The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
On behalf of the Technical Program Committee, it is our pleasure to welcome you to the IEEE Conference on Network Function Virtualization and Software Defined Networking, in Palo Alto, CA, USA.
The Software-Defined Networking (SDN) paradigm has introduced a set of resources that can be employed to design new services and applications for the next generation of network technologies. Despite all the benefits provided by the SDN approach, the management of the infrastructure remains an unsolved challenge since it is necessary to provide the appropriate tools to ensure a reliable and effective...
Service Function Chaining (SFC) defines the concept of linking ordered Service Functions (SFs) through network technologies to support specific application requirements. SFC exploits Software Defined Networking (SDN) and Network Function Virtualization (NFV) technologies to achieve the creation, modification and deletion of SFC in a cost efficient and rapid way. However, during the runtime phase,...
Orchestration across multiple domains is important for providing end-to-end services in software defined infrastructures. In this paper, we address the service function chain (SFC) mapping problem in a multi-domain network with nodes having different functions, i.e., service functions and/or switch functions. We present two different abstractions of the topology graph at the distributed orchestrators...
Future network services and applications, such as coordinated remote driving or remote surgery, pose serious challenges on the underlying networks. In order to fulfill the extremely low latency requirement in combination with ultrahigh availability and reliability, we need novel approaches, for example to dynamically move network “capabilities” close to the users. This requires more flexibility, automation...
The evolution towards the Fifth Generation (5G) mobile networks will be characterized by ubiquitous connectivity, superior user experience, stringent reliability requirements and efficient management of a massive number of devices. These characteristics will lead to a growth of diverse services and business models, which will increase the service complexity. In order to meet the needs of future networks,...
Modern network functions (NFs) are able to scale out conveniently with the help of network function virtualization (NFV). When network traffic rises, NFV can provide more instances easily for migrating network flows to new instances to balance the traffic on the existing ones. However, the main challenge is to select which subset of existing flows to migrate when scale out, minimizing the negative...
Software Defined Networking (SDN) is a paradigm shift that changes the working principals of IP networks by separating the control logic from routers and switches, and logically centralizing it within a controller. While having a centralized controller as a single point of failure creates an added vulnerability from a network security viewpoint, it also creates an opportunity to offer a whole range...
The challenging traits of 5G networks to support novel and diverse business requirements of vertical sectors have rendered current network security approaches impotent. To address various security requirements of 5G networks and services, a holistic and robust security architecture mindful of 5G technical and business features becomes vital. This paper describes a holistic security architecture for...
In this paper, we coin the term Policy Enforcement as a Service (PEPS), which enables the provision of innovative inter-layer and inter-domain Access Control. We leverage the architecture of Software-Defined-Network (SDN) to introduce a common network-level enforcement point, which is made available to a range of access control systems. With our PEPS model, it is possible to have a ‘defense in depth’...
Controllers for software defined networks (SDNs) are quickly maturing to offer network operators more intuitive programming frameworks and greater abstractions for network application development. Likewise, many security solutions now exist within SDN environments for detecting and blocking clients who violate network policies. However, many of these solutions stop at triggering the security measure...
Traditional firewalls are used to enforce network security policies at boundaries within a network. However, this can leave hosts vulnerable to attacks that originate from within the network they are part of. We leverage the flexibility of Software Defined Networking to turn the network infrastructure into a virtual firewall thus improving security across an entire network. We present ACLSwitch, a...
The significance of anomaly detection is increasing as a result of the rapid increase in unknown attacks. With the increase in deployment of scalable web services, there is a need for developing a scalable anomaly detection mechanisms. In this paper, we propose a scalable anomaly-based Bot Detection Architecture (BotD) in which different anomaly-based bot detection algorithms can be implemented. Our...
With an increase in the number of mobile users and traffic, mobile network operators are finding it difficult to scale their radio and core networks. Further, hardware network appliances are expensive to procure and upgrade, and are difficult to adapt and program for new services. These trends have recently spurred several efforts to redesign various components of mobile networks, including the LTE...
This paper proposes, implements, and evaluates VirtPhy, a novel approach to build small-scale data centers network infrastructure for network functions virtualisation (NFV). VirtPhy is fully programmable to respond to NFV stringent demands related to throughput, latency, cost, rapid innovation, and efficient orchestration. An 8-node testbed demonstrates its key enabling mechanisms, which are programmed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.