@techreport{li-ietf-sfc-security-mimicry-defense-00, number = {draft-li-ietf-sfc-security-mimicry-defense-00}, type = {Internet-Draft}, institution = {Internet Engineering Task Force}, publisher = {Internet Engineering Task Force}, note = {Work in Progress}, url = {https://datatracker.ietf.org/doc/draft-li-ietf-sfc-security-mimicry-defense/00/}, author = {Chuanhuang Li and Zhongyun Tang and Chao Chen}, title = {{SFC Security Mimicry Defense}}, pagetotal = 9, year = 2021, month = mar, day = 12, abstract = {With the increase of network threats, the Service Function Chain (SFC) is vulnerable to various attacks, and as a key component of the entire SFC, the security of the service function (SF) is more critical. This document proposes a mimic SF security architecture based on the dynamic heterogeneous redundancy model, which can effectively protect the normal execution function of SF in SFC. The security architecture adopts an active defense method to defend against network attacks, and it can effectively defend against most SF attacks.}, }