2018 Fourth International Conference on Mobile and Secure Services (MobiSecServ) 2018
DOI: 10.1109/mobisecserv.2018.8311440
|View full text |Cite
|
Sign up to set email alerts
|

An evaluation of a virtual network function for real-time threat detection using stream processing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 15 publications
(8 citation statements)
references
References 13 publications
0
7
0
1
Order By: Relevance
“…Another strategy that relies on artificial intelligence is Reference , which proposes a virtualized network function (VNF) that implements a distributed stream processing technique for real‐time threat detection. The proposed VNF presents auto‐scaling properties and is empirically shown to be able to process up to 5 million messages per second.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Another strategy that relies on artificial intelligence is Reference , which proposes a virtualized network function (VNF) that implements a distributed stream processing technique for real‐time threat detection. The proposed VNF presents auto‐scaling properties and is empirically shown to be able to process up to 5 million messages per second.…”
Section: Related Workmentioning
confidence: 99%
“…SPE's have been applied to sensor networks, the analysis of TCP flows, network intrusion detection . Multiple, diverse strategies for traffic anomaly detection have been proposed: machine learning, expert systems, rule mining, NFV technology, besides the strategy implemented in the present work which is the usage of entropy and PCA to detect traffic anomalies by monitoring the network traffic as a whole . It is possible to say that the major contribution of the present work is to employ an SPE extended with the operators to compute traffic entropy and PCA of the network as a whole in real time.…”
Section: Related Workmentioning
confidence: 99%
“…Beyond the autonomics domain, the intrusion detection/prevention through the usage of Virtual Network Functions (VNF) is a hot topic nowadays. Thereby, virtualized network nodes and functions are distributed across the network infrastructure and equipped with the belonging intelligence and logic as to automatically and collaboratively monitor, identify and block network attacks and anomalies [27] [28]. [29] proposes a framework for the trusted and authorized distribution of shortlived VNF based firewalls in a distributed network infrastructure.…”
Section: Related Workmentioning
confidence: 99%
“…In a previous work, we evaluated the performance of our monitoring system as a virtual network function. Results show that our virtual network function can scale and migrate during traffic overload.…”
Section: Introductionmentioning
confidence: 99%