A SDN/NFV Security Protection Architecture with a Function
Composition Algorithm Based on Trie
Zheng Hao
*
1
Network and Information Center,
Institute of Network Technology,
Beijing University of Posts and
Telecommunications
Beijing 100876, China
2
Science and Technology on
Information Transmission and
Dissemination in Communication
Networks Laboratory
Shijiazhuang 050081, China
3
National Engineering Laboratory for
Mobile Network Security
Beijing 100876, China
haoz@bupt.edu.cn
Zhaowen Lin
1
Network and Information Center,
Institute of Network Technology,
Beijing University of Posts and
Telecommunications
Beijing 100876, China
2
Science and Technology on
Information Transmission and
Dissemination in Communication
Networks Laboratory
Shijiazhuang 050081, China
3
National Engineering Laboratory for
Mobile Network Security
Beijing 100876, China
linzw@bupt.edu.cn
Ran Li
1
Network and Information Center,
Institute of Network Technology,
Beijing University of Posts and
Telecommunications
Beijing 100876, China
2
Science and Technology on
Information Transmission and
Dissemination in Communication
Networks Laboratory
Shijiazhuang 050081, China
3
National Engineering Laboratory for
Mobile Network Security
Beijing 100876, China
liran_@bupt.edu.cn
ABSTRACT
Soware
1
Dened Network (SDN) is a new type of network
architecture that has advantages over traditional network. For
SDN, security is a basic issue. SDN controller has received
considerable aention in the researches on SDN security.
Researchers assign security tasks to SDN controllers generally,
but it puts a heavy burden on the SDN controller and leads to a
decrease in system stability. On the basis of previous work, we
propose a new security protection architecture based on
SDN/NFV. Meanwhile, a security function virtual machine pool
is designed in infrastructure layer in architecture. It can create
virtual machines and manage the ip addresses of the virtual
machines automatically, which improves the exibility and
expandability of the architecture. Moreover, a function
composition algorithm based on Trie (FCT) has been introduced.
We deploy the security protection architecture on VMware cloud
platform to validate the availability of the architecture and use
experimental data to prove FCT algorithm has good
performance.
1
Permission to make digital or hard copies of all or part of this work for personal
or classroom use is granted without fee provided that copies are not made or
distributed for profit or commercial advantage and that copies bear this notice and
the full citation on the first page. Copyrights for components of this work owned
by others than ACM must be honored. Abstracting with credit is permitted. To
copy otherwise, or republish, to post on servers or to redistribute to lists, requires
prior specific permission and/or a fee. Request permissions from
Permissions@acm.org.
CSAE '18, October 22–24, 2018, Hohhot, China
© 2018 Association for Computing Machinery.
ACM ISBN 978-1-4503-6512-3/18/10…$15.00
https://doi.org/10.1145/3207677.3277992
CCS CONCEPTS
• Security and privacy → Network security • Networks →
Network architectures; Network components; Network
algorithms
KEYWORDS
SDN, NFV, security protection architecture, composition
algorithm
1 INTRODUCTION
Software Define Network(SDN) [1] is a new network
architecture based on OpenFlow [2]. Compared with traditional
networks, it has great advantages in flexibility, scalability, etc.
The core of SDN is the separation of the control plane and the
data plane, which makes the configuration and management of
network environment more flexible, effective and dynamic, thus
realizing adaptive control of network traffic and providing users
with a good programmable network.
Network Function Virtualization(NFV) [3] is a network
architecture concept which aims to make the network control
deployment more exible and reduce the cost of the network. By
making use of the universal hardware and virtualization
technology, more functional soware processing can be carried
out to replace the traditional specic hardware devices, which is
helpful to reduce the cost of the network equipment and make
the network equipment no longer depend on the dedicated
hardware.
Network has become increasingly complicated with the
development of new technologies, such as cloud computing,
Internet of things, big data and mobile Internet, especially the
widespread application of virtualization technology. e