[go: up one dir, main page]

Bhattacharya, 2022 - Google Patents

Security analysis of network function virtualization (NFV)

Bhattacharya, 2022

View PDF
Document ID
924905980372669985
Author
Bhattacharya J
Publication year

External Links

Snippet

As a result of inflexibility and increasing cost of traditional network, Network Function Virtualization came into focus of the industry. NFV decouples network function software implementation from underlying hardware, and it provides an abstraction of network …
Continue reading at 20.198.91.3:8080 (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • G06F9/455Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogramme communication; Intertask communication
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Programme initiating; Programme switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • G06F9/50Allocation of resources, e.g. of the central processing unit [CPU]
    • G06F9/5061Partitioning or combining of resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F15/00Digital computers in general; Data processing equipment in general
    • G06F15/16Combinations of two or more digital computers each having at least an arithmetic unit, a programme unit and a register, e.g. for a simultaneous processing of several programmes
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L29/00Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/00 - H04L27/00 contains provisionally no documents
    • H04L29/02Communication control; Communication processing contains provisionally no documents
    • H04L29/06Communication control; Communication processing contains provisionally no documents characterised by a protocol
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring

Similar Documents

Publication Publication Date Title
Chandramouli et al. Building secure microservices-based applications using service-mesh architecture
KR102110273B1 (en) Chain security systems
US9509692B2 (en) Secured access to resources using a proxy
CA2737631C (en) Protected application stack and method and system of utilizing
US20190058709A1 (en) Tenant management method and system in a cloud computing environment
US10686791B1 (en) Secure cloud computing framework
Shackleford Virtualization security: protecting virtualized environments
Tsugawa et al. Cloud computing security: What changes with software-defined networking?
LaBarge et al. Cloud penetration testing
De Benedictis et al. A proposal for trust monitoring in a network functions virtualisation infrastructure
Sherry Middleboxes as a cloud service
Paladi et al. Trust anchors in software defined networks
US20200110857A1 (en) Reflection Based Endpoint Security Test Framework
Sood Empirical Cloud Security: Practical Intelligence to Evaluate Risks and Attacks
Chikhale et al. Security analysis of SDN cloud applications
Bhattacharya Security analysis of network function virtualization (NFV)
Sharma et al. Traefik API Gateway for Microservices
Karakaş Enhancing Security in Communication Applications Deployed on Kubernetes: Best Practices and Service Mesh Analysis
Faynberg et al. NFV security: Emerging technologies and standards
Giangiulio et al. Testing the security of a kubernetes cluster in a production environment
Pattaranantakul Moving towards software-defined security in the era of NFV and SDN
Zhang Secure and practical splitting of IoT device functionalities
Lioy et al. Trust in SDN/NFV environments
de Jesus Silva Zero trust security for microservices in scalable systems
Silva Zero Trust Security for microservices in scalable systems