Cargando…

A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base

In view of various security requirements, there are various security services in the network. In particular, DDoS attacks have various types and detection methods. How to flexibly combine security services and make full use of the information provided by security services have become urgent problems...

Descripción completa

Detalles Bibliográficos
Autores principales: Guo, Qi, Li, Man, Wang, Weilin, Liu, Ying
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2022
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9692741/
https://www.ncbi.nlm.nih.gov/pubmed/36433613
http://dx.doi.org/10.3390/s22229021
_version_ 1784837344498548736
author Guo, Qi
Li, Man
Wang, Weilin
Liu, Ying
author_facet Guo, Qi
Li, Man
Wang, Weilin
Liu, Ying
author_sort Guo, Qi
collection PubMed
description In view of various security requirements, there are various security services in the network. In particular, DDoS attacks have various types and detection methods. How to flexibly combine security services and make full use of the information provided by security services have become urgent problems to be solved. This paper combines the reasoning ability of the malicious behavior knowledge base to realize the dynamic deployment of the service function chain and dynamic configuration of the security service function. The method feeds back the information generated by the security service to the knowledge base. After the analysis of the knowledge base, the service function chain path and the security service configuration policies are generated, and these policies will be dynamically distributed to the security service function. Finally, security services can be dynamically arranged for different network traffic, realizing the coordinated use of various security services and improving the overall detection rate of the network. The experimental results show that by arranging the paths under the UDP and the TCP, the overall detection rate of the network can reach 99% and 88%, respectively, indicating that it has a good overall detection performance for multiple distributed denial of service (DDoS) attacks.
format Online
Article
Text
id pubmed-9692741
institution National Center for Biotechnology Information
language English
publishDate 2022
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-96927412022-11-26 A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base Guo, Qi Li, Man Wang, Weilin Liu, Ying Sensors (Basel) Article In view of various security requirements, there are various security services in the network. In particular, DDoS attacks have various types and detection methods. How to flexibly combine security services and make full use of the information provided by security services have become urgent problems to be solved. This paper combines the reasoning ability of the malicious behavior knowledge base to realize the dynamic deployment of the service function chain and dynamic configuration of the security service function. The method feeds back the information generated by the security service to the knowledge base. After the analysis of the knowledge base, the service function chain path and the security service configuration policies are generated, and these policies will be dynamically distributed to the security service function. Finally, security services can be dynamically arranged for different network traffic, realizing the coordinated use of various security services and improving the overall detection rate of the network. The experimental results show that by arranging the paths under the UDP and the TCP, the overall detection rate of the network can reach 99% and 88%, respectively, indicating that it has a good overall detection performance for multiple distributed denial of service (DDoS) attacks. MDPI 2022-11-21 /pmc/articles/PMC9692741/ /pubmed/36433613 http://dx.doi.org/10.3390/s22229021 Text en © 2022 by the authors. https://creativecommons.org/licenses/by/4.0/Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Guo, Qi
Li, Man
Wang, Weilin
Liu, Ying
A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base
title A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base
title_full A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base
title_fullStr A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base
title_full_unstemmed A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base
title_short A Dynamic Deployment Method of Security Services Based on Malicious Behavior Knowledge Base
title_sort dynamic deployment method of security services based on malicious behavior knowledge base
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC9692741/
https://www.ncbi.nlm.nih.gov/pubmed/36433613
http://dx.doi.org/10.3390/s22229021
work_keys_str_mv AT guoqi adynamicdeploymentmethodofsecurityservicesbasedonmaliciousbehaviorknowledgebase
AT liman adynamicdeploymentmethodofsecurityservicesbasedonmaliciousbehaviorknowledgebase
AT wangweilin adynamicdeploymentmethodofsecurityservicesbasedonmaliciousbehaviorknowledgebase
AT liuying adynamicdeploymentmethodofsecurityservicesbasedonmaliciousbehaviorknowledgebase
AT guoqi dynamicdeploymentmethodofsecurityservicesbasedonmaliciousbehaviorknowledgebase
AT liman dynamicdeploymentmethodofsecurityservicesbasedonmaliciousbehaviorknowledgebase
AT wangweilin dynamicdeploymentmethodofsecurityservicesbasedonmaliciousbehaviorknowledgebase
AT liuying dynamicdeploymentmethodofsecurityservicesbasedonmaliciousbehaviorknowledgebase