Network Functions Virtualization (NFV) is transforming the way in which network operators acquire and manage network services. By using virtualization technologies to move packet processing from dedicated hardware to software, NFV has introduced a new market focused on the offer and distribution of Virtual Network Functions (VNF). Infrastructure Providers (InP) can benefit from an NFV market by providing their infrastructures to fulfill demands of end-users that, in turn, acquire VNFsas-a-Service (VNFaaS). In this context, solutions that promote the competition between InPs can lead to lower prices, while increasing VNF performance to accommodate specific demands of end-users. In this paper, BRAIN, a blockchain-based reverse auction is presented to introduce an auditable solution in which InPs can compete to host VNFs taking into account the demands of each particular end-user. Such a solution helps reduce costs involved in VNF's commercialization and also monetize NFVenabled infrastructures. BRAIN is supported by a case study that provides evidence of the solution's feasibility and effectiveness. A discussion regarding blockchain advantages and drawbacks in this use-case (e.g., , additional costs and time) concludes this paper.
Em primeiro lugar, gostaria de agradecer à minha família, a qual é a base de tudo. Ao meu pai e minha mãe, que são exemplo a serem seguidos de integridade, perseverança, honestidade, trabalho duro e por me ensinarem que o estudo é uma fundação essencial no crescimento do indivíduo. Ao meu irmão, companheiro desde sempre, exemplo de dedicação e que sempre torceu por mim e pelo Internacional :). A minha namorada, que esteve presente em todos os momentos, bons ou ruins e sempre acreditou em mim. Sem vocês nunca teria chegado até aqui. Obrigado! Gostaria de também agradecer ao meu orientador, Lisandro, que durante todo o decorrer de meu mestrado contribuiu com diversos elementos essenciais para a conclusão desta dissertação, oportunidades e pela valiosa orientação tanto acadêmica e pessoal. Destaco as reuniões e encontros que foram fonte de esclarecimento para problemas de pesquisa e para indicar a direção na qual seguir durante toda minha formação. Meus agradecimentos ao corpo docente e técnicos administrativos da Universidade Federal do Rio Grande do Sul (UFRGS), em especial aos professores das disciplinas que cursei durante o mestrado, obrigado pelos ensinamentos. Estendo meus agradecimentos à todo o grupo de Redes de Computadores do Instituto de Informática da UFRGS, grupo que mais que colegas, se tornaram amigos. Expresso minha gratidão ao Lab. 210 pela fiel parceria, amizade, e churrascos durante estes dois anos, em especial ao Cristian Machado (Batman), Muriel Franco (Mumu), Ricardo Pfitscher (Tocaio) e Ricardo Santos (Ricardão) pelas múltiplas contribuições nos artigos e nesta dissertação. Valeu, gurizada! Uma menção à todos meus amigos que estão do meu lado até hoje, desde o ensino fundamental, ensino médio e graduação. Espero que toda a amizade que temos continue se perpetuando. Por fim, obrigado à todos as pessoas, departamentos e órgãos federais que contribuíram de alguma maneira, direta ou indireta, para minha formação. "Desire to know why, and how, curiosity; such as is in no living creature but man: so that man is distinguished, not only by his reason, but also by this singular passion from other animals; in whom the appetite of food, and other pleasures of sense, by predominance, take away the care of knowing causes; which is a lust of the mind, that by a perseverance of delight in the continual and indefatigable generation of knowledge, exceedeth the short vehemence of any carnal pleasure".-THOMAS HOBBES-LEVIATHAN.
Cyberattacks are the cause of several damages on governments and companies in the last years. Such damage includes not only leaks of sensitive information, but also economic loss due to downtime of services. The security market size worth billions of dollars, which represents investments to acquire protection services and training response teams to operate such services, determines a considerable part of the investment in technologies around the world. Although a vast number of protection services are available, it is neither trivial for network operators nor endusers to choose one of them in order to prevent or mitigate an imminent attack. As the next-generation cybersecurity solutions are on the horizon, systems that simplify their adoption are still required in support of security management tasks. Thus, this paper introduces MENTOR, a support tool for cybersecurity, focusing on the recommendation of protection services. MENTOR is able to (a) to deal with different demands from the user and (b) to recommend the adequate protection service in order to provide a proper level of cybersecurity in different scenarios. Four similarity measurements are implemented in order to prove the feasibility of the MENTOR's engine. An evaluation determines the performance and accuracy of each measurement used during the recommendation process.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.