Guide to Security in SDN and NFV

Download or Read eBook Guide to Security in SDN and NFV PDF written by Shao Ying Zhu and published by Springer. This book was released on 2017-11-10 with total page 342 pages. Available in PDF, EPUB and Kindle.
Guide to Security in SDN and NFV
Author :
Publisher : Springer
Total Pages : 342
Release :
ISBN-10 : 9783319646534
ISBN-13 : 3319646532
Rating : 4/5 (34 Downloads)

Book Synopsis Guide to Security in SDN and NFV by : Shao Ying Zhu

Book excerpt: This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV. Presenting a comprehensive guide to the application of security mechanisms in the context of SDNFV, the content spans fundamental theory, practical solutions, and potential applications in future networks. Topics and features: introduces the key security challenges of SDN, NFV and Cloud Computing, providing a detailed tutorial on NFV security; discusses the issue of trust in SDN/NFV environments, covering roots of trust services, and proposing a technique to evaluate trust by exploiting remote attestation; reviews a range of specific SDNFV security solutions, including a DDoS detection and remediation framework, and a security policy transition framework for SDN; describes the implementation of a virtual home gateway, and a project that combines dynamic security monitoring with big-data analytics to detect network-wide threats; examines the security implications of SDNFV in evolving and future networks, from network-based threats to Industry 4.0 machines, to the security requirements for 5G; investigates security in the Observe, Orient, Decide and Act (OODA) paradigm, and proposes a monitoring solution for a Named Data Networking (NDN) architecture; includes review questions in each chapter, to test the reader’s understanding of each of the key concepts described. This informative and practical volume is an essential resource for researchers interested in the potential of SDNFV systems to address a broad range of network security challenges. The work will also be of great benefit to practitioners wishing to design secure next-generation communication networks, or to develop new security-related mechanisms for SDNFV systems.


Guide to Security in SDN and NFV Related Books

Guide to Security in SDN and NFV
Language: en
Pages: 342
Authors: Shao Ying Zhu
Categories: Computers
Type: BOOK - Published: 2017-11-10 - Publisher: Springer

DOWNLOAD EBOOK

This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Func
SDN and NFV Security
Language: en
Pages: 141
Authors: Rahamatullah Khondoker
Categories: Technology & Engineering
Type: BOOK - Published: 2018-01-29 - Publisher: Springer

DOWNLOAD EBOOK

This book provides security analyses of several Software Defined Networking (SDN) and Network Functions Virtualization (NFV) applications using Microsoft’s th
SDN and NFV Simplified
Language: en
Pages: 612
Authors: Jim Doherty
Categories: Computers
Type: BOOK - Published: 2016-02-24 - Publisher: Addison-Wesley Professional

DOWNLOAD EBOOK

A Visual Guide to Understanding Software Defined Networks and Network Function Virtualization The simple, visual, at-a-glance guide to SDN and NFV: Core concept
A Comprehensive Guide to 5G Security
Language: en
Pages: 482
Authors: Madhusanka Liyanage
Categories: Technology & Engineering
Type: BOOK - Published: 2018-03-19 - Publisher: John Wiley & Sons

DOWNLOAD EBOOK

The first comprehensive guide to the design and implementation of security in 5G wireless networks and devices Security models for 3G and 4G networks based on U
Advances in Artificial Intelligence and Security
Language: en
Pages: 751
Authors: Xingming Sun
Categories: Computers
Type: BOOK - Published: 2022-07-08 - Publisher: Springer Nature

DOWNLOAD EBOOK

The 3-volume set CCIS 1586, CCIS 1587 and CCIS 1588 constitutes the refereed proceedings of the 8th International Conference on Artificial Intelligence and Secu