2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS) 2018
DOI: 10.1109/padsw.2018.8644566
|View full text |Cite
|
Sign up to set email alerts
|

Virtualized Security Function Placement for Security Service Chaining in Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…The authors of [10] proposed a placement scheme of virtual security network functions considering both performance optimization and security aspects. The authors of [11] introduced a potential resolution to the issue of placing virtualized security functions in security service chaining within cloud environments. The authors of [12] proposed a mathematical model for optimally placing virtualized network functions at the edge, considering network security and operator's best practices.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The authors of [10] proposed a placement scheme of virtual security network functions considering both performance optimization and security aspects. The authors of [11] introduced a potential resolution to the issue of placing virtualized security functions in security service chaining within cloud environments. The authors of [12] proposed a mathematical model for optimally placing virtualized network functions at the edge, considering network security and operator's best practices.…”
Section: Related Workmentioning
confidence: 99%
“…Building upon their previous work, the authors [18] proposed an RL-based detection model that processes V2X data broadcast by vehicles as time series at the roadside units. However, the studies in [10][11][12][13] are based on traditional optimization techniques, which have difficulty scaling for NP-Hard problems since their calculation time grows exponentially, rendering them unsuitable for real-time use. In addition, the works in [14][15][16] did not consider security service orchestration in the context of 5G-V2X and network slicing.…”
Section: Related Workmentioning
confidence: 99%