期刊文献+
共找到36篇文章
< 1 2 >
每页显示 20 50 100
Federated Network Intelligence Orchestration for Scalable and Automated FL-Based Anomaly Detection in B5G Networks
1
作者 Pablo Fernández Saura José M.Bernabé Murcia +3 位作者 Emilio García de la Calera Molina Alejandro Molina Zarca Jorge Bernal Bernabé Antonio F.Skarmeta Gómez 《Computers, Materials & Continua》 SCIE EI 2024年第7期163-193,共31页
The management of network intelligence in Beyond 5G(B5G)networks encompasses the complex challenges of scalability,dynamicity,interoperability,privacy,and security.These are essential steps towards achieving the reali... The management of network intelligence in Beyond 5G(B5G)networks encompasses the complex challenges of scalability,dynamicity,interoperability,privacy,and security.These are essential steps towards achieving the realization of truly ubiquitous Artificial Intelligence(AI)-based analytics,empowering seamless integration across the entire Continuum(Edge,Fog,Core,Cloud).This paper introduces a Federated Network Intelligence Orchestration approach aimed at scalable and automated Federated Learning(FL)-based anomaly detection in B5Gnetworks.By leveraging a horizontal Federated learning approach based on the FedAvg aggregation algorithm,which employs a deep autoencoder model trained on non-anomalous traffic samples to recognize normal behavior,the systemorchestrates network intelligence to detect and prevent cyber-attacks.Integrated into a B5G Zero-touch Service Management(ZSM)aligned Security Framework,the proposal utilizes multi-domain and multi-tenant orchestration to automate and scale the deployment of FL-agents and AI-based anomaly detectors,enhancing reaction capabilities against cyber-attacks.The proposed FL architecture can be dynamically deployed across the B5G Continuum,utilizing a hierarchy of Network Intelligence orchestrators for real-time anomaly and security threat handling.Implementation includes FL enforcement operations for interoperability and extensibility,enabling dynamic deployment,configuration,and reconfiguration on demand.Performance validation of the proposed solution was conducted through dynamic orchestration,FL,and real-time anomaly detection processes using a practical test environment.Analysis of key performance metrics,leveraging the 5G-NIDD dataset,demonstrates the system’s capability for automatic and near real-time handling of anomalies and attacks,including real-time network monitoring and countermeasure implementation for mitigation. 展开更多
关键词 Federated learning 6G ORCHESTRATION anomaly detection security policy
下载PDF
Security Monitoring and Management for the Network Services in the Orchestration of SDN-NFV Environment Using Machine Learning Techniques
2
作者 Nasser Alshammari Shumaila Shahzadi +7 位作者 Saad Awadh Alanazi Shahid Naseem Muhammad Anwar Madallah Alruwaili Muhammad Rizwan Abid Omar Alruwaili Ahmed Alsayat Fahad Ahmad 《Computer Systems Science & Engineering》 2024年第2期363-394,共32页
Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified ne... Software Defined Network(SDN)and Network Function Virtualization(NFV)technology promote several benefits to network operators,including reduced maintenance costs,increased network operational performance,simplified network lifecycle,and policies management.Network vulnerabilities try to modify services provided by Network Function Virtualization MANagement and Orchestration(NFV MANO),and malicious attacks in different scenarios disrupt the NFV Orchestrator(NFVO)and Virtualized Infrastructure Manager(VIM)lifecycle management related to network services or individual Virtualized Network Function(VNF).This paper proposes an anomaly detection mechanism that monitors threats in NFV MANO and manages promptly and adaptively to implement and handle security functions in order to enhance the quality of experience for end users.An anomaly detector investigates these identified risks and provides secure network services.It enables virtual network security functions and identifies anomalies in Kubernetes(a cloud-based platform).For training and testing purpose of the proposed approach,an intrusion-containing dataset is used that hold multiple malicious activities like a Smurf,Neptune,Teardrop,Pod,Land,IPsweep,etc.,categorized as Probing(Prob),Denial of Service(DoS),User to Root(U2R),and Remote to User(R2L)attacks.An anomaly detector is anticipated with the capabilities of a Machine Learning(ML)technique,making use of supervised learning techniques like Logistic Regression(LR),Support Vector Machine(SVM),Random Forest(RF),Naïve Bayes(NB),and Extreme Gradient Boosting(XGBoost).The proposed framework has been evaluated by deploying the identified ML algorithm on a Jupyter notebook in Kubeflow to simulate Kubernetes for validation purposes.RF classifier has shown better outcomes(99.90%accuracy)than other classifiers in detecting anomalies/intrusions in the containerized environment. 展开更多
关键词 Software defined network network function virtualization network function virtualization management and orchestration virtual infrastructure manager virtual network function Kubernetes Kubectl artificial intelligence machine learning
下载PDF
Cyber Resilience through Real-Time Threat Analysis in Information Security
3
作者 Aparna Gadhi Ragha Madhavi Gondu +1 位作者 Hitendra Chaudhary Olatunde Abiona 《International Journal of Communications, Network and System Sciences》 2024年第4期51-67,共17页
This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends t... This paper examines how cybersecurity is developing and how it relates to more conventional information security. Although information security and cyber security are sometimes used synonymously, this study contends that they are not the same. The concept of cyber security is explored, which goes beyond protecting information resources to include a wider variety of assets, including people [1]. Protecting information assets is the main goal of traditional information security, with consideration to the human element and how people fit into the security process. On the other hand, cyber security adds a new level of complexity, as people might unintentionally contribute to or become targets of cyberattacks. This aspect presents moral questions since it is becoming more widely accepted that society has a duty to protect weaker members of society, including children [1]. The study emphasizes how important cyber security is on a larger scale, with many countries creating plans and laws to counteract cyberattacks. Nevertheless, a lot of these sources frequently neglect to define the differences or the relationship between information security and cyber security [1]. The paper focus on differentiating between cybersecurity and information security on a larger scale. The study also highlights other areas of cybersecurity which includes defending people, social norms, and vital infrastructure from threats that arise from online in addition to information and technology protection. It contends that ethical issues and the human factor are becoming more and more important in protecting assets in the digital age, and that cyber security is a paradigm shift in this regard [1]. 展开更多
关键词 Cybersecurity Information Security Network Security Cyber Resilience Real-Time Threat Analysis Cyber Threats Cyberattacks Threat Intelligence Machine Learning Artificial Intelligence Threat Detection Threat Mitigation Risk Assessment Vulnerability Management Incident Response Security Orchestration Automation Threat Landscape Cyber-Physical Systems Critical Infrastructure Data Protection Privacy Compliance Regulations Policy Ethics CYBERCRIME Threat Actors Threat Modeling Security Architecture
下载PDF
Fortifying the Digital Bastion: Pioneering Cybersecurity with Dynamic Secrets Management and CMDB Fusion in the Enterprise
4
作者 Gyani Pillala 《Journal of Information Security》 2024年第4期411-418,共8页
In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manus... In the relentless quest for digital sovereignty, organizations face an unprecedented challenge in safeguarding sensitive information, protecting against cyber threats, and maintaining regulatory compliance. This manuscript unveils a revolutionary blueprint for cyber resilience, empowering organizations to transcend the limitations of traditional cybersecurity paradigms and forge ahead into uncharted territories of data security excellence and frictionless secrets management experience. Enter a new era of cybersecurity innovation and continued excellence. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the secrets lifecycle management with other platform cohesive integrations. Enterprises can enhance security, streamline operations, fasten development practices, avoid secrets sprawl, and improve overall compliance and DevSecOps practice. This enables the enterprises to enhance security, streamline operations, fasten development & deployment practices, avoid secrets spawls, and improve overall volume in shipping software with paved-road DevSecOps Practices, and improve developers’ productivity. By seamlessly integrating secrets based on logical environments and applications (assets), dynamic secrets management orchestrates and automates the application secrets lifecycle with other platform cohesive integrations. Organizations can enhance security, streamline operations, fasten development & deployment practices, avoid secrets sprawl, and improve overall volume in shipping software with paved-road DevSecOps practices. Most importantly, increases developer productivity. 展开更多
关键词 Dynamic Secrets Management Logical Environments Configuration Management Database (CMDB) Secrets Orchestration M2M (Machine to Machine) Authentication/Authorization Developer Productivity
下载PDF
Vertical Pod Autoscaling in Kubernetes for Elastic Container Collaborative Framework
5
作者 Mushtaq Niazi Sagheer Abbas +3 位作者 Abdel-Hamid Soliman Tahir Alyas Shazia Asif Tauqeer Faiz 《Computers, Materials & Continua》 SCIE EI 2023年第1期591-606,共16页
Kubernetes is an open-source container management tool which automates container deployment,container load balancing and container(de)scaling,including Horizontal Pod Autoscaler(HPA),Vertical Pod Autoscaler(VPA).HPA e... Kubernetes is an open-source container management tool which automates container deployment,container load balancing and container(de)scaling,including Horizontal Pod Autoscaler(HPA),Vertical Pod Autoscaler(VPA).HPA enables flawless operation,interactively scaling the number of resource units,or pods,without downtime.Default Resource Metrics,such as CPU and memory use of host machines and pods,are monitored by Kubernetes.Cloud Computing has emerged as a platform for individuals beside the corporate sector.It provides cost-effective infrastructure,platform and software services in a shared environment.On the other hand,the emergence of industry 4.0 brought new challenges for the adaptability and infusion of cloud computing.As the global work environment is adapting constituents of industry 4.0 in terms of robotics,artificial intelligence and IoT devices,it is becoming eminent that one emerging challenge is collaborative schematics.Provision of such autonomous mechanism that can develop,manage and operationalize digital resources like CoBots to perform tasks in a distributed and collaborative cloud environment for optimized utilization of resources,ensuring schedule completion.Collaborative schematics are also linked with Bigdata management produced by large scale industry 4.0 setups.Different use cases and simulation results showed a significant improvement in Pod CPU utilization,latency,and throughput over Kubernetes environment. 展开更多
关键词 Autoscaling query optimization PODS kubernetes CONTAINER ORCHESTRATION
下载PDF
A Provably Secure and PUF-Based Authentication Key Agreement Scheme for Cloud-Edge IoT
6
作者 Liquan Chen Jinlong Wang +2 位作者 Bangwei Yin Kunliang Yu Jinguang Han 《China Communications》 SCIE CSCD 2023年第5期198-216,共19页
With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying ... With the exponential growth of intelligent Internet of Things(IoT)applications,Cloud-Edge(CE)paradigm is emerging as a solution that facilitates resource-efficient and timely services.However,it remains an underlying issue that frequent end-edgecloud communication is over a public or adversarycontrolled channel.Additionally,with the presence of resource-constrained devices,it’s imperative to conduct the secure communication mechanism,while still guaranteeing efficiency.Physical unclonable functions(PUF)emerge as promising lightweight security primitives.Thus,we first construct a PUF-based security mechanism for vulnerable IoT devices.Further,a provably secure and PUF-based authentication key agreement scheme is proposed for establishing the secure channel in end-edge-cloud empowered IoT,without requiring pre-loaded master keys.The security of our scheme is rigorously proven through formal security analysis under the random oracle model,and security verification using AVISPA tool.The comprehensive security features are also elaborated.Moreover,the numerical results demonstrate that the proposed scheme outperforms existing related schemes in terms of computational and communication efficiency. 展开更多
关键词 Internet of Things end-edge-cloud orchestration secure communication physical unclonable function authentication key agreement
下载PDF
供应链环境下的物流金融服务——基于3PL的“Orchestrator”角色分析 被引量:9
7
作者 刘晓红 周利国 《中央财经大学学报》 CSSCI 北大核心 2015年第7期74-79,90,共7页
基于学术界对3PL("Third-Party Logistics Providers")演进及其"Orchestrator"角色的理论研究,笔者对供应链环境下的物流金融服务进行了探讨。研究表明:基于成本交易理论、资源基础观以及网络理论支持的3PL的"... 基于学术界对3PL("Third-Party Logistics Providers")演进及其"Orchestrator"角色的理论研究,笔者对供应链环境下的物流金融服务进行了探讨。研究表明:基于成本交易理论、资源基础观以及网络理论支持的3PL的"Orchestrator"角色可用于对供应链环境下的物流金融服务的理论解释。为了充分说明3PL的"Orchestrator"角色在物流金融服务中的作用,笔者还结合了三种具体形式,即工业品供应链物流金融服务、消费品供应链物流金融服务以及物流银行进行了说明。3PL的"Orchestrator"角色研究在物流与供应链管理学术界刚起步,本文从物流金融服务视角丰富了学术界对此议题的讨论,具有理论和实践的双重启示意义。从理论上看,尽管物流金融服务将3PL提升到一个新的运作平台,推进了3PL的演进,但对这一现象,特别是在供应链环境下,学术界尚未给出一个系统的理论解释。本文推进了3PL在物流金融服务中的理论研究。从实践来看,对于3PL来说,只有充分发挥"Orchestrator"角色的作用,才能最大化自身的价值增值空间以及物流金融服务创新的潜力。 展开更多
关键词 3PL Orchestrator 供应链 物流金融
下载PDF
BizTalk在仓储管理系统中的应用 被引量:1
8
作者 陈建辉 《价值工程》 2011年第28期140-141,共2页
随着企业信息化程度的不断提高,越来越多的应用系统被应用到实际的生产工作中来。然而企业中的应用系统之间并不都是相互关联、共享资源的。为了确保系统与系统之间数据是一致的、同步的,类似于BizTalk这种中间件的应用就越发重要了。... 随着企业信息化程度的不断提高,越来越多的应用系统被应用到实际的生产工作中来。然而企业中的应用系统之间并不都是相互关联、共享资源的。为了确保系统与系统之间数据是一致的、同步的,类似于BizTalk这种中间件的应用就越发重要了。本文介绍了BizTalk是如何实现仓储管理系统与SAP之间的数据交互的。 展开更多
关键词 SCHEME MAPPING orchestrations
下载PDF
Horizontal-Based Orchestration for Multi-Domain SFC in SDN/NFV-Enabled Satellite/Terrestrial Networks 被引量:11
9
作者 Guanglei Li Huachun Zhou +2 位作者 Bohao Feng Guanwen Li Qi Xu 《China Communications》 SCIE CSCD 2018年第5期77-91,共15页
It's promising to use Software-Defined Networking(SDN) and Network Functions Virtualization(NFV) to integrate satellite and terrestrial networks. To construct network service function chains in such a multi-domain... It's promising to use Software-Defined Networking(SDN) and Network Functions Virtualization(NFV) to integrate satellite and terrestrial networks. To construct network service function chains in such a multi-domain environment, we propose a horizontal-based Multi-domain Service Function Chaining(Md-SFC) orchestration framework. In this framework, multi-domain orchestrators can coordinate with each other to guarantee the end-to-end service quality. Intra-domain orchestrators also coordinate SDN controllers and NFV management components to implement intra-domain service function chains. Based on this, we further propose a heuristic SFC mapping algorithm with a cooperative inter-domain path calculation method to map service function chains to infrastructures. In this method, master multi-domain orchestrator and intra-domain orchestrators coordinate to select proper inter-domain links. We compare the cooperative method with a naive uncooperative way that domains' topology information is provided to the master multi-domain orchestrator and it calculates the shortest inter-domain path between intra-domain service function chains directly. Simulation results demonstrate that our solution is feasible. It is able to construct end-to-end performance guaranteed service function chain by horizontal-based cooperation. The cooperative inter-domain path calculation method decreasesthe mapping load for the master orchestrator and gets the same end-to-end performance. 展开更多
关键词 satellite and terrestrial networks SDN NFV multi-domain orchestration SFC
下载PDF
Event-driven process execution model for process virtual machine 被引量:3
10
作者 WU Dong-yao WEI Jun GAO Chu-shu DOU Wen-shen 《计算机集成制造系统》 EI CSCD 北大核心 2012年第8期1675-1685,共11页
Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principle... Current orchestration and choreography process engines only serve with dedicate process languages.To solve these problems,an Event-driven Process Execution Model(EPEM) was developed.Formalization and mapping principles of the model were presented to guarantee the correctness and efficiency for process transformation.As a case study,the EPEM descriptions of Web Services Business Process Execution Language(WS-BPEL) were represented and a Process Virtual Machine(PVM)-OncePVM was implemented in compliance with the EPEM. 展开更多
关键词 business process modeling event-driven architecture process virtual machine service orchestration process execution language
下载PDF
SDN Orchestration for Dynamic End-to-End Control of Data Center Multi-Domain Optical Networking 被引量:3
11
作者 LIU Lei 《China Communications》 SCIE CSCD 2015年第8期10-21,共12页
New and emerging use cases, such as the interconnection of geographically distributed data centers(DCs), are drawing attention to the requirement for dynamic end-to-end service provisioning, spanning multiple and hete... New and emerging use cases, such as the interconnection of geographically distributed data centers(DCs), are drawing attention to the requirement for dynamic end-to-end service provisioning, spanning multiple and heterogeneous optical network domains. This heterogeneity is, not only due to the diverse data transmission and switching technologies, but also due to the different options of control plane techniques. In light of this, the problem of heterogeneous control plane interworking needs to be solved, and in particular, the solution must address the specific issues of multi-domain networks, such as limited domain topology visibility, given the scalability and confidentiality constraints. In this article, some of the recent activities regarding the Software-Defined Networking(SDN) orchestration are reviewed to address such a multi-domain control plane interworking problem. Specifically, three different models, including the single SDN controller model, multiple SDN controllers in mesh, and multiple SDN controllers in a hierarchical setting, are presented for the DC interconnection network with multiple SDN/Open Flow domains or multiple Open Flow/Generalized Multi-Protocol Label Switching( GMPLS) heterogeneous domains. I n addition, two concrete implementations of the orchestration architectures are detailed, showing the overall feasibility and procedures of SDN orchestration for the end-to-endservice provisioning in multi-domain data center optical networks. 展开更多
关键词 software-defined networking(SDN) generalized multi-protocol labelswitching (GMPLS) path computationelement (PCE) data center ORCHESTRATION multi-domain optical network
下载PDF
Orchestrating Network Functions in Software-Defined Networks 被引量:2
12
作者 Hongchao Hu Lin Pang +1 位作者 Zhenpeng Wang Guozhen Cheng 《China Communications》 SCIE CSCD 2017年第2期104-117,共14页
Software.defined networking(SDN) enables third.part companies to participate in the network function innovations. A number of instances for one network function will inevitably co.exist in the network. Although some o... Software.defined networking(SDN) enables third.part companies to participate in the network function innovations. A number of instances for one network function will inevitably co.exist in the network. Although some orchestration architecture has been proposed to chain network functions, rare works are focused on how to optimize this process. In this paper, we propose an optimized model for network function orchestration, function combination model(FCM). Our main contributions are as following. First, network functions are featured with a new abstraction, and are open to external providers. And FCM identifies network functions using unique type, and organizes their instances distributed over the network with the appropriate way. Second, with the specialized demands, we can combine function instances under the global network views, and formulate it into the problem of Boolean linear program(BLP). A simulated annealing algorithm is designed to approach optimal solution for this BLP. Finally, the numerical experiment demonstrates that our model can create outstanding composite schemas efficiently. 展开更多
关键词 software-defined network network function function orchestrating
下载PDF
Exploring and Modelling IoT Offloading Policies in Edge Cloud Environments 被引量:2
13
作者 Jaber Almutairi Mohammad Aldossary 《Computer Systems Science & Engineering》 SCIE EI 2022年第5期611-624,共14页
The Internet of Things(IoT)has recently become a popular technology that can play increasingly important roles in every aspect of our daily life.For collaboration between IoT devices and edge cloud servers,edge server... The Internet of Things(IoT)has recently become a popular technology that can play increasingly important roles in every aspect of our daily life.For collaboration between IoT devices and edge cloud servers,edge server nodes provide the computation and storage capabilities for IoT devices through the task offloading process for accelerating tasks with large resource requests.However,the quantitative impact of different offloading architectures and policies on IoT applications’performance remains far from clear,especially with a dynamic and unpredictable range of connected physical and virtual devices.To this end,this work models the performance impact by exploiting a potential latency that exhibits within the environment of edge cloud.Also,it investigates and compares the effects of loosely-coupled(LC)and orchestrator-enabled(OE)architecture.The LC scheme can smoothly address task redistribution with less time consumption for the offloading sceneries with small scale and small task requests.Moreover,the OE scheme not only outperforms the LC scheme in the large-scale tasks requests and offloading occurs but also reduces the overall time by 28.19%.Finally,to achieve optimized solutions for optimal offloading placement with different constraints,orchestration is important. 展开更多
关键词 Internet of things application deployment latency-sensitive edge orchestrator
下载PDF
Multi-Path Service Function Chaining for Mobile Surveillance of Animal Husbandry 被引量:1
14
作者 Xi Chen Tao Wu Mehtab Afzal 《Computers, Materials & Continua》 SCIE EI 2022年第4期1959-1971,共13页
Animal husbandry is the pillar industry in some ethnic areas of China.However,the communication/networking infrastructure in these areas is often underdeveloped,thus the difficulty in centralized management,and challe... Animal husbandry is the pillar industry in some ethnic areas of China.However,the communication/networking infrastructure in these areas is often underdeveloped,thus the difficulty in centralized management,and challenges for the effective monitoring.Considering the dynamics of the field monitoring environment,as well as the diversity and mobility of monitoring targets,traditional WSN(Wireless Sensor Networks)or IoT(Internet of Things)is difficult to meet the surveillance needs.Mobile surveillance that features the collaboration of various functions(camera,sensing,image recognition,etc.)deployed on mobile devices is desirable in a volatile wireless environment.This paper proposes the service function chaining for mobile surveillance of animal husbandry,which orchestrates multi-path multifunction(MPMF)chains to help mobile devices to collaborate in complex surveillance tasks,provide backup chains in case the primary service function chain fails due to mobility,signal strength,obstacle,etc.,and make up for the defects of difficult deployment of monitoring facilities in ethnic areas.MPMF algorithmmodels both mobile devices and various functions deployed on them as abstract graph nodes,so that chains that are required to traverse various functions and hosting mobile devices can be orchestrated in a single graphbased query through modified and adapted Dijkstra-like algorithms,with their cost ordered automatically.Experiment results show that the proposed MPMF algorithm finds multiple least-costly chains that traverse demanded functions in a timely fashion on Raspberry Pi-equipped mobile devices. 展开更多
关键词 Service function chaining ORCHESTRATION SURVEILLANCE shortest path
下载PDF
一种基于Web服务的集成型企业数据仓库架构
15
作者 刘毅 丁烈云 《微机发展》 2005年第1期115-118,共4页
建立基于Web服务的数据仓库有可能成为数据仓库技术应用的发展趋势。将数据仓库技术与Web服务技术和集成技术结合起来,提出了基于Web服务的集成型企业数据仓库架构体系。这种架构用Web服务实现传统数据仓库的相关功能,加入了Orchestrat... 建立基于Web服务的数据仓库有可能成为数据仓库技术应用的发展趋势。将数据仓库技术与Web服务技术和集成技术结合起来,提出了基于Web服务的集成型企业数据仓库架构体系。这种架构用Web服务实现传统数据仓库的相关功能,加入了Orchestration服务以使其可与外部应用集成。 展开更多
关键词 WEB服务 数据仓库 Orchestration操作型数据存储 数据集市 集成
下载PDF
Network Access Control Technology—Proposition to Contain New Security Challenges 被引量:1
16
作者 Abdelmajid Lakbabi Ghizlane Orhanou Said El Hajji 《International Journal of Communications, Network and System Sciences》 2012年第8期505-512,共8页
Traditional products working independently are no longer sufficient, since threats are continually gaining in complexity, diversity and performance;In order to proactively block such threats we need more integrated in... Traditional products working independently are no longer sufficient, since threats are continually gaining in complexity, diversity and performance;In order to proactively block such threats we need more integrated information security solution. To achieve this objective, we will analyze a real-world security platform, and focus on some key components Like, NAC, Firewall, and IPS/IDS then study their interaction in the perspective to propose a new security posture that coordinate and share security information between different network security components, using a central policy server that will be the NAC server or the PDP (the Policy Decision Point), playing an orchestration role as a central point of control. Finally we will conclude with potential research paths that will impact NAC technology evolution. 展开更多
关键词 Threats NAC Identity SECURITY POSTURE Policy ENFORCEMENT Point Remediation Coordination ORCHESTRATION
下载PDF
Service Function Chain Orchestration across Multiple Clouds 被引量:1
17
作者 Xuxia Zhong Ying Wang Xuesong Qiu 《China Communications》 SCIE CSCD 2018年第10期99-116,共18页
Network function virtualization is a new network concept that moves network functions from dedicated hardware to software-defined applications running on standard high volume severs. In order to accomplish network ser... Network function virtualization is a new network concept that moves network functions from dedicated hardware to software-defined applications running on standard high volume severs. In order to accomplish network services, traffic flows are usually processed by a list of network functions in sequence which is defined by service function chain. By incorporating network function virtualization in inter-data center(DC) network, we can use the network resources intelligently and deploy network services faster. However, orchestrating service function chains across multiple data centers will incur high deployment cost, including the inter-data center bandwidth cost, virtual network function cost and the intra-data center bandwidth cost. In this paper, we orchestrate SFCs across multiple data centers, with a goal to minimize the overall cost. An integer linear programming(ILP) model is formulated and we provide a meta-heuristic algorithm named GBAO which contains three modules to solve it. We implemented our algorithm in Python and performed side-by-side comparison with prior algorithms. Simulation results show that our proposed algorithm reduces the overall cost by at least 21.4% over the existing algorithms for accommodating the same service function chain requests. 展开更多
关键词 network function virtualization service function chain orchestration inter-DC network
下载PDF
RUAP:Random Rearrangement Block Matrix-Based Ultra-Lightweight RFID Authentication Protocol for End-Edge-Cloud Collaborative Environment
18
作者 Yu Luo Kai Fan +2 位作者 Xingmiao Wang Hui Li Yintang Yang 《China Communications》 SCIE CSCD 2022年第7期197-213,共17页
Cloud computing provides powerful processing capabilities for large-scale intelligent Internet of things(IoT)terminals.However,the massive realtime data processing requirements challenge the existing cloud computing m... Cloud computing provides powerful processing capabilities for large-scale intelligent Internet of things(IoT)terminals.However,the massive realtime data processing requirements challenge the existing cloud computing model.The edge server is closer to the data source.The end-edge-cloud collaboration offloads the cloud computing tasks to the edge environment,which solves the shortcomings of the cloud in resource storage,computing performance,and energy consumption.IoT terminals and sensors have caused security and privacy challenges due to resource constraints and exponential growth.As the key technology of IoT,Radio-Frequency Identification(RFID)authentication protocol tremendously strengthens privacy protection and improves IoT security.However,it inevitably increases system overhead while improving security,which is a major blow to low-cost RFID tags.The existing RFID authentication protocols are difficult to balance overhead and security.This paper designs an ultra-lightweight encryption function and proposes an RFID authentication scheme based on this function for the end-edge-cloud collaborative environment.The BAN logic proof and protocol verification tools AVISPA formally verify the protocol’s security.We use VIVADO to implement the encryption function and tag’s overhead on the FPGA platform.Performance evaluation indicates that the proposed protocol balances low computing costs and high-security requirements. 展开更多
关键词 end-edge-cloud orchestration mutual authentication ULTRA-LIGHTWEIGHT RFID random rearrangement block matrix IoT
下载PDF
Performance Evaluation of Service Orchestration with Dynarric Latency Simulation
19
作者 Zhang Changyou Zhu Dongfeng +1 位作者 Hu Jingjing Jin Haifei 《China Communications》 SCIE CSCD 2012年第12期68-79,共12页
Dynamic latency over the Intemet is an Important parameter for evaluating the performance of Web service orchestration. In this paper, we propose a performance analyzing and correctness checking method for service orc... Dynamic latency over the Intemet is an Important parameter for evaluating the performance of Web service orchestration. In this paper, we propose a performance analyzing and correctness checking method for service orchestration with dynamic latency simulated in Colored PetriNets (CPNs). First, we extend the CPN to Web Service Composition Orchestration Network System (WS-CONS) for the description of dynamic latency in service orchestration. Secondly, with simulated dynamic latency, a buffer-limited policy and admittance-control policy are designed in WS- CONS and implemented on CPN Tools. In the buffer-limited policy, the passing messages would be discarded if the node capacity is not adequate. In the admittance-control policy, the ability of a message entering the system depends on the number of messages concurrently flowing in the system. This helps to enhance the success rate of message passing. Finally, the system performance is evaluated through running models in CPN Tools. Simulated results show that the dynamic latency plays an important role in the system throughput and response latency. This simulation helps system designers to quickly make proper compromises at low cost. 展开更多
关键词 service orchestration CPN dynamic latency SIMULATION
下载PDF
Intelligent Approach for Traffic Orchestration in SDVN Based on CMPR
20
作者 Thamer Alhussain Ahmad Ali AlZubi Abdulaziz Alarifi 《Computers, Materials & Continua》 SCIE EI 2021年第6期3749-3763,共15页
The vehicle ad hoc network that has emerged in recent years was originally a branch of the mobile ad hoc network.With the drafting and gradual establishment of standards such as IEEE802.11p and IEEE1609,the vehicle ad... The vehicle ad hoc network that has emerged in recent years was originally a branch of the mobile ad hoc network.With the drafting and gradual establishment of standards such as IEEE802.11p and IEEE1609,the vehicle ad hoc network has gradually become independent of the mobile ad hoc network.The Internet of Vehicles(Vehicular Ad Hoc Network,VANET)is a vehicle-mounted network that comprises vehicles and roadside basic units.This multi-hop hybrid wireless network is based on a vehicle-mounted self-organizing network.As compared to other wireless networks,such as mobile ad hoc networks,wireless sensor networks,wireless mesh networks,etc.,the Internet of Vehicles offers benefits such as a large network scale,limited network topology,and predictability of node movement.The paper elaborates on the Traffic Orchestration(TO)problems in the Software-Defined Vehicular Networks(SDVN).A succinct examination of the Software-defined networks(SDN)is provided along with the growing relevance of TO in SDVN.Considering the technology features of SDN,a modified TO method is proposed,which makes it possible to reduce time complexity in terms of a group of path creation while simultaneously reducing the time needed for path reconfiguration.A criterion for path choosing is proposed and justified,which makes it possible to optimize the load of transport network channels.Summing up,this paper justifies using multipath routing for TO. 展开更多
关键词 SDVN traffic orchestration vehicular networks multipath routing
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部