A Virtual Network Topology Security Assessment Process

被引:0
|
作者
Goyette, R. [1 ]
Karmouch, A. [1 ]
机构
[1] Univ Ottawa, Fac Engn, Sch Informat Technol & Engn, Ottawa, ON K1N 6N5, Canada
关键词
virtual network; security; 4Ward; MAVT;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Network virtualization is a concept in which a Virtual Network Provider constructs logical virtual networks for various clients on a common, virtualized infrastructure substrate. However, there is currently no general framework or benchmark for assessing the security properties of these logical networks within the context of network virtualization. In this paper, we describe a virtual network security assessment process in which a preference model is constructed over a select set of network element attributes. This preference model reflects the knowledge and experience of one or more security experts. The relevant attribute values are exposed during virtual network composition. Our process answers the question: "how does the security of my virtual network compare to an equivalent topology whose attribute values are most preferred by security experts?"
引用
收藏
页码:974 / 979
页数:6
相关论文
共 50 条
  • [41] Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process
    Wang, Huan
    Chen, Zhanfang
    Feng, Xin
    Di, Xiaoqiang
    Liu, Dan
    Zhao, Jianping
    Sui, Xin
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2018, 102 (02) : 1401 - 1420
  • [42] Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process
    Huan Wang
    Zhanfang Chen
    Xin Feng
    Xiaoqiang Di
    Dan Liu
    Jianping Zhao
    Xin Sui
    [J]. Wireless Personal Communications, 2018, 102 : 1401 - 1420
  • [43] Network Security Risk Assessment Method Research Based on Fuzzy Analytic Hierarchy Process
    Yu, Zhi
    Xu, Xiang
    Wu, Xianjie
    [J]. NANOTECHNOLOGY AND COMPUTER ENGINEERING, 2010, 121-122 : 80 - 86
  • [44] Topology-aware Virtual Network Embedding through Bayesian Network Analysis
    Qing, Sude
    Qi, Qi
    Wang, Jingyu
    Xu, Tong
    Liao, Jianxin
    [J]. 2012 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2012,
  • [45] Process security in the network of pharmaceutical companies
    Loock, D
    [J]. PHARMAZEUTISCHE INDUSTRIE, 2004, 66 (11A): : 1387 - 1389
  • [46] Security Analysis of Topology Structure of Electric Power Communication Network
    Jiang Dairu
    Tian Dan
    Liu Xintong
    Shen Zhentao
    [J]. 2016 FIRST IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET (ICCCI 2016), 2016, : 76 - 79
  • [47] Analysis of Security and Threat of Underwater Wireless Sensor Network Topology
    Yang, Guang
    Wei, Zhiqiang
    Cong, Yanping
    Jia, Dongning
    [J]. FOURTH INTERNATIONAL CONFERENCE ON DIGITAL IMAGE PROCESSING (ICDIP 2012), 2012, 8334
  • [48] Robust Virtual Network Topology Control based on Attractor Selection
    Koizumi, Yuki
    Miyamura, Takashi
    Arakawa, Shin'ichi
    Oki, Eiji
    Shiomoto, Kohei
    Murata, Masayuki
    [J]. ONDM: 2009 INTERNATIONAL CONFERENCE ON OPTICAL NETWORK DESIGN AND MODELING, 2009, : 123 - +
  • [49] Stability of virtual network topology control for overlay routing services
    Koizumi, Yuki
    Miyamura, Takashi
    Arakawa, Shin'ichi
    Oki, Eiji
    Shiomoto, Kohei
    Murata, Masayuki
    [J]. JOURNAL OF OPTICAL NETWORKING, 2008, 7 (07): : 704 - 719
  • [50] On the stability of virtual network topology control for overlay routing services
    Koizumi, Yuki
    Miyamura, Takashi
    Arakawa, Shin'ichi
    Oki, Eiji
    Shiomoto, Kohei
    Murata, Masayuki
    [J]. 2007 FOURTH INTERNATIONAL CONFERENCE ON BROADBAND COMMUNICATIONS, NETWORKS & SYSTEMS, VOLS 1 AND 2, 2007, : 810 - +