Results 21 to 30 of about 834,303 (333)

Security-aware Service Function Chain Deployment Method Based on Deep ReinforcementLearning [PDF]

open access: yesJisuanji kexue
As a key technology to improve the utilization of network resources,service function chain combined with deep reinforcement learning makes it possible to achieve flexible and secure deployment.However,how to effectively deploy service function chains ...
ZHU Ziyi, ZHANG Jianhui, ZENG Junjieand ZHANG Hongyuan
doaj   +1 more source

5G Network Slice Isolation

open access: yesNetwork, 2022
This article reveals an adequate comprehension of basic defense, security challenges, and attack vectors in deploying multi-network slicing. Network slicing is a revolutionary concept of providing mobile network on-demand and expanding mobile networking ...
Stan Wong, Bin Han, Hans D. Schotten
doaj   +1 more source

Security Policy Scheme for an Efficient Security Architecture in Software-Defined Networking

open access: yesInformation, 2017
In order to build an efficient security architecture, previous studies have attempted to understand complex system architectures and message flows to detect various attack packets.
Woosik Lee, Namgi Kim
doaj   +1 more source

An Effective Algorithm for Collision Resolution in Security Policy Rules

open access: yesМоделирование и анализ информационных систем, 2019
A firewall is the main classic tool for monitoring and managing the network traffic on a local network. Its task is to compare the network traffic passing through it with the established security rules.
Sergey V. Morzhov, Valeriy A. Sokolov
doaj   +1 more source

Policy based security architecture for software defined networks [PDF]

open access: yesProceedings of the 31st Annual ACM Symposium on Applied Computing, 2016
As networks expand in size and complexity, they pose greater administrative and management challenges. Software Defined Networks (SDN) offer a promising approach to meeting some of these challenges. In this paper, we propose a policy driven security architecture for securing end to end services across multiple SDN domains.
Vijay Varadharajan   +3 more
openaire   +2 more sources

Chemical Enterprise Network Construction and Network Security Solution

open access: yesChemical Engineering Transactions, 2018
With the informatization process of the chemical industry deepening and the scale of chemical enterprise network gradually expanding, it has brought about the problems of network and information security in chemical enterprises.
Hong Zhang, Pei Li, Jie Zhang
doaj   +1 more source

Tunneling Activities Detection Using Machine Learning Techniques

open access: yesJournal of Telecommunications and Information Technology, 2023
Tunnel establishment, like HTTPS tunnel or related ones, between a computer protected by a security gateway and a remote server located outside the protected network is the most effective way to bypass the network security policy.
Fabien Allard   +3 more
doaj   +1 more source

Semantic-Aware Security Orchestration in SDN/NFV-Enabled IoT Systems

open access: yesSensors, 2020
IoT systems can be leveraged by Network Function Virtualization (NFV) and Software-Defined Networking (SDN) technologies, thereby strengthening their overall flexibility, security and resilience.
Alejandro Molina Zarca   +4 more
doaj   +1 more source

Transfer Fuzzy Learning enabled Streebog Cryptographic Substitution Permutation based zero trust security in IIOT

open access: yesAlexandria Engineering Journal, 2023
The advent of the fourth industrial revolution and connection with devices and sensors produced extensive arbitrary, discordant data in IIoT platforms.
Anamika Singh   +4 more
doaj   +1 more source

Design and Application Prospects of Zero-Trust Architecture for Near-Space Networks [PDF]

open access: yes中国工程科学
The unique position of near space makes its network, centered around various near-space vehicles, a critical component of the integrated air-space-ground network.
Qiao Liu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy