Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Virtual Network Mapping Method Oriented to Network Security Experiment

A technology of virtual network mapping and virtual network, applied in data exchange network, software simulation/interpretation/simulation, instruments, etc., can solve the problem of low revenue-to-cost ratio

Active Publication Date: 2021-04-09
HARBIN INST OF TECH
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The purpose of the present invention is to solve the disadvantage of low revenue-to-cost ratio when mapping the number of nodes above 1,000 levels in the prior art, and propose a virtual network mapping method oriented to network security experiments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Virtual Network Mapping Method Oriented to Network Security Experiment
  • A Virtual Network Mapping Method Oriented to Network Security Experiment
  • A Virtual Network Mapping Method Oriented to Network Security Experiment

Examples

Experimental program
Comparison scheme
Effect test

specific Embodiment approach 1

[0024] Specific implementation mode one: a kind of virtual network mapping method for network security experiment comprises the following steps:

[0025] The present invention mainly proposes a new algorithm OPTMap under the background of the problem of new large-scale virtual network mapping, combining the two ideas of the graph division scheme and the mapping scheme, which first divides the graph and then maps it. Firstly, a simple segmentation is given by using the graph partition method. While ensuring the mapping effect, it is to reduce the number of links, improve the success rate and quality of the mapping process, and avoid complex constraint control. Then, for simple segmentation, a new mapping process is proposed to reflect constraints and pursue a more optimal ratio of revenue to cost.

[0026] Step 1: coarsening the virtual network topology map to obtain the roughened virtual network topology map;

[0027] Step 2: Carry out K-path division to the virtual network t...

specific Embodiment approach 2

[0032] Embodiment 2: The difference between this embodiment and Embodiment 1 is that in the first step, the virtual network topology map is coarsened, and the specific process of obtaining the roughened virtual network topology map is as follows:

[0033] The virtual network topology map is coarsened by using an improved double-edge matching strategy, and the compressed virtual network topology map is obtained.

[0034] Other steps and parameters are the same as those in Embodiment 1.

specific Embodiment approach 3

[0035] Specific embodiment 3: The difference between this embodiment and specific embodiments 1 or 2 is that in the step 2, the virtual network topology graph roughened in step 1 is divided into K paths to obtain a virtual network divided into K parts The specific process of the topology map is:

[0036] The first is the process of graph partitioning, which is called the preprocessing process based on multi-layer K-path partitioning. Divided into three stages. The first is the coarsening stage. The goal of the coarsening stage is to compress the size of the virtual network topology graph. By continuously merging the vertices and edges in the virtual network topology graph, the large graph is transformed into a sufficiently small graph. Based on the improved multiple edge matching Strategy.

[0037] Then there is K-way division. The goal of this step is to divide the virtual network topology map obtained in the coarsening stage into K parts. The sum of the link weights is th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A virtual network mapping method oriented to a network security test, the invention relates to a virtual network mapping method oriented to a network security test. The present invention aims to solve the problem of low revenue-to-cost ratio when mapping the number of nodes above a thousand levels in the prior art. The present invention includes: 1: coarsening the virtual network topology map to obtain the roughened virtual network topology map; 2: obtaining the virtual network topology map divided into K parts; 3: obtaining the virtual network of K nodes Topology diagram; 4: Sorting the nodes of the physical network topology diagram and the virtual network topology diagram of K nodes; 5: Mapping physical network nodes and virtual network nodes; 6: According to the relationship between physical network nodes and virtual network node mapping, Map the virtual link to the physical link. If the link mapping fails, re-execute steps 1 to 5 to perform link mapping in the next virtual network topology map. The invention is used in the field of virtual network mapping.

Description

technical field [0001] The invention relates to a virtual network mapping method for network security experiments. Background technique [0002] The situation of confrontation in cyberspace is becoming more and more serious. The degree of confrontation at the network level of various countries is becoming more and more intense, and the technical means are becoming more and more complicated. In this case, the network simulation and effect evaluation platform, that is, the network shooting range, has become more and more important as an important infrastructure and tool for network security experiments and network attack and defense technology evaluation. The primary task of building a network shooting range is to quickly and flexibly construct a virtual network, which involves network virtualization, and the virtual network mapping algorithm is the core of network virtualization. Through research on large-scale virtual network mapping algorithms for network security experimen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24G06F9/455
CPCG06F9/45558G06F2009/45595H04L41/12H04L41/145
Inventor 张伟哲方滨兴何慧张宇孙奥王德胜余翔湛刘亚维
Owner HARBIN INST OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products