安全性达到的程度,因此,基于所选择的用于部署待部署服务功能链的第二组合中各个VNF部署服务功能链,在满足所部署的服务功能链的安全性需求的基础上,提高了所部署的服务功能链的安全性。It can be seen from the above that when the solution provided by this embodiment is applied to construct the service function chain, since it is based on the security value of the first combination and the expected security value of the service function chain to be deployed, the determined second combination is selected for deployment. The second combination of the service function chain to be deployed, and because the security value of the first combination can reflect the security of the VNF in the first combination, and the above expected security value reflects the expected degree of security of the service function chain to be deployed. Therefore, The service function chain is deployed based on each VNF in the second combination selected for deploying the service function chain to be deployed, and the security of the deployed service function chain is improved on the basis of meeting the security requirements of the deployed service function chain sex.

另外,由于是从业务请求所请求服务的每一服务类型的各个VNF中选择VNF,得到VNF数量分别为预设数量范围内各个数量的VNF集,并对所得到的各个VNF集进行组合,相较于现有技术中仅选择一个VNF,选择预设数量范围内各个数量的VNF能够降低被网络攻击者攻击的概率,提高了所部署服务功能链的安全性。In addition, since the VNFs are selected from the VNFs of each service type requested by the business request, the VNF sets of which the number of VNFs are respectively within the preset number range are obtained, and the obtained VNF sets are combined. Compared with selecting only one VNF in the prior art, selecting each number of VNFs within a preset number range can reduce the probability of being attacked by a network attacker and improve the security of the deployed service function chain.

最后,由于是基于各个第二组合的调整后的安全值和部署消耗,选择用于部署待部署服务功能链的第二组合,又由于第二组合调整后的安全值较为准确反映第二组合中VNF的安全性,第二组合的部署消耗较为准确反映部署第二组合中VNF的总资源消耗,因此,基于各个第二组合的调整后的安全值和部署消耗,选择用于部署待部署服务功能链的第二组合在提高待部署服务功能链的安全性基础上,降低了部署待部署服务功能链的消耗,从而提高了资源利用率。Finally, because it is based on the adjusted security value and deployment consumption of each second combination, the second combination for deploying the service function chain to be deployed is selected, and because the adjusted security value of the second combination more accurately reflects the second combination For the security of the VNF, the deployment consumption of the second combination more accurately reflects the total resource consumption of the VNF in the deployment of the second combination. Therefore, based on the adjusted security value and deployment consumption of each second combination, the service function to be deployed is selected for deployment. On the basis of improving the security of the service function chain to be deployed, the second combination of the chain reduces the consumption of deploying the service function chain to be deployed, thereby improving resource utilization.

在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机指令。在计算机上加载和执行所述计算机程序指令时,全部或部分地产生按照本发明实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其他可编程装置。所述计算机指令可以存储在计算机可读存储介质中,或者从一个计算机可读存储介质向另一个计算机可读存储介质传输,例如,所述计算机指令可以从一个网站站点、计算机、服务器或数据中心通过有线(例如同轴电缆、光纤、数字用户线(DSL))或无线(例如红外、无线、微波等)方式向另一个网站站点、计算机、服务器或数据中心进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是包含一个或多个可用介质集成的服务器、数据中心等数据存储设备。所述可用介质可以是磁性介质,(例如,软盘、硬盘、磁带)、光介质(例如,DVD)、或者半导体介质(例如固态硬盘Solid State Disk(SSD))等。In the above-mentioned embodiments, it may be implemented in whole or in part by software, hardware, firmware or any combination thereof. When implemented in software, it can be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, all or part of the processes or functions described in the embodiments of the present invention are generated. The computer may be a general purpose computer, special purpose computer, computer network, or other programmable device. The computer instructions may be stored in or transmitted from one computer readable storage medium to another computer readable storage medium, for example, the computer instructions may be downloaded from a website site, computer, server or data center Transmission to another website site, computer, server, or data center is by wire (eg, coaxial cable, fiber optic, digital subscriber line (DSL)) or wireless (eg, infrared, wireless, microwave, etc.). The computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that includes an integration of one or more available media. The usable media may be magnetic media (eg, floppy disks, hard disks, magnetic tapes), optical media (eg, DVD), or semiconductor media (eg, Solid State Disk (SSD)), among others.

需要说明的是,在本文中,诸如第一和第二等之类的关系术语仅仅用来将一个实体或者操作与另一个实体或操作区分开来,而不一定要求或者暗示这些实体或操作之间存在任何这种实际的关系或者顺序。而且,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、物品或者设备中还存在另外的相同要素。It should be noted that, in this document, relational terms such as first and second are only used to distinguish one entity or operation from another entity or operation, and do not necessarily require or imply any relationship between these entities or operations. any such actual relationship or sequence exists. Moreover, the terms "comprising", "comprising" or any other variation thereof are intended to encompass a non-exclusive inclusion such that a process, method, article or device that includes a list of elements includes not only those elements, but also includes not explicitly listed or other elements inherent to such a process, method, article or apparatus. Without further limitation, an element qualified by the phrase "comprising a..." does not preclude the presence of additional identical elements in a process, method, article or apparatus that includes the element.

本说明书中的各个实施例均采用相关的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于装置、电子设备、计算机可读存储介质实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。Each embodiment in this specification is described in a related manner, and the same and similar parts between the various embodiments may be referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the embodiments of the apparatus, electronic equipment, and computer-readable storage medium, since they are basically similar to the method embodiments, the description is relatively simple.

以上所述仅为本发明的较佳实施例而已,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内所作的任何修改、等同替换、改进等,均包含在本发明的保护范围内。The above descriptions are only preferred embodiments of the present invention, and are not intended to limit the protection scope of the present invention. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present invention are included in the protection scope of the present invention.

Claims (10)

1.一种服务功能链部署方法,其特征在于,所述方法包括:1. A service function chain deployment method, wherein the method comprises: 根据待响应的业务请求,确定待部署服务功能链的期望安全值;Determine the expected security value of the service function chain to be deployed according to the business request to be responded; 针对所述待响应的业务请求所请求服务的每一服务类型,从该服务类型的各个预设虚拟化网络功能VNF中选择VNF,得到VNF数量分别为预设数量范围内各个数量的VNF集;For each service type of the service requested by the service request to be responded, select a VNF from each preset virtualized network function VNF of the service type, and obtain a VNF set whose number of VNFs is each within the preset number range; 对得到的各个VNF集进行组合,得到各个第一组合,其中,每一第一组合中包含各个服务类型对应的一个VNF集;Combining the obtained VNF sets to obtain each first combination, wherein each first combination includes a VNF set corresponding to each service type; 针对每一第一组合,根据该第一组合内各个VNF的安全值,计算该第一组合的安全值;For each first combination, calculate the security value of the first combination according to the security value of each VNF in the first combination; 针对每一第二组合,根据该第二组合的安全值,调整部署该第二组合中VNF的总资源消耗,作为部署消耗,并根据该第二组合内VNF的实际总占用资源,调整该第二组合的安全值,其中,第二组合为:第一组合的安全值大于所述期望安全值的第一组合;For each second combination, according to the security value of the second combination, adjust the total resource consumption of the VNFs in the second combination as deployment consumption, and adjust the total resource consumption of the VNFs in the second combination according to the actual total occupied resources of the second combination. Two combinations of safety values, wherein the second combination is: a first combination in which the safety value of the first combination is greater than the expected safety value; 基于各个第二组合的调整后的安全值和部署消耗,在各个第二组合中选择用于部署所述待部署服务功能链的第二组合,并将所选择的第二组合中VNF按照预设逻辑顺序部署所述待部署服务功能链。Based on the adjusted security value and deployment consumption of each second combination, a second combination for deploying the service function chain to be deployed is selected in each second combination, and the VNF in the selected second combination is set according to the preset The to-be-deployed service function chain is deployed in a logical sequence. 2.根据权利要求1所述的方法,其特征在于,所述期望安全值为针对服务功能链的安全值,2. The method according to claim 1, wherein the expected security value is a security value for a service function chain, 所述针对每一第一组合,根据该第一组合内各个VNF的安全值,计算该第一组合的安全值,包括:For each first combination, calculating the security value of the first combination according to the security value of each VNF in the first combination, including: 按照以下表达式计算各个第一组合的安全值θ:The safety value θ of each first combination is calculated according to the following expression:
Figure FDA0002510919450000011
Figure FDA0002510919450000011
其中,X表示第一组合中VNF所对应的服务类型的数量,x表示第一组合中VNF所对应服务类型的顺序号,Δx表示第x个服务类型的安全值,kx表示第x个服务类型的安全权重,nx表示第x个服务类型对应的VNF集的VNF数量。Among them, X represents the number of service types corresponding to the VNFs in the first combination, x represents the sequence number of the service types corresponding to the VNFs in the first combination, Δx represents the security value of the xth service type, and kx represents the xth The security weight of the service type, n x represents the number of VNFs in the VNF set corresponding to the xth service type.
3.根据权利要求1所述的方法,其特征在于,所述期望安全值为针对服务功能链中VNF的安全值,3. The method according to claim 1, wherein the expected security value is a security value for the VNF in the service function chain, 所述所述针对每一第一组合,根据该第一组合内各个VNF的安全值,计算该第一组合的安全值,包括:For each first combination, calculating the security value of the first combination according to the security value of each VNF in the first combination, including: 按照以下表达式计算各第一组合的安全值μ:The safety value μ of each first combination is calculated according to the following expression:
Figure FDA0002510919450000021
Figure FDA0002510919450000021
其中,X表示第一组合中VNF所对应的服务类型的数量,x表示第一组合中VNF所对应服务类型的顺序号,Δx表示第x个服务类型的安全值,kx表示第x个服务类型的安全权重,nx表示第x个服务类型对应的VNF集的VNF数量。Among them, X represents the number of service types corresponding to the VNFs in the first combination, x represents the sequence number of the service types corresponding to the VNFs in the first combination, Δx represents the security value of the xth service type, and kx represents the xth The security weight of the service type, n x represents the number of VNFs in the VNF set corresponding to the xth service type.
4.根据权利要求1所述的方法,其特征在于,所述根据待响应的业务请求,确定待部署服务功能链的期望安全值,包括:4. The method according to claim 1, wherein, determining the expected security value of the service function chain to be deployed according to the service request to be responded, comprising: 当所述待响应的业务请求中携带所请求业务的期望业务安全值时,将所述期望业务安全值作为待部署服务功能链的期望安全值;When the service request to be responded carries the expected service security value of the requested service, the expected service security value is used as the expected security value of the service function chain to be deployed; 当所述待响应的业务请求中未携带所请求业务的期望业务安全值时,将预设期望安全值作为待部署服务功能链的期望安全值。When the service request to be responded does not carry the expected service security value of the requested service, the preset expected security value is used as the expected security value of the service function chain to be deployed. 5.根据权利要求1所述的方法,其特征在于,所述针对每一第二组合,根据该第二组合的安全值,调整部署该第二组合中VNF的总资源消耗,作为部署消耗,并根据该第二组合内VNF的实际总占用资源,调整该第二组合的安全值包括:5. The method according to claim 1, wherein, for each second combination, according to the security value of the second combination, the total resource consumption of deploying the VNF in the second combination is adjusted as deployment consumption, And according to the actual total occupied resources of VNFs in the second combination, adjusting the security value of the second combination includes: 针对每一第二组合,计算部署该第二组合中VNF的总资源消耗与该第二组合的安全值之和,将计算得到的值作为该第二组合的部署消耗,并计算该第二组合内VNF的实际总占用资源与该第二组合的安全值之和,将计算得到的值作为该第二组合调整后的安全值。For each second combination, calculate the sum of the total resource consumption of deploying VNFs in the second combination and the security value of the second combination, use the calculated value as the deployment consumption of the second combination, and calculate the second combination The sum of the actual total occupied resources of the inner VNF and the security value of the second combination is taken as the adjusted security value of the second combination. 6.根据权利要求1所述的方法,其特征在于,所述在各个第二组合中选择用于部署所述待部署服务功能链的第二组合,包括:6. The method according to claim 1, wherein the selecting the second combination for deploying the to-be-deployed service function chain in each of the second combinations comprises: 计算各个第二组合调整后的安全值和部署消耗间的比值,将比值最大的第二组合作为用于部署所述待部署服务功能链的第二组合。Calculate the ratio between the adjusted security value of each second combination and the deployment consumption, and use the second combination with the largest ratio as the second combination for deploying the service function chain to be deployed. 7.根据权利要求1-6任一项所述的方法,其特征在于,在所述将所选择的第二组合中VNF按照预设逻辑顺序部署所述待部署服务功能链之后,还包括:7. The method according to any one of claims 1-6, wherein after the VNF in the selected second combination deploys the to-be-deployed service function chain according to a preset logical sequence, the method further comprises: 评估所选择的第二组合中VNF的工作性能值;Evaluate the performance values of the VNFs in the selected second combination; 基于所评估的VNF的工作性能值和VNF的安全值,在所选择的第二组合的VNF中选择用于工作的工作VNF;Selecting a working VNF for work among the selected VNFs of the second combination based on the assessed work performance value of the VNF and the security value of the VNF; 基于所确定的工作VNF响应所述待响应的业务请求。The service request to be responded is responded to based on the determined working VNF. 8.根据权利要求1-6中任一项所述的方法,其特征在于,所述方法还包括:8. The method according to any one of claims 1-6, wherein the method further comprises: 按照预设的周期,基于各个VNF的历史安全值,按照以下表达式确定各个VNF当前周期的安全值T:According to the preset period, based on the historical security value of each VNF, the security value T of the current period of each VNF is determined according to the following expression:
Figure FDA0002510919450000031
Figure FDA0002510919450000031
其中,T0为当前周期VNF的安全值评估结果,i为周期的顺序号,I为初始周期到当前周期的周期数量,Ti为第i个周期的VNF的安全值,α为VNF的安全值评估结果的安全权重,βi为第i个周期的VNF的安全值的安全权重,且
Figure FDA0002510919450000032
大于预设阈值。
Among them, T 0 is the evaluation result of the security value of the VNF in the current cycle, i is the sequence number of the cycle, I is the number of cycles from the initial cycle to the current cycle, T i is the security value of the VNF in the ith cycle, and α is the security value of the VNF is the security weight of the value evaluation result, β i is the security weight of the security value of the VNF in the ith cycle, and
Figure FDA0002510919450000032
greater than the preset threshold.
9.一种服务功能链部署装置,其特征在于,所述装置包括:9. A service function chain deployment device, wherein the device comprises: 期望安全值确定模块,用于根据待响应的业务请求,确定待部署服务功能链的期望安全值;The expected security value determination module is used to determine the expected security value of the service function chain to be deployed according to the business request to be responded; VNF集获得模块,用于针对所述待响应的业务请求所请求服务的每一服务类型,从该服务类型的各个预设虚拟化网络功能VNF中选择VNF,得到VNF数量分别为预设数量范围内各个数量的VNF集;The VNF set obtaining module is configured to, for each service type of the service requested by the service request to be responded, select a VNF from each preset virtualized network function VNF of the service type, and obtain the number of VNFs in the preset number range respectively Each number of VNF sets within; 第一组合获得模块,用于对得到的各个VNF集进行组合,得到各个第一组合,其中,每一第一组合中包含各个服务类型对应的一个VNF集;The first combination obtaining module is used to combine the obtained VNF sets to obtain each first combination, wherein each first combination includes a VNF set corresponding to each service type; 安全值计算模块,用于针对每一第一组合,根据该第一组合内各个VNF的安全值,计算该第一组合的安全值;a security value calculation module, configured to calculate the security value of the first combination according to the security value of each VNF in the first combination for each first combination; 数据计算模块,用于针对每一第二组合,根据该第二组合的安全值,调整部署该第二组合中VNF的总资源消耗,作为部署消耗,并根据该第二组合内VNF的实际总占用资源,调整该第二组合的安全值,其中,第二组合为:第一组合的安全值大于所述期望安全值的第一组合;The data calculation module is configured to, for each second combination, adjust the total resource consumption of deploying VNFs in the second combination according to the security value of the second combination, as the deployment consumption, and according to the actual total resource consumption of the VNFs in the second combination. Occupy resources, and adjust the security value of the second combination, where the second combination is: the security value of the first combination is greater than the expected security value of the first combination; 服务功能链部署模块,用于基于各个第二组合的调整后的安全值和部署消耗,在各个第二组合中选择用于部署所述待部署服务功能链的第二组合,并将所选择的第二组合中VNF按照预设逻辑顺序部署所述待部署服务功能链。The service function chain deployment module is configured to select a second combination for deploying the service function chain to be deployed in each second combination based on the adjusted security value and deployment consumption of each second combination, and assign the selected In the second combination, the VNF deploys the to-be-deployed service function chain according to a preset logical sequence. 10.一种电子设备,其特征在于,包括处理器、通信接口、存储器和通信总线,其中,处理器,通信接口,存储器通过通信总线完成相互间的通信;10. An electronic device, comprising a processor, a communication interface, a memory, and a communication bus, wherein the processor, the communication interface, and the memory communicate with each other through the communication bus; 存储器,用于存放计算机程序;memory for storing computer programs; 处理器,用于执行存储器上所存放的程序时,实现权利要求1-8任一所述的方法步骤。The processor is configured to implement the method steps described in any one of claims 1-8 when executing the program stored in the memory.
CN202010461022.3A 2020-05-27 2020-05-27 A service function chain deployment method and device Active CN111800291B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010461022.3A CN111800291B (en) 2020-05-27 2020-05-27 A service function chain deployment method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010461022.3A CN111800291B (en) 2020-05-27 2020-05-27 A service function chain deployment method and device

Publications (2)

Publication Number Publication Date
CN111800291A true CN111800291A (en) 2020-10-20
CN111800291B CN111800291B (en) 2021-07-20

Family

ID=72806300

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010461022.3A Active CN111800291B (en) 2020-05-27 2020-05-27 A service function chain deployment method and device

Country Status (1)

Country Link
CN (1) CN111800291B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114020455A (en) * 2021-10-27 2022-02-08 中国联合网络通信集团有限公司 Method, device and computer-readable storage medium for arranging service functions
CN114629685A (en) * 2022-02-17 2022-06-14 华南理工大学 Industrial private network hard slicing service function chain deployment method, device and medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170019303A1 (en) * 2015-07-14 2017-01-19 Microsoft Technology Licensing, Llc Service Chains for Network Services
CN107332913A (en) * 2017-07-04 2017-11-07 电子科技大学 A kind of Optimization deployment method of service function chain in 5G mobile networks
CN107682203A (en) * 2017-10-30 2018-02-09 北京计算机技术及应用研究所 A kind of security function dispositions method based on service chaining
CN108881207A (en) * 2018-06-11 2018-11-23 中国人民解放军战略支援部队信息工程大学 Network safety service framework and its implementation based on security service chain
CN109245932A (en) * 2018-09-20 2019-01-18 北京计算机技术及应用研究所 A kind of security function service chaining dispositions method
CN109495391A (en) * 2018-12-18 2019-03-19 天津城建大学 A kind of security service catenary system and data packet matched retransmission method based on SDN
CN110505082A (en) * 2019-07-26 2019-11-26 国家电网有限公司 A kind of NFV service chaining mapping method towards cost and QoS
CN111147307A (en) * 2019-12-30 2020-05-12 重庆邮电大学 Service function chain reliable deployment method based on deep reinforcement learning

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170019303A1 (en) * 2015-07-14 2017-01-19 Microsoft Technology Licensing, Llc Service Chains for Network Services
CN107332913A (en) * 2017-07-04 2017-11-07 电子科技大学 A kind of Optimization deployment method of service function chain in 5G mobile networks
CN107682203A (en) * 2017-10-30 2018-02-09 北京计算机技术及应用研究所 A kind of security function dispositions method based on service chaining
CN108881207A (en) * 2018-06-11 2018-11-23 中国人民解放军战略支援部队信息工程大学 Network safety service framework and its implementation based on security service chain
CN109245932A (en) * 2018-09-20 2019-01-18 北京计算机技术及应用研究所 A kind of security function service chaining dispositions method
CN109495391A (en) * 2018-12-18 2019-03-19 天津城建大学 A kind of security service catenary system and data packet matched retransmission method based on SDN
CN110505082A (en) * 2019-07-26 2019-11-26 国家电网有限公司 A kind of NFV service chaining mapping method towards cost and QoS
CN111147307A (en) * 2019-12-30 2020-05-12 重庆邮电大学 Service function chain reliable deployment method based on deep reinforcement learning

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
张奇: "基于SDN/NFV 的安全服务链自动编排部署框架", 《计算机系统应用》 *
黄睿,张红旗: "安全服务链中虚拟网络功能分配与调度算法研究", 《计算机应用研究》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114020455A (en) * 2021-10-27 2022-02-08 中国联合网络通信集团有限公司 Method, device and computer-readable storage medium for arranging service functions
CN114020455B (en) * 2021-10-27 2023-01-24 中国联合网络通信集团有限公司 Service function orchestration method, device and computer-readable storage medium
CN114629685A (en) * 2022-02-17 2022-06-14 华南理工大学 Industrial private network hard slicing service function chain deployment method, device and medium
CN114629685B (en) * 2022-02-17 2022-12-16 华南理工大学 Industrial private network hard slicing service function chain deployment method, device and medium

Also Published As

Publication number Publication date
CN111800291B (en) 2021-07-20

Similar Documents

Publication Publication Date Title
CN110049130B (en) A method and device for service deployment and task scheduling based on edge computing
CN108173938B (en) Server load distribution method and device
US10320623B2 (en) Techniques for tracking resource usage statistics per transaction across multiple layers of protocols
Durrani et al. Volunteer computing: requirements, challenges, and solutions
CN101297272B (en) Method and system for virtualized health monitoring of resources
US20180267820A1 (en) Method, apparatus and system for selectively providing virtual machine through actual measurement of efficiency of power usage
CN104641355B (en) Adaptive service time-out
CN106911582B (en) A real-time flow control method and system based on Nginx server
US20150169339A1 (en) Determining Horizontal Scaling Pattern for a Workload
US12255981B2 (en) Methods and apparatuses for implementing high-speed cryptographic computation based on software-hardware collaboration, and electronic devices
CN110808914A (en) Access request processing method and device and electronic equipment
US11755374B2 (en) Cloud resource audit system
Wen et al. Research and realization of nginx-based dynamic feedback load balancing algorithm
WO2017107812A1 (en) User log storage method and device
TW202027003A (en) Method and system for accepting blockchain evidence storage transaction
CN111800291A (en) Service function chain deployment method and device
CN108471385B (en) Flow control method and device for distributed system
US20220171789A1 (en) Sgx based flow control for distributed ledgers
CN105592134B (en) A kind of method and apparatus of load balancing
CN108270857A (en) A kind of cloud computing operating system load-balancing method and system
WO2012047448A2 (en) Techniques to support large numbers of subscribers to a real-time event
CN119561753A (en) Abnormal traffic attack defense method, device, medium, product and electronic equipment
CN114423038B (en) Edge computing blocking recovery method, device, electronic device and storage medium
CN113141394B (en) A resource allocation method, device, electronic device and storage medium
CN116708430A (en) Registration center cluster scheduling method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant