Machine learning-based anomaly detection in NFV: A comprehensive survey

S Zehra, U Faseeha, HJ Syed, F Samad, AO Ibrahim… - Sensors, 2023 - mdpi.com
Network function virtualization (NFV) is a rapidly growing technology that enables the
virtualization of traditional network hardware components, offering benefits such as cost …

Microservice security: a systematic literature review

D Berardi, S Giallorenzo, J Mauro, A Melis… - PeerJ Computer …, 2022 - peerj.com
Microservices is an emerging paradigm for developing distributed systems. With their
widespread adoption, more and more work investigated the relation between microservices …

Technological transformation of telco operators towards seamless iot edge-cloud continuum

K Oztoprak, YK Tuncel, I Butun - Sensors, 2023 - mdpi.com
This article investigates and discusses challenges in the telecommunication field from
multiple perspectives, both academic and industry sides are catered for, surveying the main …

[PDF][PDF] Analyzing challenging aspects of IPv6 over IPv4

S Ashraf, D Muhammad, Z Aslam - J. Ilm. Tek. Elektro Komput. Dan …, 2020 - eprints.uad.ac.id
The exponential expansion of the Internet has exhausted the IPv4 addresses provided by
IANA. The new IP edition, ie, IPv6 introduced by IETF with new features such as a simplified …

[HTML][HTML] A dynamic and scalable parallel Network Intrusion Detection System using intelligent rule ordering and Network Function Virtualization

H Haugerud, HN Tran, N Aitsaadi, A Yazidi - Future Generation Computer …, 2021 - Elsevier
Abstract A Network Intrusion Detection System (NIDS) is a fundamental security tool.
However, under heavy network traffic, a NIDS might become a bottleneck. In an overloaded …

Towards a security reference architecture for NFV

AK Alnaim, AM Alwakeel, EB Fernandez - Sensors, 2022 - mdpi.com
Network function virtualization (NFV) is an emerging technology that is becoming
increasingly important due to its many advantages. NFV transforms legacy hardware-based …

A path selection scheme for detecting malicious behavior based on deep reinforcement learning in SDN/NFV-Enabled network

M Li, S Deng, H Zhou, Y Qin - Computer Networks, 2023 - Elsevier
The SDN/NFV network is prone to different types of attacks. The Distributed Denial of
Service (DDoS) attack has the most severe impact as it can overwhelm the critical …

Meta Relational Learning-Based Service-Tailored VNF Deployment for B5G Network Slice

Z Xu, L Zhuang, W Zhuang, Y Hu… - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
To bring 5G systems and networks to life in large-scale commercial applications, academia
community has started the research beyond 5G (B5G), in which network slicing (NS) is …

Parallel path selection mechanism for DDoS attack detection

M Li, H Zhou, S Deng - Journal of Network and Computer Applications, 2024 - Elsevier
DDoS attack have always been a polular topic in the field of network security. As an
emerging networking paradigm, SDN's characteristics such as centralized control and …

Performance benchmarking of virtualized network functions to correlate key performance metrics with system activity

Y Sharma, MG Khan, J Taheri… - 2020 11th International …, 2020 - ieeexplore.ieee.org
Industry is set to enter in a new revolution (Industry 4.0) backed by high inter-connectivity.
Therefore, leveraging virtualization technology to deploy networks as virtualized network …