2015
DOI: 10.1007/978-3-319-25360-2_6
|View full text |Cite
|
Sign up to set email alerts
|

Towards the Dynamic Provision of Virtualized Security Services

Abstract: When network operators want to offer security services to a large number of customers (potentially tens of million) with current technologies face several limitations in terms of infrastructure management and costs. Network Functions Virtualization (NFV) and Software-Defined Networks (SDN) paradigms try to overcome these limitations by allowing more flexibility, configurability and agility. Unfortunately, the problem of deciding which security services to use, where to place and how to configure them is a mult… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…It uses horizontal scaling to leverage performance, however, it only considers functions that process traffic at the flow level. The authors in [10], address the allocation of security services in virtualized environments and discuss their challenges. They model the allocation problem for ISP networks to minimise the cost of operators as a Mixed-Integer Linear Programming (MILP) problem but no results for the implementation are reported.…”
Section: Related Workmentioning
confidence: 99%
“…It uses horizontal scaling to leverage performance, however, it only considers functions that process traffic at the flow level. The authors in [10], address the allocation of security services in virtualized environments and discuss their challenges. They model the allocation problem for ISP networks to minimise the cost of operators as a Mixed-Integer Linear Programming (MILP) problem but no results for the implementation are reported.…”
Section: Related Workmentioning
confidence: 99%
“…Several studies in the peer-reviewed literature tackle the problem by proposing architectural and mathematical solutions with the aim of optimizing the utilization of network and computational resources and minimizing the operational costs [2], [3]. As reported in Section IV, recent works go beyond the simple cost and resource optimization by introducing more specific constraints, either to enforce the security of the network [4], [5], or to guarantee QoS parameters such as minimum bandwidth and maximum end-to-end latency [6], [7].…”
Section: Motivationmentioning
confidence: 99%
“…In [5], the authors provide a model to determine the best placement of security VNFs based on the user requirements and the cost for the network operator. However, the proposed approach does not take into account the specific QoS requirements of the user's applications.…”
Section: Related Workmentioning
confidence: 99%
“…The authors in [1] address the allocation of security services in virtualized environments and discuss their challenges. They model the allocation problem in ISP networks to minimise the cost of network operators as a mixedinteger linear programming (MILP) problem but no results are reported.…”
Section: Related Workmentioning
confidence: 99%
“…A typical security system for a Data Center (DC) usually consists of a combination of bespoke hardware-based (middleboxes) e.g., Firewalls and Intrusion Detection and/or Prevention Systems (IDS/IPS), and Deep Packet Inspection (DPI) appliances, deployed in fixed locations [1] which restricts the ability of the infrastructure to react rapidly to changes or respond to attacks [2]. These middleboxes are expensive high-performance vendor-specific appliances with limit extensible functionality and results in vendor lock-in.…”
Section: Introductionmentioning
confidence: 99%