Guide to Security in SDN and NFV

Guide to Security in SDN and NFV
Author :
Publisher : Springer
Total Pages : 331
Release :
ISBN-10 : 9783319646534
ISBN-13 : 3319646532
Rating : 4/5 (34 Downloads)

Book Synopsis Guide to Security in SDN and NFV by : Shao Ying Zhu

Download or read book Guide to Security in SDN and NFV written by Shao Ying Zhu and published by Springer. This book was released on 2017-11-10 with total page 331 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Functions Virtualization (NFV), together referred to as SDNFV. Presenting a comprehensive guide to the application of security mechanisms in the context of SDNFV, the content spans fundamental theory, practical solutions, and potential applications in future networks. Topics and features: introduces the key security challenges of SDN, NFV and Cloud Computing, providing a detailed tutorial on NFV security; discusses the issue of trust in SDN/NFV environments, covering roots of trust services, and proposing a technique to evaluate trust by exploiting remote attestation; reviews a range of specific SDNFV security solutions, including a DDoS detection and remediation framework, and a security policy transition framework for SDN; describes the implementation of a virtual home gateway, and a project that combines dynamic security monitoring with big-data analytics to detect network-wide threats; examines the security implications of SDNFV in evolving and future networks, from network-based threats to Industry 4.0 machines, to the security requirements for 5G; investigates security in the Observe, Orient, Decide and Act (OODA) paradigm, and proposes a monitoring solution for a Named Data Networking (NDN) architecture; includes review questions in each chapter, to test the reader’s understanding of each of the key concepts described. This informative and practical volume is an essential resource for researchers interested in the potential of SDNFV systems to address a broad range of network security challenges. The work will also be of great benefit to practitioners wishing to design secure next-generation communication networks, or to develop new security-related mechanisms for SDNFV systems.


Guide to Security in SDN and NFV Related Books

Guide to Security in SDN and NFV
Language: en
Pages: 331
Authors: Shao Ying Zhu
Categories: Computers
Type: BOOK - Published: 2017-11-10 - Publisher: Springer

DOWNLOAD EBOOK

This book highlights the importance of security in the design, development and deployment of systems based on Software-Defined Networking (SDN) and Network Func
SDN and NFV Security
Language: en
Pages: 141
Authors: Rahamatullah Khondoker
Categories: Technology & Engineering
Type: BOOK - Published: 2018-01-29 - Publisher: Springer

DOWNLOAD EBOOK

This book provides security analyses of several Software Defined Networking (SDN) and Network Functions Virtualization (NFV) applications using Microsoft’s th
SDN and NFV Security
Language: en
Pages:
Authors: Rahamatullah Khondoker
Categories: Computer networks
Type: BOOK - Published: 2018 - Publisher:

DOWNLOAD EBOOK

This book provides security analyses of several Software Defined Networking (SDN) and Network Functions Virtualization (NFV) applications using Microsofts threa
SDN and NFV Simplified
Language: en
Pages: 612
Authors: Jim Doherty
Categories: Computers
Type: BOOK - Published: 2016-02-24 - Publisher: Addison-Wesley Professional

DOWNLOAD EBOOK

A Visual Guide to Understanding Software Defined Networks and Network Function Virtualization The simple, visual, at-a-glance guide to SDN and NFV: Core concept
5G Enabled Secure Wireless Networks
Language: en
Pages: 214
Authors: Dushantha Nalin K. Jayakody
Categories: Technology & Engineering
Type: BOOK - Published: 2019-02-05 - Publisher: Springer

DOWNLOAD EBOOK

This book covers issues related to 5G network security. The authors start by providing details on network architecture and key requirements. They then outline t