Research on Autonomous Defense Paradigm for Smart Computing Integration Networks

LIU Ying, XIA Yu, YU Cheng-xiao, ZHANG Wei-ting, WANG Run-hu, ZHANG Hong-ke

ACTA ELECTRONICA SINICA ›› 2024, Vol. 52 ›› Issue (5) : 1432-1441.

PDF(2305 KB)
CIE Homepage  |  Join CIE  |  Login CIE  |  中文 
PDF(2305 KB)
ACTA ELECTRONICA SINICA ›› 2024, Vol. 52 ›› Issue (5) : 1432-1441. DOI: 10.12263/DZXB.20230864
PAPERS

Research on Autonomous Defense Paradigm for Smart Computing Integration Networks

Author information +

Abstract

With the transformation of the computing power supply pattern in the digital economy era, the new network infrastructure with computing power as the core has become an important driving force to realize the sharing of computing power resources and support the digital economy transformation. In the computing power network, multiple heterogeneous user terminals access the network frequently in various ways to obtain computing power services anytime and anywhere, which increases the openness and dynamics of the network. Hence, the computing power network will face more severe security challenges. However, the traditional network-based security defense pattern usually statically supplements security protection components for specific security issues, which cannot actively adapt to user needs to adjust defense strategies flexibly, which is difficult to deal with security risks in computing-network integration scenarios. Therefore, facing the security requirements of the new computing power network, this paper regards security as the internal attribute of the network and proposes a multi-dimensional collaborative autonomous defense paradigm based on the smart computing integration networks, which combines the design of “three layers” and “three domains” of the network. In the “three layers”, this paper defines the security inherent service at the generalized service layer, adapts the security function at the mapping adaptation layer, and executes the security strategy at the fusion component layer. In the “three domains”, the resource adaptation is guided by the entity domain, the security service process is driven by the knowledge domain, and the specific security technologies are implemented by the sense control domain. It constructs a basic management and control process that integrates “detection”, “trace”, and “defense”, in which security policies and technologies can be flexibly adjusted according to scenario scalability and business security. Finally, the proposed paradigm is verified through simulation experiments, and the results prove the effectiveness of the proposed paradigm and also provide a reference for further research and application of smart computing fusion security in the future.

Key words

smart computing integration networks / computing power network / autonomous defense / defense paradigm / network attack

Cite this article

Download Citations
LIU Ying , XIA Yu , YU Cheng-xiao , ZHANG Wei-ting , WANG Run-hu , ZHANG Hong-ke. Research on Autonomous Defense Paradigm for Smart Computing Integration Networks[J]. Acta Electronica Sinica, 2024, 52(5): 1432-1441. https://doi.org/10.12263/DZXB.20230864

References

1
李少鹤, 李泰新, 周旭. 算力网络:以网络为中心的融合资源供给[J]. 中兴通讯技术, 2021, 27(3): 29-34.
LI S H, LI T X, ZHOU X. Computing power network: A network-centric supply paradigm for integrated resources[J]. ZTE Technology Journal, 2021, 27(3): 29-34. (in Chinese)
2
邱勤, 徐天妮, 张智杰, 等. 算力网络安全应用需求与关键技术研究[J]. 信息技术与标准化, 2022(11): 19-24, 33.
QIU Q, XU T N, ZHANG Z J, et al. Research on security application requirements and key technologies of computing force network[J]. Information Technology & Standardization, 2022(11): 19-24, 33. (in Chinese)
3
曹畅, 唐雄燕. 算力网络关键技术及发展挑战分析[J]. 信息通信技术与政策, 2021, 47(3): 6-11.
CAO C, TANG X Y. Analysis of key technologies and development challenges of computing power network[J]. Information and Communications Technology and Policy, 2021, 47(3): 6-11. (in Chinese)
4
贾庆民, 丁瑞, 刘辉, 等. 算力网络研究进展综述[J]. 网络与信息安全学报, 2021, 7(5): 1-12.
JIA Q M, DING R, LIU H, et al. Survey on research progress for compute first networking[J]. Chinese Journal of Network and Information Security, 2021, 7(5): 1-12. (in Chinese)
5
段晓东, 姚惠娟, 付月霞, 等. 面向算网一体化演进的算力网络技术[J]. 电信科学, 2021, 37(10): 76-85.
DUAN X D, YAO H J, FU Y X, et al. Computing force network technologies for computing and network integration evolution[J]. Telecommunications Science, 2021, 37(10): 76-85. (in Chinese)
6
TANG X Y, CAO C, WANG Y X, et al. Computing power network: The architecture of convergence of computing and networking towards 6G requirement[J]. China Communications, 2021, 18(2): 175-185.
7
张宏科, 罗洪斌. 智慧协同网络体系基础研究[J]. 电子学报, 2013, 41(7): 1249-1252, 1254.
ZHANG H K, LUO H B. Fundamental research on theories of smart and cooperative networks[J]. Acta Electronica Sinica, 2013, 41(7): 1249-1252, 1254. (in Chinese)
8
AHMAD I, NAMAL S, YLIANTTILA M, et al. Security in software defined networks: A survey[J]. IEEE Communications Surveys & Tutorials, 2015, 17(4): 2317-2346.
9
ZHOU Y Y, CHENG G, YU S. An SDN-enabled proactive defense framework for DDoS mitigation in IoT networks[J]. IEEE Transactions on Information Forensics and Security, 2021, 16: 5366-5380.
10
SAHAY R, MENG W Z, JENSEN C D. The application of Software Defined Networking on securing computer networks: A survey[J]. Journal of Network and Computer Applications, 2019, 131(C): 89-108.
11
张宏科, 于成晓, 权伟, 等. 融算网络体系基础研究[J]. 电子学报, 2022, 50(12): 2928-2934.
ZHANG H K, YU C X, QUAN W, et al. Fundamental research on computing integration networking[J]. Acta Electronica Sinica, 2022, 50(12): 2928-2934. (in Chinese)
12
张宏科, 权伟, 刘康. 算力网络研究与探索[J]. 中兴通讯技术, 2023, 29(1): 1-5.
ZHANG H K, QUAN W, LIU K. Research and exploration of computing power network[J]. ZTE Technology Journal, 2023, 29(1): 1-5. (in Chinese)
13
The Center for Applied Internet Data Analysis. The CAIDA UCSD IPv4 Routed /24 topology dataset[EB/OL]. (2022)[2024].

Funding

The Major Key Project of PCL
National Key Research and Development Program of China(2022ZD0115301)
National Natural Science Foundation of China(62201029)
China Postdoctoral Science Foundation(2022M710007)
PDF(2305 KB)

Accesses

Citation

Detail

Sections
Recommended

/