Scalable Network Diversity Modeling For Assessing Threats in Cloud Networks

Author(s):  
Sachin Shetty ◽  
Xuebiao Yuchi ◽  
Min Song
2007 ◽  
Author(s):  
Nichole Thompson ◽  
Tim Abraham ◽  
Ray Parr ◽  
Ryan Halley ◽  
Kate Lachowsky ◽  
...  

Author(s):  
Nicolae Paladi ◽  
Marco Tiloca ◽  
Pegah Nikbakht Bideh ◽  
Martin Hell

Author(s):  
Ankur Chowdhary ◽  
Abdulhakim Sabur ◽  
Dijiang Huang ◽  
James Kirby ◽  
M. Kang

IEEE Access ◽  
2021 ◽  
pp. 1-1
Author(s):  
Andrews O. Nyanteh ◽  
Maozhen Li ◽  
Maysam Abbod ◽  
Hamed Al-Raweshidy

Author(s):  
Shingo Takada ◽  
Akira Sato ◽  
Yasushi Shinjo ◽  
Hisashi Nakai ◽  
Akiyoshi Sugiki ◽  
...  
Keyword(s):  

IEEE Access ◽  
2021 ◽  
Vol 9 ◽  
pp. 115839-115854 ◽  
Author(s):  
Jude Okwuibe ◽  
Juuso Haavisto ◽  
Ivana Kovacevic ◽  
Erkki Harjula ◽  
Ijaz Ahmad ◽  
...  

2021 ◽  
Vol 13 (1) ◽  
pp. 12
Author(s):  
Juan Wang ◽  
Yang Yu ◽  
Yi Li ◽  
Chengyang Fan ◽  
Shirong Hao

Network function virtualization (NFV) provides flexible and scalable network function for the emerging platform, such as the cloud computing, edge computing, and IoT platforms, while it faces more security challenges, such as tampering with network policies and leaking sensitive processing states, due to running in a shared open environment and lacking the protection of proprietary hardware. Currently, Intel® Software Guard Extensions (SGX) provides a promising way to build a secure and trusted VNF (virtual network function) by isolating VNF or sensitive data into an enclave. However, directly placing multiple VNFs in a single enclave will lose the scalability advantage of NFV. This paper combines SGX and click technology to design the virtual security function architecture based on multiple enclaves. In our design, the sensitive modules of a VNF are put into different enclaves and communicate by local attestation. The system can freely combine these modules according to user requirements, and increase the scalability of the system while protecting its running state security. In addition, we design a new hot-swapping scheme to enable the system to dynamically modify the configuration function at runtime, so that the original VNFs do not need to stop when the function of VNFs is modified. We implement an IDS (intrusion detection system) based on our architecture to verify the feasibility of our system and evaluate its performance. The results show that the overhead introduced by the system architecture is within an acceptable range.


Sign in / Sign up

Export Citation Format

Share Document