2019
DOI: 10.1109/access.2019.2944982
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Construction of Service Function Chains Based on Security Level for Improving Network Security

Abstract: In this paper, in order to improve network security, we propose an optimal placement of security virtual network function (security VNF) for service function chains based on the security level. In this method, an optimization problem is formulated for constructing service function chains based on the security level, and its near-optimal solution is derived with genetic algorithm. From the derived solution, security VNFs are placed to satisfy the security level of each service function chaining and many service… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(3 citation statements)
references
References 33 publications
0
3
0
Order By: Relevance
“…The following QoS-based composition methods were compared by performance: ILP (integer linear programming model): This is the typical global optimization method with all service competitors represented in it (Lodi & Nagarajan, 2019). GA: In this method, service compositions are generated by the GA with all services (Dwiardhika & Tachibana, 2019). KS: This signifies the K-means method used with Skyline service candidates (Kumar & Purohit, 2016).…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…The following QoS-based composition methods were compared by performance: ILP (integer linear programming model): This is the typical global optimization method with all service competitors represented in it (Lodi & Nagarajan, 2019). GA: In this method, service compositions are generated by the GA with all services (Dwiardhika & Tachibana, 2019). KS: This signifies the K-means method used with Skyline service candidates (Kumar & Purohit, 2016).…”
Section: Discussionmentioning
confidence: 99%
“…To finding the best answer to the QoS-based service composition problem, some methods can be used, such as Integer linear programming (ILP) techniques, called an optimization algorithm (Liang et al, 2019;Lodi & Nagarajan, 2019;Wang et al, 2019). But some heuristic methods like a genetic algorithm (GA) can be used, known as an approximation algorithm (Dwiardhika & Tachibana, 2019).…”
Section: Related Workmentioning
confidence: 99%
“…Liu et al [10] proposed a system architecture solution that uses SDN and NFV to control virtualized security resources for security service function chain construction. Dwiardhika and Tachibana [11] proposed an optimal placement of security virtual network functions for the security service function chains based on the security level. Shameli-Sendi et al [12] proposed a security approach for cloud infrastructure that incorporates the best practice, know-how of the security experts, and various security constraints into a network security pattern.…”
Section: The Related Workmentioning
confidence: 99%