航空通信网络业务功能链攻击影响分析

IF 4.3 2区 综合性期刊 Q1 ENGINEERING, ELECTRICAL & ELECTRONIC
Yong Yang;Buhong Wang;Jiwei Tian;Chen Chen;Siqi Li;Xiaofan Lyu
{"title":"航空通信网络业务功能链攻击影响分析","authors":"Yong Yang;Buhong Wang;Jiwei Tian;Chen Chen;Siqi Li;Xiaofan Lyu","doi":"10.1109/JSEN.2025.3575163","DOIUrl":null,"url":null,"abstract":"With the integration of technologies such as cloud computing, edge computing, and network function virtualization (NFV) into aviation communication networks, the cost of communication services has decreased while flexibility has increased, but this has also expanded the attack surface of the network. Currently, there is no research on the impact of attacks on service function chains (SFCs) in aviation communication networks. In order to address this issue, a formal modeling of SFC deployment is first conducted, followed by an analysis of the recovery process of SFC after the network has been attacked. Second, a case analysis is performed to refine the SFC attack impact analysis model, which introduces six typical attack strategies and four SFC recovery methods proposed in the literature. Finally, experiments were conducted to investigate the impact of different attack strategies on the availability, quality of service, and security of SFC in aviation communication networks and to compare the robustness of different SFC recovery methods in responding to these attacks. The experiments found that betweenness-based attacks have the most significant impact on the SFC failure rate, the number of virtual link (VL) redirections, and the average increase rate of coexistence risk, increasing them by 170.85%, 108.39%, and 272.94%, respectively. Load-based attacks have the greatest effect on the number of virtual network function (VNF) migrations, increasing it by 120.65%. Degree-based attacks have the largest impact on the average latency variation of the SFC, increasing it by 170.20%. Additionally, it was found that among the four SFC recovery methods proposed in the literature, the recovery strategy based on evolutionary algorithms shows the best robustness against attacks in terms of SFC failure rate and average delay variation, while the recovery strategy based on greedy algorithms performs best regarding the number of VNF migrations, VL redirections, and average increase rate of coexistence risk.","PeriodicalId":447,"journal":{"name":"IEEE Sensors Journal","volume":"25 14","pages":"27628-27641"},"PeriodicalIF":4.3000,"publicationDate":"2025-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Attack Impact Analysis of Service Function Chain in Aviation Communication Network\",\"authors\":\"Yong Yang;Buhong Wang;Jiwei Tian;Chen Chen;Siqi Li;Xiaofan Lyu\",\"doi\":\"10.1109/JSEN.2025.3575163\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"With the integration of technologies such as cloud computing, edge computing, and network function virtualization (NFV) into aviation communication networks, the cost of communication services has decreased while flexibility has increased, but this has also expanded the attack surface of the network. Currently, there is no research on the impact of attacks on service function chains (SFCs) in aviation communication networks. In order to address this issue, a formal modeling of SFC deployment is first conducted, followed by an analysis of the recovery process of SFC after the network has been attacked. Second, a case analysis is performed to refine the SFC attack impact analysis model, which introduces six typical attack strategies and four SFC recovery methods proposed in the literature. Finally, experiments were conducted to investigate the impact of different attack strategies on the availability, quality of service, and security of SFC in aviation communication networks and to compare the robustness of different SFC recovery methods in responding to these attacks. The experiments found that betweenness-based attacks have the most significant impact on the SFC failure rate, the number of virtual link (VL) redirections, and the average increase rate of coexistence risk, increasing them by 170.85%, 108.39%, and 272.94%, respectively. Load-based attacks have the greatest effect on the number of virtual network function (VNF) migrations, increasing it by 120.65%. Degree-based attacks have the largest impact on the average latency variation of the SFC, increasing it by 170.20%. Additionally, it was found that among the four SFC recovery methods proposed in the literature, the recovery strategy based on evolutionary algorithms shows the best robustness against attacks in terms of SFC failure rate and average delay variation, while the recovery strategy based on greedy algorithms performs best regarding the number of VNF migrations, VL redirections, and average increase rate of coexistence risk.\",\"PeriodicalId\":447,\"journal\":{\"name\":\"IEEE Sensors Journal\",\"volume\":\"25 14\",\"pages\":\"27628-27641\"},\"PeriodicalIF\":4.3000,\"publicationDate\":\"2025-06-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Sensors Journal\",\"FirstCategoryId\":\"103\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11026247/\",\"RegionNum\":2,\"RegionCategory\":\"综合性期刊\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Sensors Journal","FirstCategoryId":"103","ListUrlMain":"https://ieeexplore.ieee.org/document/11026247/","RegionNum":2,"RegionCategory":"综合性期刊","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

摘要

随着云计算、边缘计算、网络功能虚拟化(network function virtualization, NFV)等技术融入航空通信网络,在提高灵活性的同时降低了通信业务的成本,但这也扩大了网络的攻击面。目前还没有针对航空通信网络中攻击对业务功能链(sfc)影响的研究。为了解决这一问题,首先对SFC部署进行了形式化建模,然后分析了SFC在网络受到攻击后的恢复过程。其次,通过案例分析,完善SFC攻击影响分析模型,介绍了文献中提出的六种典型攻击策略和四种SFC恢复方法。最后,通过实验研究了不同攻击策略对航空通信网络中SFC的可用性、服务质量和安全性的影响,并比较了不同SFC恢复方法在应对这些攻击时的鲁棒性。实验发现,基于间隔的攻击对SFC失败率、VL重定向次数和共存风险平均增加率的影响最为显著,分别增加了170.85%、108.39%和272.94%。基于负载的攻击对VNF迁移的影响最大,增加了120.65%。度攻击对SFC平均时延变化的影响最大,增加了170.20%。此外,研究发现,在文献中提出的4种SFC恢复方法中,基于进化算法的恢复策略在SFC故障率和平均延迟变化方面对攻击的鲁棒性最好,而基于贪婪算法的恢复策略在VNF迁移次数、VL重定向次数和共存风险平均增加率方面表现最好。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Attack Impact Analysis of Service Function Chain in Aviation Communication Network
With the integration of technologies such as cloud computing, edge computing, and network function virtualization (NFV) into aviation communication networks, the cost of communication services has decreased while flexibility has increased, but this has also expanded the attack surface of the network. Currently, there is no research on the impact of attacks on service function chains (SFCs) in aviation communication networks. In order to address this issue, a formal modeling of SFC deployment is first conducted, followed by an analysis of the recovery process of SFC after the network has been attacked. Second, a case analysis is performed to refine the SFC attack impact analysis model, which introduces six typical attack strategies and four SFC recovery methods proposed in the literature. Finally, experiments were conducted to investigate the impact of different attack strategies on the availability, quality of service, and security of SFC in aviation communication networks and to compare the robustness of different SFC recovery methods in responding to these attacks. The experiments found that betweenness-based attacks have the most significant impact on the SFC failure rate, the number of virtual link (VL) redirections, and the average increase rate of coexistence risk, increasing them by 170.85%, 108.39%, and 272.94%, respectively. Load-based attacks have the greatest effect on the number of virtual network function (VNF) migrations, increasing it by 120.65%. Degree-based attacks have the largest impact on the average latency variation of the SFC, increasing it by 170.20%. Additionally, it was found that among the four SFC recovery methods proposed in the literature, the recovery strategy based on evolutionary algorithms shows the best robustness against attacks in terms of SFC failure rate and average delay variation, while the recovery strategy based on greedy algorithms performs best regarding the number of VNF migrations, VL redirections, and average increase rate of coexistence risk.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Sensors Journal
IEEE Sensors Journal 工程技术-工程:电子与电气
CiteScore
7.70
自引率
14.00%
发文量
2058
审稿时长
5.2 months
期刊介绍: The fields of interest of the IEEE Sensors Journal are the theory, design , fabrication, manufacturing and applications of devices for sensing and transducing physical, chemical and biological phenomena, with emphasis on the electronics and physics aspect of sensors and integrated sensors-actuators. IEEE Sensors Journal deals with the following: -Sensor Phenomenology, Modelling, and Evaluation -Sensor Materials, Processing, and Fabrication -Chemical and Gas Sensors -Microfluidics and Biosensors -Optical Sensors -Physical Sensors: Temperature, Mechanical, Magnetic, and others -Acoustic and Ultrasonic Sensors -Sensor Packaging -Sensor Networks -Sensor Applications -Sensor Systems: Signals, Processing, and Interfaces -Actuators and Sensor Power Systems -Sensor Signal Processing for high precision and stability (amplification, filtering, linearization, modulation/demodulation) and under harsh conditions (EMC, radiation, humidity, temperature); energy consumption/harvesting -Sensor Data Processing (soft computing with sensor data, e.g., pattern recognition, machine learning, evolutionary computation; sensor data fusion, processing of wave e.g., electromagnetic and acoustic; and non-wave, e.g., chemical, gravity, particle, thermal, radiative and non-radiative sensor data, detection, estimation and classification based on sensor data) -Sensors in Industrial Practice
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信