A Virtual Network Topology Security Assessment Process

被引:0
|
作者
Goyette, R. [1 ]
Karmouch, A. [1 ]
机构
[1] Univ Ottawa, Fac Engn, Sch Informat Technol & Engn, Ottawa, ON K1N 6N5, Canada
关键词
virtual network; security; 4Ward; MAVT;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Network virtualization is a concept in which a Virtual Network Provider constructs logical virtual networks for various clients on a common, virtualized infrastructure substrate. However, there is currently no general framework or benchmark for assessing the security properties of these logical networks within the context of network virtualization. In this paper, we describe a virtual network security assessment process in which a preference model is constructed over a select set of network element attributes. This preference model reflects the knowledge and experience of one or more security experts. The relevant attribute values are exposed during virtual network composition. Our process answers the question: "how does the security of my virtual network compare to an equivalent topology whose attribute values are most preferred by security experts?"
引用
收藏
页码:974 / 979
页数:6
相关论文
共 50 条
  • [1] A Dynamic Model Building Process for Virtual Network Security Assessment
    Goyette, R.
    Karmouch, A.
    [J]. 2011 IEEE PACIFIC RIM CONFERENCE ON COMMUNICATIONS, COMPUTERS AND SIGNAL PROCESSING (PACRIM), 2011, : 482 - 487
  • [2] Assessment of Security Threats via Network Topology Analysis: An Initial Investigation
    Trovati, Marcello
    Thomas, Win
    Sun, Quanbin
    Kontonatsios, Georgios
    [J]. GREEN, PERVASIVE, AND CLOUD COMPUTING (GPC 2017), 2017, 10232 : 416 - 425
  • [3] GENERALIZED NETWORK TOPOLOGY PROGRAM FOR REAL-TIME SECURITY ASSESSMENT
    MANSOUR, O
    [J]. IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1978, 97 (04): : 1012 - 1012
  • [4] NETWORK TOPOLOGY OPTIMIZATION WITH SECURITY CONSTRAINTS
    BACHER, R
    GLAVITSCH, H
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 1986, 1 (04) : 103 - 111
  • [5] Computational complexity of the network routing logical security assessment process
    Llorens, C
    Valois, D
    Le Teigner, Y
    Gibouin, A
    [J]. IWIA 2003: FIRST IEEE INTERNATIONAL WORKSHOP ON INFORMATION ASSURANCE, PROCEEDINGS, 2003, : 37 - 47
  • [6] Study on Network Security Assessment Based on Analytical Hierarchy Process
    Qian Dong-mei
    Fan Chun-shu
    [J]. 2011 INTERNATIONAL CONFERENCE ON ELECTRONICS, COMMUNICATIONS AND CONTROL (ICECC), 2011, : 2320 - 2323
  • [7] Delivering IPTV Service over a Virtual Network: A Study on Virtual Network Topology
    Song, Biao
    Hassan, Mohammad Mehedi
    Huh, Eui-Nam
    [J]. JOURNAL OF COMMUNICATIONS AND NETWORKS, 2012, 14 (03) : 319 - 335
  • [8] Application of the Analytic Network Process in Risk Assessment for Information Systems Security
    Wang, Xuan
    Sun, Lele
    [J]. PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON COOPERATION AND PROMOTION OF INFORMATION RESOURCES IN SCIENCE AND TECHNOLOGY(COINFO 10), 2010, : 285 - 289
  • [9] Topology awareness algorithm for virtual network mapping
    Li, Xiao-ling
    Wang, Huai-min
    Guo, Chang-guo
    Ding, Bo
    Li, Xiao-yong
    Bi, Wen-qi
    Tan, Shuang
    [J]. JOURNAL OF ZHEJIANG UNIVERSITY-SCIENCE C-COMPUTERS & ELECTRONICS, 2012, 13 (03): : 178 - 186