Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/3123878.3131970acmconferencesArticle/Chapter ViewAbstractPublication PagescommConference Proceedingsconference-collections
demonstration
Free access

SDN/NFV-enabled Security Architecture for Fine-grained Policy Enforcement and Threat Mitigation for Enterprise Networks

Published: 22 August 2017 Publication History

Abstract

No abstract available.

References

[1]
M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker. Ethane: Taking control of the enterprise. SIGCOMM Comput. Commun. Rev., 37(4):1--12, Aug. 2007.
[2]
N. Gray, C. Lorenz, A. Müssig, S. Gebert, T. Zinner, and P. Tran-Gia. A priori state synchronization for fast failover of stateful firewall vnfs. In Workshop on Software-Defined Networking and Network Function Virtualization for Flexible Network Management (SDNFlex 2017), Göttingen, Germany, 2017.
[3]
C. Lorenz, D. Hock, J. Scherer, R. Durner, W. Kellerer, S. Gebert, N. Gray, T. Zinner, and P. Tran-Gia. An SDN/NFV-Enabled Enterprise Network Architecture Offering Fine-Grained Security Policy Enforcement. IEEE Communications Magazine, 55(3):217--223, March 2017.
[4]
S. Scott-Hayward, S. Natarajan, and S. Sezer. A survey of security in software defined networks. IEEE Communications Surveys & Tutorials, 18(1):623--654, 2016.
[5]
SecureList. Wannacry ransomware used in widespread attacks all over the world. https://securelist.com/blog/incidents/78351/wannacry-ransomware-used-in-widespread-attacks-all-over-the-world/. called on May 16, 2017.

Cited By

View all
  • (2020)Network Function Offloading Through Classification of Elephant FlowsIEEE Transactions on Network and Service Management10.1109/TNSM.2020.297683817:2(807-820)Online publication date: 1-Jun-2020
  • (2018)Overview of 5G security technologyScience China Information Sciences10.1007/s11432-017-9426-461:8Online publication date: 9-Jul-2018

Index Terms

  1. SDN/NFV-enabled Security Architecture for Fine-grained Policy Enforcement and Threat Mitigation for Enterprise Networks

        Recommendations

        Comments

        Please enable JavaScript to view thecomments powered by Disqus.

        Information & Contributors

        Information

        Published In

        cover image ACM Conferences
        SIGCOMM Posters and Demos '17: Proceedings of the SIGCOMM Posters and Demos
        August 2017
        158 pages
        ISBN:9781450350570
        DOI:10.1145/3123878
        Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

        Sponsors

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        Published: 22 August 2017

        Check for updates

        Author Tags

        1. Firewalling
        2. Management
        3. NFV
        4. SDN
        5. Security

        Qualifiers

        • Demonstration
        • Research
        • Refereed limited

        Conference

        SIGCOMM '17
        Sponsor:
        SIGCOMM '17: ACM SIGCOMM 2017 Conference
        August 22 - 24, 2017
        CA, Los Angeles, USA

        Acceptance Rates

        Overall Acceptance Rate 92 of 158 submissions, 58%

        Contributors

        Other Metrics

        Bibliometrics & Citations

        Bibliometrics

        Article Metrics

        • Downloads (Last 12 months)43
        • Downloads (Last 6 weeks)13
        Reflects downloads up to 20 Nov 2024

        Other Metrics

        Citations

        Cited By

        View all
        • (2020)Network Function Offloading Through Classification of Elephant FlowsIEEE Transactions on Network and Service Management10.1109/TNSM.2020.297683817:2(807-820)Online publication date: 1-Jun-2020
        • (2018)Overview of 5G security technologyScience China Information Sciences10.1007/s11432-017-9426-461:8Online publication date: 9-Jul-2018

        View Options

        View options

        PDF

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader

        Login options

        Media

        Figures

        Other

        Tables

        Share

        Share

        Share this Publication link

        Share on social media