计算机与现代化 ›› 2023, Vol. 0 ›› Issue (08): 107-111.doi: 10.3969/j.issn.1006-2475.2023.08.017

• 信息安全 • 上一篇    下一篇

基于SRv6服务链的云网专线场景安全防护方法

  

  1. (广州华商学院数据科学学院,广东 广州 511300)
  • 出版日期:2023-08-30 发布日期:2023-09-13
  • 作者简介:杨波(1977—),男,江西井冈山人,副教授,硕士,研究方向:计算机网络,大数据与人工智能,E-mail: yangbo_20224@126.com; 徐胜超(1980—),男,湖北武汉人,讲师,硕士,研究方向:并行分布式处理软件,E-mail: isdooropen@126.com。
  • 基金资助:
    国家自然科学基金资助项目(61772221); 广州华商学院校内导师制科研项目资助(2022HSDS23)

Security Protection Method of Cloud Network Special Line Scenarios Based on SRv6#br# Service Chain

  1. (School of Data Science, Guangzhou HuaShang College, Guangzhou 511300, China)
  • Online:2023-08-30 Published:2023-09-13

摘要: 摘要:云网融合背景下,专线场景服务安全性与可靠性受到威胁,为此提出一种基于SRv6服务链的云网专线场景安全防护方法。从数据、语音、互联网入手,明确云网专线场景业务特征,在云网网络结构中引入SRv6服务链,实现节点逐级跳跃,提升网络资源转换效率;分析云网专线场景安全需求,将云网专线场景安全防护分为上传数据与下载文件2个阶段,计算网络流量限值函数和约束条件,在共享连接防护机制前提下创建数据共享密钥,一致化处理数据共享种子,完成云网专线场景安全防护目标。实验结果表明,该方法可敏锐感知异常攻击行为,安全防护速度快,具有极强的鲁棒性。

关键词: 关键词:SRv6服务链, 专线场景, 云计算, 安全防护, 区块链

Abstract: Abstract: Under the background of cloud network convergence, the security and reliability of dedicated line scenarios are threatened. Therefore, this paper proposes a security protection method for dedicated line scenarios in cloud network based on SRv6 service chain technology. Starting from data, voice and the Internet, we should clarify the business characteristics of the cloud network dedicated line scenario, introduce SRv6 service chain technology into the cloud network structure, achieve node level by level jump, and improve the efficiency of network resource conversion; Analyze the security requirements of cloud network dedicated line scenarios, divide the security protection of cloud network dedicated line scenarios into two stages: uploading data and downloading files, calculate network traffic limit functions and constraints, create data sharing keys under the premise of shared connection protection mechanism, uniformly process data sharing seeds, and complete the security protection goals of cloud network dedicated line scenarios. The experimental results show that the proposed method can sensitively perceive abnormal attack behavior, and has fast security protection speed and strong robustness.

Key words: Key words: SRv6 service chain, special line scenario, cloud computing, safety protection, blockchain

中图分类号: