{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:27:08Z","timestamp":1765268828452,"version":"build-2065373602"},"reference-count":30,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2022,1,21]],"date-time":"2022-01-21T00:00:00Z","timestamp":1642723200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100010880","name":"State Grid Corporation of China","doi-asserted-by":"publisher","award":["SGHAXT00YJJS2100034"],"award-info":[{"award-number":["SGHAXT00YJJS2100034"]}],"id":[{"id":"10.13039\/501100010880","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information"],"abstract":"<jats:p>Software-defined networking (SDN) and network function virtualization (NFV) make a network programmable, resulting in a more flexible and agile network. An important and promising application for these two technologies is network security, where they can dynamically chain virtual security functions (VSFs), such as firewalls, intrusion detection systems, and intrusion prevention systems, and thus inspect, monitor, or filter traffic flows in cloud data center networks. In view of the strict delay constraints of security services and the high failure probability of VSFs, we propose the use of a security service chain (SSC) orchestration algorithm that is latency aware with reliability assurance (LARA). This algorithm includes an SSC orchestration module and VSF backup module. We first use a reinforcement learning (RL) based Q-learning algorithm to achieve efficient SSC orchestration and try to reduce the end-to-end delay of services. Then, we measure the importance of the physical nodes carrying the VSF instance and backup VSF according to the node importance of VSF. Extensive simulation results indicate that the LARA algorithm is more effective in reducing delay and ensuring reliability compared with other algorithms.<\/jats:p>","DOI":"10.3390\/info13020053","type":"journal-article","created":{"date-parts":[[2022,1,23]],"date-time":"2022-01-23T20:32:52Z","timestamp":1642969972000},"page":"53","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Reliability Assurance Dynamic SSC Placement Using Reinforcement Learning"],"prefix":"10.3390","volume":"13","author":[{"given":"Wei","family":"Li","sequence":"first","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China"}]},{"given":"Yuan","family":"Jiang","sequence":"additional","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1531-8946","authenticated-orcid":false,"given":"Xiaoliang","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China"}]},{"given":"Fangfang","family":"Dang","sequence":"additional","affiliation":[{"name":"The State Grid Henan Information & Communication Company, Zhengzhou 450052, China"}]},{"given":"Feng","family":"Gao","sequence":"additional","affiliation":[{"name":"The State Grid Henan Information & Communication Company, Zhengzhou 450052, China"}]},{"given":"Haomin","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3620-8201","authenticated-orcid":false,"given":"Qi","family":"Fan","sequence":"additional","affiliation":[{"name":"School of Control and Computer Engineering, North China Electric Power University, Beijing 102206, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,1,21]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Luizelli, M.C., Bays, L.R., Buriol, L.S., Barcellos, M.P., and Gaspary, L.P. (2015, January 11\u201315). Piecing together the NFV provisioning puzzle: Efficient placement and chaining of virtual network functions. Proceedings of the 2015 IFIP\/IEEE International Symposium on Integrated Network Management (IM), Ottawa, ON, Canada.","key":"ref_1","DOI":"10.1109\/INM.2015.7140281"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"196","DOI":"10.1109\/MNET.100.2000338","article-title":"Enabling Machine Learning with Service Function Chaining for Security Enhancement at 5G Edges","volume":"35","author":"Feng","year":"2021","journal-title":"IEEE Netw."},{"doi-asserted-by":"crossref","unstructured":"Nguyen, T.N. (2018, January 24\u201326). The Challenges in SDN\/ML Based Network Security. Proceedings of the 2018 2nd Cyber Security in Networking Conference (CSNet), Paris, France.","key":"ref_3","DOI":"10.1109\/CSNET.2018.8602680"},{"doi-asserted-by":"crossref","unstructured":"Park, Y., Kengalahalli, N.V., and Chang, S. (2018, January 27\u201329). Distributed Security Network Functions against Botnet Attacks in Software-defined Networks. Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Verona, Italy.","key":"ref_4","DOI":"10.1109\/NFV-SDN.2018.8725657"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"152","DOI":"10.1109\/MNET.2018.1700467","article-title":"Enabling Efficient Service Function Chaining by Integrating NFV and SDN: Architecture, Challenges and Opportunities","volume":"32","author":"Zhang","year":"2018","journal-title":"IEEE Netw."},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"812","DOI":"10.1109\/COMST.2018.2862350","article-title":"A Survey on Emerging SDN and NFV Security Mechanisms for IoT Systems","volume":"21","author":"Farris","year":"2019","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1109\/TNSM.2019.2941128","article-title":"Dynamic and Application-Aware Provisioning of Chained Virtual Security Network Functions","volume":"17","author":"Siracusa","year":"2020","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"doi-asserted-by":"crossref","unstructured":"Menouer, T., Khedimi, A., C\u00e9rin, C., and Chahbar, M. (2020, January 9\u201311). Scheduling Service Function Chains with Dependencies in the Cloud. Proceedings of the 2020 IEEE 9th International Conference on Cloud Networking (CloudNet), Piscataway, NJ, USA.","key":"ref_8","DOI":"10.1109\/CloudNet51028.2020.9335790"},{"doi-asserted-by":"crossref","unstructured":"Xu, Y., and Kafle, V.P. (2018, January 22\u201324). Optimal Service Function Chain Placement Modeling for Minimizing Setup and Operation Cost. Proceedings of the 2018 IEEE 7th International Conference on Cloud Networking (CloudNet), Tokyo, Japan.","key":"ref_9","DOI":"10.1109\/CloudNet.2018.8549288"},{"doi-asserted-by":"crossref","unstructured":"Kim, S.I., and Kim, H.S. (2019, January 2\u20135). Method for VNF Placement for Service Function Chaining optimized in the NFV Environment. Proceedings of the 2019 Eleventh International Conference on Ubiquitous and Future Networks (ICUFN), Zagreb, Croatia.","key":"ref_10","DOI":"10.1109\/ICUFN.2019.8806094"},{"doi-asserted-by":"crossref","unstructured":"Wang, Z., Zhao, Z., Shu, C., Min, G., Han, Y., and Jiang, Y. (2019, January 16\u201318). Orchestrating Service Function Chains with Joint Resource Optimization in NFV Networks. Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA\/BDCloud\/SocialCom\/SustainCom), Xiamen, China.","key":"ref_11","DOI":"10.1109\/ISPA-BDCloud-SustainCom-SocialCom48970.2019.00159"},{"doi-asserted-by":"crossref","unstructured":"Guo, H., Wang, Y., Li, Z., Qiu, Z., An, H., Yu, P., and Yuan, N. (2020, January 20\u201324). Cost-aware Placement and Chaining of Service Function Chain with VNF Instance Sharing. Proceedings of the NOMS 2020\u20132020 IEEE\/IFIP Network Operations and Management Symposium, Budapest, Hungary.","key":"ref_12","DOI":"10.1109\/NOMS47738.2020.9110360"},{"doi-asserted-by":"crossref","unstructured":"Khatiri, A., and Mirjalily, G. (February, January 29). Resource Balanced Service Chaining in NFV-enabled Inter-Datacenter Elastic Optical Networks. Proceedings of the 2020 12th International Conference on Knowledge and Smart Technology (KST), Pattaya, Thailand.","key":"ref_13","DOI":"10.1109\/KST48564.2020.9059321"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"77307","DOI":"10.1109\/ACCESS.2021.3082644","article-title":"A Novel Method for Resource Efficient Security Service Chain Embedding Oriented to Cloud Datacenter Networks","volume":"9","author":"Qiao","year":"2021","journal-title":"IEEE Access"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"5640134","DOI":"10.1155\/2019\/5640134","article-title":"Virtual Network Embedding Based on Security Level with VNF Placement","volume":"2019","author":"Dwiardhika","year":"2019","journal-title":"Secur. Commun. Netw."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/MIC.2016.128","article-title":"Stringer: Balancing Latency and Resource Usage in Service Function Chain Provisioning","volume":"20","author":"Chua","year":"2016","journal-title":"IEEE Internet Comput."},{"doi-asserted-by":"crossref","unstructured":"Cho, D., Taheri, J., Zomaya, A.Y., and Wang, L. (2017, January 11\u201314). Virtual Network Function Placement: Towards Minimizing Network Latency and Lead Time. Proceedings of the IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Hong Kong, China.","key":"ref_17","DOI":"10.1109\/CloudCom.2017.12"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"560","DOI":"10.1109\/TSC.2015.2502252","article-title":"Improve Service Chaining Performance with Optimized Middlebox Placement","volume":"10","author":"Liu","year":"2017","journal-title":"IEEE Trans. Serv. Comput."},{"doi-asserted-by":"crossref","unstructured":"Hmaity, A., Savi, M., Musumeci, F., Tornatore, M., and Pattavina, A. (2016, January 13\u201315). Virtual Network Function placement for resilient Service Chain provisioning. Proceedings of the 2016 8th International Workshop on Resilient Networks Design and Modeling (RNDM), Halmstad, Sweden.","key":"ref_19","DOI":"10.1109\/RNDM.2016.7608294"},{"doi-asserted-by":"crossref","unstructured":"Casazza, M., Fouilhoux, P., Bouet, M., and Secci, S. (2017, January 12\u201316). Securing virtual network function placement with high availability guarantees. Proceedings of the 2017 IFIP Networking Conference (IFIP Networking) and Workshops, Stockholm, Sweden.","key":"ref_20","DOI":"10.23919\/IFIPNetworking.2017.8264850"},{"key":"ref_21","first-page":"3","article-title":"Method for virtual network function backup based on backup-cost importance","volume":"36","author":"Wang","year":"2019","journal-title":"Appl. Res. Comput."},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1002\/net.21782","article-title":"Protection strategies for virtual network functions placement and service chains provisioning","volume":"70","author":"Hmaity","year":"2017","journal-title":"Networks"},{"doi-asserted-by":"crossref","unstructured":"Lee, D., Yoo, J.H., and Hong, W.K. (2020, January 22\u201325). Q-learning based Service Function Chaining using VNF Resource-aware Reward Model. Proceedings of the 2020 21st Asia-Pacific Network Operations and Management Symposium (APNOMS), Daegu, Korea.","key":"ref_23","DOI":"10.23919\/APNOMS50412.2020.9236975"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"163898","DOI":"10.1109\/ACCESS.2019.2946319","article-title":"A Q-Learning Based Scheme to Securely Cache Content in Edge-Enabled Heterogeneous Networks","volume":"7","author":"Dai","year":"2019","journal-title":"IEEE Access"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"33169","DOI":"10.1109\/ACCESS.2021.3061406","article-title":"Q-Learning-Based Power Allocation for Secure Wireless Communication in UAV-Aided Relay Network","volume":"9","author":"Alnagar","year":"2021","journal-title":"IEEE Access"},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"32405","DOI":"10.1109\/ACCESS.2021.3060480","article-title":"Interference Mitigation in HetNets to Improve the QoS Using Q-Learning","volume":"9","author":"Iqbal","year":"2019","journal-title":"IEEE Access"},{"unstructured":"Google Company (2021, November 10). Google Apps Service Level Agreement[OL]. Available online: http:\/\/www.google.com\/apps\/intl\/en\/terms\/sla.html.","key":"ref_27"},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"10969","DOI":"10.1109\/JIOT.2020.2991753","article-title":"On Dynamic Service Function Chain Reconfiguration in IoT Networks","volume":"7","author":"Liu","year":"2020","journal-title":"IEEE Internet Things J."},{"key":"ref_29","first-page":"484","article-title":"A SDN routing performance prediction model based on graph neural network","volume":"49","author":"Che","year":"2021","journal-title":"Chin. J. Electron."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comnet.2019.106980","article-title":"Machine learning-driven service function chain placement and scaling in MEC-enabled 5G networks","volume":"166","author":"Subramanya","year":"2020","journal-title":"Comput. Netw."}],"container-title":["Information"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2078-2489\/13\/2\/53\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T22:05:36Z","timestamp":1760133936000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2078-2489\/13\/2\/53"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,21]]},"references-count":30,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2022,2]]}},"alternative-id":["info13020053"],"URL":"https:\/\/doi.org\/10.3390\/info13020053","relation":{},"ISSN":["2078-2489"],"issn-type":[{"type":"electronic","value":"2078-2489"}],"subject":[],"published":{"date-parts":[[2022,1,21]]}}}