Network virtualization can potentially limit the impact of attacks by isolating traffic from different networks. How-ever, routers and links are still vulnerable to attacks on the underlying network. Specifically, should a physical link be compromised, all embedded virtual links will be affected. Previous work protects virtual networks by setting aside backup resources. Although effective, this solution tends to be expensive as backup resources usually remain idle. In this paper, we present a novel virtual network allocation approach which explores the trade-off between resilience to attacks and efficiency in resource utilization. Our approach is composed of two complementary strategies, one preventive and the other reactive. The former emb...
International audienceIn the future 5G networks, a wide range of new services with strong requiremen...
International audienceIn this paper, we are interested in the problem of Virtual Network Function (V...
International audienceIn this paper, we are interested in the problem of Virtual Network Function (N...
Abstract—Although network virtualization can improve secu-rity by isolating traffic from different n...
Network Virtualization has recently emerged to provide scalable, customized and on-demand virtual ne...
Network virtualization allows to create logical or virtual networks on top of a shared physical or s...
Computer networks were not designed with security in mind, making research into the subject of netwo...
Network resilience represents one of the major requirements of next generation networks. It refers t...
Internet applications are deployed on the same network infrastructure, yet they have diverse perform...
International audienceDistributed Denial of Service (DDoS) cyberattacks represent a major security r...
Thorough defense against DoS attacks is extremely diffi-cult without incurring significant changes t...
As the "network of network", the Internet has been playing a central and crucial role in modern soci...
Tese de mestrado, Segurança Informática, Universidade de Lisboa, Faculdade de Ciências, 2018Network ...
Abstract—Network virtualization is a promising technology to enable multiple architectures to run on...
Proxy networks have been proposed to protect applications from Denial-of-Service (DoS) attacks. Howe...
International audienceIn the future 5G networks, a wide range of new services with strong requiremen...
International audienceIn this paper, we are interested in the problem of Virtual Network Function (V...
International audienceIn this paper, we are interested in the problem of Virtual Network Function (N...
Abstract—Although network virtualization can improve secu-rity by isolating traffic from different n...
Network Virtualization has recently emerged to provide scalable, customized and on-demand virtual ne...
Network virtualization allows to create logical or virtual networks on top of a shared physical or s...
Computer networks were not designed with security in mind, making research into the subject of netwo...
Network resilience represents one of the major requirements of next generation networks. It refers t...
Internet applications are deployed on the same network infrastructure, yet they have diverse perform...
International audienceDistributed Denial of Service (DDoS) cyberattacks represent a major security r...
Thorough defense against DoS attacks is extremely diffi-cult without incurring significant changes t...
As the "network of network", the Internet has been playing a central and crucial role in modern soci...
Tese de mestrado, Segurança Informática, Universidade de Lisboa, Faculdade de Ciências, 2018Network ...
Abstract—Network virtualization is a promising technology to enable multiple architectures to run on...
Proxy networks have been proposed to protect applications from Denial-of-Service (DoS) attacks. Howe...
International audienceIn the future 5G networks, a wide range of new services with strong requiremen...
International audienceIn this paper, we are interested in the problem of Virtual Network Function (V...
International audienceIn this paper, we are interested in the problem of Virtual Network Function (N...