Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3185768.3186309acmconferencesArticle/Chapter ViewAbstractPublication PagesicpeConference Proceedingsconference-collections
research-article

The Vision of Self-aware Reordering of Security Network Function Chains

Published: 02 April 2018 Publication History

Abstract

Services provided online are subject to various types of attacks. Security appliances can be chained to protect a system against multiple types of network attacks. The sequence of appliances has a significant impact on the efficiency of the whole chain. While the operation of security appliance chains is currently based on a static order, traffic-aware reordering of security appliances may significantly improve efficiency and accuracy. In this paper, we present the vision of a self-aware system to automatically reorder security appliances according to incoming traffic. To achieve this, we propose to apply a model-based learning, reasoning, and acting (LRA-M) loop. To this end, we describe a corresponding system architecture and explain its building blocks.

References

[1]
A. Fischer. Performance evaluation for service function chains through automated model building. In 11th EAI International Conference on Performance Evaluation Methodologies and Tools (ValueTools'17), 2017.
[2]
S. Kounev, P. Lewis, K. L. Bellman, N. Bencomo, J. Camara, A. Diaconescu, L. Esterle, K. Geihs, H. Giese, S. Götz, et al. The notion of self-aware computing. In Self-Aware Computing Systems, pages 3--16. Springer, 2017.
[3]
M. Mechtri, C. Ghribi, and D. Zeghlache. A scalable algorithm for the placement of service function chains. IEEE Transactions on Network and Service Management, 13(3):533--546, Sept 2016.
[4]
A. F. Ocampo, J. Gil-Herrera, P. H. Isolani, M. C. Neves, J. F. Botero, S. Latré, L. Zambenedetti, M. P. Barcellos, and L. P. Gaspary. Optimal Service Function Chain Composition in Network Functions Virtualization, pages 62--76. Springer International Publishing, Cham, 2017.
[5]
P. Rygielski, M. Seliuchenko, and S. Kounev. Modeling and Prediction of Software-Defined Networks Performance using Queueing Petri Nets. In Proceedings of the Ninth International Conference on Simulation Tools and Techniques (SIMUTools 2016), pages 66--75, August 2016.
[6]
P. Rygielski, V. Simko, F. Sittner, D. Aschenbrenner, S. Kounev, and K. Schilling. Automated Extraction of Network Traffic Models Suitable for Performance Simulation. In Proceedings of the 7th ACM/SPEC International Conference on Performance Engineering (ICPE 2016), pages 27--35. ACM, March 2016.
[7]
T. N. Theis and H.-S. P. Wong. The end of moore's law: A new beginning for information technology. Computing in Science & Engineering, 19(2):41--50, 2017.
[8]
S. Thian-ngam and M. Lertwatechakul. False positive decrement for snort intrusion detection. Engineering and Applied Science Research, 36(3):251--259, 2012.
[9]
J. Walter, C. Stier, H. Koziolek, and S. Kounev. An Expandable Extraction Framework for Architectural Performance Models. In Proceedings of the 3rd International Workshop on Quality-Aware DevOps (QUDOS'17). ACM, April 2017.

Cited By

View all
  • (2023)Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer PerceptronFuture Internet10.3390/fi1502007615:2(76)Online publication date: 15-Feb-2023
  • (2023)Application Design of Data Security Pool System Based on Network Security Data Link Technology2023 8th International Conference on Information Systems Engineering (ICISE)10.1109/ICISE60366.2023.00095(419-423)Online publication date: 23-Jun-2023
  • (2020)Architecture for a Dynamic Security Service Function Chain Reordering Framework2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C)10.1109/ACSOS-C51401.2020.00064(232-233)Online publication date: Aug-2020
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
ICPE '18: Companion of the 2018 ACM/SPEC International Conference on Performance Engineering
April 2018
212 pages
ISBN:9781450356299
DOI:10.1145/3185768
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 April 2018

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. models at run-time
  2. network function virtualization
  3. service function chaining
  4. software-defined networking

Qualifiers

  • Research-article

Funding Sources

  • DFG
  • German Research Foundation (DFG)

Conference

ICPE '18

Acceptance Rates

Overall Acceptance Rate 252 of 851 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Effective and Efficient DDoS Attack Detection Using Deep Learning Algorithm, Multi-Layer PerceptronFuture Internet10.3390/fi1502007615:2(76)Online publication date: 15-Feb-2023
  • (2023)Application Design of Data Security Pool System Based on Network Security Data Link Technology2023 8th International Conference on Information Systems Engineering (ICISE)10.1109/ICISE60366.2023.00095(419-423)Online publication date: 23-Jun-2023
  • (2020)Architecture for a Dynamic Security Service Function Chain Reordering Framework2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C)10.1109/ACSOS-C51401.2020.00064(232-233)Online publication date: Aug-2020
  • (2020)Implementing Attack-aware Security Function Chain Reordering2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion (ACSOS-C)10.1109/ACSOS-C51401.2020.00055(194-199)Online publication date: Aug-2020
  • (2019)Performance Influence of Security Function Chain OrderingCompanion of the 2019 ACM/SPEC International Conference on Performance Engineering10.1145/3302541.3311965(45-46)Online publication date: 27-Mar-2019

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media