This demo showcases some of the capabilities foreseen for the security infrastructure designed by the H2020 SHIELD project. SHIELD exploits NFV for adaptive monitoring of an IT infrastructure and for feeding the data to an analytics engine to detect attacks in real time. An intelligent reaction system is then activated to reconfigure the SDN/NFV infrastructure so that the attacks are thwarted. The SDN/NFV infrastructure itself is protected from attacks thanks to trusted computing techniques, that permit to quickly identify misbehaving nodes. The proposed demo will present detection and reaction to a DDoS attack (by on-the-fly deployment of new virtual network security functions and/or change of network paths), as well as detection of softwa...
In recent years, the rise of software-definednetworks (SDN) have made network control moreflexible, ...
This paper introduces an approach towards automatic enforcement of security policies in NFV networks...
National audienceThe IP network, which was originally designed to merely connect two computers from ...
This paper describes a demo that showcases some of the capabilities foreseen for the security infras...
SHIELD is an EU-funded project, targeting at the design and development of a novel cybersecurity fra...
Distributed Denial of Service (DDoS) attack has become one of the major threat to current Internet. ...
SHIELD is an EU-funded project, targeting at the design and development of a novel cybersecurity fra...
Network functions virtualization (NFV), along with software-defined networking (SDN), drives a new c...
Purpose of this paper is to provide an overview of the motivations and technical work carried out by...
講演者所属: IMT Lille Douai, Institut Mines-Telecom 講演場所: 情報科学棟大講義室L1While tremendous efforts have been ...
International audienceCombining NFV fast service deployment and SDN fine grained control of data flo...
As ICT resources are increasingly hosted over Cloud Data Center infrastructures, Distributed Denial...
Network function virtualization (NFV) is an emerging technology that is becoming increasingly import...
In recent years, the rise of software-defined networks (SDN) has made network control more flexible,...
| openaire: EC/H2020/731558/EU//ANASTACIAThe explosive rise of Internet of Things (IoT) systems have...
In recent years, the rise of software-definednetworks (SDN) have made network control moreflexible, ...
This paper introduces an approach towards automatic enforcement of security policies in NFV networks...
National audienceThe IP network, which was originally designed to merely connect two computers from ...
This paper describes a demo that showcases some of the capabilities foreseen for the security infras...
SHIELD is an EU-funded project, targeting at the design and development of a novel cybersecurity fra...
Distributed Denial of Service (DDoS) attack has become one of the major threat to current Internet. ...
SHIELD is an EU-funded project, targeting at the design and development of a novel cybersecurity fra...
Network functions virtualization (NFV), along with software-defined networking (SDN), drives a new c...
Purpose of this paper is to provide an overview of the motivations and technical work carried out by...
講演者所属: IMT Lille Douai, Institut Mines-Telecom 講演場所: 情報科学棟大講義室L1While tremendous efforts have been ...
International audienceCombining NFV fast service deployment and SDN fine grained control of data flo...
As ICT resources are increasingly hosted over Cloud Data Center infrastructures, Distributed Denial...
Network function virtualization (NFV) is an emerging technology that is becoming increasingly import...
In recent years, the rise of software-defined networks (SDN) has made network control more flexible,...
| openaire: EC/H2020/731558/EU//ANASTACIAThe explosive rise of Internet of Things (IoT) systems have...
In recent years, the rise of software-definednetworks (SDN) have made network control moreflexible, ...
This paper introduces an approach towards automatic enforcement of security policies in NFV networks...
National audienceThe IP network, which was originally designed to merely connect two computers from ...