2017
DOI: 10.1155/2017/9534754
|View full text |Cite
|
Sign up to set email alerts
|

A New Approach for Delivering Customized Security Everywhere: Security Service Chain

Abstract: Security functions are usually deployed on proprietary hardware, which makes the delivery of security service inflexible and of high cost. Emerging technologies such as software-defined networking and network function virtualization go in the direction of executing functions as software components in virtual machines or containers provisioned in standard hardware resources. They enable network to provide customized security service by deploying Security Service Chain (SSC), which refers to steering flow throug… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0
4

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(10 citation statements)
references
References 30 publications
(47 reference statements)
0
6
0
4
Order By: Relevance
“…Namely, the authors of [13] tackled the problem of efficient Security Service Chain (SSC) deployment. A SSC is an ordered set of security functions composing a logical security service.…”
Section: Related Workmentioning
confidence: 99%
“…Namely, the authors of [13] tackled the problem of efficient Security Service Chain (SSC) deployment. A SSC is an ordered set of security functions composing a logical security service.…”
Section: Related Workmentioning
confidence: 99%
“…To further demonstrate the effectivity of the proposed PSO algorithm, we compare our proposed algorithm with three other algorithms, and the compared approaches are all implemented in MATLAB. Since our proposed PSO algorithm consists of three parts, i.e., k-Dijkstra algorithm, the security level selection algorithm and the VSNF embedding algorithm, we combine some previous classical algorithms (e.g., greedy biased approaches [22], tabu search (TS)-based approach [32]) to generate the other three algorithms. The details are as follows.…”
Section: B Results and Discussionmentioning
confidence: 99%
“…The authors also demonstrate the effectivity the novel architecture. Liu et al [32] propose an SDN/NFV-enabled SSC orchestration architecture. Based on the architecture, the authors further present a meta-heuristic-based Tabu search algorithm, which aims to minimize the end-to-end delay and security resource cost.…”
Section: Security-driven Sfc Resource Allocationmentioning
confidence: 99%
See 1 more Smart Citation
“…Literatürdeki çalışmalarda, VNSF yerleştirme problemi için [3,7] çoğunlukla, yerleştirilen VNSF sayısı [8][9][10], bant genişliği [11][12][13] ve linklerin sayısı [14][15][16] gibi parametrelerin bir kombinasyonu olarak tanımlanan maliyetin [16][17][18] en aza indirgenmesi hedeflenmiştir. Fakat VNSF yerleştirme probleminde ele alınması gereken en önemli operasyonel amaçlardan biri, ağdaki enerji tüketiminin minimize edilmesidir.…”
Section: Gi̇ri̇ş (Introduction)unclassified