{"id":"https://openalex.org/W7108220638","doi":"https://doi.org/10.1631/fitee.2500218","title":"Dynamic trust-based service function chain deployment method for disrupting attack chains","display_name":"Dynamic trust-based service function chain deployment method for disrupting attack chains","publication_year":2025,"publication_date":"2025-12-01","ids":{"openalex":"https://openalex.org/W7108220638","doi":"https://doi.org/10.1631/fitee.2500218"},"language":"en","primary_location":{"id":"doi:10.1631/fitee.2500218","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.2500218","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Deqiang Zhou","orcid":"https://orcid.org/0009-0002-0326-0513"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Deqiang Zhou","raw_affiliation_strings":["Information Technology Institute, PLA Information Engineering University, Zhengzhou, 450002, China"],"raw_orcid":"https://orcid.org/0009-0002-0326-0513","affiliations":[{"raw_affiliation_string":"Information Technology Institute, PLA Information Engineering University, Zhengzhou, 450002, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xinsheng Ji","orcid":"https://orcid.org/0009-0004-9579-6132"},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]},{"id":"https://openalex.org/I4210155350","display_name":"Purple Mountain Laboratories","ror":"https://ror.org/04zcbk583","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210155350"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinsheng Ji","raw_affiliation_strings":["Information Technology Institute, PLA Information Engineering University, Zhengzhou, 450002, China","Purple Mountain Laboratories, Nanjing, 211111, China"],"raw_orcid":"https://orcid.org/0009-0004-9579-6132","affiliations":[{"raw_affiliation_string":"Information Technology Institute, PLA Information Engineering University, Zhengzhou, 450002, China","institution_ids":["https://openalex.org/I169689159"]},{"raw_affiliation_string":"Purple Mountain Laboratories, Nanjing, 211111, China","institution_ids":["https://openalex.org/I4210155350"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Wei You","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei You","raw_affiliation_strings":["Information Technology Institute, PLA Information Engineering University, Zhengzhou, 450002, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Information Technology Institute, PLA Information Engineering University, Zhengzhou, 450002, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Hang Qiu","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Hang Qiu","raw_affiliation_strings":["Information Technology Institute, PLA Information Engineering University, Zhengzhou, 450002, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Information Technology Institute, PLA Information Engineering University, Zhengzhou, 450002, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Jie Yang","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jie Yang","raw_affiliation_strings":["Information Technology Institute, PLA Information Engineering University, Zhengzhou, 450002, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Information Technology Institute, PLA Information Engineering University, Zhengzhou, 450002, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Yu Zhao","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Zhao","raw_affiliation_strings":["Information Technology Institute, PLA Information Engineering University, Zhengzhou, 450002, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Information Technology Institute, PLA Information Engineering University, Zhengzhou, 450002, China","institution_ids":["https://openalex.org/I169689159"]}]},{"author_position":"last","author":{"id":null,"display_name":"Mingyan Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I169689159","display_name":"PLA Information Engineering University","ror":"https://ror.org/00mm1qk40","country_code":"CN","type":"education","lineage":["https://openalex.org/I169689159"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingyan Xu","raw_affiliation_strings":["Information Technology Institute, PLA Information Engineering University, Zhengzhou, 450002, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Information Technology Institute, PLA Information Engineering University, Zhengzhou, 450002, China","institution_ids":["https://openalex.org/I169689159"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":7,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I169689159"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.59046971,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"26","issue":"12","first_page":"2550","last_page":"2568"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.8366000056266785,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10714","display_name":"Software-Defined Networks and 5G","score":0.8366000056266785,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":0.03759999945759773,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.02250000089406967,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/software-deployment","display_name":"Software deployment","score":0.6754999756813049},{"id":"https://openalex.org/keywords/virtual-network","display_name":"Virtual network","score":0.6575000286102295},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.6330999732017517},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.462799996137619},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.4544999897480011},{"id":"https://openalex.org/keywords/integer-programming","display_name":"Integer programming","score":0.42739999294281006},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.42559999227523804},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.40310001373291016},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.3815999925136566}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7946000099182129},{"id":"https://openalex.org/C105339364","wikidata":"https://www.wikidata.org/wiki/Q2297740","display_name":"Software deployment","level":2,"score":0.6754999756813049},{"id":"https://openalex.org/C2776874963","wikidata":"https://www.wikidata.org/wiki/Q4112081","display_name":"Virtual network","level":2,"score":0.6575000286102295},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.6330999732017517},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5236999988555908},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4754999876022339},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.462799996137619},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.4544999897480011},{"id":"https://openalex.org/C56086750","wikidata":"https://www.wikidata.org/wiki/Q6042592","display_name":"Integer programming","level":2,"score":0.42739999294281006},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.42559999227523804},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.40310001373291016},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3921000063419342},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.3815999925136566},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.3513000011444092},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.349700003862381},{"id":"https://openalex.org/C199168358","wikidata":"https://www.wikidata.org/wiki/Q3367000","display_name":"Orchestration","level":3,"score":0.33239999413490295},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.3310000002384186},{"id":"https://openalex.org/C41045048","wikidata":"https://www.wikidata.org/wiki/Q202843","display_name":"Linear programming","level":2,"score":0.3188000023365021},{"id":"https://openalex.org/C167063184","wikidata":"https://www.wikidata.org/wiki/Q1400839","display_name":"Vulnerability assessment","level":3,"score":0.29789999127388},{"id":"https://openalex.org/C2779618445","wikidata":"https://www.wikidata.org/wiki/Q1640628","display_name":"Network service","level":2,"score":0.29600000381469727},{"id":"https://openalex.org/C25344961","wikidata":"https://www.wikidata.org/wiki/Q192726","display_name":"Virtual machine","level":2,"score":0.2930999994277954},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2791999876499176},{"id":"https://openalex.org/C2776384856","wikidata":"https://www.wikidata.org/wiki/Q17145767","display_name":"Trust management (information system)","level":2,"score":0.27239999175071716},{"id":"https://openalex.org/C65856478","wikidata":"https://www.wikidata.org/wiki/Q3991682","display_name":"Attack model","level":2,"score":0.2671999931335449},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.26260000467300415},{"id":"https://openalex.org/C170130773","wikidata":"https://www.wikidata.org/wiki/Q216378","display_name":"Usability","level":2,"score":0.25220000743865967}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1631/fitee.2500218","is_oa":false,"landing_page_url":"https://doi.org/10.1631/fitee.2500218","pdf_url":null,"source":{"id":"https://openalex.org/S4210189857","display_name":"Frontiers of Information Technology & Electronic Engineering","issn_l":"2095-9184","issn":["2095-9184","2095-9230"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Frontiers of Information Technology &amp; Electronic Engineering","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":37,"referenced_works":["https://openalex.org/W2159753170","https://openalex.org/W2500898769","https://openalex.org/W2520457393","https://openalex.org/W2545165718","https://openalex.org/W2591732478","https://openalex.org/W2911430788","https://openalex.org/W2964796648","https://openalex.org/W3028144365","https://openalex.org/W3034856882","https://openalex.org/W3041725488","https://openalex.org/W3115357057","https://openalex.org/W3116156549","https://openalex.org/W3135269587","https://openalex.org/W3182773834","https://openalex.org/W3185132550","https://openalex.org/W3185650902","https://openalex.org/W3216019620","https://openalex.org/W4206984830","https://openalex.org/W4221146354","https://openalex.org/W4283826703","https://openalex.org/W4285160072","https://openalex.org/W4288069434","https://openalex.org/W4292387464","https://openalex.org/W4309880845","https://openalex.org/W4309940780","https://openalex.org/W4316877044","https://openalex.org/W4362717980","https://openalex.org/W4381415999","https://openalex.org/W4383503707","https://openalex.org/W4388206353","https://openalex.org/W4388240206","https://openalex.org/W4390120092","https://openalex.org/W4394694882","https://openalex.org/W4400571528","https://openalex.org/W4401877006","https://openalex.org/W4403257136","https://openalex.org/W4408325351"],"related_works":[],"abstract_inverted_index":{"Enhancement":[0],"of":[1,34,52,121,127,138],"service":[2],"function":[3],"chain":[4],"(SFC)":[5],"security":[6,19,68,258],"ability":[7],"by":[8,115],"composing":[9],"virtual":[10,125],"network":[11,77,112,254],"functions":[12],"(VNFs)":[13],"and":[14,79,135,167,171,195,208,220,240],"allocating":[15],"resources":[16],"considering":[17],"their":[18],"attributes":[20],"can":[21,231,241],"address":[22],"the":[23,40,49,53,72,90,108,119,131,144,153,165,189,192,206,211,216,233,243],"vulnerability":[24,50,116],"threats":[25],"in":[26,66,74,156,256],"cloud":[27],"environments,":[28],"which":[29,184],"is":[30,104,175,185,201],"an":[31,99,178],"important":[32],"means":[33],"attempting":[35],"to":[36,93,106,151,203],"secure":[37,94],"SFCs":[38,157,252],"at":[39,130,143,246],"deployment":[41,60,213,236],"stage.":[42],"However,":[43],"existing":[44,67],"works":[45],"do":[46],"not":[47],"consider":[48],"correlation":[51],"multi-step":[54],"attack":[55,91,154],"chains":[56,92,155],"when":[57],"completing":[58],"SFC":[59,132,145,169,212,235,244],"based":[61],"on":[62,82],"trustworthiness.":[63],"This":[64],"results":[65,225],"orchestration":[69],"methods":[70],"ignoring":[71],"differences":[73],"trustworthiness":[75,110,122,207,245],"among":[76,111],"entities":[78,113],"focusing":[80],"only":[81],"local":[83],"trust":[84,102,126,137,194],"optimization;":[85],"these":[86],"steps":[87],"effectively":[88],"disrupt":[89,152],"SFCs.":[95],"In":[96],"this":[97,163],"article,":[98],"innovative":[100],"hierarchical":[101],"model":[103],"proposed":[105,202,229],"assess":[107],"differentiated":[109],"caused":[114],"correlation.":[117],"On":[118],"basis":[120],"assessment,":[123],"both":[124],"VNF":[128,217],"combinations":[129],"composition":[133,170],"stage":[134,147],"physical":[136,139],"node":[140],"(PN)":[141],"selections":[142],"placement":[146,172],"are":[148],"globally":[149,209],"considered":[150],"as":[158,160,177],"much":[159],"possible.":[161],"To":[162,187],"end,":[164],"security-aware":[166],"cost-efficient":[168],"(SCSCP)":[173],"problem":[174],"formulated":[176],"integer":[179],"linear":[180],"programming":[181],"(ILP)":[182],"problem,":[183,191],"NP-hard.":[186],"tackle":[188],"SCSCP":[190],"joint":[193],"cost":[196],"global":[197],"optimization":[198],"(JTCGO)":[199],"algorithm":[200,230],"dynamically":[204],"update":[205],"find":[210],"solutions":[214,237],"including":[215],"combination":[218],"schemes":[219],"PN":[221],"selection":[222],"schemes.":[223],"Simulation":[224],"demonstrate":[226],"that":[227],"our":[228],"provide":[232],"optimal":[234],"for":[238],"requests":[239],"guarantee":[242],"a":[247],"controllable":[248],"cost,":[249],"thereby":[250],"protecting":[251],"from":[253],"attacks":[255],"complex":[257],"environments.":[259]},"counts_by_year":[],"updated_date":"2025-12-24T23:09:58.560324","created_date":"2025-12-03T00:00:00"}
