Results 191 to 200 of about 24,575 (225)
Some of the next articles are maybe not open access.
Proceedings of the 2016 ACM SIGCOMM Conference, 2016
We propose SLA-NFV, a Service Level Agreement (SLA) aware framework, for building high-performance NFV, focusing on fulfilling SLAs of service subscribers (or tenants). SLA-NFV leverages a hybrid infrastructure with both software and programmable hardware to enhance NFV’s capability with respect to various SLAs.
Chen Sun +3 more
openaire +1 more source
We propose SLA-NFV, a Service Level Agreement (SLA) aware framework, for building high-performance NFV, focusing on fulfilling SLAs of service subscribers (or tenants). SLA-NFV leverages a hybrid infrastructure with both software and programmable hardware to enhance NFV’s capability with respect to various SLAs.
Chen Sun +3 more
openaire +1 more source
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2016
Network Function Virtualization (NFV) applications are stateful. For example, a Content Distribution Network (CDN) caches web contents from remote servers and serves them to clients. Similarly, an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS) have both per-flow and multi-flow (shared) states to properly react to intrusions ...
Ming-Wei Shih +3 more
openaire +1 more source
Network Function Virtualization (NFV) applications are stateful. For example, a Content Distribution Network (CDN) caches web contents from remote servers and serves them to clients. Similarly, an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS) have both per-flow and multi-flow (shared) states to properly react to intrusions ...
Ming-Wei Shih +3 more
openaire +1 more source
NFV-GUARD: Mitigating Flow Table-Overflow Attacks in SDN Using NFV
2021 IEEE 7th International Conference on Network Softwarization (NetSoft), 2021Software Defined Networking (SDN) has recently drawn attention by changing the network control paradigm. SDN devices handle the network traffic based on entries stored in their flow table. However, due to the flow table’s limited size, attacks such as DDoS can cause the table to overflow. Some of the current table overflow mitigation methods distribute
Mustafa Soylu +4 more
openaire +1 more source
SPaaS-NFV: Enabling Stream-Processing-as-a-Service for NFV
2018 IEEE 8th International Symposium on Cloud and Service Computing (SC2), 2018Network Function Virtualization (NFV) as new network paradigm provides an opportunity to accelerate network innovation in the next generation mobile network (MN). The monitoring, in this case, helps the analysis and gives better insights into the network function in real time.
Tseng, Yuchia +4 more
openaire +2 more sources
Network Functions Virtualization (NFV)
2021Network functions virtualization (NFV) is consolidating as one of the base technologies for the design, deployment, and operation of network services. NFV can be seen as a natural evolution of the trend to cloud technologies in IT, and hence perceived as bringing them to the network provider environments.
Diego R. Lopez, Pedro A. Aranda
openaire +1 more source
2017
The SDN and NFV architectures heavily rely on specific software modules executed at distributed nodes. These modules may act differently from their expected behaviour due to errors or attacks. Remote attestation is a procedure able to reliably report the software state of a node to a third party.
LIOY, ANTONIO +5 more
openaire +1 more source
The SDN and NFV architectures heavily rely on specific software modules executed at distributed nodes. These modules may act differently from their expected behaviour due to errors or attacks. Remote attestation is a procedure able to reliably report the software state of a node to a third party.
LIOY, ANTONIO +5 more
openaire +1 more source
Optimizing NFV deployment in Segment Routing
2021 16th Iberian Conference on Information Systems and Technologies (CISTI), 2021Segment Routing (SR) is an implementation of Software-Defined Networking (SDN) for traffic routing. It derives from a source routing paradigm where each node, at the network's periphery, adds a list of labels to the packet's header defining explicitly the path each traffic flow should follow to its destination. Each label is a segment that identifies a
Camaz, Gonçalo +3 more
openaire +2 more sources
NFV: Security Threats and Best Practices
IEEE Communications Magazine, 2017Network function virtualization (NFV) yields numerous benefits, particularly the possibility of a cost-efficient transition of telco hardware functionalities on the software platform to break the vendor lock-in problem. These benefits come at the price of some security flaws.
Taleb, Tarik +3 more
openaire +2 more sources
MC NFV: Molecular Communication NFV in 6G Networks
2022 IEEE 21st Mediterranean Electrotechnical Conference (MELECON), 2022Pit Hofmann +3 more
openaire +1 more source

