Although there is a lot of interest in cloud computing, security concerns have prevented it from becoming mainstream. Users of cloud services frequently worry about the loss of data, the compromise of security, and th...
详细信息
Although there is a lot of interest in cloud computing, security concerns have prevented it from becoming mainstream. Users of cloud services frequently worry about the loss of data, the compromise of security, and the unavailability of the services at important moments. Security applications that employ learning-based solutions are gaining attraction in the literature thanks to recent advancements. However, the most challenging aspect of these approaches is the objective datasets. Numerous internal datasets are off-limits for public usage for various reasons, including privacy and the possibility of missing statistical information. Even though there is some lacking, researchers are using these datasets for training and testing in experimental settings. Using a single dataset to train a machine learning model often produces misleading findings. How well these models perform when applied to data from a variety of sources and contexts is an open question, although it hasn’t been thoroughly explored in the literature. As, cloud problems are unique, therefore it is crucial to evaluate the performance of these models over a wide range of circumstances. To train the supervised machine learning models used in this research, we make use of the dataset made available by UNSW. For evaluating the performance of these models, we have used the ISOT dataset.
Edge computing emerges as a new paradigm to provide low-latency network services in close proximity to end users. Based on the network function virtualization (NFV) technology, network services can be flexibly and sca...
详细信息
Edge computing emerges as a new paradigm to provide low-latency network services in close proximity to end users. Based on the network function virtualization (NFV) technology, network services can be flexibly and scalably provisioned as virtual networkfunction (VNF) chains deployed at edge servers. With such advantages, both the industry and research communities have done extensive studies on deploying VNF chains at network edge. The existing works mainly take an ideal assumption that the network is totally safe and there are no malicious users. Therefore, they leverage all available resources to serve their users. However, such an assumption is impractical in real networks. Security services, such as firewall, deep packet detection, intrusion detection, are always required for production networks. The existing service deployment methods fail to consider the co-existence of security services and functionality services. In this paper, we present the topic of joint deployment of both security and functionality services, wherein the security services are responsible to check the data flows before being processed by the functionality services. To solve this problem, we propose the Secure Deployment Pattern, which aims to simultaneously satisfy the security protection and QoS requirements at network edge. It divides the services into two kinds, i.e., the user-oriented functionality services, and the service provider-oriented security services. In this case, it is very challenging to jointly deploy the security services and functional services with respect to the resource and latency constraints. We formulate this problem as an integer programming model, and propose the heuristic algorithms to solve it. As far as we know, this paper is the first step, which targets at a proper orchestration of security and functionality services in edge computing. Extensive evaluations show that the proposed algorithms are effective and efficient, in terms of the execution time and the
network slicing is one of the core features of the 5G network to meet the requirements of various network services, namely, enhanced Mobile Broadband (eMBB), ultra Reliable Low Latency Communications (uRLLC), and mass...
详细信息
network function virtualization (NFV) aims at satisfying various performance requirements of network services and increasing the performance/cost ratio mostly by decoupling software and hardware. However, network oper...
详细信息
The deployment of network function virtualization (NFV) in fog networks allows network providers to offer dynamic, delay-sensitive services on top of general purpose hardware. A key challenge is the provisioning of se...
详细信息
the wide application of 5G technology is changing our production and life. Power grid enterprise is regarded as the basic support for the development of the national economy. The power grid is important. Power communi...
详细信息
The emergency of machine type and ultra-reliable low latency communication is imposing stringent constraints for service provisioning. Addressing such constraints is challenging for network and cloud service providers...
详细信息
The emergency of machine type and ultra-reliable low latency communication is imposing stringent constraints for service provisioning. Addressing such constraints is challenging for network and cloud service providers. As a trending paradigm, software-defined networking (SDN) plays a significant role in future networks and services. However, the classical implementation of the SDN controller has limitations in-terms-of latency and reliability since the controller is decoupled from the forwarding device. Several research works have tried to tackle these challenges by proposing solutions such as Devoflow, DIFANE, and hierarchical and distributed controller deployment. Nonetheless, these approaches are not fully addressing these challenges. This paper tries to address the problem of latency and reliability by proposing a dynamic controller role delegation architecture for forwarding devices. To align with the microservice or multi-agent-based service-based architecture, the role delegation function as a service is proposed. The dynamic role delegation enables to predict and (pre-)installed flow rules in the forwarding devices based on various considerations such as network state, packet type, and service's stringent requirements. The proposed architecture is implemented and evaluated for latency and resiliency performance in comparison to the centralized and distributed deployment of the SDN controller. We used ComNetsEmu, a softwarized network emulation tool, to emulate SDN and NFV (network function virtualization). The result indicated a significant decrease in latency and improved resilience in case of failure, yielding better network performance.
network function virtualization (NFV) and software-defined network (SDN) have become emerging network paradigms, allowing virtualized networkfunction (VNF) deployment at a low cost. Even though VNF deployment can be ...
详细信息
network softwarization helps operators deliver new services and deploys new functions more efficiently, so as to meet the needs of ever-increasing and diverse users. Many studies have shown that network softwarization...
详细信息
network function virtualization (NFV) and Software Defined networks (SDN) do not leave any legacy network services untouched. This work will present how Proxy Mobile IPv6 (PMIPv6) can evolve to the cloud. Our approach...
详细信息
暂无评论