Guide to Security in SDN and NFV: Challenges, Opportunities, and Applications (Computer Communications and Networks) 🔍
Zhu; Shao Ying Zhu; Sandra Scott-Hayward; Ludovic Jacquin; Richard Hill Springer International Publishing : Imprint : Springer, Springer Nature, Cham, 2017
英语 [en] · PDF · 22.0MB · 2017 · 📗 未知类型的图书 · 🚀/ia · Save
描述
This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV. Presenting a comprehensive guide to the application of security mechanisms in the context of SDNFV, the content spans fundamental theory, practical solutions, and potential applications in future networks. Topics and features: Introduces the key security challenges of SDN, NFV and Cloud Computing, providing a detailed tutorial on NFV security Discusses the issue of trust in SDN/NFV environments, covering roots of trust services, and proposing a technique to evaluate trust by exploiting remote attestation Reviews a range of specific SDNFV security solutions, including a DDoS detection and remediation framework, and a security policy transition framework for SDN Describes the implementation of a virtual home gateway, and a project that combines dynamic security monitoring with big-data analytics to detect network-wide threats Examines the security implications of SDNFV in evolving and future networks, from network-based threats to Industry 4.0 machines, to the security requirements for 5G Investigates security in the Observe, Orient, Decide and Act (OODA) paradigm, and proposes a monitoring solution for a Named Data Networking (NDN) architecture Includes review questions in each chapter, to test the reader's understanding of each of the key concepts described This informative and practical volume is an essential resource for researchers interested in the potential of SDNFV systems to address a broad range of network security challenges. The work will also be of great benefit to practitioners wishing to design secure next-generation communication networks, or to develop new security-related mechanisms for SDNFV systems. Dr. Shao Ying Zhu is a Senior Lecturer in Computing at the University of Derby, UK. Dr. Sandra Scott-Hayward is a Lecturer (Assistant Professor) at Queen's University Belfast, Northern Ireland. Dr. Ludovic Jacquin is a Senior Researcher at Hewlett Packard Labs - the research organisation of Hewlett Packard Enterprise - in Bristol, UK. Prof. Richard Hill is the Head of the Department of Informatics and the Director of the Centre for Industrial Analytics at the University of Huddersfield, UK. The other publications of the editors include the Springer titles Guide to Security Assurance for Cloud Computing and Big-Data Analytics and Cloud Computing: Theory, Algorithms and Applications
备选作者
Zhu, Shao Ying; Scott-Hayward, Sandra; Jacquin, Ludovic; Hill, Richard
备用出版商
Cham: Springer International Publishing
备用出版商
Springer Nature Switzerland AG
备用版本
Computer communications and networks, Cham, Switzerland, 2017
备用版本
Computer Communications and Networks Ser, New York, Nov. 2017
备用版本
1st ed. 2017, Cham, 2017
备用版本
Switzerland, Switzerland
备用版本
1st ed. 2017, PS, 2017
备用版本
Nov 20, 2017
元数据中的注释
Source title: Guide to Security in SDN and NFV: Challenges, Opportunities, and Applications (Computer Communications and Networks)
备用描述
1 online resource (342 pages)
This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV. Presenting a comprehensive guide to the application of security mechanisms in the context of SDNFV, the content spans fundamental theory, practical solutions, and potential applications in future networks. Topics and features: Introduces the key security challenges of SDN, NFV and Cloud Computing, providing a detailed tutorial on NFV security Discusses the issue of trust in SDN/NFV environments, covering roots of trust services, and proposing a technique to evaluate trust by exploiting remote attestation Reviews a range of specific SDNFV security solutions, including a DDoS detection and remediation framework, and a security policy transition framework for SDN Describes the implementation of a virtual home gateway, and a project that combines dynamic security monitoring with big-data analytics to detect network-wide threats Examines the security implications of SDNFV in evolving and future networks, from network-based threats to Industry 4.0 machines, to the security requirements for 5G Investigates security in the Observe, Orient, Decide and Act (OODA) paradigm, and proposes a monitoring solution for a Named Data Networking (NDN) architecture Includes review questions in each chapter, to test the reader's understanding of each of the key concepts described This informative and practical volume is an essential resource for researchers interested in the potential of SDNFV systems to address a broad range of network security challenges. The work will also be of great benefit to practitioners wishing to design secure next-generation communication networks, or to develop new security-related mechanisms for SDNFV systems. Dr. Shao Ying Zhu is a Senior Lecturer in Computing at the University of Derby, UK. Dr. Sandra Scott-Hayward is a Lecturer (Assistant Professor) at Queen's University Belfast, Northern Ireland. Dr. Ludovic Jacquin is a Senior Researcher at Hewlett Packard Labs - the research organisation of Hewlett Packard Enterprise - in Bristol, UK. Prof. Richard Hill is the Head of the Department of Informatics and the Director of the Centre for Industrial Analytics at the University of Huddersfield, UK. The other publications of the editors include the Springer titles Guide to Security Assurance for Cloud Computing and Big-Data Analytics and Cloud Computing: Theory, Algorithms and Applications
Print version record
Foreword -- Preface -- Acknowledgement -- Contents -- Contributors -- About the Editors -- Part I Introduction to Security in SDNFV â#x80;#x93; Key Concepts -- 1 Security of Software-Defined Infrastructures with SDN, NFV, and Cloud Computing Technologies -- 1.1 Introduction -- 1.2 Defining Characteristics of Software-Defined Networking, Network Functions Virtualization, and Cloud Computing -- 1.2.1 Software-Defined Networking -- 1.2.2 Network Functions Virtualization -- 1.2.3 Cloud Computing -- 1.2.4 Virtualization -- 1.3 Security Challenges of NFV, SDN, and Cloud
1.3.1 General Security Requirements and Definitions1.3.2 NFV Security Challenges -- 1.3.3 SDN Security Challenges -- 1.3.4 Cloud Security Challenges -- 1.4 Security Challenges and Solutions for Cloud-SDN-NFV Integrated Software Infrastructure -- 1.4.1 Security of Virtualization -- 1.4.1.1 Fundamental Security Issues with Virtualization -- 1.4.1.2 Solutions and Guidance -- 1.4.2 Security by Isolation -- 1.4.2.1 Isolation Classification -- 1.4.2.2 Standard Network Security Solutions by Isolation -- 1.4.3 Security of Identity and Access Management
1.5 Case Study: Security of OpenStack Platform1.5.1 Security Challenges and Threats in OpenStack -- 1.5.2 OpenStack Security Solution Recommendation -- 1.6 Integrated Software-Defined Infrastructure Security -- 1.6.1 SDSec Concept -- 1.6.2 Software-Defined Security Service (SDS2) Architecture -- 1.6.2.1 SDS2 Controller -- 1.6.2.2 SDS2 Northbound Interface (NBI) -- 1.6.2.3 SDS2 Virtual Security Function -- 1.6.2.4 SDS2 Southbound Interface (SBI) -- 1.6.2.5 Application of SDS2 to Data Center Security -- 1.7 Summary -- 1.8 Questions -- References
2 NFV Security: Emerging Technologies and Standards2.1 Introduction -- 2.2 Threats and Opportunities -- 2.3 The Problems Identified in the ETSI NFV Security Problem Statement -- 2.3.1 Topology Validation and Enforcement -- 2.3.2 Availability of Management Support Infrastructure -- 2.3.3 Secured Boot -- 2.3.4 Secure Crash -- 2.3.5 Performance Isolation -- 2.3.6 User/Tenant Authentication, Authorization, and Accounting (AAA) -- 2.3.7 Authenticated Time Service -- 2.3.8 Private Keys within Cloned Images
2.3.9 Backdoors via Virtualized Test and Monitoring Functions2.3.10 Multi-administrator Isolation -- 2.4 Establishing and Maintaining Trust -- 2.5 Lawful Interception and the Environment for the Execution of Sensitive Components -- 2.6 Security Management and Monitoring -- 2.7 Analysis of the OpenStack Security -- 2.8 Conclusion -- 2.9 Review Questions -- References -- 3 SDN and NFV Security: Challenges for Integrated Solutions -- 3.1 Introduction -- 3.2 SDN and NFV Integration -- 3.2.1 An Integrated Architecture -- 3.2.2 Orchestration and Management in SDN/NFV
""3.3 A Survey of Proposals to Secure SDN/NFV Platforms""
Includes bibliographical references and index
备用描述
Annotation This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV. Presenting a comprehensive guide to the application of security mechanisms in the context of SDNFV, the content spans fundamental theory, practical solutions, and potential applications in future networks. Topics and features: introduces the key security challenges of SDN, NFV and Cloud Computing, providing a detailed tutorial on NFV security; discusses the issue of trust in SDN/NFV environments, covering roots of trust services, and proposing a technique to evaluate trust by exploiting remote attestation; reviews a range of specific SDNFV security solutions, including a DDoS detection and remediation framework, and a security policy transition framework for SDN; describes the implementation of a virtual home gateway, and a project that combines dynamic security monitoring with big-data analytics to detect network-wide threats; examines the security implications of SDNFV in evolving and future networks, from network-based threats to Industry 4.0 machines, to the security requirements for 5G; investigates security in the Observe, Orient, Decide and Act (OODA) paradigm, and proposes a monitoring solution for a Named Data Networking (NDN) architecture; includes review questions in each chapter, to test the reader's understanding of each of the key concepts described. This informative and practical volume is an essential resource for researchers interested in the potential of SDNFV systems to address a broad range of network security challenges. The work will also be of great benefit to practitioners wishing to design secure next-generation communication networks, or to develop new security-related mechanisms for SDNFV systems
备用描述
Computer Communications and Networks
Erscheinungsdatum: 20.11.2017
开源日期
2023-06-28
更多信息……

🚀 快速下载

成为会员以支持书籍、论文等的长期保存。为了感谢您对我们的支持,您将获得高速下载权益。❤️
如果您在本月捐款,您将获得双倍的快速下载次数。

🐢 低速下载

由可信的合作方提供。 更多信息请参见常见问题解答。 (可能需要验证浏览器——无限次下载!)

所有选项下载的文件都相同,应该可以安全使用。即使这样,从互联网下载文件时始终要小心。例如,确保您的设备更新及时。
  • 对于大文件,我们建议使用下载管理器以防止中断。
    推荐的下载管理器:JDownloader
  • 您将需要一个电子书或 PDF 阅读器来打开文件,具体取决于文件格式。
    推荐的电子书阅读器:Anna的档案在线查看器ReadEraCalibre
  • 使用在线工具进行格式转换。
    推荐的转换工具:CloudConvertPrintFriendly
  • 您可以将 PDF 和 EPUB 文件发送到您的 Kindle 或 Kobo 电子阅读器。
    推荐的工具:亚马逊的“发送到 Kindle”djazz 的“发送到 Kobo/Kindle”
  • 支持作者和图书馆
    ✍️ 如果您喜欢这个并且能够负担得起,请考虑购买原版,或直接支持作者。
    📚 如果您当地的图书馆有这本书,请考虑在那里免费借阅。