Machine learning algorithms for enhancing intrusion detection within SDN/NFV

A Sahbi, F Jaidi, A Bouhoula - 2023 International Wireless …, 2023 - ieeexplore.ieee.org
Emerging networks envisage to establish a modern digital society that tends to be more
valuable on both social and economic levels. The objective is to resolve current network …

Cost optimization in security-aware service function chain deployment with diverse vendors

D Zheng, X Liu, W Tang, H Xu… - GLOBECOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Frequent cyber-attacks force the service provider to employ security-aware service functions
(SFs) to accommodate client network requests. Thanks to virtualization techniques' maturity …

Utilization of Mobile Network Infrastructure to Prevent Financial Mobile Application Account Takeover

A Prayogi, RF Aji - Jurnal RESTI (Rekayasa Sistem dan Teknologi …, 2023 - jurnal.iaii.or.id
The Covid-19 pandemic has kept almost everyone at home and forced them to perform
online activities using their mobile gadgets. Penetration of the Internet and mobile use is …

Offline and Real-Time Policy-based Management for Virtualized Services: Conflict and Redundancy Detection, and Automated Resolution

H Suwi, N Kara, OA Wahab, C Edstrom… - Journal of Network and …, 2024 - Springer
Abstract Network Function Virtualization (NFV) is a new technology that allows service
providers to improve the cost efficiency of network service provisioning. This is …

Efficient SFC Protection Method against Network Attack Risks in Air Traffic Information Networks

Y Yang, B Wang, J Tian, P Luo - Electronics, 2024 - search.proquest.com
With the continuous development of the civil aviation industry toward digitalization and
intelligence, the closed architecture of traditional air traffic information networks struggles to …

The State of Security in Sdn, Nfv, and Network Slicing

AK Alnaim, EB Fernandez - Nfv, and Network Slicing, 2023 - papers.ssrn.com
Abstract 5G, the current generation of communication networks is based on the stan-dards
deftned by 3GPP and other organizations (ETSI, ENISA, NGNM). These standards deftne …

Security and Privacy Issues in Network Function Virtualization: A Review from Architectural Perspective.

B Zahran, N Ahmed, AR Alzoubaidi… - … Journal of Advanced …, 2024 - search.ebscohost.com
Abstract Network Function Virtualization (NFV) delivers numerous benefits to customers
since it is a cost-effective evolution of legacy networks, allowing for rapid network …

Insight Into the Architecture and Technology of Smart Identifier Networks

Z Fan - Proceedings of the 3rd International Conference on …, 2024 - eudl.eu
The traditional Internet adopts a host-centric data transmission mode, and data are
repeatedly transmitted between different computers, resulting in vast network traffic and low …

A Method for DDOS Attacks Prevention Using SDN and NFV

MJ Shayegan, A Damghanian - 2023 - researchsquare.com
One of the most widespread forms of security attacks in enterprise networks is Distributed
Denial-of-Service (DDOS) attacks. The purpose of DDOS attacks is to intentionally disrupt a …

Efficient Zero-Trust-enabled Service Function Chain Deployment in Multi-Vendor Networks

D Zheng, H Xing, X Cao, J Xu - techrxiv.org
With the advent of zero trust (ZT) security architectures, vendors can bolster their services'
security by continuously verifying every end-to-end traffic flow through the policy …