dynamic deployment
Recently Published Documents


TOTAL DOCUMENTS

147
(FIVE YEARS 30)

H-INDEX

14
(FIVE YEARS 2)

2022 ◽  
Vol 22 (1) ◽  
pp. 1-27
Author(s):  
Zhenyu Fan ◽  
Wang Yang ◽  
Fan Wu ◽  
Jing Cao ◽  
Weisong Shi

Different from cloud computing, edge computing moves computing away from the centralized data center and closer to the end-user. Therefore, with the large-scale deployment of edge services, it becomes a new challenge of how to dynamically select the appropriate edge server for computing requesters based on the edge server and network status. In the TCP/IP architecture, edge computing applications rely on centralized proxy servers to select an appropriate edge server, which leads to additional network overhead and increases service response latency. Due to its powerful forwarding plane, Information-Centric Networking (ICN) has the potential to provide more efficient networking support for edge computing than TCP/IP. However, traditional ICN only addresses named data and cannot well support the handle of dynamic content. In this article, we propose an edge computing service architecture based on ICN, which contains the edge computing service session model, service request forwarding strategies, and service dynamic deployment mechanism. The proposed service session model can not only keep the overhead low but also push the results to the computing requester immediately once the computing is completed. However, the service request forwarding strategies can forward computing requests to an appropriate edge server in a distributed manner. Compared with the TCP/IP-based proxy solution, our forwarding strategy can avoid unnecessary network transmissions, thereby reducing the service completion time. Moreover, the service dynamic deployment mechanism decides whether to deploy an edge service on an edge server based on service popularity, so that edge services can be dynamically deployed to hotspot, further reducing the service completion time.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Yazhuo Gao ◽  
Guomin Zhang ◽  
Changyou Xing

As an important deception defense method, a honeypot can be used to enhance the network’s active defense capability effectively. However, the existing rigid deployment method makes it difficult to deal with the uncertain strategic attack behaviors of the attackers. To solve such a problem, we propose a multiphase dynamic deployment mechanism of virtualized honeypots (MD2VH) based on the intelligent attack path prediction method. MD2VH depicts the attack and defense characteristics of both attackers and defenders through the Bayesian state attack graph, establishes a multiphase dynamic deployment optimization model of the virtualized honeypots based on the extended Markov’s decision-making process, and generates the deployment strategies dynamically by combining the online and offline reinforcement learning methods. Besides, we also implement a prototype system based on software-defined network and virtualization container, so as to evaluate the effectiveness of MD2VH. Experiments results show that the capture rate of MD2VH is maintained at about 90% in the case of both simple topology and complex topology. Compared with the simple intelligent deployment strategy, such a metric is increased by 20% to 60%, and the result is more stable under different types of the attacker’s strategy.


2021 ◽  
Author(s):  
Zizheng Dou ◽  
Zheng Yao ◽  
Ziyue Sun ◽  
Mingquan Lu

2021 ◽  
Author(s):  
C. Manso ◽  
R. Munoz ◽  
F. Balasis ◽  
R. Casellas ◽  
R. Vilalta ◽  
...  

Author(s):  
Isakovic Haris ◽  
Luis Lino Ferreira ◽  
Irmin Okic ◽  
Adam Dukkon ◽  
Zlatan Tucakovic ◽  
...  
Keyword(s):  

2021 ◽  
Author(s):  
Nobukatsu Okuizumi ◽  
Akihito Watanabe ◽  
Hiroaki Ito ◽  
Masanori Matsushita

Author(s):  
Istvan Pelle ◽  
Francesco Paolucci ◽  
Balazs Sonkoly ◽  
Filippo Cugini

Sign in / Sign up

Export Citation Format

Share Document