Skip to main content

SFC Security Mimicry Defense
draft-li-ietf-sfc-security-mimicry-defense-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Authors Chuanhuang Li , Zhongyun Tang , Chao Chen
Last updated 2021-09-13 (Latest revision 2021-03-12)
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

With the increase of network threats, the Service Function Chain (SFC) is vulnerable to various attacks, and as a key component of the entire SFC, the security of the service function (SF) is more critical. This document proposes a mimic SF security architecture based on the dynamic heterogeneous redundancy model, which can effectively protect the normal execution function of SF in SFC. The security architecture adopts an active defense method to defend against network attacks, and it can effectively defend against most SF attacks.

Authors

Chuanhuang Li
Zhongyun Tang
Chao Chen

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)