This paper describes a demo that showcases some of the capabilities foreseen for the security infrastructure designed by the H2020 SHIELD project. SHIELD exploits NFV for adaptive monitoring of an IT infrastructure and for feeding the data to an analytics engine to detect attacks in real time. An intelligent reaction system is then activated to reconfigure the SDN/NFV infrastructure so that the attacks are thwarted. The SDN/NFV infrastructure itself is protected from attacks thanks to trusted computing techniques, that permit to quickly identify misbehaving nodes. The proposed demo will present detection and reaction to a DDoS attack (by on-the-fly deployment of new virtual network security functions and/or change of network paths), as well...
| openaire: EC/H2020/731558/EU//ANASTACIAThe explosive rise of Internet of Things (IoT) systems have...
International audienceIn this paper, we are interested in the problem of Virtual Network Function (V...
The current paper addresses relevant network security vulnerabilities introduced by network devices ...
This demo showcases some of the capabilities foreseen for the security infrastructure designed by th...
SHIELD is an EU-funded project, targeting at the design and development of a novel cybersecurity fra...
Distributed Denial of Service (DDoS) attack has become one of the major threat to current Internet. ...
SHIELD is an EU-funded project, targeting at the design and development of a novel cybersecurity fra...
Network functions virtualization (NFV), along with software-defined networking (SDN), drives a new c...
Purpose of this paper is to provide an overview of the motivations and technical work carried out by...
講演者所属: IMT Lille Douai, Institut Mines-Telecom 講演場所: 情報科学棟大講義室L1While tremendous efforts have been ...
International audienceCombining NFV fast service deployment and SDN fine grained control of data flo...
In recent years, the rise of software-defined networks (SDN) has made network control more flexible,...
As ICT resources are increasingly hosted over Cloud Data Center infrastructures, Distributed Denial...
Network function virtualization (NFV) is an emerging technology that is becoming increasingly import...
In recent years, the rise of software-definednetworks (SDN) have made network control moreflexible, ...
| openaire: EC/H2020/731558/EU//ANASTACIAThe explosive rise of Internet of Things (IoT) systems have...
International audienceIn this paper, we are interested in the problem of Virtual Network Function (V...
The current paper addresses relevant network security vulnerabilities introduced by network devices ...
This demo showcases some of the capabilities foreseen for the security infrastructure designed by th...
SHIELD is an EU-funded project, targeting at the design and development of a novel cybersecurity fra...
Distributed Denial of Service (DDoS) attack has become one of the major threat to current Internet. ...
SHIELD is an EU-funded project, targeting at the design and development of a novel cybersecurity fra...
Network functions virtualization (NFV), along with software-defined networking (SDN), drives a new c...
Purpose of this paper is to provide an overview of the motivations and technical work carried out by...
講演者所属: IMT Lille Douai, Institut Mines-Telecom 講演場所: 情報科学棟大講義室L1While tremendous efforts have been ...
International audienceCombining NFV fast service deployment and SDN fine grained control of data flo...
In recent years, the rise of software-defined networks (SDN) has made network control more flexible,...
As ICT resources are increasingly hosted over Cloud Data Center infrastructures, Distributed Denial...
Network function virtualization (NFV) is an emerging technology that is becoming increasingly import...
In recent years, the rise of software-definednetworks (SDN) have made network control moreflexible, ...
| openaire: EC/H2020/731558/EU//ANASTACIAThe explosive rise of Internet of Things (IoT) systems have...
International audienceIn this paper, we are interested in the problem of Virtual Network Function (V...
The current paper addresses relevant network security vulnerabilities introduced by network devices ...