Article thumbnail

A New Approach for Delivering Customized Security Everywhere: Security Service Chain

By Yi Liu, Hong-qi Zhang, Jiang Liu and Ying-jie Yang

Abstract

Security functions are usually deployed on proprietary hardware, which makes the delivery of security service inflexible and of high cost. Emerging technologies such as software-defined networking and network function virtualization go in the direction of executing functions as software components in virtual machines or containers provisioned in standard hardware resources. They enable network to provide customized security service by deploying Security Service Chain (SSC), which refers to steering flow through multiple security functions in a particular order specified by individual user or application. However, SSC Deployment Problem (SSC-DP) needs to be solved. It is a challenging problem for various reasons, such as the heterogeneity of instances in terms of service capacity and resource demand. In this paper, we propose an SSC-based approach to deliver security service to users without worrying about physical locations of security functions. For SSC-DP, we present a three-phase method to solve it while optimizing network and security resource allocation. The presented method allows network to serve a large number of flows and minimizes the latency seen by flows. Comparative experiments on the fat-tree and Waxman topologies show that our method performs better than other heuristics under a wide range of network conditions

Topics: Technology (General), T1-995, Science (General), Q1-390
Publisher: Hindawi-Wiley
Year: 2017
DOI identifier: 10.1155/2017/9534754
OAI identifier: oai:doaj.org/article:dcfe664c127a497884c8287324a52824
Journal:
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • https://doaj.org/toc/1939-0122 (external link)
  • https://doaj.org/toc/1939-0114 (external link)
  • http://dx.doi.org/10.1155/2017... (external link)
  • https://doaj.org/article/dcfe6... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.