4.7 Article

Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling

Related references

Note: Only part of the references are listed.
Article Engineering, Electrical & Electronic

A general-purpose calculation module for route optimization in virtualized networks

Takefumi Wakayama et al.

Summary: Network functions virtualization (NFV) enables the provision of diverse network services by deploying virtualized network functions (VNFs) flexibly. We developed a calculation module in Python to automate the generation of linear programming problems and evaluate its effectiveness in obtaining optimal routes through VNFs.

IEICE COMMUNICATIONS EXPRESS (2022)

Article Computer Science, Information Systems

Resource Aware Routing for Service Function Chains in SDN and NFV-Enabled Network

Jianing Pei et al.

Summary: This paper studies the Differentiated Routing Problem considering SFC in SDN and NFV-enabled network, and proposes a novel Resource Aware Routing Algorithm to solve it. Performance evaluation demonstrates that the proposed algorithm efficiently addresses the problem and outperforms existing algorithms in acceptance rate, throughput, hop count, and load balancing.

IEEE TRANSACTIONS ON SERVICES COMPUTING (2021)

Article Computer Science, Information Systems

Capacitated Shortest Path Tour Problem-Based Integer Linear Programming for Service Chaining and Function Placement in NFV Networks

Masahiro Sasabe et al.

Summary: NFV is a new paradigm for achieving flexible and agile network services by decoupling network functions from proprietary hardware and running them on generic hardware as VNFs. This article proposes capacitated SPTP-based ILPs for solving service chaining and function placement, which can support larger-scale systems and reduce total delay.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2021)

Article Engineering, Electrical & Electronic

NFV/SDN Enabled Architecture for Efficient Adaptive Management of Renewable and Non-Renewable Energy

Christian Tipantuna et al.

IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY (2020)

Proceedings Paper Computer Science, Information Systems

Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches

Menghao Zhang et al.

27TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2020) (2020)

Proceedings Paper Computer Science, Hardware & Architecture

T-cache: Dependency-free Ternary Rule Cache for Policy-based Forwarding

Ying Wan et al.

IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (2020)

Proceedings Paper Computer Science, Hardware & Architecture

Latency-aware VNF Chain Deployment with Efficient Resource Reuse at Network Edge

Panpan Jin et al.

IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (2020)

Article Computer Science, Information Systems

Virtual Machine Migration Planning in Software-Defined Networks

Huandong Wang et al.

IEEE TRANSACTIONS ON CLOUD COMPUTING (2019)

Article Computer Science, Hardware & Architecture

Dynamic Packet Forwarding Verification in SDN

Qi Li et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2019)

Article Engineering, Electrical & Electronic

Network Function Virtualization-Aware Orchestrator for Service Function Chaining Placement in the Cloud

Hassan Hawilo et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2019)

Article Computer Science, Theory & Methods

Efficiently Embedding Service Function Chains with Dynamic Virtual Network Function Placement in Geo-Distributed Cloud System

Jianing Pei et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2019)

Article Computer Science, Information Systems

Joint Energy Efficient and QoS-Aware Path Allocation and VNF Placement for Service Function Chaining

Mohammad M. Tajiki et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2019)

Article Computer Science, Theory & Methods

Realtime DDoS Defense Using COTS SDN Switches via Adaptive Correlation Analysis

Jing Zheng et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2018)

Article Computer Science, Theory & Methods

Virtual Network Function Placement Considering Resource Optimization and SFC Requests in Cloud Datacenter

Defang Li et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2018)

Article Telecommunications

Computing and Bandwidth Resource Allocation in Multi-Provider NFV Environment

V Eramo et al.

IEEE COMMUNICATIONS LETTERS (2018)

Article Engineering, Electrical & Electronic

Distributed Service Function Chaining

Milad Ghaznavi et al.

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS (2017)

Proceedings Paper Computer Science, Information Systems

On the Safety and Efficiency of Virtual Firewall Elasticity Control

Juan Deng et al.

24TH ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2017) (2017)

Article Computer Science, Information Systems

Network Function Virtualization: State-of-the-Art and Research Challenges

Rashid Mijumbi et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2016)

Article Engineering, Electrical & Electronic

Delay-Aware Scheduling and Resource Optimization With Network Function Virtualization

Long Qu et al.

IEEE TRANSACTIONS ON COMMUNICATIONS (2016)

Article Computer Science, Information Systems

Resource Allocation in NFV: A Comprehensive Survey

Juliver Gil Herrera et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2016)

Article Computer Science, Information Systems

Resource Allocation in NFV: A Comprehensive Survey

Juliver Gil Herrera et al.

IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT (2016)

Proceedings Paper Computer Science, Software Engineering

CacheFlow: Dependency-Aware Rule-Caching for Software-Defined Networks

Naga Katta et al.

SYMPOSIUM ON SOFTWARE DEFINED NETWORKING (SDN) RESEARCH (SOSR'16) (2016)

Article Engineering, Electrical & Electronic

Toward an SDN-Enabled NFV Architecture

Jon Matias et al.

IEEE COMMUNICATIONS MAGAZINE (2015)

Article Computer Science, Theory & Methods

A First Step Toward Network Security Virtualization: From Concept To Prototype

Seungwon Shin et al.

IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY (2015)

Proceedings Paper Computer Science, Information Systems

SPHINX: Detecting Security Attacks in Software-Defined Networks

Mohan Dhawan et al.

22ND ANNUAL NETWORK AND DISTRIBUTED SYSTEM SECURITY SYMPOSIUM (NDSS 2015) (2015)

Article Computer Science, Information Systems

Programming Protocol-Independent Packet Processors

Pat Bosshart et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2014)

Article Computer Science, Information Systems

B4: Experience with a Globally-Deployed Software Defined WAN

Sushant Jain et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2013)

Article Computer Science, Information Systems

Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service

Justine Sherry et al.

ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2012)