scholarly journals An Overview on SDN and NFV Security Orchestration in Cloud Network Environment

2021 ◽  
Vol 5 (1) ◽  
pp. 20-27
Author(s):  
Israa T. Aziz ◽  
Ihsan H. Abdulqadder

Cloud networks are being used in most industries and applications in the current era. Software-defined networking has come up as an alternative tool and mechanism to follow and implement in a cloud networking environment in place of the traditional networking approaches. This paper includes the security aspects of computer networking concerning the cloud networking environment and software-defined networks. The security risks and vulnerabilities have been listed and described in this work, and the measures that may be adapted to detect, prevent, and control the same. The use of figures, diagrams, and codes has been done as applicable.

Web Services ◽  
2019 ◽  
pp. 1762-1789
Author(s):  
Harilaos Koumaras ◽  
Christos Damaskos ◽  
George Diakoumakos ◽  
Michail-Alexandros Kourtis ◽  
George Xilouris ◽  
...  

This chapter discusses the evolution of the cloud computing paradigm and its applicability in various sections of the computing and networking/telecommunications industry, such as the cloud networking, the cloud offloading, and the network function virtualization. The new heterogeneous virtualized ecosystem that is formulated creates new needs and challenges for management and administration at the network part. For this purpose, the approach of Software-Defined Networking is discussed and its future perspectives are further analyzed.


Web Services ◽  
2019 ◽  
pp. 1007-1047
Author(s):  
Qi Wang ◽  
James Nightingale ◽  
Jose M. Alcaraz-Calero ◽  
Chunbo Luo ◽  
Zeeshan Pervez ◽  
...  

Mobile video applications have started to dominate the global mobile data traffic in recent years, and both opportunities and challenges have arisen when the emerging mobile cloud paradigm is introduced to support the resource-demanding video processing and networking services. This chapter offers in-depth discussions for content- and context-aware, adaptive, robust, secure, and real-time video applications in mobile cloud networks. The chapter describes and analyses the essential building blocks including the state-of-the-art technologies and standards on video encoding, adaptive streaming, mobile cloud computing, and resource management, and the associated security issues. The focus is context-aware adaptive streaming based on the latest video coding standard H.265 in the context of Internet-centric mobile cloud networking. Built upon selected building blocks underpinned by promising approaches and emerging standards, an integrated architecture is proposed towards achieving next-generation smart video streaming for mobile cloud users, with future research directions in this field identified.


Author(s):  
Sujitha S. ◽  
Manikandan M. S. K. ◽  
Ashwini G.

Designing and organizing networks has become extra innovative over the past few years with the assistance of SDN (software-defined networking). The software implements network protocols that undergo years of equivalence and interoperability testing. Software-defined networking (SDN) is a move toward computer networking that allows network administrators to programmatically initialize, manage, alter, and direct network behavior dynamically through open interfaces and abstraction of lower-level functionality. SDN controller is an application in software-defined networking (SDN) that manages run control to permit clever networking. SDN controllers are based on protocols, such as OpenFlow, that permit servers to inform switches where to send packets. This chapter explores SDN controllers.


Author(s):  
Oleksandr Klevtsov ◽  
Artem Symonov ◽  
Serhii Trubchaninov

The chapter is devoted to the issues of cyber security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPP). The authors examined the main types of potential cyber threats at the stages of development and operation of NPP I&C systems. Examples of real incidents at various nuclear facilities caused by intentional cyber-attacks or unintentional computer errors during the maintenance of the software of NPP I&C systems are given. The approaches to vulnerabilities assessment of NPP I&C systems are described. The scope and content of the assessment and periodic reassessment of cyber security of NPP I&C systems are considered. An approach of assessment to cyber security risks is described.


Author(s):  
Ekaterina Pshehotskaya ◽  
Oleg Mikhalsky

This article is concerned with the arising problems and implications of physical security and privacy of personal and control data on portable computer devices, especially smartphones. The authors consider various classifications of portable computer devices, isolate smartphones as a most common device, and study types of user behavior regarding the involved security risks of unauthorized access to the data stored both locally and remotely with accent of physical data access via device theft. Based on provided categorization the researchers discuss the factors and criteria suitable to generalize user patterns and evaluate the corresponding vulnerability level against specified statistics. The considered statistical criteria can be formulated as a mathematical model of relative risks and implemented as a service or an application to be used for improving user awareness on current threats to his personal data and respective interconnected personal portable devices.


Author(s):  
Christos Bouras ◽  
Anastasia Kollia ◽  
Andreas Papazois

This article describes how novel functionalities will take advantage of the cloud networking and will gradually replace the existing infrastructure of mobile networks with a virtualized one. Two technologies, namely software defined networking (SDN) and network function virtualization (NFV), offer their important benefits and a combination of them is an answer to the demands raised, such as central office re-architected as a data center (CORD). Open network operating system (ONOS) and POX are SDN controllers and offer an option to combine SDN and NFV addressing many ongoing problems in the field of mobile networks. In this paper, technologies and both controllers are compared and contrasted. Indicative cases of topologies are simulated and help evaluating both controllers. According to the experimental findings, ONOS is one of the most important controllers for practical, theoretical, research and educational purposes, while POX is a useful and simpler controller for other educative applications.


2020 ◽  
Vol 38 ◽  
pp. 222-232
Author(s):  
Osamu Takaki ◽  
Ichiro Suzuta ◽  
Kota Torikai ◽  
Yuichiro Saito ◽  
Tsuyoshi Kato ◽  
...  

A "whitelist network switch (WLS)", which can monitor and filter packets based on a whitelist, is particularly effective for stronger information security in closed network environments, such as in factories. This paper focuses on the base network environment for a nurse call system within a large hospital. This network environment is of particular importance to security, and the types of network protocols used are limited. We note important points regarding the practical operation and effectiveness of WLS through two approaches: (i) test introduction into an existing, actual hospital network system; (ii) test introduction in an experimental nurse call system environment.


Sign in / Sign up

Export Citation Format

Share Document